ABC springer.de

Springer Customized Book List Computer

FRANKFURT BUCHMESSE 2007 springer.com/booksellers Computer 1

K. Aberer, Korea Advanced Institute of Science and Technolo- A. Abraham, Norwegian University of Science and Technology, gy, Korea; N. Noy, Stanford University, Stanford, CA, USA; D. Alle- Trondheim, Norway; Y. Dote, Muroran Institute of Technology, Transactions on Computational mang, TopQuadrant, CA, USA; K.-I. Lee, Saltlux Inc., Korea; L. Muroran, Japan Nixon, Free University Berlin, Germany; J. Goldbeck, University of Systems Biology VIII Maryland, MD, USA; P. Mika, Yahoo! Research Barcelona, Spain; D. Maynard, University of Sheffield, United Kingdom,; R. Mizoguchi, Engineering Hybrid Soft Computing Osaka University, Japan,; G. Schreiber, Free University Amster- dam, Netherlands,; P. Cudré-Mauroux, EPFL, Switzerland, (Eds.) Systems The LNCS journal Transactions on Computation- al Systems Biology is devoted to inter- and multi- disciplinary research in the fields of computer sci- The Semantic Web This book is focused on the latest technologies re- ence and life sciences and supports a paradigmat- 6th International Semantic Web Conference, 2nd Asian Se- lated to Hybrid Soft Computing targeting academia, ic shift in the techniques from computer and infor- mantic Web Conference, ISWC 2007 + ASWC 2007, Busan, Ko- scientists, researchers, and graduate students. mation science to cope with the new challenges aris- rea, November 11-15, 2007, Proceedings ing from the systems oriented point of view of bio- Features logical phenomena.  The six papers selected Latest technologies related to Hybrid Soft Comput- for this special issue are:Bio-inspired Network-Cen- ing tric Operation and Control for Sensor/Actuator This book constitutes the refereed proceedings of the joined 6th International Semantic Web Confer- Networks;A Computationally Fast and Parametric Fields of interest ence, ISWC 2007, and the 2nd Asian Semantic Web Model to Estimate Protein-Ligand Docking Time Appl.Mathematics/Computational Methods of En- Conference, ASWC 2007, held in Busan, Korea, in for Stochastic Event Based Simulation;Equation- gineering; Artificial Intelligence (incl. Robotics); Ap- November 2007. The 50 revised full academic pa- Based Congestion Control in the Internet Bio- plications of Mathematics; Numerical and Computa- pers and 12 revised application papers presented to- logic Environment;Computational Thinking in tional Methods in Engineering Biology;End-to-End Information Management for gether with 5 Semantic Web Challenge papers and Systems Biology;and a corrected version of: On Dif- 12 selected doctoral consortium articles were care- Target groups ferentiation and Homeostatic Behaviours of Boolean fully reviewed and selected from a total of 257 sub- Researchers, engineers, graduate students in Soft Dynamical Systems mitted papers to the academic track and 29 to the Computing and Fuzziness applications track. The papers address all current is- Fields of interest sues in the field of the semantic Web, ranging from Type of publication Computation by Abstract Devices; Bioinformatics; theoretical and foundational aspects to various ap- Monograph Mathematical Logic and Formal Languages; Algo- plied topics such as management of semantic Web data, ontologies, semantic Web architecture, social rithm Analysis and Problem Complexity Due November 2008 semantic Web, as well as applications of the semantic Target groups Web. Short descriptions of the top five winning ap- Researchers and professionals plications submitted to the Semantic Web Challenge 2008. Approx. 500 p. (Studies in Fuzziness and Soft Computing, competition conclude the volume. Vorläufiger Eintrag 350) Geb. Type of publication Collected works Fields of interest 139,05 € Information Systems Applications (incl.Internet); ISBN 978-3-540-25058-6 Due November 2007 Data Mining and Knowledge Discovery; Computer Communication Networks; Multimedia Information Systems; Logics and Meanings of Programs; Artifi- 2007. VII, 103 p. (Lecture Notes in Computer Science, Band 4780) cial Intelligence (incl. Robotics) Softcover

52,43 € Target groups ISBN 978-3-540-76638-4 Researchers and professionals Type of publication Proceedings

Due October 2007

2008. XXVII, 973 p. With CD. (Lecture Notes in Computer Science, Band 4825) Softcover

102,72 € ISBN 978-3-540-76297-3 2 Computer springer.com/booksellers

A. Abraham, Norwegian University of Science and Technology, M.S. Ackerman, University of Michigan, Ann Arbor, USA; C.A. J.C. Adams, W.S. Brainerd, R.A. Hendrickson, R.E. Maine, J.T. Mar- Trondheim, Norway; C. Grosan, Babes-Bolyai University, Cluj - Halverson, IBM TJ Watson Research, USA; Th. Erickson, IBM TJ tin, B.T. Smith Napoca, Romania; W. Pedrycz, University of Alberta, Edmonton, Watson Research, USA; W.A. Kellogg, IBM TJ Watson Research, AB, Canada (Eds.) USA (Eds.) The Fortran Handbook

Engineering Evolutionary Resources, Co-Evolution and A Toolkit for Fortran 2003 Intelligent Systems Artifacts

Theory in CSCW The Fortran 2003 Handbook is a definitive and com- prehensive guide to Fortran 2003 and its use. For- Evolutionary design of intelligent systems is gaining tran 2003, the latest standard version of Fortran, has much popularity due to its capabilities in handling A topic of significant interest to the CSCW, IT and many excellent features that assist the programmer several real world problems involving optimization, IS communities is the issue of how software and oth- in writing efficient, portable & maintainable complexity, noisy and non-stationary environment, er technical systems come to be adopted and used. programs. This book is an informal description of imprecision, uncertainty and vagueness. This edit- We know from considerable research that people Fortran 2003, developed to provide not only a read- ed volume 'Engineering Evolutionary Intelligent Sys- use systems in many ways, and that the process of in- able explanation of features, but also some rationale tems' deals with the theoretical and methodological corporating them in their everyday activities can re- for the inclusion of features & their use. Topics aspects, as well as various evolutionary algorithm quire a great deal of effort. One way of understand- & features include: The syntactic features of the applications to many real world problems originat- ing adoption and use is by considering artifacts as re- language are described completely in the appendices ing from science, technology, business or commerce. sources in people's environments. "Resources, Co- Each chapter begins with a summary of the main This volume comprises of 15 chapters including an Evolution and Artifacts: Theory in CSCW" looks at terms and concepts described in the chapter Each introductory chapter which covers the fundamen- how resources get created, adopted, modified, and of the intrinsic procedures is described in detail The tal definitions and outlines some important research die, by using a number of theoretical and empirical complete syntax of Fortran 2003 is supplied Contains challenges. Chapters were selected on the basis of studies to carefully examine and chart resources over a listing of the new and obsolescent features Numer- fundamental ideas/concepts rather than the thor- time. It examines issues such as: how resources are ous examples are given This handbook is intended oughness of techniques deployed. tailored or otherwise changed as the situations and for anyone who wants a comprehensive survey of Features purposes for which they are used change; how a re- Fortran 2003, including those familiar with program- Reports recent research results on Engineering Evo- source is maintained and reused within an organisa- ming language concepts but unfamiliar [..] lutionary Intelligent Systems tion; the ways in which the value of a resource comes to be recognised and portrayed; the ways in which an Features Fields of interest artifact is transformed to enable it to [..] Comprehensive coverage for anyone who wants a Appl.Mathematics/Computational Methods of Engi- comprehensive survey of Fortran 2003, including neering; Artificial Intelligence (incl. Robotics) Features those familiar with programming language concepts Proposes some new theories for CSCW by attempt- but unfamiliar with Fortran All authors have been Target groups ing to determine why computational systems or oth- intrinsically involved in the development of Fortran Engineers, researchers, and graduate students in er artifacts become so important in people's environ- computational intelligence ments (or how they become resources) Contents Preface.- Introduction.- Fortran Concepts and Type of publication Contents Terms.- Language Elements an Source Form.- Data Monograph Artifacts and Their Development.- The Birth of an Types.- Declarations.- Using Data.- Expressions and Organizational Resource.- The Zephyr Help Instance Assignment.- Block constructs and Execution con- trol.- Input and Output Processing.- Input and Out- Due January 2008 as a CSCW Resource.- Co-realisation: Towards a Principled Synthesis of Ethnomethodology and Par- put Editing.- Program Units.- Using Procedures.- ticipatory Design.- Figuring Out How to Figure Intrinsic Procedures and Modules.- Exceptions and 2008. Approx. 400 p. (Studies in Computational Intelligence, Out.- Contextualizing Influences: Language, Trust IEEE Arithmetic.- Interoperability with C.- Scope, Band 82) Geb. and Time.- Representational Gestures as Cognitive Association, and Definition.- A: Fortran 2003 Syn- tax.- B: Language Evolution.- Index 139,05 € Artifacts for Developing Theories in a Scientific Lab- ISBN 978-3-540-75395-7 oratory.- Distributed Cognition and Joint activity in Computer-System Administration.- Representation, Fields of interest Coordination and Information Artifacts in Medical Programming Languages, Compilers, Interpreters; Work.- Reach, Bracket and the Limits of [..] Programming Techniques

Fields of interest Target groups User Interfaces and Human Computer Interaction; Professionals Information Systems and Communication Service; Type of publication Management of Computing and Information Sys- Handbook tems

Target groups Due June 2008 Researchers and educators in IT; software engineers and information technology managers 2008. Approx. 800 p. Geb.

Type of publication 67,36 € Contributed volume ISBN 978-1-84628-378-9

Due November 2007

2007. Approx. 335 p. (Computer Supported Cooperative Work) Geb.

78,06 € ISBN 978-1-84628-900-2 springer.com/booksellers Computer 3

C.C. Aggarwal, IBM T.J. Watson Research Center, Yorktown M. Agosti, University of Padova, Italy (Ed.) S. Aguzzoli, University of Milan, Italy; A. Ciabattoni, Technical Uni- Heights, NY, USA; P.S. Yu, IBM T.J. Watson Research Center, York- versity Vienna, Austria; B. Gerla, University of Insurbria, Italy; C. town Heights, NY, USA (Eds.) Manara, University of Milan, Italy; V. Marra, University of Milan, Information Access through Search Italy (Eds.) Privacy-Preserving Data Mining Engines and Digital Libraries Algebraic and Proof-Theoretic Models and Algorithms Aspects of Non-Classical Logics The Information Management Systems group at the University of Padua, led by Maristella Agosti, has Papers in Honor of Daniele Mundici in the Occasion of His 60th Birthday Advances in hardware technology has increased been a major contributor to information retrieval the capability to store and record personal da- (IR) and digital libraries for nearly twenty years. ta about consumers and individuals. This, in This group has gained an excellent reputation in the turn, has led to concerns that personal data may IR community and has produced some of the best- Edited in collaboration with FoLLI, the Association be misused for a variety of purposes. Privacy known IR researchers, whose work spans a broad of Logic, Language and Information, this book con- Preserving Data Mining:  Models and range of topics. The papers in this book deal with e.g. stitutes the third volume of the FoLLI LNAI subline. Algorithms proposes a number of techniques automated text categorizations, web link analysis al- The 17 revised papers of this Festschrift volume - to perform the data mining tasks in a privacy-pre- gorithms, retrieval in multimedia digital libraries, published in honour of Daniele Mundici on the oc- serving way that alleviate these concerns. These tech- and multilingual information retrieval. The presen- casion of his 60th birthday - include invited extended niques generally fall into the following categories: tation of original research results built on the past versions of the most interesting contributions to the data modification techniques, cryptographic meth- work of the group which at the same time summa- International Conference on the Algebraic and Logi- ods & protocols for data sharing, statistical rizes past findings and opens up new directions and cal Foundations of Many-Valued Reasoning, held in techniques for disclosure and inference control, new areas of possible future research and coopera- Gargnano, Italy, in March 2006. Daniele Mundici is query auditing methods, randomization and pertur- tion will appeal to researchers and developers in in- widely acknowledged as a leading scientist in many- bation-based techniques. Privacy Preserving Data stitutions and companies working on search engines valued logic and ordered algebraic structures. In the Mining:  Models and Algorithms is an edited and information retrieval algorithms. last decades, his work has unvelead profound con- volume by distinguished world class leaders in the nections between logic and such diverse fields of re- field. Each chapter includes a survey, which contains Contents search as functional analysis, probability and mea- the key research content on the topic and future di- Information Access using the Guide of User Require- sure theory, the geometry of toric varieties, piecewise rections of research in this field. This volume is de- ments (M. Agosti) - From Linking Text to Linking linear geometry, and error-correcting codes. Several signed for researchers, professors [..] Crimes (F. Crestani) - Modeling Retrieval and Nav- prominent logicians, mathematicians, and computer igation in Context (M. Melucci) - Two Algorithms scientists attending the conference have contributed Features for Probabilistic Stemming (M. Melucci, N. Orio) - to this wide-ranging collection [..] Occupies an important niche in the privacy-preserv- Automated Text Categorization (G.M. Di Nunzio) - ing data mining field Survey information included Analysis of Web Link Analysis Algorithms (L. Pret- Fields of interest with each chapter is unique in terms of its focus on to) - Digital Annotations (N. Ferro) - Music Index- Artificial Intelligence (incl. Robotics); Mathematical introducing the different topics more comprehen- ing and Retrieval for Multimedia Digital Libraries Logic and Formal Languages; Language Translation sively Provides relative understanding of the work of (N. Orio) - A Statistical and Graphical Methodolo- and Linguistics different communities, such as cryptography, statis- gy for Comparing Bilingual and Monolingual Cross- tical disclosure control, data mining working in the Language Information Retrieval (F.Crivellari, [..] Target groups privacy field Comprehensive & current, bring- Researchers and professionals ing [..] Fields of interest Information Storage and Retrieval; Document Type of publication Contents Preparation and Text Processing; Library Science Proceedings -Preface.- Association Rule Hiding-. On Adversarial Privacy-Preserving Data Mining.- Privacy Preserv- Target groups Due October 2007 ing Data Mining across vertically partitioned data.- Researchers and libraries Privacy-Preserving Data Mining across horizontal- ly partitioned data.- Personalized Privacy Preserva- Type of publication 2007. VIII, 309 p. (Lecture Notes in Computer Science, Band 4460) Softcover tion.- Distributed and Cryptographic protocols for Monograph privacy-preserving computations.- A survey of Cryp- 51,36 € tographic Techniques for Privacy Preserving Data Due November 2007 ISBN 978-3-540-75938-6 Mining.- Cryptographic Approaches to Privacy.- Pri- vacy Preserving Stream Mining.- A Survey of Statis- 2008. XVI,196 pages with 39 illus. (The Information Retrieval Se- tical Disclosure Control Methods for Privacy Preser- ries, Band 22) Geb. vation.- Condensation: A pseudo-data [..] 74,85 € Fields of interest ISBN 978-3-540-75133-5 Systems and Data Security; Database Management; Data Encryption; Information Storage and Retrieval; Multimedia Information Systems; Information Sys- tems Applications (incl.Internet)

Target groups Researchers, professors and graduate-level students

Type of publication Contributed volume

Due July 2008

2008. Approx. 600 p. (Advances in Database Systems, Band 34) Geb.

81,59 € ISBN 978-0-387-70991-8 4 Computer springer.com/booksellers

F. Ahrendts, A. Marton H. Ammari, Ecole Polytechnique, CNRS, Palaiseau, France (Ed.) D.R. Anderson, Colorado State University, Fort Collins, CO, USA

IT-Risikomanagement leben! Modeling and Computations in Model Based Inference in the Life

Wirkungsvolle Umsetzung für Projekte in der Softwareen- Electromagnetics Sciences twicklung A Volume Dedicated to Jean-Claude Nédélec A Primer on Evidence

Dieses Handbuch bietet für alle Mitarbeiter an Modeling and computations in electromagnetics The abstract concept of “information” can be quan- einem Softwareentwicklungsprojekt eine umfassende is a quite novel and growing discipline, expanding tified and this has led to many important advances Einführung in die Thematik des Risikomanage- as a result of the steadily increasing demand for de- in the analysis of data in the empirical sciences. This ments. Projektmanager und Programmierer erhalten signing electrical devices, modeling electromagnet- text focuses on a science philosophy based on “mul- eine gemeinsame Wissensgrundlage und einen Leit- ic materials, and simulating electromagnetic fields tiple working hypotheses” and statistical models faden für die effektive Anwendung und Einführung in nanoscale structures. The aim of this volume is to to represent them. The fundamental science ques- eines Risikomanagementsystems für Softwareen- bring together prominent worldwide experts to re- tion relates to the empirical evidence for hypothe- twicklungsprojekte beliebiger Größe. Der Leitfaden view state-of-the-art developments and future trends ses in this set—a formal strength of evidence. Kull- beschreibt die Anwendung in der Arbeitspraxis und of modeling and computations in electromagnetics. back-Leibler information is the information lost basiert auf einem Risikokatalog, der Risiken auflis- This volume is devoted to merging the expertise of when a model is used to approximate full reality. Hi- tet und systematisiert. Dies grenzt das Buch von scientists working in this dynamic discipline, and rotugu Akaike found a link between K-L informa- bestehenden schwergewichtigen und zentralisierten to raising interest for challenging issues. The most tion (a cornerstone of information theory) and the Ansätzen zum Risikomanagement ab und ermöglicht significant advances in computational techniques maximized log-likelihood (a cornerstone of mathe- optimierte Ansätze im Spannungsfeld zwischen have been made only in the last few years, and sever- matical statistics). This combination has become the Kosten, Zeit und Qualität. Das Hauptgewicht des al challenging technological applications are present- basis for a new paradigm in model based inference. Buches liegt im praktischen Einsatz. Als Kombina- ed in this volume. The text advocates formal inference from all the hy- tion zwischen Grundlagenwissen, Anwendungsleit- potheses/models in the a priori set—multimodel in- faden und Risikokatalog ist es prädestiniert zur Fields of interest ference. This compelling approach allows a simple regelmäßigen projektintegrierten Anwendung. Dabei Computational Mathematics and Numerical Analy- ranking of the science hypothesis and their models. werden alle beteiligten Rollen vom Management bis sis; Electromagnetism, Optics and Lasers; Numerical Simple methods are introduced for computing the zur Entwicklung gleichermaßen angesprochen. and Computational Methods in Engineering; Mathe- likelihood [..] matical and Computational Physics Features Features Leitfaden zur effektiven Einführung und Nutzung Target groups Very broad applicability, very science-based, and eines Risikomanagementsystems Risiko- und Computational scientists practical Very powerful – the concept of formal Maßnahmenkatalog mit praxisrelevanten Risiken bei “strength of evidence” Simple to use and understand der Softwareentwicklung Risiken klassifiziert und Type of publication An emphasis on science philosophy, not just “data übersichtlich in Tabellenform präsentiert Ideal zum Proceedings analysis” Nachschlagen Contents Contents Due October 2007 Introduction--science hypotheses and science phi- 1. Anleitung zum Buch: Was muss welcher Leser losophy.- Data and models.- Information theory and lesen?- Wie sollte das Buch eingesetzt werden?- 2. 2008. IX, 229 p. 74 illus. (Lecture Notes in Computational Science entropy.- Quantifying the evidence about science hy- Einführung in das Risikomanagement: Definition and Engineering, Band 59) Softcover potheses.- Multimodel inference.- Advanced topics.- Risiko.- Was ist Risikomanagement?- Probleme Summary. des Risikomanagements.- 3. Leitfaden: Aufruf zum 64,15 € ISBN 978-3-540-73777-3 "neuen Risikomanagement".- Ablauf des Risiko- Fields of interest managementprozesses.- Integration in Vorgehens- Statistics for Life Sciences, Medicine, Health Sci- modelle der Softwareentwicklung.- Praxisbeispiel.- ences; Environmental Computing/Environmental Los geht's.- 4. Risikokatalog: Entwicklungsprozess- Modelling; Ecology; Evolutionary Biology; Epidemi- risiken.- Qualitäts- und Testmanagementrisiken.- ology; Methodology of the Social Sciences Organisatorische Risiken.- Soziale Risiken.- Strate- gische Risiken. Target groups Grad students, scientists Fields of interest Management of Computing and Information Type of publication Systems; Information Systems Applications Graduate/advanced undergraduate textbook (incl.Internet); Information Systems

Target groups Due December 2007 Softwareentwickler, Projektleiter, IT-Berater 2008. Approx. 190 p. Softcover Type of publication Professional book 32,96 € ISBN 978-0-387-74073-7 Due October 2007

2008. XVIII, 371 S. 25 Abb. (Xpert.press) Geb.

49,95 € ISBN 978-3-540-30024-3 springer.com/booksellers Computer 5

A.M. Andrew R. Annicchiarico, U. Cortés, C. Urdiales (Eds.) R. Anthony, University of Greenwich, UK; O.F. Rana, Cardiff Uni- versity, UK; D. Johnston-Watt, Enigmatec Corporation Limited, , UK (Eds.) A Missing Link in Cybernetics Agent Technology and e-Health

Logic and Continuity Policy-Based Autonomic Computing

Multi-agent systems are one of the most exciting re- search areas in Artificial Intelligence. In the last ten The relative failure of attempts to analyze and mod- years there has been a growing interest in the appli- Policy-based computing is one of many techniques el intelligence can be attributed in part to the cus- cation of agent-based systems in health care. More- used to implement autonomic computer systems. tomary assumption that the processing of continu- over, a growing European community of researchers The business function is expressed in terms of work- ous variables and the manipulation of discrete con- interested in the application of intelligent agents in flow (logic + actions) or behavioural rules to be per- cepts should be treated separately. In this book, the health care emerged as a result of the activities with- formed in response to certain situations, which is de- author considers concept-based thought as having in the AgentCities.NET European network and the coupled from the implementation mechanism. The evolved from processing of continuous variables. AgentLink III Technical Forum Group on Health- mechanisms are fixed at design time, but the actu- Although "fuzzy" theory acknowledges the need to care Applications of Intelligent Agents. And special- al run-time behaviour is decided by the policy. This combine conceptual and continuous processing, its ly in R and D projects funded during the FP6. Thus, facilitates contextual awareness as the policy may assumption of the primacy of concept-based process- this book reports on the results achieved in this area, take account of various environmental inputs from ing makes it evolutionarily implausible. The text be- discuss the benefits (and drawbacks) that agent- sensors and external software systems. Policy-based gins by reviewing the origins and aims of cybernet- based systems may bring to medical domains and so- mechanisms are also very useful in specifying system ics with particular reference to Warren McCulloch’s ciety, and also to provide a list of the research topics behaviour - such as when specifying Service Level declared lifetime quest of "understanding man’s un- that should be tackled in the near future to make the Agreements, and subsequently monitoring whether derstanding". It is shown that continuous systems deployment of health-care agent-based systems a re- these agreements have been adhered to. Policy-based can undergo complex self-organization, but a need ality. configuration is highly versatile and generally ap- for classification of situations becomes apparent and plicable across a very wide application space. When can be seen as the evolutionary beginning of con- Features compared with other autonomics techniques, poli- cept-based processing. Possibilities for complex self- Presents results achieved in Healthcare Applications cies represent one of the lowest risk and lowest cost organization are emphasized by discussion of a [..] of Intelligent Agents Comprehensive view of the solutions; because there is relatively low complexity. field, up-to-date information and state of the art of Features the research Features Advances an alternative approach to analyze and Represents state of the art concepts and practice Var- model intelligence Systematically presented Contents ious aspects of using policies in the context of au- HealthAgents - Agent-based Distributed Decision tonomic computing Survey articles that highlight Contents Support System for Brain Tumour Diagnosis and research directions in policy languages, tools and Preface.- Cybernetics: Origins and Aims.- Where to Prognosis.- SAPHIRE: A Multi-Agent System for Re- frameworks Start?- Continuous Versus Discrete.- Adaptation, mote Healthcare Monitoring through Computerized Self-Organization, and Learning.- Significance Feed- Clinical Guidelines.- K4CARE: Knowledge-Based Contents back.- Self-Reference.- Fractal Intelligence.- Conclu- HomeCare eServices for an Ageing Europe.- ASPIC: From the contents: Towards an Autonomic Com- sions.- References. Argumentation Service Platform with Integrated puting Testbed.- Categorizing and differencing sys- tem behaviors.- Invited Paper: Implementing Prato, Fields of interest Components.- Applying Provenance in Distributed Organ Transplant Management.- Supported Human a database on demand service.- Prize Paper: Enabling Artificial Intelligence (incl. Robotics); Applications Policy-Driven Self-Management for Enterprise-Scale of Mathematics; Systems Theory, Control Autonomy for Recovery and Enhancement of cogni- tive and motor disabilities using Agent technologies. Systems.- Policies as Signals in Collaborative Policy Engineering.- Policy-Based Context Modelling and Target groups Ontologies in Autonomic Applications to Facilitate Researchers in AI, cybernetics, and systems science, Fields of interest the Information Interoperability in NGN.- Industry graduate students Artificial Intelligence (incl. Robotics); Computer Systems Organization and Communication Net- Case Study: Policy-driven self-management for an Type of publication works; Computer Appl. in Arts and Humanities; automotive middleware.- Exploiting Emergent Be- Monograph Computer Applications havior for Inter-Vehicle Communication.- [..] Target groups Fields of interest Due August 2008 Researchers, computer scientists, general practi- Artificial Intelligence (incl. Robotics); Special Pur- cioners and students pose and Application-Based Systems; Logic Design; 2008. Approx 230 p. (IFSR International Series on Systems Sci- Programming Languages, Compilers, Interpreters; ence and Engineering, Band 27) Geb. Type of publication Information Systems and Communication Service Collected works 74,15 € Target groups ISBN 978-0-387-75163-4 Due December 2007 Researchers and research students, autonomics prac- titioners, autonomics and policy-computing com- munities, policy specialists 2008. Approx. 140 p. (Whitestein Series in Software Agent Tech- nologies and Autonomic Computing) Softcover Type of publication Collection of essays 42,69 € ISBN 978-3-7643-8546-0 Due February 2008

2008. Approx. 250 p. (Whitestein Series in Software Agent Tech- nologies and Autonomic Computing) Softcover

42,69 € ISBN 978-3-7643-8544-6 6 Computer springer.com/booksellers

L. Antunes, University of Lisbon, Portugal; K. Takadama, The Uni- F. Arbab, Leiden University, Leiden, The Netherlands; M. Sirjani, M. Arenas, Universidad Catolica de Chile, Santiago, Chile; M.I. versity of Electro-Communications, Tokyo, Japan (Eds.) University of Tehran, Iran (Eds.) Schwartzbach, University of Aarhus, Denmark (Eds.)

Multi-Agent-Based Simulation VII International Symposium on Database Programming Languages

International Workshop, MABS 2006, Hakodate, Japan, May 8, Fundamentals of Software 11th International Symposium, DBPL 2007, Vienna, Austria, 2006, Revised and Invited Papers Engineering September 23-24, 2007, Revised Selected Papers

International Symposium, FSEN 2007, Tehran, Iran, April 17-19, 2007, Proceedings This book constitutes the thoroughly refereed pro- This book constitutes the thoroughly refereed post- ceedings of the 7th International Workshop on Mul- proceedings of the 11th International Symposium ti-Agent-Based Simulation, MABS 2006, held in on Database Programming Languages, DBPL 2007, Hakodate, Japan, May 8, 2006 as an associated event This book constitutes the refereed proceedings of held in Vienna, Austria, in September 2007 in con- of AAMAS 2006, the main international conference the International Symposium on Fundamentals of junction with VLDB 2007. The 16 revised full papers on autonomous agents and multi-agent systems. The Software Engineering, FSEN 2007, held in Tehran, presented together with 1 invited lecture were care- 12 revised full papers presented together with 3 short Iran, April 17-19, 2007. The 32 revised papers pre- fully selected during two rounds of reviewing and papers and 2 invited papers were carefully reviewed sented were carefully reviewed and selected from improvement from 41 submissions. The papers are and selected from 25 submissions during two rounds 73 submissions. The topics include Models of pro- organized in topical sections on algorithms, XML of reviewing and improvement. The papers are or- grams and systems, Software specification, validation query languages, inconsistency handling, data prove- ganized in topical sections on Empirical Cross Stud- and verification, Software architectures and their de- nance, emerging data models, and type checking. ies, Experimental Ecology, Experimental Economics, scription languages, Object and multi-agent systems, Foundations and Methodologies, Learning and So- Coordination and feature interaction, Integration Fields of interest cial Dependence. of formal and informal methods, Integration of dif- Database Management; Information Storage ferent formal methods, Component-based develop- and Retrieval; Information Systems Applications Fields of interest ment, Service-oriented development, Model check- (incl.Internet); Data Storage Representation; Infor- Artificial Intelligence (incl. Robotics); Simula- ing and theorem proving, Software and hardware mation Systems tion and Modeling; Computer Communication verification and CASE tools and tool integration. Networks; Computer Appl. in Social and Behav- Target groups ioral Sciences; Information Systems Applications Fields of interest Researchers and professionals (incl.Internet) Software Engineering/Programming and Operat- ing Systems; Logics and Meanings of Programs; Pro- Type of publication Target groups gramming Techniques; Models and Principles Proceedings Researchers and professionals Target groups Due October 2007 Type of publication Researchers and professionals Proceedings Type of publication 2007. VIII, 261 p. (Lecture Notes in Computer Science, Band 4797) Softcover Due October 2007 Proceedings 48,15 € Due October 2007 2007. X, 189 p. (Lecture Notes in Computer Science, Band 4442) ISBN 978-3-540-75986-7 Softcover 2007. XIII, 450 p. (Lecture Notes in Computer Science, Band 4767) 44,94 € Softcover ISBN 978-3-540-76536-3 64,20 € ISBN 978-3-540-75697-2 springer.com/booksellers Computer 7

I.K. Argyros, Cameron University, Lawton, OK, USA S. Arimoto, Ritsumeikan University, Kyoto, Japan J. Arndt, Bayreuth; C. Haenel, München

Convergence and Applications of Control Theory of Multi-fingered Pi

Newton-type Iterations Hands Algorithmen, Computer, Arithmetik A Modelling and Analytical–Geometry Approach for Dexterity and Intelligence Together with recent trends in local convergence, Ausgehend von der Programmierung moderner semilocal convergence analysis constitutes a natu- Hochleistungsalgorithmen stellen die Autoren das ral framework for the theoretical study of iterative The hand is an agency of the brain; it reflects activ- mathematische und programmtechnische Umfeld methods. This monograph is the first to adequately ities of the brain and thereby can be seen as a mir- der Zahl Pi ausführlich dar. So werden zur Berech- cover both basic theory and new results in the area. It ror to the mind. The dexterity of the hand has been nung von Pi sowohl die arithmetischen Algorith- treats iterative methods for solving nonlinear equa- investigated widely in developmental psychology men, etwa die FFT-Multiplikation, die super-linear tions with particular emphasis on theoretical aspects and in anthropology. Since robotics launched in the konvergenten Verfahren von Gauß, Brent, Salamin, of semilocal convergence of Newton-type methods. mid-1970s, numerous multi-fingered hands mimick- Borwein, die Formeln von Ramanujan und Bor- An ideal introduction to the field, the book primari- ing the human hand have been designed and made wein-Bailey-Plouffe bis zum neuen Tröpfel-Algo- ly contains research results obtained by the author, in a number of universities and research institutes, rithmus behandelt. Der Leser findet viel Anregendes extending classical theorems, such as convergence in addition to sophisticated prosthetic hands with wie auch Skurriles, etwa interessante Anmerkungen results under weaker hypothesis, enlargement of the plural fingers. Control Theory of Multi-fingered zur Quadratur des Kreises. Die dritte, überarbeitete radius of convergence, improvements of certain con- Hands presents a comprehensive insight into the in- Auflage berichtet auch über die wichtigsten neuen stants or bounds. The development of the material is telligence and dexterity of robotic multi-fingered Ergebnisse der Pi-Forschung. Zahlreiche Verweise intuitive, and each chapter contains new theoretical hands from both the physical and control- theoretic auf Internetquellen, ausführlicher Index und Liter- results and important applications to engineering, viewpoints. Control Theory of Multi-fingered Hands aturverzeichnis ergänzen das Buch. dynamic economic systems, input-output systems, will be a useful reference for postgraduate students nonlinear and linear differential equations, and opti- Features and researchers in this field, as well as engineers and mization problems. Several classes of operators are Dritte, überarbeitete und erweiterte Auflage roboticists. considered: operators without [..] mit neuen Pi-Entdeckungen Mathematisches Features Lesevergnügen pur Darstellung algorithmischer Features No other book has been written about the control of Werkzeuge * An ideal introduction to the field * Contains new multi-fingered hands Explains what kinds of senso- theoretical results and important applications to en- Contents ry-motor coordinated signals are necessary and suf- gineering, dynamic economic systems, input-output Der Stand der Dinge.- Wie zufällig ist Pi?- ficient for realizing stable grasping and/or object ma- systems, nonlinear and linear differential equations, Näherungen für Pi und Kettenbrüche.- Arcus Tan- nipulation and optimization problems * Useful to an au- gens.- Tröpfel-Algorithmen.- Gauß und Pi.- Ra- dience of graduate students and researchers working Contents manujan und Pi.- Die Borweins und Pi.- Das BBP- in the areas of numerical and functional analysis or Characteristics of Human Hands.- Stability of Grasp- Verfahren.- Arithmetik.- Vermischtes.- Histo- computer science * Includes many solved problems ing in a Static or Dynamic Sense.- Test-bed Problems rie.- Die Zukunft: Internet und Pi-Berechnungen.- and [..] of Control: How to Stabilise 2D Objects through Formelsammlung Pi.- Tabellen.- Documentation for Rolling Contact.- Two-dimensional Grasping by a the hfloat library.- Other high precision libraries.- Contents Pair of Rigid Fingers.- Three-dimensional Grasping Literaturverzeichnis.- Index. Preface.- Table of Contents.- Operators and Equa- by a Pair of Rigid Fingers.- Dexterity and Control for tions.- The Newton-Kantorovich (NK) Method.- Ap- Fields of interest Stable Grasp by Soft Fingers. plications of the Weaker Version of the (NK) The- Algorithm Analysis and Problem Complexity; Sym- orem.- Special Methods.- Newton-Like Methods.- Fields of interest bolic and Algebraic Manipulation; Math Applica- Analytic Computational Complexity: We are Con- Automation and Robotics; Artificial Intelligence (in- tions in Computer Science; Number Theory cerned with the Choice of Initial Approximations.- cl. Robotics); Control Engineering Variational Inequalities.- Convergence Involving Target groups Operators with Outer or Generalized Inverses.- Con- Target groups Programmierer, Software-Entwickler, Pi-Fans, Hob- vergence on Generalized Banach Spaces.- Point-to- Postgraduate students studying robotics, human sci- by-Mathematiker Set Mappings.- The Newton-Kantorovich Theorem ence and developmental psychology, Robotics en- Type of publication and Mathematical Programming.- Glossary of Sym- gineers, roboticists, Engineers and researchers con- Professional book bols. cerned with prosthetics, Researchers in computa- tional brain science Fields of interest Due June 2008 Numerical Analysis; Computational Mathematics Type of publication and Numerical Analysis; Functional Analysis Monograph 2008. Etwa 260 S. Geb. Target groups Due January 2008 32,95 € Graduate students and researchers in numerical and ISBN 978-3-540-48246-8 functional analysis as well as computer science. 2008. Approx. 275 p. Geb. Type of publication Monograph 117,65 € ISBN 978-1-84800-062-9 Due March 2008

2008. XII, 516 pp. Geb.

ISBN 978-0-387-72741-7 8 Computer springer.com/booksellers

A. Arnez, Schönaich, Germany; K. Polthier, Technische Universität A. Arnez, Schönaich, Germany; K. Polthier, Technische Universität B.C. Arnold, University of California, Riverside, CA, USA; N. Balakr- Berlin, Germany; M. Steffens, Unterföhring, Germany; C. Teitzel, Berlin, Germany; M. Steffens, Unterföhring, Germany; C. Teitzel, ishnan, McMaster University, Hamilton, ON, Canada; J.M. Sarabia, Unterföhring, Germany Unterföhring, Germany University of Cantabria, Santander, Spain; R. Mínguez, University of Castilla-La Mancha, Ciudad Real, Spain (Eds.) Touching Soap Films Touching Soap Films Advances in Mathematical and Statistical Modeling This is a scientific video about the world of soap This is a scientific video about the world of soap films, designed for the general public. Few other films, designed for the general public. Few other physical problems have influenced as many branch- physical problems have influenced as many branch- Enrique Castillo is a leading figure in several math- es of mathematics in the past 200 years as have the es of mathematics in the past 200 years as have the ematical and engineering fields, having contribut- study of soap films. A soap film is physically similar study of soap films. A soap film is physically similar ed seminal work in such areas as Bayesian networks, to a piece of rubber surface which tries to contract it- to a piece of rubber surface which tries to contract it- neural networks, functional equations, artificial in- self under surface tension to a surface with least area. self under surface tension to a surface with least area. telligence, linear algebra, optimization methods, nu- This completely computer generated video explains This completely computer generated video explains merical methods, reliability engineering, as well as the world of soap films in an amusing story, in which the world of soap films in an amusing story, in which sensitivity analysis and its applications. Organized a young boy explores the palace of soap films. Under a young boy explores the palace of soap films. Under to honor Castillo’s significant contributions, the guidance of an old professor, he gains fascinating the guidance of an old professor, he gains fascinating this volume is an outgrowth of the "International insights and becomes a witness to never-before-seen insights and becomes a witness to never-before-seen Conference on Mathematical and Statistical Mod- shapes and animations of soap films. The authors shapes and animations of soap films. The authors eling," and covers recent advances in mathematical have achieved the unique result of making the film have achieved the unique result of making the film and statistical modeling. Applications to safety, re- exciting and enjoyable for both anyone interested exciting and enjoyable for both anyone interested liability and life-testing, financial modeling, quali- in science and researchers in differential geometry. in science and researchers in differential geometry. ty control, general inference, as well as neural net- In addition, the film is ideally suited to be shown to In addition, the film is ideally suited to be shown to works and computational techniques are presented. school students, and hence of great interest to math- school students, and hence of great interest to math- The book is divided into seven main sections, ematics teachers. For the DVD version, "Geodesics ematics teachers. For the DVD version, "Geodesics which include distribution the- and Waves" has been added. and Waves" has been added. ory and order statistics, extreme value theory, modeling in Features Features engineering, fatigue models, modeling The film has a unique mathematical content, which The film has a unique mathematical content, which in business and [..] is not accessible anywhere else, neither in any print- is not accessible anywhere else, neither in any print- ed publication nor any other film It is of immense ed publication nor any other film It is of immense Features interest to researchers and students in mathematics, interest to researchers and students in mathematics, Contributors are prominent, distinguished, and a general science-interested audience and a general science-interested audience and well-respected researchers in the field of math- ematical and statistical modeling Real-world appli- Fields of interest Fields of interest cations to safety, reliability, life-testing, finan- Differential Geometry; Computer Graphics; Mathe- Differential Geometry; Computer Graphics; Mathe- cial modeling, quality control, general inference, eco- matical and Computational Physics matical and Computational Physics nomics, engineering, as well as neural networks and Target groups Target groups computational techniques Good reference work for Researchers and students in mathematics, and a gen- Researchers and students in mathematics, and a gen- practitioners, researchers, and graduate students in eral science-interested audience eral science-interested audience [..]

Type of publication Type of publication Contents Teachware Teachware Preface.- List of Contributors.- List of Tables.- List of Figures.- Part I. Distribution Theory and Appli- cations.- Enrique Castillo's Contributions to Con- Due November 2007 Due November 2007 ditional Specification.- The Polygonal Distribu- tion.- Conditionally Specified Models: New 2008. DVD-Video NTSC. (Springer VideoMATH) 2008. DVD-Video PAL. (Springer VideoMATH) Developments and Applications.- Modelling of Insurance Claim Count with Hurdle Distribu- 41,59 € 41,59 € tion for Panel Data.- Distance-Based Asso- ISBN 978-3-540-24041-9 ISBN 978-3-540-24093-8 ciation and Multi-Sample Tests for General Multi- variate Data.- Part II. Probability and Statistics.- Em- pirical Bayes Assessment of the Hyperparameters in Bayesian Factor Analysis.- Part III. Order [..]

Fields of interest Statistical Theory and Methods; Statistics for Busi- ness/Economics/Mathematical Finance/Insurance; Statistics for Engineering, Physics, Computer Sci- ence, Chemistry & Geosciences; Mathematical Mod- eling and Industrial Mathematics; Computational Science and Engineering; Optimization

Target groups Practitioners, researchers, and graduate students in statistics, applied mathematics, engineering, eco- nomics, and modeling.  

Type of publication Contributed volume

Due May 2008 springer.com/booksellers Computer 9

Y. Avramenko, Lappeenranta University of Technology, Lappeen- N. Ayache, INRIA, Sophia-Antipolis, France; S. Ourselin, CSIRO ICT 2008. Approx. 504 p. 56 illus. (Statistics for Industry and Technol- ranta, Finland; A. Kraslawski, Lappeenranta University of Tech- Centre, Brisbane, Australia; A. Maeder, CSIRO ICT Centre, Bris- ogy) Geb. nology, Lappeenranta, Finland bane, Australia (Eds.)

103,79 € ISBN 978-0-8176-4625-7 Case Based Design Medical Image Computing and

Applications in Process Engineering Computer-Assisted Intervention – MICCAI 2007

10th International Conference, Brisbane, Australia, October 29 The book by Professors Avramenko and Kraslawski - November 2, 2007, Proceedings, Part I is unique in several important ways. First, it is an im- pressive and in-depth treatment of the essence of the case–based reasoning strategy and case-based design dwelling upon the algorithmic facet of the paradigm. The two-volume set LNCS 4791 and LNCS 4792 Second, the authors provided an excellent applied re- constitute the refereed proceedings of the 10th Inter- search framework by showing how this development national Conference on Medical Image Computing can be effectively utilized in real word complicated and Computer-Assisted Intervention, MICCAI 2007, environment of process engineering- a pursuit that held in Brisbane, Australia, in October/November is rarely reported in the literature in such a compre- 2007. The program committee carefully selected 38 hensive manner as done in this book. In a highly au- revised full papers and 199 revised poster papers thoritative and systematic manner, the authors guide from 637 submissions for presentation in two vol- the reader through the essential features of the CBR umes, based on rigorous peer reviews. The first vol- machinery. ume contains 120 contributions related to diffusion tensor imaging and computing, cardiac imaging and Features robotics, image segmentation and classification, im- Contributes to a broader use of case-based design in age guided intervention and robotics, general med- engineering practice ical image computing, computer assisted interven- tion and robotics, computational anatomy, compu- Contents tational physiology, innovative clinical and biologi- Part I: Design Support.- The Design Process of Prod- cal applications, physiology and physics-based image uct and Process Development.- Decision Support in computing, brain atlas computing, and simulation of Design.- Part II: Case-Based Design Support.- Case- therapy. The second volume includes 117 papers re- Based Reasoning Approach.- Similarity and Adapta- lated to computer assisted intervention and robotics, tion Concepts.- Case-Based Reasoning Environment visualization [..] – Cabareen.- Part III: Application to Support of De- sign Process.- Product Design: Food Product Formu- Fields of interest lation.- Conceptual Design: Process Sequence Syn- Image Processing and Computer Vision; Pattern thesis.- Pre-Detailed Design: Process Model Selec- Recognition; Computer Graphics; Artificial Intelli- tion.- Equipment Design: Reactive Distillation Col- gence (incl. Robotics); Imaging / Radiology; Health umn Design. Informatics & Health Administration

Fields of interest Target groups Appl.Mathematics/Computational Methods of Engi- Researchers, professors, and clinical doctors neering; Artificial Intelligence (incl. Robotics); Engi- neering Design Type of publication Proceedings Target groups Engineers, researchers, and graduate students in Due October 2007 computational intelligence and computer science

Type of publication 2007. XLVI, 1012 p. (Lecture Notes in Computer Science, Band 4791) Softcover Monograph 109,14 € Due January 2008 ISBN 978-3-540-75756-6

2008. Approx. 170 p. (Studies in Computational Intelligence, Band 87) Geb.

106,95 € ISBN 978-3-540-75705-4 10 Computer springer.com/booksellers

N. Ayache, INRIA, Sophia-Antipolis, France; S. Ourselin, CSIRO ICT C. Badica, University of Craiova, Romania; M. Paprzycki, Warsaw P. Baker, Motorola Labs, Basingstoke, UK; Z.R. Dai, Fraunhofer Centre, Brisbane, Australia; A. Maeder, CSIRO ICT Centre, Bris- School of Social Psychology, Warsaw, Poland (Eds.) Fokus, Berlin, Germany; J. Grabowski, University of Goettingen, bane, Australia (Eds.) Germany; Ø. Haugen, University of Oslo, Norway; I. Schieferdeck- er, Fraunhofer Fokus, Berlin, Germany; C. Williams, IBM Watson Advances in Intelligent and Research Center, Hawthorne, NY, USA Medical Image Computing and Distributed Computing Computer-Assisted Intervention – Model-Driven Testing MICCAI 2007 Proceedings of the 1st International Symposium on Intelligent and Distributed Computing IDC 2007, Craiova, Romania, Octo- Using the UML Testing Profile ber 2007 10th International Conference, Brisbane, Australia, October 29 - November 2, 2007, Proceedings, Part II Model-driven development has become the most im- This book presents the proceedings of the 1st Inter- portant new paradigm in software development and national Symposium on Intelligent and Distribut- The two-volume set LNCS 4791 and LNCS 4792 has already demonstrated considerable impact in re- ed Computing – IDC’2007, held in Craiova, Roma- constitute the refereed proceedings of the 10th Inter- ducing time to market and improving product qual- nia, October 2007. IDC 2007 was the first Interna- national Conference on Medical Image Computing ity. However, the development of high-quality sys- tional Symposium bringing together researchers in- and Computer-Assisted Intervention, MICCAI 2007, tems not only requires systematic development pro- volved in intelligent and distributed computing to held in Brisbane, Australia, in October/November cesses but also systematic test processes. This book allow cross-fertilization and search for synergies of 2007. The program committee carefully selected 38 is about systematic, model-driven test processes in ideas and to enable advancement of research in these revised full papers and 199 revised poster papers the context of UML. As UML provides only limited exciting sub-fields of computer science. The 34 con- from 637 submissions for presentation in two vol- means for the design and development of test arti- tributions in this book cover a broad area of topics umes, based on rigorous peer reviews. The first vol- facts, a consortium was formed by the Object Man- related to intelligent and distributed computing, sys- ume contains 120 contributions related to diffusion agement Group (OMG) to develop a UML profile tems and applications, including: autonomous and tensor imaging and computing, cardiac imaging and for model-driven testing – the UML Testing Pro- adaptive computing; constraint satisfaction; cooper- robotics, image segmentation and classification, im- file (UTP), an official OMG standard since 2005. ation and coordination; data mining and knowledge age guided intervention and robotics, general med- Written by the original members of this standard- discovery; distributed problem solving and decision ical image computing, computer assisted interven- ization group, this book shows you how to use UML making; e-business, e-health and e-learning; genetic tion and robotics, computational anatomy, compu- to test complex software systems. The authors intro- algorithms; image processing; information retrieval; tational physiology, innovative clinical and biologi- duce UTP step-by-step, using a case study that illus- or intelligence in mobile and ubiquitous computing. cal applications, physiology and physics-based image trates how UTP can be used for test modeling and computing, brain atlas computing, and simulation of Features test specification. You’ll learn how UTP concepts can therapy. The second volume includes 117 papers re- Presents latest results in Intelligent and Distributed be used for functional [..] lated to computer assisted intervention and robotics, computing visualization [..] Features Contents Learn from its creators how to apply the UML Test- Fields of interest Invited Papers.- Regular Papers.- Short Papers. ing Profile for test modeling and test specification Image Processing and Computer Vision; Pattern See how model-driven testing works with UML Ex- Recognition; Computer Graphics; Artificial Intelli- Fields of interest perience best practices in the use of UML for differ- gence (incl. Robotics); Imaging / Radiology; Health Appl.Mathematics/Computational Methods of En- ent aspects of testing Understand the automated ex- Informatics & Health Administration gineering; Artificial Intelligence (incl. Robotics); Ap- ecution of UML-based tests with existing test frame- plications of Mathematics works like JUnit and TTCN-3 Find additional online Target groups material at http://utp.omg.org/ Researchers, professors, and clinical doctors Target groups Researchers, engineers, graduate students in compu- Contents Type of publication tational intelligence and computer science Introduction.- Part I: Foundations.- 1 Model-Based Proceedings Testing - 2 Basics - 3 Library -Example Introduc- Type of publication tion.- Part II: Functional Testing.- 4 Unit Level Test- Due October 2007 Monograph ing - 5 Component and IntegrationLevel Testing - 6 System and Acceptance Level Testing.- Part III: Ad- vanced Testing Conderns.- 7 Data Driven Testing 2007. XLVI, 988 p. Also available online. (Lecture Notes in Com- Due October 2007 puter Science, Band 4792) Softcover - 8 Real-Time and Performance Testing.- Part IV: Applications of UTP.- 9 User-Interface Testing - 10 105,93 € 2008. XIV, 309 p. 98 illus. (Studies in Computational Intelligence, Testing Service-Oriented Architecture Applications.- Band 78) Geb. ISBN 978-3-540-75758-0 Part V: Tools.- 11 Tool Frameworks and Examples 106,95 € - 12 Test Execution with JUnit - 13 Test Execution ISBN 978-3-540-74929-5 with TTCN-3.- U2TP Reference Guide - [..] Fields of interest Software Engineering; Management of Computing and Information Systems

Target groups Professionals

Type of publication Professional book

Due October 2007

2007. XIV, 183 p. 94 illus. Geb.

42,75 € ISBN 978-3-540-72562-6 springer.com/booksellers Computer 11

S. Bandyopadhyay, University of Windsor, Canada

Dissemination of Information in Optical Networks: From Technology to Algorithms

In Cooperation with Ralf Klasing

Optical networks and the related technologies, net- work management software and services have under- gone remarkable developments, and such networks are now the ultra-high-speed backbone networks for communication. Wavelength-Division Multiplexing (WDM), the ability to support multiple communica- tion pathways over the same fiber, enables efficient use of the enormous capability for data communi- cation of optical networks. This book gives a broad overview of techniques used in the design of WDM networks for efficient dissemination of information in computer networks. It starts with an overview of the hardware components, then provides a thorough review of WDM, wavelength-routed networks, al- gorithms for route and wavelength assignment, de- sign of broadcast and select networks, logical topol- ogy design, and techniques to handle faults and al- gorithms for efficient use of optical networks. Each topic has been covered rigorously with emphasis on detailed explanations of the approaches used, start- ing from the [..]

Contents Introduction to Optical Networks.- Introduction to Optical Technology.- WDM Network Design.- Route and Wavelength Assignment (RWA) I.- Route and Wavelength Assignment (RWA) II.- Logical Topolo- gy Design I.- Logical Topology Design II.- Faults in Optical Networks.- Traffic Grooming.- List of Sym- bols.- App. 1: Linear Programming in a Nutshell.- App. 2: The De Bruijn Graph.- App. 3: Network Flow Programming.- References.- Index.

Fields of interest Theory of Computation; Communications Engi- neering, Networks; Computer Communication Net- works; Algorithm Analysis and Problem Complexity; Applied Optics, Optoelectronics, Optical Devices

Target groups Graduate students, researchers, practitioners

Type of publication Monograph

Due November 2007

2008. XII,308 pages with 95 illus. (Texts in Theoretical Computer Science. An EATCS Series) Geb.

69,50 € ISBN 978-3-540-72874-0 springer.com/booksellers Computer 12

J.J. Barbara, Florida Dept. of Law Enforcement, Tampa, FL, USA V. Barbu, Université de Technologie de Compiègne, Compiègne, D. Barceló, CSIC Barcelona, Spain; M. Petrovic, CSIC Barcelona, (Ed.) France; N. Limnios, Université de Technologie de Compiègne, Spain (Eds.) Compiègne, France Handbook of Digital and Emerging Contaminants from Multimedia Forensic Evidence Semi-Markov Chains and Hidden Industrial and Municipal Waste Semi-Markov Models toward Applications

This volume presents an overview of computer Their use in Reliability and DNA Analysis forensics perfect for beginners. A distinguished Contents group of specialist authors have crafted chapters Petrovic: Occurrence of Emerging Contaminants rich with detail yet accessible for readers who are in Wastewaters: Sources and Levels.- Removal of not experts in the field. Tying together topics as di- This book is concerned with the estimation of dis- Emerging Contaminants in Wastewater Treatment.- verse as applicable laws on search and seizure, inves- crete-time semi-Markov and hidden semi-Markov Smital/Stella: Acute and Chronic Effect (Toxicity, Es- tigating cybercrime, and preparation for courtroom processes. Semi-Markov processes are much more trogenicity, Genotoxicity etc.).- Environmental Risk tesitmony, Handbook of Digital & Multimedia general and better adapted to applications than the Assessment. Impact of Emerging Contaminants in Evidence is an ideal overall reference for this mul- Markov ones because sojourn times in any state can the Environment.- Barcelo: Legislation (EU ti-faceted discipline. be arbitrarily distributed, as opposed to the geomet- and Non-EU Countries (USA)) rically distributed sojourn time in the Markov case. Features Another unique feature of the book is the use of dis- Fields of interest Presents an overview of computer forensics perfect crete time, especially useful in some specific appli- Atmospheric Protection/Air Quality Control/Air for beginners An ideal overall reference for this mul- cations where the time scale is intrinsically discrete. Pollution; Statistics for Engineering, Physics, Com- ti-faceted discipline The models presented in the book are specifically puter Science, Chemistry & Geosciences adapted to reliability studies and DNA analysis. The Contents book is mainly intended for applied probabilists and Target groups The Analog and Digital World.- Training and Ed- statisticians interested in semi-Markov chains theo- Scientists, engineers, graduate students in the field of ucation in Digital Evidence.- Certification and Ac- ry, reliability and DNA analysis, and for theoretical Environmental Sciences, Risk Assessment and Risk creditation Overview.- History, Concepts and Tech- oriented reliability and bioinformatics engineers. It Controlling, Toxicology and Ecology; decision-mak- nology of Networks and their Security.- The Digi- can also serve as a text for a six month research-ori- ers in Government, Industrial and Regulatory Bodies tal Crime Scene.- Investigating Cybercrime.- Duties, ented course at a Master or PhD level. The prerequi- Type of publication Support Functions, and Competencies.- Electronic sites are a background in probability theory and fi- Reviews Evidence and Digital Forensic Testimony in Court. nite state space Markov chains.

Fields of interest Features Due June 2008 Criminology & Criminal Justice; Legal Aspects of Explores the semi-Markov case Combines the flexi- Computing; Forensic Medicine bility of the semi-Markov chain with the known ad- 2008. Approx. 250 p. Also available online. (Water Pollution, Teil vantages of HMMs 5X) Geb. Target groups Forensic scientists, criminal justice enthusiasts, radi- Contents 203,25 € ologists Introduction.- Discrete-time renewal processes.- ISBN 978-3-540-74793-2 Semi-Markov chains.- Nonparametric estimation Type of publication for semi-Markov chains.- Reliability theory for Contributed volume discrete-time semi-Markov systems.- Hidden se- mi-Markov model and estimation. Due December 2007 Fields of interest Statistical Theory and Methods; Statistics for En- 2008. Approx. 200 p. 13 illus. Geb. gineering, Physics, Computer Science, Chemistry 80,20 € & Geosciences; Quality Control, Reliability, Safety ISBN 978-1-58829-782-2 and Risk; Operations Research, Mathematical Pro- gramming; Bioinformatics; Probability Theory and Stochastic Processes

Target groups Graduate students, researchers

Type of publication Monograph

Due December 2007

2008. Approx. 228 p. (Lecture Notes in Statistics, Band 191) Soft- cover

50,24 € ISBN 978-0-387-73171-1 springer.com/booksellers Computer 13

Th. Barkowsky, University of Bremen, Germany; M. Knauff, Jus- J. Behrendt, K. Zeppenfeld, Fachhochschule Dortmund G. Beliakov, Deakin University, Wheelers Hill, VIC, Australia; A. tus-Liebig-Universität Gießen, Germany; G. Ligozat, LIMSI-CNRS, Pradera, Universidad Rey Juan, Madrid, Spain; T. Calvo, Universi- Orsay, France; D.R. Montello, University of California, Santa Bar- dad de Alcala, Alcala de Henares, Spain bara, CA, USA (Eds.) Web 2.0 Aggregation Functions: A Guide for Spatial Cognition V Practitioners Der Begriff "Web 2.0" ist mittlerweile nahezu Reasoning, Action, Interaction allgegenwärtig. Doch auch wenn er Einzug in diverse Stellenausschreibungen und Nachrichtenmeldungen gehalten hat, scheint doch den wenigsten Leuten klar Aggregation of information is of primary importance This book constitutes the refereed proceedings of zu sein, was er genau zu bedeuten hat. Diese Frage in the construction of knowledge based systems in the International Conference on Spatial Cognition, zu beantworten und die jeweiligen Hintergründe various domains, ranging from medicine, economics, Spatial Cognition 2006, held in Bremen, Germany, aufzuzeigen ist das Ziel des ersten Teils dieses Buch- and engineering to decision-making processes, ar- September 24-28, 2006. The 28 revised full papers es. Zudem wird ein Einblick in die relevanten Tech- tificial intelligence, robotics, and machine learning. presented were carefully reviewed and selected from nologien gegeben. Neben AJaX werden hierbei auch This book gives a broad introduction into the topic 59 submissions. The papers are organized in topi- die Grundlagen von RSS und Webservices praktisch of aggregation functions, and provides a concise ac- cal sections on Spatial Reasoning, Human-Robot In- vorgestellt, so dass der unerfahrene Leser nach dieser count of the properties and the main classes of such teraction, Visuo-Spatial Reasoning and Spatial Dy- Lektüre ein grundlegendes Verständnis für die rel- functions, including classical means, medians, or- namics, Spatial Concepts, Human Memory, Men- evanten Aspekte der heutigen Internetlandschaft dered weighted averaging functions, Choquet and tal Reasoning and Assistance, Spatial Concepts, Hu- haben wird. Sugeno integrals, triangular norms, conorms and man Memory and Mental Reasoning, Navigation, copulas, uninorms, nullnorms, and symmetric sums. Wayfinding and Route Instructions as well as Lin- Features It also presents some state-of-the-art techniques, guistic and Social Issues in Spatial Knowledge Pro- Die leicht verständliche Antwort auf die Frage: Was many graphical illustrations and new interpolatory cessing. ist "Web 2.0"? Schnelle Einführung und grundle- aggregation functions. A particular attention is paid gender Einblick in die wichtigen Aspekte heutiger to identification and construction of aggregation Fields of interest Webtechnologien Plus: AJaX, RSS und Webservices functions from application specific requirements and Simulation and Modeling; Computer Imaging, Vi- empirical data. This book provides scientists, IT spe- Contents sion, Pattern Recognition and Graphics; Computer cialists and system architects with a self-contained Einleitung.- Das Web 2.0 in der Theorie.- Das Web Appl. in Social and Behavioral Sciences; Artificial In- easy-to-use guide, as well as examples of [..] telligence (incl. Robotics); Data Mining and Knowl- 2.0 in der Praxis.- Fazit.- Anhang. edge Discovery Features Fields of interest Broad introduction into the topic of aggregation Software Engineering Target groups functions and discusses in detail the four broad class- Researchers and professionals Target groups es of aggregation operators: averaging operators, conjunctive, disjunctive and mixed operators Comes Type of publication Studenten, Praktiker der Informatik und Elek- trotechnik with a software package AOTool, which can be freely Proceedings downloaded implementing a large number of meth- Type of publication ods for fitting aggregation functions to empirical da- Due November 2007 German textbook ta, described in the relevant sections of the [..] Contents 2008. Approx. 535 p. (Lecture Notes in Computer Science, Band Due October 2007 4387) Softcover Introduction.- Averaging Functions.- Conjunc- tive and Disjunctive Functions.- Mixed Functions.- 68,48 € 2007. 110 S (Informatik im Fokus) Softcover Choice and Construction of Aggregation Functions.- ISBN 978-3-540-75665-1 Interpolatory Type Aggregation Functions.- Other 14,95 € Types of Aggregation and Additional Properties. ISBN 978-3-540-73120-7 Fields of interest Appl.Mathematics/Computational Methods of Engi- neering; Software Engineering; Artificial Intelligence (incl. Robotics)

Target groups Researchers, engineers, graduate students in compu- tational intelligence software engineering, computer science

Type of publication Monograph

Due October 2007

2007. XIX, 361 p. 181 illus. (Studies in Fuzziness and Soft Comput- ing, Band 221) Geb.

139,05 € ISBN 978-3-540-73720-9 14 Computer springer.com/booksellers

M. Ben-Ari, Weizmann Institute of Science, Israel M. Bendix, Potsdam J. Benesty, Université de Québec, Montréal, QC, Canada; M. Sond- hi, Avayalabs Research, Basking Ridge, NJ, USA; Y. Huang, Bell Labs, Murray Hill, NJ, USA (Eds.) Principles of the Spin Model Wissenschaftliche Arbeiten Checker typografisch gestalten Springer Handbook of Speech Mit Word und InDesign ans Ziel Processing

Principles of Spin is an introductory book, the only requirement is a background in programming. Spin Bei der Erstellung einer wissenschaftlichen Ar- models are written in the Promela language which is From common consumer products such as cell beit spielen Layout, Schriftbild, Abbildungen usw. easily learned by students and programmers. Spin is phones and MP3 players to more sophisticated eine wichtige Rolle. Zur Integration von Text und easy to install and use. The Spin model checker is not projects such as human-machine interfaces and re- Bild stehen heute unterschiedliche Software-Pakete only a widely used professional tool but it is also a sponsive robots, speech technologies are now ev- zur Verfügung, die - effektiv eingesetzt - die Ar- superb tool for teaching important concepts of com- erywhere. Many think that it is just a matter of time beit am Manuskript erleichtern. Die Autorin stellt puter science such as verification, concurrency and before more applications of the science of speech die typografischen Grundsätze zur Gestaltung wis- nondeterminism. The book introduces Spin-based become inescapable in our daily life. This hand- senschaftlicher Arbeiten kompakt dar. Sie geht auf software that the author has developed for teaching: book is meant to play a fundamental role for sustain- den Aufbau des Manuskripts ein und behandelt •jSpin - an integrated development environment for able progress in speech research and development. Seitenformat, inhaltliche Abfolge der Seiten und Spin. •SpinSpider - uses output from Spin to auto- Springer Handbook of Speech Processing targets Kapitel sowie die Einband- und Titelgestaltung von matically construct state diagrams of concurrent pro- three categories of readers: graduate students, profes- der Konzeption bis zur Fertigstellung. Besondere grams. •VN is a tool for visualizing nondeterminism. sors and active researchers in academia and research Berücksichtigung finden dabei die Programme MS Complete programs will demonstrate each construct labs, and engineers in industry who need to under- Word und Adobe InDesign. Kurzleitfaden und Glos- and concept and these programs will be available on stand or implement some specific algorithms for sar runden das Buch ab. a companion website. their speech-related products. The handbook could also be used as a sourcebook for one or more gradu- Features Features ate courses on signal processing for speech and dif- Leitfaden für alle, die eine wissenschaftliche Ar- First introductory textbook on Spin In- ferent aspects of speech processing and applications. beit verfassen wollen. Typografie und Layout wis- cludes complete programs which will demonstrate A quickly accessible source of application-oriented, senschaftlicher Arbeiten. Gezielter Einsatz von Word construct and concept, these programs will also be authoritative and comprehensive information about und InDesign. Mit Mustervorlagen für eigene Ar- available on a companion website. Promela and Spin these [..] beiten. are presented in a graduated manner, to facilitate easy learning   Features Contents Authoritative desk reference of one of tomorrow's Einleitung.- Allgemeine typografische Grundsätze.- Contents breakthrough technology Provides quick access to Typografische Grundsätze für wissenschaftliche Ar- Foreword.- Preface.- Sequential programming applicable, reliable, and comprehensive knowledge beiten.- Seiten- und Werkgestaltung.- Arbeiten und in PROMELA.- Verification of Sequential Pro- Electronic contents on accompanying CD-ROM Formatieren mit DTP-Programmen.- Handbuch für grams.- Concurrency.- Synchronization.- Ver- Handy format, lucid two-color layout, uniformly wissenschafltiche Arbeiten.- Glossar.- Literaturverze- ification with Temporal Logic.- Data and Pro- styled figures ichnis. gram Structures.- Channels.- Nondetermin- Contents ism.- Advanced Topics in SPIN.- Case Fields of interest Studies.- Software Tools.- Links.- References.- Index Production, Perception, and Modeling of Speech.- Media Design; Science, general; Mathematics, gen- Signal Processing for Speech.- Speech Coding.- Text- eral; Physics, general; Economics/Management Sci- Fields of interest to-Speech Synthesis.- Speech Recognition.- Speaker ence, general Software Engineering/Programming and Operating Identification and Verification.- Language Identifica- tion.- Speech Enhancement.- Multichannel Speech Systems; Programming Techniques; Programming Target groups Processing Languages, Compilers, Interpreters; Operating Sys- Studierende an Universitäten und Fachhochschulen, tems; Theory of Computation; Logics and Meanings Schüler of Programs Fields of interest Signal,Image and Speech Processing; Language Type of publication Translation and Linguistics; Acoustics; Computa- Target groups Professional book 2nd/3rd year undergraduate students of computer tional Linguistics; Pattern Recognition; Communica- science and software engineering. tions Engineering, Networks Due November 2007 Type of publication Target groups Graduate/advanced undergraduate textbook 2008. XVIII, 159 S. 40 Abb. Softcover Researchers in electrical engineering, applied physics, computer science, linguistics; development Due February 2008 14,95 € engineers in acoustics, signal processing, telecommu- ISBN 978-3-540-73391-1 nications

2008. Approx. 250 p. Softcover Type of publication Handbook 49,17 € ISBN 978-1-84628-769-5 Due November 2007

2008. Online version.

296,31 € ISBN 978-3-540-49127-9 springer.com/booksellers Computer 15

J. Benesty, Université de Québec, Montréal, QC, Canada; M.M. S. Benzoni-Gavage, Université Claude Bernard Lyon I, France; D. T. Berndt, Augsburg Sondhi, Avayalabs Research, Basking Ridge, NJ, USA; Y.(. Huang, Serre, Ecole Normale Supérieure, Lyon, France (Eds.) Bell Labs, Murray Hill, NJ, USA (Eds.) Typographie in LaTeX Hyperbolic Problems: Theory, Springer Handbook of Speech Numerics, Applications Processing Proceedings of the XIth International Conference on Hyper- Dieses Fachbuch über das freie Satzsystem LaTeX bolic Problems held in Ecole Normale Supérieure, Lyon, July vermittelt ein solides technisches Verständnis zur 17-21, 2006 Benutzung der Software. Im Vordergund stehen die From common consumer products such as cell typographischen Möglichkeiten von LaTeX. Neben phones and MP3 players to more sophisticated einer übersichtlichen Darstellung der technischen projects such as human-machine interfaces and re- Kenntnisse zur Bedienung des Systems erläutert This volume contains papers that were presented at sponsive robots, speech technologies are now ev- der Autor die typographischen Hintergründe, um HYP2006, the eleventh international Conference on erywhere. Many think that it is just a matter of time ein solches System auch im ästhetischen Sinn opti- Hyperbolic Problems: Theory, Numerics and Ap- before more applications of the science of speech mal einzusetzen. Zudem ist das Buch in einem an- plications held at the Ecole Normale Supérieure de become inescapable in our daily life. This hand- genehmen, lockeren Ton geschrieben und besticht Lyon, France, July 17-21, 2006. This biennial series book is meant to play a fundamental role for sustain- durch viele originelle Beispiele, mittels derer of conferences has become one of the most impor- able progress in speech research and development. textgestalterische Alternativen verdeutlicht werden. tant international events in Applied Mathematics. As Springer Handbook of Speech Processing targets computers became more and more powerful, the in- three categories of readers: graduate students, profes- Features terplay between theory, modelling, and numerical al- sors and active researchers in academia and research Schwerpunkte sind Typographie und Ästhetik. An- gorithms gained considerable impact, and the scope labs, and engineers in industry who need to under- schauliche Darstellung typographischer Alternativ- of HYP conferences expanded accordingly. The field stand or implement some specific algorithms for en. Originelle Beispiele, unterhaltsam zu lesen. &nb- is currently in interaction with a variety of scientif- their speech-related products. The handbook could sp;   ic domains, including fluid dynamics, physics, elec- also be used as a sourcebook for one or more gradu- tromagnetism, chemistry, biology, road and net- Fields of interest ate courses on signal processing for speech and dif- work traffic, and engineering. Many of these papers Document Preparation and Text Processing; Media ferent aspects of speech processing and applications. present new effective numerical methods and their Design A quickly accessible source of application-oriented, application in various contexts. authoritative and comprehensive information about Target groups these [..] Fields of interest LaTeX-Anwender, UNIX-Fachleute, professionelle Computational Mathematics and Numerical Anal- Textgestalter, Typografen, Mediengestalter.   Features ysis; Numerical Analysis; Partial Differential Equa- Authoritative desk reference of one of tomorrow's tions; Numerical and Computational Methods Type of publication breakthrough technology Provides quick access to Professional book applicable, reliable, and comprehensive knowledge Target groups Electronic contents on accompanying DVD-ROM Researchers and graduate students Handy format, lucid two-color layout, uniformly Due March 2008 styled figures Type of publication Proceedings 2008. Etwa 450 S. (X.media.press) Geb. Contents Introduction to Speech Processing.- Production, Per- 49,95 € Due December 2007 ception, and Modeling of Speech.- Signal Process- ISBN 978-3-540-76552-3 ing for Speech.- Speech Coding.-Text-to-Speech Syn- thesis.- Speech Recognition.- Speaker Recognition.- 2008. Approx. 1000 p. Geb. Language Recognition.- Speech Enhancement.- Mul- tichannel Speech Processing 106,95 € ISBN 978-3-540-75711-5 Fields of interest Signal,Image and Speech Processing; Language Translation and Linguistics; Acoustics; Computa- tional Linguistics; Pattern Recognition; Communica- tions Engineering, Networks

Target groups Researchers in electrical engineering, applied physics, computer science, and linguistics; develop- ment engineers in acoustics, signal processing and telecommunications

Type of publication Handbook

Due November 2007

2008. Approx. 1250 p. 456 illus. With DVD-ROM. Geb.

266,43 € ISBN 978-3-540-49125-5 16 Computer springer.com/booksellers

K. Berns, Technische Universität Kaiserslautern; T. Luksch, Tech- M.W. Berry, University of Tennessee, Knoxville, TN, USA; M. S. Bhalla, University of Aizu, Japan (Ed.) nische Universität Kaiserslautern (Eds.) Castellanos (Eds.) Databases in Networked Autonome Mobile Systeme 2007 Survey of Text Mining II Information Systems 20. Fachgespräch Kaiserslautern, 18./19. Oktober 2007 Clustering, Classification, and Retrieval 5th International Workshop, DNIS 2007, Aizu-Wakamatsu, Japan, October 17-19, 2007, Proceedings

Das 20. Fachgespräch Autonome Mobile Systeme The proliferation of digital computing devices and (AMS 2007) ist ein Forum, das Wissenschaftlerin- their use in communication has resulted in an in- This book constitutes the refereed proceedings of the nen und Wissenschaftlern aus Forschung und In- creased demand for systems and algorithms capa- 5th International Workshop on Databases in Net- dustrie, die auf dem Gebiet der autonomen mo- ble of mining textual data. Thus, the development worked Information Systems, DNIS 2007, held in bilen Systeme arbeiten, eine Basis für den Gedake- of techniques for mining unstructured, semi-struc- Aizu-Wakamatsu, Japan in October 2007. The 22 re- naustausch bietet und wissenschfltiche Diskussio- tured, and fully structured textual data has become vised full papers presented together with 1 invited nen sowie Kooperationen auf diesem Forschungs- important in both academia and industry. This 2nd talk were carefully reviewed and selected for inclu- gebiet fördert bzw. initiiert. Inhaltlich setzt das edition surveys the emerging field of Text Mining sion in the book. Focusing on data semantics and in- Fachgespräch den diesjährigen Schwerpunkt auf - the application of techniques of machine learning frastructure for information management and inter- Arbeiten im Bereich der kognitiven Automobile in conjunction with natural language processing, in- change, the papers are organized in topical sections und Laufmaschinen. Ausgewählte Beiträge zu den formation extraction and algebraic/mathematical on geospatial decision-making, Web data manage- Themen Fahrerassistenzsysteme, Humanoide approaches to computational information retrieval. ment systems, infrastructure of networked informa- Roboter, Kartierung und Lokalisation, Navigation, Many issues are addressed, ranging from the devel- tion systems, and Web query and web mining sys- Lernverfahren, System- und Steuerungsarchitekturen opment of new learning approaches to the paral- tems. sowie der Anwendung von autonomen mobilen Sys- lelization of existing algorithms. Presenting a com- temen bilden den Inhalt dieses Bandes. prehensive selection of topics within the field to gen- Fields of interest erate both interest and insight into the state of Text Database Management; Data Mining and Knowl- Features Mining, this book will be an indispensable resource edge Discovery; Information Systems Applications Das Forum für Wissenschaftler/innen aus Forschung for researchers, practitioners, and professionals in- (incl.Internet); Multimedia Information Systems; und Industrie Ausgewählte Beiträge zu aktuellen volved in information retrieval, computational [..] User Interfaces and Human Computer Interaction; Themen Gedankenaustausch – Diskussion – Koop- Computer Communication Networks eration Features Overview of current methods and software for text Target groups Contents mining Experts from academia and industry share Researchers and professionals Fahrerassistenzsysteme.- Humanoide Roboter.- their experiences in solving large-scale retrieval and Architektur kooperativer Systeme, Kognitive Bild- classification problems Highlights open research Type of publication bearbeitung.- Sonsornetzwerke und Multisensorik.- questions in document categorization and clustering, Proceedings Modellierung und Simulation.- Planungs- und and trend detection Describes new application prob- Entscheidungsverfahren.- Lernen und Selbstorgani- lems in areas such as email surveillance and anomaly Due October 2007 sation.- Multi-Agenten-Systeme.- Anwendungen:.- detection Servicerobotik.- Behindertenunterstützung.- Mikro- und Nanorobotik.- Fertigung.- Straßenverkehr. Fields of interest 2007. X, 329 p. (Lecture Notes in Computer Science, Band 4777) Document Preparation and Text Processing; Infor- Softcover Fields of interest mation Storage and Retrieval; Information Systems 51,36 € Artificial Intelligence (incl. Robotics); Information Applications (incl.Internet); Multimedia Information ISBN 978-3-540-75511-1 Systems Applications (incl.Internet); Processor Ar- Systems; Applications of Mathematics chitectures; System Performance and Evaluation Target groups Target groups Researchers, R and D, professionals, graduate stu- Wissenschaftler, Doktoranden, Studenten dents

Type of publication Type of publication Proceedings Contributed volume

Due October 2007 Due December 2007

2008. XII, 348 S. (Informatik aktuell) Softcover 2008. Approx. 255 p. 57 illus. Geb.

64,95 € 67,36 € ISBN 978-3-540-74763-5 ISBN 978-1-84800-045-2 springer.com/booksellers Computer 17

B. Bhanu, University of California at Riverside, CA, USA; H. Chen, B. Bhanu, University of California, Riverside, CA, USA.; S. Das, Uni- U.N. Bhat, Professor Emeritus, Southern Methodist University, University of California at Riverside, CA, USA versity of California, Riverside, CA, USA. Dallas, TX, USA

Human Ear Recognition by Computational Learning for An Introduction to Queueing Computer Adaptive Computer Vision Theory

Modeling and Analysis in Applications

Biometrics deal with recognition of individuals based The goal of computer vision (CV) research is to pro- on their physiological or behavioural characteristics. vide computers with human-like perception capa- This introductory textbook is designed for a one- Researchers have done extensive studies on biomet- bilities so that they can sense the environment, un- semester course on queueing theory that does not rics such as fingerprint, face, palm print, iris and gait. derstand the sensed data, take appropriate actions, require a course in stochastic processes as a prereq- Ear, a viable new class of biometrics, has certain ad- and learn from this experience in order to enhance uisite. By integrating the necessary background on vantages over face and fingerprint, which are the two future performance. The field has evolved from the stochastic processes with the analysis of models, this most common biometrics in both academic research application of classical pattern recognition and im- book provides a sound foundational introduction to and industrial applications. This book explores all age processing methods to advanced techniques in the modeling and analysis of queueing systems for aspects of 3D ear recognition: representation, detec- image understanding, like model-based and knowl- a broad interdisciplinary audience of students com- tion, recognition, indexing and performance predic- edge-based vision. In recent years, there has been ing from diverse disciplines, including applied math- tion. It uses large datasets to quantify and compare an increased demand for computer vision systems ematics, statistics, computer science, operations re- the performance of various techniques. Features and to address "real-world" applications, such as naviga- search, and industrial, systems, manufacturing, and topics include: • Ear detection and recognition in 2D tion, target recognition, manufacturing, photointer- communications engineering. Key features include image • 3D object recognition and 3D biometrics • pretation, remote sensing, etc. This unique mono- an introductory chapter, which contains an histori- 3D ear recognition • Performance comparison and graph details the way machine learning, a field con- cal account of the growth of queueing theory in the prediction The techniques discussed will be of great cerned with the temporal improvement of computer last 100 years; rigorous treatment of the foundations interest to researchers, developers and decision mak- algorithms and systems, can help create robust, flex- of basic models commonly used in applications with ers who are involved in robust human recognition ible vision techniques for optimal functioning in re- appropriate references for advanced topics; a chapter by computer for a large number of practical applica- al-world scenarios. Enriched by many concrete ex- on modeling and analysis using computational tools; tions. amples and illustrations, it is an indispensable refer- modeling exercises as a motivational tool, and review ence [..] Features exercises covering background [..] Offers complete coverage of human ear recogni- Contents Features tion Describes complete human recognition systems 1. Introduction.- 2. Learning as a Discipline.- 3. Ba- The first textbook on queueing theory that does not using 3D ear biometrics Includes new biometrics, sic Paradigms of Learning.- 4. Selection of Learning require a course in stochastic processes as a prerequi- new application and results on the latest available Paradigms and Designing Practical Learning Systems site; suitable for applied science students not needing databases At the frontier of research on 3D ear-based for Vision.- 5. Learning Applied to Low-Level Vi- a specialized course in queueing theory For a broad human recognition sion.- 6. Learning Applied to Intermediate-Level Vi- interdisciplinary audience of advanced undergradu- sion.- 7. Learning Applied to High-Level Vision.- 8. ates, graduate students, researchers, and practition- Contents Learning Integrated Multi-Level Vision.- 9. Learning ers in applied mathematics, statistics, computer sci- Introduction.- Ear Detection and Recognition in Applied to Integrating Vision and Action.- 10. Appli- ence, operations research, and industrial, [..] 2D Images.- 3D Object Recognition and 3D Biomet- cations.- 11. Summary. rics.- 3D Ear Detection.- Recognizing 3D Ears Using Contents Helix/Anti-helix.- Recognizing 3D Ears using Local Fields of interest Introduction.- System Element Models.- An Intro- Surface Patches.- Rapid 3D Ear Indexing and Recog- Computer Imaging, Vision, Pattern Recognition and duction to Stochastic Processes.- Simple Markovian nition.- Performance Comparison and Prediction.- Graphics Queueing Systems.- Imbedded Markov Chain Mod- Conclusion and Future Work Target groups els for M/G/I and G/M/I Queues.- Extended Markov Fields of interest Engineers, computer scientists in industry and Models.- Queueing Networks.- Renewal Process Computer Imaging, Vision, Pattern Recognition and academia interested in machine vision and artificial Models.- The General Queue G/G/I and Approxi- Graphics; Biometrics; Image Processing and Com- intelligence. mations.- Statistical Inference for Queueing Mod- puter Vision; Pattern Recognition; Computer Graph- els.- Decision Problems in Queueing Theory.- Index ics; The Computing Profession Type of publication   Monograph Target groups Fields of interest Statistics for Engineering, Physics, Computer Sci- Researchers, Developers, Decision Makers Due November 2007 ence, Chemistry & Geosciences; Statistical Theo- Type of publication ry and Methods; Probability Theory and Stochastic Monograph 2007. Approx. 520 p. Geb. Processes; Mathematical Modeling and Industrial Mathematics; Operations Research, Mathematical 42,75 € Due March 2008 Programming; Industrial and Production Engineer- ISBN 978-0-387-23703-9 ing

2008. Approx. 230 p. Geb. Target groups Advanced undergraduates, graduate students, re- 64,15 € searchers, and practitioners in applied mathematics, ISBN 978-1-84800-128-2 statistics, computer science, operations research, and industrial, systems, manufacturing, and communica- tions engineering

Type of publication Graduate/advanced undergraduate textbook

Due February 2008

2008. Approx. 376 p. 5 illus. (Statistics for Industry and Technolo- gy) Geb. 18 Computer springer.com/booksellers

49,43 € J.P.N. Bishwal, University of North Carolina, Charlotte, NC, USA S. Biswas, Indian Statistical Institute, Kolkata, India; B.C. Lovell, ISBN 978-0-8176-4724-7 University of Queensland, Brisbane, QLD, Australia Parameter Estimation in Stochastic Differential Equations Bézier and Splines in Image Processing and Machine Vision

Parameter estimation in stochastic differential equa- tions and stochastic partial differential equations is Digital image processing and machine vision have the science, art and technology of modelling com- grown considerably during the last few decades. Of plex phenomena and making beautiful decisions. the various techniques, developed so far, splines play The subject has attracted researchers from several a significant role in many of them. This book deals areas of mathematics and other related fields like with various image processing and machine vision economics and finance. This volume presents the problems efficiently with splines and includes: the estimation of the unknown parameters in the cor- significance of Bernstein Polynomial in splines, de- responding continuous models based on continu- tailed coverage of Beta-splines applications which are ous and discrete observations and examines exten- relatively new, Splines in motion tracking, various sively maximum likelihood, minimum contrast and deformative models and their uses. Finally the book Bayesian methods. Useful because of the current covers wavelet splines which are efficient and effec- availability of high frequency data is the study of re- tive in different image applications. fined asymptotic properties of several estimators when the observation time length is large and the Features observation time interval is small. Also space time Examines the various uses of splines in the area of white noise driven models, useful for spatial data, Image Processing and Machine Vision Includes all and more sophisticated non-Markovian and non- significant splines as well as the latest one - the semimartingale models like fractional diffusions that wavelet spline model the long memory phenomena are examined in Contents this volume. Part I Early Background.- 1 Bernstein Polynomial Contents and Bézier-Bernstein Spline.- Significance of Bern- Preface.- 1.Parametric Stochastic Differential Equa- stein Polynomial in Splines.- 2 Image Segmentation.- tions.- Part I: Continuous Sampling.- 2.Rates of Two Different Concepts of Segmentation.- Contour Weak Convergence of Estimators in Homogeneous Based Segmentation.- Region Based Segmentation.- Diffusions. -3.Large Deviations for Estimators in 3 1-d B-B Spline Polynomial and Hilbert Scan for Homogeneous Diffusions.- 4.Local Asymptotic Graylevel Image Coding.- Hilbert Scanned Image.- Mixed Normality for Nonhomogeneous Diffusions.- Shortcomings of Bernstein Polynomial and Error of 5.Bayes and Sequential Estimation in Stochastic Approximation.- 4 Image Compression.- SLIC: Sub- PDEs.- 6.Maximum Likelihood Estimation in Frac- image Based Lossy Image Compression.- Part II In- tional Diffusions.- Part II: Discrete Sampling.- 7.Ap- termediate Steps.- 5 B-Splines and its Applications.- proximate Maximum Likelihood Estimation in Non- B-Spline Function.- 6 Beta-Splines: A [..] homogeneous Diffusions.- 8.Rates of Weak Conver- Fields of interest gence of Estimators in the Ornstein-Uhlenbeck Pro- Image Processing and Computer Vision; Computer cess.- 9.Local [..] Imaging, Vision, Pattern Recognition and Graphics Fields of interest Target groups Probability Theory and Stochastic Processes; Statisti- Postgraduate and PhD students and researchers in cal Theory and Methods; Quantitative Finance; Nu- Image Processing and Computer Vision merical Analysis; Game Theory, Economics, Social and Behav. Sciences Type of publication Reference work Target groups Researchers and graduate students Due December 2007 Type of publication Monograph 2008. Approx. 250 p. Geb.

Due October 2007 74,85 € ISBN 978-1-84628-956-9

2008. XIV, 268 p. (Lecture Notes in Mathematics, Band 1923) Softcover

42,75 € ISBN 978-3-540-74447-4 springer.com/booksellers Computer 19

D. Bjorner, Holte, Denmark; M.C. Henson, University of Essex, UK C. Blum, Universitat Politecnica Catalunya, Barcelona, Spain; D. A. Blumauer, Semantic Web School - Zentrum für Wissenstrans- (Eds.) Merkle, University of Leipzig, Germany (Eds.) fer, Wien; T. Pellegrini, Semantic Web School - Zentrum für Wis- senstransfer, Wien (Eds.) Logics of Specification Languages Swarm Intelligence Social Semantic Web Introduction and Applications Die Konvergenz von Social Software, Web 2.0 und Semantic By a specification language we understand a formal Web system of syntax, semantics and proof rules. The syn- The laws that govern the collective behavior of social tax and semantics define a language; the proof rules insects, flocks of birds, or fish schools continue to define a proof system. Specifications are expressions mesmerize researchers. While individuals are rather  Während in den vergangenen Monat- in the language, and reasoning over properties of unsophisticated, in cooperation they can solve com- en Themen wie Web 2.0 und Social Soft- these specifications is done within the proof system. plex tasks, a prime example being the ability of ant ware ein erstaunliches Konjunkturhoch erlebt This book presents comprehensive studies on nine colonies to find shortest paths between their nests haben, vollzieht sich weitgehend abseits der specification languages and their logics of reason- and food sources. Task-solving results from self-or- öffentlichen Wahrnehmung eine technologische ing. The editors and authors are authorities on these ganization, which often evolves from simple means Komplementärinnovation. Die wachsende Adap- specification languages and their application. Ded- of communication, either directly or indirectly via tion semantischer Technologien zu Zwecken der icated chapters address: the use of ASM (Abstract changing the environment, the latter referred to as strukturierten Erschließung von "Web 2.0 Content", State Machines) in the classroom; the Event-B mod- stigmergy. Scientists have applied these principles aber auch zur kollaborativen Anreicherung von Web elling method; a methodological guide to CafeOBJ in new approaches, for example to optimization and Content mit maschinenlesbaren Metadaten sind logic; CASL, the Common Algebraic Specification the control of robots. Characteristics of the result- Ausdruck eines Trends in Richtung "Social Seman- Language; the Duration Calculus; the logic of the ing systems include robustness and flexibility. This tic Web". Bezeichnendes Merkmal dieser Entwick- RAISE specification language (RSL); the specification field of research is now referred to as swarm intel- lung ist die voranschreitende technologische Kon- language TLA+; the typed logic of partial functions ligence. The contributing authors are among the vergenz zwischen Social Software und Semantic Web and the Vienna Development Method (VDM); and top researchers in their domain. The book is intend- Technologien mit weit reichenden Effekten auf die Z logic and its applications. Each chapter is self-con- ed to provide an overview of swarm intelligence to Zukunft von Unternehmenskultur, Arbeitsplatz und tained, with references, and symbol and [..] novices, and to offer researchers in the field an up- soziale Interaktion im Netz.       date on interesting recent [..] Features Features Unique overview of the key current formal specifica- Features Überblick über die relevanten Konzepte des Social tion languages Combines an overview of swarm intelligence with an Semantic Web. Stellt Technologien und Methoden dar. Good-Practices-Beispiele. Contents up-to-date treatment of the advances in the field. An Overview.- Abstract State Machines for the Contents Fields of interest Classroom.- The Event-B Modelling Method: Con- Biological Foundations of Swarm Intelligence.- Information Systems Applications (incl.Internet); cepts and Case Studies.- A Methodological Guide Swarm Intelligence in Optimization.- Swarm Computer Communication Networks; Operating to CafeOBJ Logic.- CASL - The Common Algebra- Robotics.- Routing Protocols for Next-Generation Systems; Input/Output and Data Communications ic Specification Language.- Duration Calculus.- The Intelligent Networks Inspired by Collective Behav- Logic of the RAISE Specification Language.- The Target groups iors of Insect Societies.- Evolution, Self-organization Specification Language TLA+.- The Typed Logic Informatiker, Projektleiter, Entwickler, Wissensman- and Swarm Robotics.- Particle Swarms for Dynamic of Partial Functions and the Vienna Development ager Optimization Problems.- An Agent-Based Approach Method.- Z and Its Applications.- Reviews. to Self-organized Production.- Organic Computing Type of publication Fields of interest and Swarm Intelligence Professional book Mathematical Logic and Formal Languages; Software Fields of interest Engineering; Logics and Meanings of Programs; Artificial Intelligence (incl. Robotics); Computation Due June 2008 Theory of Computation by Abstract Devices; Simulation and Modeling; Op- Target groups erations Research, Mathematical Programming; Au- 2008. Etwa 500 S. 75 Abb. (X.media.press) Geb. Researchers, graduate students tomation and Robotics; Communications Engineer- ing, Networks 49,95 € Type of publication ISBN 978-3-540-72215-1 Monograph Target groups Researchers in academia and industry, graduate stu- dents Due November 2007 Type of publication 2008. XXI, 620 p. (Monographs in Theoretical Computer Science. Monograph An EATCS Series) Geb. Due February 2008 96,25 € ISBN 978-3-540-74106-0 2008. Approx. 275 p. (Natural Computing Series) Geb.

64,15 € ISBN 978-3-540-74088-9 20 Computer springer.com/booksellers

B.G. Blundell, University of the US Virgin Islands C. Bobda, Kaiserslautern University of Technology, Kaiser- A. Bode, TU München; W. Karl, Universität Karlsruhe slautern, Germany An Introduction to Computer Multicore-Architekturen Graphics and Creative 3-D Introduction to Reconfigurable Environments Computing Architectures, algorithms and applications Alle Hersteller von Standard-Mikroprozessoren bi- eten seit 2005 "Multicore-Architekturen" an, bei de- nen auf einem Prozessorchip zwei oder mehr Prozes- This book introduces the fundamentals of 2-D and soren realisiert sind. Das Buch führt in die Multi- 3-D computer graphics. Additionally, a range of “Introduction to Reconfigurable Computing” pro- core-Technologie, deren Organisation und Architek- emerging, creative 3-D display technologies are de- vides a comprehensive study of the field Reconfig- tur, ein. Besonderer Wert wird dabei auf die Vorstel- scribed, including stereoscopic systems, immersive urable Computing. It provides an entry point to lung der verschiedenen bislang realisierten und virtual reality, volumetric, varifocal, and others. In- the novice willing to move in the research field re- verfügbaren Prozessoren gelegt. Ein Kapitel über teraction is a vital aspect of modern computer graph- configurable computing, FPGA and system on pro- Parallele Programmierung und Systemsoftware run- ics, and issues concerning interaction (including grammable chip design. The book can also be used den das Buch ab. haptic feedback) are discussed. Included with the as teaching reference for a graduate course in com- book are anaglyph, stereoscopic, and Pulfrich view- puter engineering, or as reference to advance electri- Features ing glasses. Topics covered include: •essential math- cal and computer engineers. It provides a very strong Erstes Buch zum Thema Autoren sind Topexperten ematics •vital 2-D and 3-D graphics techniques •key theoretical and practical background to the field of auf dem Gebiet features of the graphics pipeline (including GPU) reconfigurable computing, from the early Estrin’s •display and interaction techniques •important his- machine to the very modern architecture like coarse- Contents torical milestones Designed to be a core teaching grained reconfigurable device and the embedded log- Einführung.- Grundlagen Multicore-Technologie.- text at the undergraduate level, accessible to students ic devices. Apart from the introduction and the con- Fallstudien.- Parallele Programmierung und System- with wide-ranging backgrounds, only an elementary clusion, the main chapters of the book are Architec- software.- Ausblick. grounding in mathematics is assumed as key maths ture of reconfigurable systems, Design and imple- is provided. Regular ‘Over to You’ activities are in- mentation, High-Level Synthesis for Reconfigurable Fields of interest cluded, and each chapter concludes with review and Devices, Temporal placement, On-line and Dynam- Processor Architectures discussion questions. ic Interconnection, Designing a reconfigurable ap- Target groups plication on Xilinx Virtex FPGA, System on pro- Studierende, Wissenschaftler und Praktiker der In- Features grammable chip, [..] Covers the key areas of computer graphics including formatik und Elektrotechnik the relevant mathematics. Stereoscopic and anaglyph Features Type of publication glasses will be provided with the book to enable read- Architecture of Reconfigurable Systems: Exhaus- German textbook ers to undertake some interesting work in connec- tive description of existing reconfigurable architec- tion with 3D images.   tures, from the simple PLDs to very complex FPGAs and coarse-grained technologies Low-level Synthe- Due October 2007 Contents sis of reconfigurable devices (RD): State of the art al- Preface.-Acknowledgements.-Setting the Scene.- gorithms for FPGA synthesis, in particular for the 2007. Etwa 150 S. (Informatik im Fokus) Softcover A Maths Primer.- Images in a  2-D Look-up table technology mapping High-level syn- Space.- Curves in a 2-D Space.-Interfacing with thesis (HLS): Detailed presentation of high-level syn- 14,95 € the Visual System.- Into the Third Dimension.- thesis [..] ISBN 978-3-540-73116-0 Incorporating the third Dimension: Transforma- tions.-3-D Graphics: Representation.- 3-D Contents Graphics: Mainly Rendering.-Creative 3-D Display From the contents Foreword. Preface. List of Fig- Systems.-Interaction and Haptic Feedback.- Ap- ures. List of Tables.- 1. Introduction.- 2. Reconfig- pendix A: Maths: Some Useful Results.- Appendix B: urable Architectures.- 3. Implementation.- 4. High- The Curvature of a Varifocal Mirror.- Appendix C: Level Synthesis For Reconfigurable Devices.- 5. Tem- The Scalar Product.- Appendix D: Concerning the poral Placement.- 6. On-Line Communication.- 7. Plane.- Feedback to Selected OTU Exercises.- Refer- Partial Reconfiguration Design.- 8. System on a Pro- ences.- Index grammable Chip.- 9. Applications.- References.- Ap- pendices. Fields of interest Computer Hardware; Math Applications in Comput- Fields of interest er Science; User Interfaces and Human Computer Circuits and Systems; Processor Architectures; Com- Interaction; Computer Appl. in Arts and Humani- puter Systems Organization and Communication ties; Computer Graphics Networks; Computer Hardware; Software Engineer- ing/Programming and Operating Systems Target groups Computer Graphics Undergraduates Target groups Computer engineers, computer architects, electri- Type of publication cal engineers, computer scientists, FPGA designers, Undergraduate textbook ASIC designers, students and teachers in computer engineering and electrical engineering Due March 2008 Type of publication Monograph 2008. Approx. 465 p. Geb.

53,45 € Due October 2007 ISBN 978-1-84800-041-4 2007. xxvi, 362 pp Geb.

96,25 € ISBN 978-1-4020-6088-5 springer.com/booksellers Computer 21

L.L. Bonilla, Universidad Carlos III de Madrid, Spain; M. Moscoso, N. Borisov, P. Golle (Eds.) D. Borrajo, Universidad Carlos III de Madrid, Spain; L. Castillo, Uni- Universidad Carlos III de Madrid, Spain; G. Platero, CSIC Madrid , versidad de Granada, Spain; J.M. Corchado, Universidad de Sala- Spain; J.M. Vega, Universidad Politécnica de Madrid, Spain (Eds.) manca, Spain (Eds.) Privacy Enhancing Technologies

Progress in Industrial Mathematics 7th International Symposium, PET 2007 Ottawa, Canada, June Current Topics in Artificial at ECMI 2006 20-22, 2007 Revised Selected Papers Intelligence

12th Conference of the Spanish Association for Artificial In- This book constitutes the thoroughly refereed post- telligence, CAEPIA 2007, Salamanca, Spain, November 12-16, 2007, Selected Papers ECMI is synonymous with European Mathematics proceedings of the 7th International Symposium on for Industry and organizes successful biannual con- Privacy Enhancing Technologies, PET 2007, held in ferences. The 14th European Conference for Mathe- Ottawa, Canada, in June 2007 in conjunction with matics in Industry held in Leganés (Madrid) focused WOTE 2007, the IAVoSS Workshop on Trustwor- This book constitutes the refereed proceedings of the on Aerospace, Information and Communications, thy Elections. The 16 revised full papers presented 12th Conference of the Spanish Association for Ar- Materials, Energy and Environment, Imaging, Biol- were carefully selected from 84 submissions during tificial Intelligence, CAEPIA 2007, held in Salaman- ogy and Biotechnology, Life Sciences, Finances and two rounds of reviewing and improvement. The pa- ca, Spain, in November 2007, in conjunction with the other topics including Education in Industrial Math- pers - both from academia and industry - cover de- 7th Workshop on Artificial Intelligence Technology ematics and web learning. Attendees came from all sign and realization of privacy services for the inter- Transfer, TTIA 2007. The 28 revised full papers pre- over the world.  Overall, these proceedings net and other communication networks and present sented were carefully selected during two rounds of give a lively overview of the importance of mathe- novel research on all theoretical and practical aspects reviewing and improvement from 134 submissions. matical modeling, analysis and numerical methods of privacy technologies, as well as experimental stud- The papers address all current issues of artificial in- when addressing and solving problems from today’s ies of fielded systems. telligence ranging from methodological and foun- real world applications. The accessible presentation dational aspects to advanced applications in various of real problems from industry and finance, model- Fields of interest fields. ing, solutions via appropriate numerical and mathe- Data Encryption; Computer Communication Net- matical techniques are a source of fresh ideas and in- works; Systems and Data Security; Information Stor- Fields of interest spiration for mathematicians. Engineers and scien- age and Retrieval; Computers and Society; Manage- Artificial Intelligence (incl. Robotics); Mathematical tists in application fields may find useful ideas and ment of Computing and Information Systems Logic and Formal Languages; Computation by Ab- techniques presented in familiar contexts that may stract Devices help them to [..] Target groups Researchers and professionals Target groups Features Researchers and professionals Proceedings of major industrial math conference Type of publication Proceedings Type of publication Fields of interest Proceedings Computational Mathematics and Numerical Anal- Due October 2007 ysis; Partial Differential Equations; Computational Due October 2007 Science and Engineering; Numerical Analysis; Prob- ability Theory and Stochastic Processes; Statistics for 2007. X, 273 p. (Lecture Notes in Computer Science, Band 4776) Business/Economics/Mathematical Finance/Insur- Softcover 2007. XI, 280 p. (Lecture Notes in Computer Science, Band 4788) Softcover ance 48,15 € ISBN 978-3-540-75550-0 48,15 € Target groups ISBN 978-3-540-75270-7 Mathematicians, engineers and physicists, and finan- cial mathematicians in applications fields (aerospace, information and communications, materials, energy and environment, imaging, biology and biotechnolo- gy, life sciences, sinances)

Type of publication Proceedings

Due October 2007

2007. X, 1000 p. With colour appendix. (The European Consor- tium for Mathematics in Industry, Band 12) Geb.

106,95 € ISBN 978-3-540-71991-5 22 Computer springer.com/booksellers

C. Boukis, Athens Information Technology; A. Pnevmatikakis, Athens Information Technology; L. Polymenakos, Athens Infor- mation Technology (Eds.)

Artificial Intelligence and Innovations 2007: From Theory to Applications

4th IFIP International Conference on Artificial Intelligence Ap- plications and Innovations (AIAI 2007)

Features "Most recent volume from the AIAI conference se- ries"

Contents Clustering Improves the Exploration of Graph Min- ing Results.- Graph Based Workflow Validation.- Resource Sharing in Multi-Agent Systems Through Multi-Stage Negotiation.- Service Decomposition and Task Allocation in Distributed Computing En- vironments.- Measuring Expert Impact on Learn- ing how to Play a Board Game.- Mining Interesting Clinico-Genomic Associations: The HealthObs Ap- proach.-Domain of Impact for Agents Collaborat- ing in a Baggage Handling System.- ANN Prediction Models for Indoor SIMO Millimeter Band System.- Image Compression with Competitive Networks and Pre-fixed [..]

Fields of interest Artificial Intelligence (incl. Robotics)

Target groups Researchers and practitioners in artificial intelli- gence.

Type of publication Proceedings

Due October 2007

2007. XIV, 408 p. 50 illus. (IFIP International Federation for Infor- mation Processing, Band 247) Geb.

136,96 € ISBN 978-0-387-74160-4 springer.com/booksellers Computer 23

S. Bozapalidis, University of Thessaloniki, Greece; G. Rahonis, Uni- M. Bramer, University of Porthsmouth, UK; F. Coenen, University K. Braune, Universität Karlsruhe; J. Lammarsch, Universität Hei- versity of Thessaloniki, Greece (Eds.) of Liverpool, UK; M. Petridis, University of Greenwich, London, UK delberg; M. Lammarsch, Universität Heidelberg (Eds.) Algebraic Informatics LaTex Research and Development in Second International Conference, CAI 2007, Thessalonkik, Werkzeuge, Grafik, WWW Greece, May 21-25, 2007, Revised Selected and Invited Papers Intelligent Systems XXIV Proceedings of AI-2007, The Twenty-seventh SGAI Initerna- tional Conference on Innovative Techniques and Applications Seit vielen Jahren spielen Tex und LaTex eine of Artificial Intelligence This book constitutes the refereed proceedings of the wichtige Rolle bei der Erstellung hochwertiger Tex- Second International Conference on Algebraic In- tausgabe; dabei ist LaTex der vom Anwender ver- formatics, CAI 2007, held in Thessaloniki, Greece, wendete Textformatierer, während Tex im Hin- in May 2007. The 10 revised full papers presented to- The papers in this volume are the refereed techni- tergrund nahezu unbemerkt den von LaTex auf- gether with 9 invited papers were carefully reviewed cal papers presented at AI-2007, the Twenty-sev- bereiteten Text in Stil, Qualität und Präzision eines and selected from 29 submissions. The papers cov- enth SGAI International Conference on Innova- Schriftsetzers setzt. Ferner gibt es eine große An- er topics such as algebraic semantics on graphs and tive Techniques and Applications of Artificial In- zahl weiterer Produkte im Umfeld von Tex und La- trees, formal power series, syntactic objects, algebraic telligence, held in Cambridge in December 2007. Tex, wie Bildschirm- oder Druckertreiber, Tools zur picture processing, infinite computation, acceptors They present new and innovative developments Erstellung von Grafiken, HTML- oder PDF-Seiten and transducers for strings, trees, graphs, arrays, etc., in the field, divided into sections on Constraint sowie zur Erzeugung von Schriften, die von einem and decision problems. Satisfaction, AI Techniques, Data Mining and großen Anwenderkreis eingesetzt werden. Selbst eine Machine Learning, Multi-Agent Systems, Data in Java geschriebene Tex-Version, die über das Inter- Fields of interest Mining and Knowledge Acquisition and net auf Quelldateien, Makros oder Fonts zugreifen Logics and Meanings of Programs; Mathematical Management, followed by the text of kann, ist mittlerweile verfügbar. In dem vorliegenden Logic and Formal Languages; Software Engineering; short papers presented as posters at the conference. Buch werden aktuelle Entwicklungen von LaTex, wie Symbolic and Algebraic Manipulation This is the twenty-fourth volume in the Research z.B. PDF-Tex und PDF-LaTex, Metafond und Meta- and Development series. The series is essential read- post vorgestellt. Weiterhin werden wichtige Tools Target groups ing for those who wish to keep up to date with de- zur Erzeugung von HTML- und PDF-Seiten detail- Researchers and professionals velopments in this important field. The Application liert beschrieben sowie Softwaresysteme, die für La- Type of publication Stream papers are published as a companion volume Tex-Anwendungen bedeutsam sind, [..] Proceedings under the title Applications and Innovations in Intel- ligent Systems XV. Features  Darstellung aktueller Entwicklungen von La- Due October 2007 Contents Tex, wie z.B. PDF-Tex/LaTex, Metafont und Meta- From the Contents Technical Keynote Address: Ad- post Detaillierte Beschreibung wichtiger Tools zur 2007. Approx. 310 p. (Lecture Notes in Computer Science, Band ventures in Personalized Web Search.- Best Tech- Erzeugung von HTML- und PDF-Seiten 4728) Softcover nical Paper: An Evolutionary Algorithm-Based Ap- proach to Robust Analog Circuit Design Using Contents 51,36 € Constrained Multi-Objective Optimization.- Con- PDF-Tex/Latex.- Erzeugung von HTML-Code.- ISBN 978-3-540-75413-8 straint Satisfaction.- Construction of Heuristics for NTS.- Rechtschreibpr?ung.- Oberfl?hen.- Grafik- a Search-Based Approach to Solving Sudoku.- Dy- Software.- METAFONT und METAPOST.- Textaus- namic Rule Mining for Argumentation Based Sys- gabe und Computeralgebra-System.- Aufbereiten der tems.- AI Techniques.- Extending Jess to Handle Ausgabe. Uncertainty.- Learning Sets of Sub-Models for Spa- tio-Temporal Prediction.- Data Mining and Machine Fields of interest Learning.- Frequent Set Meta Mining: Towards Mul- Document Preparation and Text Processing ti-Agent Data [..] Target groups Fields of interest  LaTex-Anwender, UNIX-Fachleute, profes- Artificial Intelligence (incl. Robotics) sionelle Textgestalter

Target groups Type of publication Researchers, practitioners, under-graduates/post- Professional book graduates, academics Due March 2009 Type of publication Proceedings 2009. Etwa 700 S. 75 Abb. (X.systems.press) Geb.

Due January 2008 49,95 € ISBN 978-3-540-00717-3 2008. Approx. 410 p. Softcover

127,33 € ISBN 978-1-84800-093-3 24 Computer springer.com/booksellers

K. Braune, Universität Karlsruhe; J. Lammarsch, Universität Hei- J. Braz, EST Setúbal/IPS, Portugal; A. Ranchordas, INSTICC, Portu- M.H. Breitner, Leibniz Universität Hannover, Germany; G. Denk, delberg; M. Lammarsch, Universität Heidelberg gal; H. Araújo, Universidade de Coimbra, Portugal; J. Jorge, Insti- Quimonda AG Products, München, Germany; P. Rentrop, Tech- tuto Superior Técnico/UTL, Lisboa, Portugal (Eds.) nische Universität München, Germany (Eds.) LaTeX Advances in Computer Graphics and From Nano to Space Fonts, Layout, Markup Computer Vision Applied Mathematics Inspired by Roland Bulirsch International Conferences VISAPP and GRAPP 2006, Setúbal, Seit vielen Jahren spielen TeX und LaTeX eine Portugal, February 25-28, 2006, Revised Selected Papers wichtige Rolle bei der Erstellung hochwertiger Tex- Graduate students and postgraduates in Mathemat- tausgabe; dabei ist LaTeX der vom Anwender ver- ics, Engineering and the Natural Sciences want to wendete Textformatierer, während TeX im Hin- This book includes selected papers of the VISAPP understand Applied Mathematics for the solution tergrund nahezu unbemerkt den von LaTeX auf- and GRAPP International Conferences 2006, held in of everyday problems. Scholars of Roland Bulirsch bereiteten Text in Stil, Qualität und Präzision eines Funchal, Madeira, Portugal, February 25-28, 2006. working at universities, at research institutions and Schriftsetzers setzt. Ferner gibt es eine große An- The 27 revised full papers presented were carefully in industry combine research and review papers in zahl weiterer Produkte im Umfeld von TeX und La- reviewed and selected from 314 submissions. The this anthology. Their work is summed up under the TeX, wie Bildschirm- oder Druckertreiber, Tools zur topics include Geometry and Modeling, Render- title "From Nano to Space – Applied Mathematics Erstellung von Grafiken, HTML- oder PDF-Seiten ing, Animation and Simulation, Interactive Envi- Inspired by Roland Bulirsch". More than 20 contri- sowie zur Erzeugung von Schriften, die von einem ronments, Image Formation and Processing, Image butions are divided into scales: nano, micro, macro, großen Anwenderkreis eingesetzt werden. Selbst eine Analysis, Image Understading, Motion, Tracking space and real life. The contributions survey current in Java geschriebene TeX-Version, die über das In- and Stereo Vision. research and present case studies very interesting ternet auf Quelldateien, Makros oder Fonts zugreifen and informative for both graduate students and post- kann, ist mittlerweile verfügbar. In dem vorliegenden Fields of interest graduates. The contributions show how modern Ap- Buch werden Erweiterungen des LaTeX-Basissys- Computer Imaging, Vision, Pattern Recognition and plied Mathematics influences our everyday lives. Sev- tems dargestellt, die insbesondere in den Bereichen Graphics; Image Processing and Computer Vision; eral contributions include complex graphics and il- des naturwissenschaftlichen Textsatzes Anwendung Computer Graphics; Simulation and Modeling; Pat- lustrations, many of them in color. finden; parallel hierzu werden auch alle relevanten tern Recognition typographischen Normen erläutert. Dabei findet Ko- Fields of interest ma Skript besondere Berücksichtigung. Target groups Applications of Mathematics; Computational Mathe- Researchers and professionals matics and Numerical Analysis; Appl.Mathematics/ Features Computational Methods of Engineering Umfassende Darstellung der LaTeX-Erweiterun- Type of publication gen zur Gestaltung von Texten insbesondere für die Proceedings Target groups Naturwissenschaften Ideale Grundlage für Anwen- Graduate students, postgraduates and researchers der, die bereits Grundkenntnisse in LaTeX besitzen, Due November 2007 Type of publication und eigene Vorstellungen in der Gestaltung von Tex- Contributed volume ten umsetzen wollen 2007. XV, 407 p. Also available online. (Communications in Com- puter and Information Science, Band 4) Softcover Contents Due October 2007 Einbinden von Schriften.- Text und Grafiken.- 70,62 € Typographische Konventionen.- Verzeichnisse.- ISBN 978-3-540-75272-1 2008. X, 342 p. 124 illus., 29 in Color Geb. Ausgewählte LaTeX-Pakete.- Pakete für wis- senschaftliche Disziplinen.- Kontrollstrukturen. 58,80 € ISBN 978-3-540-74237-1 Fields of interest Document Preparation and Text Processing

Target groups LaTeX-Anwender, UNIX-Fachleute, professionelle Textgestalter

Type of publication Professional book

Due April 2008

2008. Etwa 700 S. 75 Abb. (X.systems.press) Geb.

49,95 € ISBN 978-3-540-00719-7 springer.com/booksellers Computer 25

S. Brenner, L.R. Scott A. Bronstein, Technion-Israel Institute of Technology, Haifa, Is- P.J. Brooke, University of Teeside, Middlesborough, UK; R.F. rael; M. Bronstein, Technion-Israel Institute of Technology, Haifa, Paige, University of York, UK Israel; R. Kimmel, Technion-Israel Institute of Technology, Haifa, The Mathematical Theory of Finite Israel Element Methods Practical Distributed Processing Numerical Geometry of Non-Rigid Shapes Distributed processing has a strong theoretical foun- This book develops the basic mathematical theory dation, but many day-to-day practitioners make lim- of the finite element method, the most widely used ited use of the advantages this theory can give them. technique for engineering design and analysis. It for- Deformable objects are ubiquitous in the world sur- The result includes unreliable systems with obscure malizes basic tools that are commonly used by re- rounding us, on all levels from micro to macro. The and intermittent failures, that can cost time, money searchers in the field but not previously published. need to study such shapes and model their behavior and in extreme cases, lives. Reliable construction of The book will be useful to mathematicians as well as arises in a wide spectrum of applications, ranging distributed and concurrent systems must incorporate engineers and physical scientists. It can be used for from medicine to security. In recent years, non-rigid theory in practice. This book provides a concise pre- a course that provides an introduction to basic func- shapes have attracted a growing interest, which has sentation of the theory closely linked to the practical tional analysis, approximation theory, and numeri- led to rapid development of the field, where state-of- realisation of these concepts. Practical presentation cal analysis, while building upon and applying basic the-art results from very different sciences - theoret- is given with examples from C, Java and Eiffel in this techniques of real variable theory. Different course ical and numerical geometry, optimization, linear al- comprehensive textbook which contains all the ele- paths can be chosen, allowing the book to be used for gebra, graph theory, machine learning and comput- ments needed for a complete development of a dis- courses designed for students with different interests. er graphics, to mention a few - are applied to find tributed system. Theoretical models of concurrency For example, courses can emphasize physical appli- solutions. This book gives an overview of current are linked with practical realisation of systems, pro- cations, or algorithmic efficiency and code develop- state of science in analysis and synthesis of non-rigid viding an integrated approach to the field. Written ment issues, or the more difficult convergence theo- shapes. Everyday examples are used to explain con- with undergraduates in mind, especially relevant for rems of the subject. This new edition is substantial- cepts and to illustrate different techniques. Self-con- intermediate level students, this textbook will prove a ly updated with additional exercises throughout and tained presentation of topics unfolds systematically comprehensive guide to the topic. Example code will new chapters on Additive Schwarz Preconditioners and numerous figures enrich the engaging exposi- be provided [..] and Adaptive Meshes. Review of [..] tion. Practice problems follow the end of each chap- Features Features ter, with detailed solutions to selected problems in Integrated approach to the field of distributed pro- -A rigorous and thorough mathematical introduc- the appendix. A gallery of [..] cessing Links theoretical models of concurrency with tion to the foundations of the subject -A clear and Features practical realisation of systems Practical presentation concise treatment of modern fast solution techniques Gives an up-to-date overview of the concepts and with examples from C, Java and Eiffel Other books Contents techniques in analysis and synthesis of non-rigid are typically large volumes where the precise content Preface(3rdEd).- Preface(2ndEd).- Preface(1stED).- shapes Bridges between theoretical and applied becomes lost – this is a coherent textbook Contains Basic Concepts.- Sobolev Spaces.- Variational For- fields, spanning computer vision, pattern recogni- the elements needed for a complete development of a mulation of Elliptic Boundary Value Problems.- The tion and computer graphics Presents practical state- distributed system, from theory to practice Construction of a Finite Element of Space.- Polyno- of-the-art algorithms and methods and exemplifies Contents mial Approximation Theory in Sobolev Spaces.- n- them on real applications Engaging exposition en- What is Distributed Processing?- Concepts of Con- Dimensional Variational Problems.- Finite Element riched by numerous figures and everyday examples currency.- Models of Concurrency.- Concurrency Multigrid Methods.- Additive Schwarz Precondition- Reference to public [..] in Operating Systems.- Interprocess Communica- ers.- Max-norm Estimates.- Adaptive Meshes.- Vari- Contents tion.- Protocols.- Security.- Languages and Distribut- ational Crimes.- Applications to Planar Elasticity.- Introduction.- A Taste of Geometry.- Discrete Ge- ed Processing.- Building Distributed Systems.- Case Mixed Methods.- Iterative Techniques for Mixed ometry.- Shortest Paths and Fast Marching Meth- Study: A Networked Game.- The End.- Exercises, Methods.- Applications of Operator-Interpolation ods.- Numerical Optimization.- In the Rigid King- Hints and Comments.- About the Example Code.- Theory.- References.- Index. dom.- Multidimensional Scaling.- Spectral Embed- Bibliography.- Glossary.- Index. Fields of interest ding.- Non-Euclidean Embedding.- Isometry-Invari- Fields of interest Computational Mathematics and Numerical Analy- ant Similarity.- Partial Similarity.- Non-Rigid Corre- Software Engineering/Programming and Operating sis; Numerical and Computational Methods in Engi- spondence and Calculus of Shapes.- Three-Dimen- Systems neering; Theoretical and Applied Mechanics; Func- sional Face Recognition.- Epilogue.- Solutions of Se- lected Problems.- Notation.- Acronyms.- Glossary.- tional Analysis Target groups References.- Subject Index.- Author Index. Undergraduates Target groups Fields of interest Graduate students, researchers, practitioners Type of publication Computer Imaging, Vision, Pattern Recognition and Undergraduate textbook Type of publication Graphics; Geometry; Computational Mathematics Graduate/advanced undergraduate textbook and Numerical Analysis Due October 2007 Target groups Due January 2008 Graduate students, teachers, researchers, profession- 2007. XIV, 262 p. 24 illus. (Undergraduate Topics in Computer als Science) Softcover 2008. Approx. 375 p. (Texts in Applied Mathematics, Band 15) Geb. Type of publication 32,05 € Graduate/advanced undergraduate textbook ISBN 978-1-84628-840-1 57,67 € ISBN 978-0-387-75933-3 Due April 2008

2008. Approx. 320 p. (Monographs in Computer Science) Soft- cover

57,67 € ISBN 978-0-387-73300-5 26 Computer springer.com/booksellers

W.J. Buchanan, Napier University, Edinburgh, UK J.J. Buckley, University of Alabama, Birmingham, AL, USA; L.J. R.S. Burachik, University of South Australia, Mawson Lakes, Aus- Jowers, University of Alabama, Birmingham, AL, USA tralia; A.N. Iusem, IMPA, Rio de Janiero, Brazil The Handbook of Data & Networks Security Monte Carlo Methods in Fuzzy Set-Valued Mappings and Optimization Enlargements of Monotone Operators The Handbook of Security will build on the exist- ing Handbook of Data Communications and Net- Features works, and The Complete Handbook of the Inter- Set-valued analysis is an essential tool for the math- net. It will try to cover every aspect of computer and Clear and didactic book about Monte Carlo meth- ods using random fuzzy numbers to obtain approx- ematical formulation of many real-life situations, network security. This will include an analysis of the e.g., equilibrium theory in mathematical economics. physical connection and data transfer over networks, imate solutions to fuzzy optimization problems In- cludes various solved problems such as fuzzy linear This work offers the first comprehensive treatment the network protocols, the session protocols (such in book form of the fairly new subdiscipline of en- as HTTP and FTP), the network operating systems, programming, fuzzy regression, fuzzy inventory con- trol, fuzzy game theory, fuzzy queuing theory largements of maximal monotone operators, includ- network security devices, mobile networks, and an ing several important new results in the field. In the in-depth analysis of the principles and implementa- Contents last decades, with the development of nonsmooth tion of public-key encryption. Throughout the book Part I: Introduction.- 1 Introduction 3.- 2 Fuzzy optimization, effective algorithms have been devel- practical examples of security will be given, such as Sets.- 3 Crisp Random Numbers and Vectors.- 4 oped to solve these kinds of problems, such as nons- router programming commands and screen shots Random Fuzzy Numbers and Vectors.- 5 Tests for mooth variational inequalities. Several of these meth- showing key security principles. Randomness.- Part II: Applications.- 6 Fuzzy Monte ods, such as bundle methods for variational prob- lems, are fully developed and analyzed in this book. Features Carlo Method.- 7 Fully Fuzzied Linear Programming The first chapters provide a self-contained review of The complete reference on Internet Security A I.- 8 Fully Fuzzied Linear Programming II.- 9 the basic notions and fundamental results in set-val- unique and comprehensive overview in the area of Fuzzy Multiobjective LP.- 10 Solving Fuzzy Equa- ued analysis, including set convergence and continu- Networks Security Security remains a key issue in the tions.- 11 Fuzzy Linear Regression I.- 12 Univariate ity of set-valued mappings together with many im- field of communications, this reference provides a Fuzzy Nonlinear Regression.- 13 Multivariate Non- portant results in infinite-dimensional convex analy- thorough overview linear Regression.- 14 Fuzzy Linear Regression II.- 15 Fuzzy Two-Person Zero-Sum Games.- 16 Fuzzy sis, leading to the classical fixed point results due to Contents Queuing Models.- Part III: Unfinished Business.- 17 Ekeland, Caristi and Kakutani. Next, [..] Network and OS principles.- Security devices.- En- [..] Features cryption.- System attacks.- Network Operating sys- First comprehensive treatment in book form of the tems and servers.- Security policies.- Mobile Net- Fields of interest fairly new subdiscipline in set-valued analysis of en- works.- Implementation. Appl.Mathematics/Computational Methods of Engi- neering; Artificial Intelligence (incl. Robotics) largements of maximal monotone operators Presents Fields of interest several important new results in the field Addressed Management of Computing and Information Sys- Target groups to graduate students, mathematicians, engineers, tems; Electronic and Computer Engineering; Com- Engineers, researchers, and students in Fuzziness economists, and researchers Contains extensive exer- puter Science, general; Computer Systems Organiza- and applied mathematics cises and examples throughout the text tion and Communication Networks; Data Encryp- Type of publication Contents tion Monograph List of Figures.- Dedication.- Acknowledgments.- Target groups Preface.- Introduction.- Set Convergence and Point- Institutes, libraries Due January 2008 to-Set Mappings.- Convex Analysis and Fixed Point Theorems.- Maximal Monotone Operators.- 5. En- Type of publication largements of Monotone Operators.- Recent Topics 2008. Approx. 285 p. (Studies in Fuzziness and Soft Computing, in Proximal Theory.- Bibliography.- Notation.- In- Handbook Band 222) Geb. dex. 106,95 € Due December 2007 Fields of interest ISBN 978-3-540-76289-8 Optimization; Operator Theory; Operations Re- 2008. Approx.1800 p. With CD-ROM. Geb. search, Mathematical Programming; Operation Re- search/Decision Theory; Calculus of Variations and 342,40 € Optimal Control; Optimization; Analysis ISBN 978-0-387-28602-0 Target groups Graduate students and researchers in pure and applied mathematics, as well as engineers and economists interested in nonsmooth optimization, variational inequalities and nonlinear equations in infinite-dimensional spaces

Type of publication Graduate/advanced undergraduate textbook

Due November 2007

2008. XIV, 294 p. (Springer Optimization and Its Applications, Band 8) Geb.

67,36 € ISBN 978-0-387-69755-0 springer.com/booksellers Computer 27

W. Burger, Fachhochschule Hagenberg, Austria; M.J. Burge, Na- M. Burmester, Florida State University, Tallahassee, FL, USA; A. F. Burstein, Monash University, Caulfield East, VIC, Australia; C.W. tional Science Foundation, Arlington, VA, USA Yasinsac, Florida State University, Tallahassee, FL, USA Holsapple, University of Kentucky, Versailles, KY, USA (Eds.)

Digital Image Processing Security Issues in Ad-Hoc Networks Handbook on Decision Support

An Algorithmic Introduction Using Java Systems 1 The Basics Ad-hoc networks are dynamic collections of self-or- ganizing mobile wireless nodes with links that are Written as an introduction for undergraduate stu- changing in an unpredictable way. This profession- dents, this textbook covers the most important meth- al reference work investigates the security aspects Decision support systems have experienced a ods in digital image processing. Formal and mathe- of ad-hoc networks. The lack of any formal mod- marked increase in attention and importance over matical aspects are discussed at a fundamental lev- el for such networks has resulted in uncoordinat- the past 25 years. The aim of this book is to survey el and various practical examples and exercises sup- ed research, which in many cases leads to confus- the decision support system (DSS) field – covering plement the text. The book uses the image process- ing or heuristic requirements, and to routing proto- both developed territory and emergent frontiers. It ing environment ImageJ, freely distributed by the cols whose security can only be established in very will give the reader a clear understanding of funda- National Institute of Health. A comprehensive web- restrictive environments. Security Issues in Ad-Hoc mental DSS concepts, methods, technologies, trends, site supports the book, and contains full source code Networks shows that it is possible to achieve secure and issues. It will serve as a basic reference work for for all examples in the book, a question and answer communication in ad hoc networks in a strong secu- DSS research, practice, and instruction. To achieve forum, slides for instructors, etc. Digital Image Pro- rity model using appropriate cryptographic mecha- these goals, the book has been designed according cessing in Java is the definitive textbook for comput- nisms, and by exploiting particular aspects of wire- to a ten-part structure, divided in two volumes with er science students studying image processing and less communication. Security Issues in Ad-Hoc Net- chapters authored by well-known, well-versed schol- digital processing. works is designed for practitioners and researchers ars and practitioners from the DSS community. Features in industry, as well as for advanced-level students in Features Compact introduction to the methods of the digital computer science and electrical engineering. Basic reference work for decision support system image processing Covers the most important proce- Features (DSS) concepts, methods, technologies, trends, and dures Formal and mathematical aspects are discussed Timely professional reference, written by world-class issues Authored by well-known scholars and practi- at a fundamental level Practical examples and exer- researchers Demonstrates that secure communica- tioners from the DDS community cises throughout A comprehensive website supports tion is possible in ad hoc networks the book, and contains full source code for all exam- Contents ples in the book, a question and answer forum, slide Contents Foundations of Decision Support Systems.- Decision sets for instructors, images, reviews and errata Preface.- Introduction.- Models for Analyzing Ad Support System Fundamentals.- Multiparticipant hoc Networks.- Point-to-Point Communication.- Decision Support Systems.- Intelligent Decision Sup- Contents Density in Ad hoc Networks.- Distributed Applica- port Systems.- Effects on Computer-Based Decision Crunching Pixels.- Digital Images.- ImageJ.- His- tions.- Conclusion.-Bibliography.- Index. Support. tograms.- Point Operations.- Filters.- Edges and Contours.- Corner Dectection.- Detecting Simple Fields of interest Fields of interest Curves.- Morphological Filters.- Regions in Bina- Data Encryption; Data Structures, Cryptology and Operation Research/Decision Theory; Information ry Images.- Color Images.- Introduction to Spec- Information Theory; Computer Communication Systems tral Techniques.- The Discrete Fourier Transform in Networks; Computer Systems Organization and 2D.- The Discrete Cosine Transform (DCT).- Geo- Communication Networks; Coding and Information Target groups metrical Operations.- Comparing Images.- A Math- Theory; Communications Engineering, Networks Researchers, practitioners ematical Notation.- B Java Notes.- C ImageJ Short Reference.- D Source Code.- References.- Index. Target groups Type of publication Practitioners and researchers in industry Handbook Fields of interest Computer Imaging, Vision, Pattern Recognition and Type of publication Due January 2008 Graphics; Computer Graphics; Image Processing and Monograph Computer Vision; Numerical and Computational Methods in Engineering 2008. Approx. 800 p. (International Handbooks on Information Due December 2007 Systems) Geb. Target groups 192,55 € Undergraduates, lecturers 2007. Approx. 200 p. 20 illus. Geb. ISBN 978-3-540-48712-8 Type of publication 78,06 € Undergraduate textbook ISBN 978-0-387-24433-4

Due January 2008

2008. Approx. 592 p. 288 illus., 72 in color. (Texts in Computer Science) Geb.

58,80 € ISBN 978-1-84628-379-6 28 Computer springer.com/booksellers

F. Burstein, Monash University, Caulfield East, VIC, Australia; C.W. K. Busch, Rensselaer Polytechnic Institute, Troy, NY, USA; M. H. Bustince, Universidad Pública de Navarra, Pamplona, Spain; Holsapple, University of Kentucky, Versailles, KY, USA (Eds.) Mavronicolas, University of Cyprus, Nicosia, Cyprus F. Herrera, University of Granada, Spain; J. Montero, Universidad Complutense, Madrid, Spain (Eds.) Handbook on Decision Support Counting Networks Systems 2 Fuzzy Sets and Their Extensions: Representation, Aggregation and Variations This volume provides a comprehensive presenta- Models tion of counting networks — a fundamental class of distributed data structures providing efficient solu- Intelligent Systems from Decision Making to Data Mining, As the most comprehensive reference work dealing tions to important problems in distributed systems. Web Intelligence and Computer Vision with decision support systems (DSS), this book is es- Specifically, counting networks solve distributed co- sential for the library of every DSS practitioner, re- ordination problems such as counting, load balanc- searcher, and educator. Written by an international ing, and barrier synchronization. Among other top- This carefully edited book presents an up-to-date array of DSS luminaries, its more than 70 chapters ics, this book provides constructions of counting state of current research in the use of fuzzy sets and approach decision support systems from a wide vari- networks, examines their limitations as well as their their extensions, paying attention to foundation is- ety of perspectives ranging from classic foundations ability to support additional functionalities, and eval- sues and to their application to four important areas to cutting-edge thought, informative to provoca- uates several measures of performance for counting where fuzzy sets are seen to be an important tool for tive, theoretical to practical, historical to futuristic, networks. The main purpose of the book is to make modelling and solving problems. The book contains human to technological, and operational to strate- the most important results on counting networks ac- 34 chapters divided into two parts. The first part is gic. The chapters are conveniently organized into cessible to a wide audience and to stimulate new re- divided into two sections. Section 1 contains four re- 10 major sections: foundations of decision support search on this fascinating topic. Counting Networks view papers introducing some non standard repre- systems, DSS fundamentals, multiparticipant DSSs, is suitable as a text in advanced-level courses special- sentations that extend fuzzy sets (type-2 fuzzy sets, intelligent DSSs, effects of decision support, time ized in distributed computing with networked data Atanassov’s IFS, fuzzy rough sets and computing and space issues, scopes of decision support, devel- structures. The book is also a useful tool for the prac- with words under the fuzzy sets perspective). Section oping and managing decision support systems, cas- titioner who implements distributed data structures 2 reviews different aggregation issues from a theoret- es and applications, and decision support horizons. for distributed system applications.   ical and practical point of view; this second part is di- Novices and experts alike will refer to the authori- vided into four sections. Section 3 is devoted to deci- tative and stimulating content again and again for Features sion making, with seven papers that show how fuzzy years to come. First comprehensive textbook presentation of count- sets and their extensions are an important tool for ing networks Accessible to students, provides ample modelling choice problems. Section 4 includes eight Features exercises and instruction material papers that cover different aspects on the use of fuzzy Basic reference work for decision support system sets and their [..] (DSS) concepts, methods, technologies, trends, and Contents issues Authored by well-known scholars and practi- Preface.- Introduction.- Basic Regular Construc- Features tioners from the DDS community tions.- Irregular Constructions.- Advanced Con- Recent advances of fuzzy sets and their extensions structions.- Constructions with Arbitrary Output Special focus on fuzzy logic foundations (represen- Contents Width.- Combinatorial Properties and Impossibility tation and aggregation) and computer vision appli- Time and Space Issues for Decision Support.- Scopes Results.- Consistency Properties.- Contention Anal- cations, decision making, web intelligence and data of Decision Support.- Developing and Managing De- ysis.- Experimental Performance.- Increments and mining cision Support Systems.- Decision Support Cases and Decrements.- Extensions of Counting Networks.- Applications.- Decision Support Horizons. Beyond Counting.- Index. Contents Part I. Foundations: Representation and Aggrega- Fields of interest Fields of interest tion.- Aggregation.- Part II. From Decision Making Operation Research/Decision Theory; Information Computer Communication Networks; Data Struc- to Data Mining, Web Intelligence and Computer Vi- Systems tures; Operating Systems; Computer Systems Orga- sion.- Decision Making.- Data Mining.- Web Intelli- nization and Communication Networks; Algorithm gence.- Computer Vision. Target groups Analysis and Problem Complexity; Theory of Com- Researchers, practitioners putation Fields of interest Appl.Mathematics/Computational Methods of Engi- Type of publication Target groups neering; Artificial Intelligence (incl. Robotics) Handbook Industry practitioners working in distributed system applications, researchers in distributed computing Target groups Due January 2008 and theoretical computer science, discrete mathe- Researchers, engineers, graduate students in fuzzi- maticians interested in the mathematical theory of ness, soft computing, computer vision networks 2008. Approx. 800 p. (International Handbooks on Information Systems) Geb. Type of publication Type of publication Monograph 192,55 € Monograph ISBN 978-3-540-48715-9 Due October 2007 Due September 2008

2007. XX, 674 p. 126 illus. (Studies in Fuzziness and Soft Comput- 2008. Approx. 300 p. 20 illus. Geb. ing, Band 220) Geb.

82,34 € 181,85 € ISBN 978-0-387-32991-8 ISBN 978-3-540-73722-3 springer.com/booksellers Computer 29

M. Butler, University of Southampton, UK; M.G. Hinchey, Loyola P. Buxmann, Technische Universität Darmstadt; H. Diefenbach, M. Calisti, Whitestein Technology, Zürich, Switzerland; S. van der College in Maryland, Baltimore, MD, USA; M.M. Larrondo-Petrie, Technische Universität Darmstadt; Th. Hess, Ludwig-Maximil- Meer, J. Strassner, Motorola Inc., Schaumburg, IL, USA (Eds.) Florida Atlantic University, Boca Raton, FL, USA (Eds.) ians-Universität München Advanced Autonomic Networking Formal Methods and Software Die Softwareindustrie and Communication Engineering Ökonomische Prinzipien, Strategien, Perspektiven 9th International Conference on Formal Engineering Methods, ICFEM 2007, Boca Raton, Florida, USA, November 14-15, 2007, This book presents a comprehensive reference of Proceedings Ob ERP-Software, Office-Anwendungen, Open- state-of-the-art efforts and early results in the area Source-Produkte oder Online-Spiele: Software un- of autonomic networking and communication. The terscheidet sich im Hinblick auf ihre ökonomischen essence of autonomic networking, and thus auto- This book constitutes the refereed proceedings of the Eigenschaften grundlegend von Industriegütern und nomic communications, is to enable the self-gov- 9th International Conference on Formal Engineering Dienstleistungen. Auf Basis dieser ökonomischen erning of services and resources within the con- Methods, ICFEM 2007, held in Boca Raton, Flori- Prinzipien behandelt das Buch Strategien für Soft- straints of business rules. In order to support self- da, USA, November 14-15, 2007. The 19 revised full wareanbieter, Systemhäuser und IT-Beratungsge- governance, appropriate self-* functionality will be papers together with 2 invited talks presented were sellschaften. Es werden Kooperations-, Vertriebs-, deployed in the network on an application-specif- carefully reviewed and selected from 38 submissions. Preis- und Industrialisierungsstrategien vorgestellt ic basis. The continuing increase in complexity of The papers address all current issues in formal meth- und analysiert. Zudem werden mit Service Orient- upcoming networking convergence scenarios man- ods and their applications in software engineering. ed Architectures, Offshoring sowie Open-Source- dates a new approach to network management. This They are organized in topical sections on security Software drei zentrale Trends und deren Auswirkun- special issue explores different ways that autonomic and knowledge, embedded systems, testing, automat- gen auf die Zukunft der Software-Industrie betra- principles can be applied to existing and future net- ed analysis, hardware and concurrency. chtet. Das Buch enthält zahlreiche Fallstudien sowie works. In particular, the book has 3 main parts, each neue empirische Erkenntnisse, die unter anderem of them represented by three papers discussing them Fields of interest auf Basis einer Vielzahl von Expertengesprächen ent- from industrial and academic perspectives. The first Programming Techniques; Software Engineering; standen sind. Zielgruppe des Buches sind Fach- und part focuses on architectures and modeling strate- Models and Principles; Logics and Meanings of Pro- Führungskräfte aus der Software- und IT-Branche gies. Part two is dedicated to middleware and service grams; Programming Languages, Compilers, Inter- sowie Studierende und Wissenschaftler aus Betrieb- infrastructure as facilitators of autonomic [..] preters swirtschaftslehre, (Wirtschafts-)Informatik und Wirtschaftsingenieurwesen. Features Target groups Leading Scientists and Researchers show ways to ap- Researchers and professionals Features ply autonomic principles Enables for significant im- Erstes umfassendes Buch über das „Wie und warum provements in network management Type of publication funktioniert die Software-Industrie?“ und „In welche Proceedings Richtung geht die Entwicklung?“ Contents I Architectures and Models.- Technological Neutral Due October 2007 Contents Principles and Concepts for Autonomic Network- Ökonomische Prinzipien der Software-Indus- ing.- A Telco Approach to Autonomic Infrastruc- trie: Grundlagen; Softwaremärkte; Netzeffekte auf ture Management.-Modelling distribution and be- 2007. VIII, 387 p. (Lecture Notes in Computer Science, Band 4789) Softwaremärkten; Software-Entwicklung als Agen- haviour for network management of next generation Softcover cy-Problem.- Strategien der Software-Industrie: networks.- II Middleware and Services.- Autonomic 55,64 € Produktstrategien; Preisstrategien; Distribution- Communication with RASCAL Hybrid Connectivity ISBN 978-3-540-76648-3 sstrategien für Software-Anbieter; Outsourcing Management.- Autonomic Resource Regulation in und Offshoring der Software-Entwicklung; Koop- IP Military Networks: A Situatedness Based Knowl- erationen und Mergers in der Software-Industrie.- edge Plane.- Autonomic Service Access Management Ausgewählte Perspektiven für die Software-Indus- for Converged Next Generation Networks.- III Net- trie: Service-orientierte Architekturen; Industrieal- works.- Cross-Layer Optimisations for Autonomic isierung der Software-Entwicklung; Open-Source- Networks.- An [..] Software. Fields of interest Fields of interest Computer Systems Organization and Communi- Management; Information Systems; Technology cation Networks; Computer Communication Net- Management; e-business and e-commerce; Software works; Software Engineering Engineering Target groups Target groups Researchers and practitioners in autonomic comput- Fach- und Führungskräfte aus der Software- und IT- ing, networking, and communication, Telecom oper- Branche sowie Studierende und Wissenschaftler aus ators, manufacturers, and service providers, system Betriebswirtschaftslehre, (Wirtschafts-)Informatik developers und Wirtschaftsingenieurwesen Type of publication Type of publication Contributed volume Monograph Due December 2007 Due January 2008 2008. Approx. 200 p. (Whitestein Series in Software Agent Tech- 2008. XII, 216 S. 69 Abb. Geb. nologies and Autonomic Computing) Softcover

39,95 € 42,69 € ISBN 978-3-540-71828-4 ISBN 978-3-7643-8568-2 30 Computer springer.com/booksellers

G. Calvary, University of Grenoble, France; C. Pribeanu, National D. Calvetti, Case Western Reserve University, Cleveland, OH, USA; F. Camastra, University of Naples, Parthenope, Italy; A. Vinciarelli, Institute of Research and Development in Informatics, Bucharest, E. Somersalo, Helsinki University of Technology, Helsinki, Finland IDIAP Research Institute, Martigny, Switzerland Romania; G. Santucci, Università di Roma "La Sapienza", Italia; J. Vanderdonckt, Université Catholique de Louvain, Louvain-la- Neuve, Belgium (Eds.) An Introduction to Bayesian Machine Learning for Audio, Image Scientific Computing and Video Analysis Computer-Aided Design of User Ten Lectures on Subjective Computing Theory and Applications Interfaces V

Proceedings of the Sixth International Conference on Comput- er-Aided Design of User Interfaces CADUI '06 (6-8 June 2006, This book has been written for undergraduate and This book illustrates how to deal with complex me- Bucharest, Romania) graduate students in various areas of mathematics dia and convert raw data into useful information. and its applications. It is for students who are willing Once the original data have been converted into a to get acquainted with Bayesian approach to compu- digital representation, the processing of different me- This book gathers the latest experience of experts, re- tational science but not necessarily to go through the dia can be performed under the unifying framework search teams and leading organizations involved in full immersion into the statistical analysis. It has also of machine learning. Therefore only part of the in- computer-aided design of user interfaces of interac- been written for researchers working in areas where formation extraction processes is media specific and tive applications. This area investigates how it is de- mathematical and statistical modeling are of central most work can be made by applying general tech- sirable and possible to support, to facilitate and to importance, such as biology and engineering. niques valid for a wide range of problems. Apparent- speed up the development life cycle of any interac- ly very different domains like face verification and Features tive system: requirements engineering, early-stage text categorization become, from a processing point Expository accessible book, internationally known design, detailed design, development, deployment, of view, equivalent. Organized into 3 parts: The 1st authors evaluation and maintenance. In particular, it stresses focuses on technical aspects, basic mathematical no- tions and elementary machine learning techniques. how the design activity could be better understood Contents for different types of advanced interactive systems The 2nd provides an extensive survey of most rel- Introduction .- Inverse Problems and Subjective evant machine learning techniques for media pro- such as context-aware systems, multimodal appli- Computing.- Basic Problem of Statistical Infer- cations, multi-platform systems, pervasive comput- cessing. The 3rd focuses on applications and shows ence.-The Praise Of Ignorance: Randomness as Lack how techniques are applied in actual problems. This ing, ubiquitous computing and multi-device envi- of Information.- Basic Problem in Numerical Linear ronments. unique book offers an introduction and advanced Algebra.- Sampling: First Encounter.- Statistically In- material in the combined fields of machine learning spired Preconditioners.- Conditional Gaussian Den- Features and [..] sities and Predictive Envelopes.- More Applications Gathers the latest research of experts, research teams of the Gaussian Conditioning.- Sampling: The Real and leading organisations involved in computer-aid- Features Thing.- Wrapping up: Hypermodel, Dynamic Prior- ed design of user interactive applications supported Provides detailed introductions to algorithms and conditioners and Bayesian Learning. by software, with specific attention for platform-in- examples of their applications Domains that appear far from one another such as speech and handwrit- dependent user interfaces and context-sensitive or Fields of interest aware applications ing recognition are shown to be equivalent from the Computational Science and Engineering; Statistics processing point of view, via the unifying framework and Computing/Statistics Programs; Computational Fields of interest of machine learning Supplies detailed appendices re- Mathematics and Numerical Analysis; Probability Software Engineering; Information Systems Appli- viewing the basic background Provides pointers to Theory and Stochastic Processes cations (incl.Internet); Multimedia Information Sys- publicly available data and software packages used in [..] tems; User Interfaces and Human Computer Interac- Target groups tion Graduate students, researchers Contents Introduction.- Part 1: From Perception to Compu- Target groups Type of publication tation.- Audio Acquisition, Representation and Stor- Students, task analysts, designers, developers, soft- Graduate/advanced undergraduate textbook ware engineers, teachers in interactive computing, age.- Image and Video Acquisition, Representation especially in language, models and tools aspects and Storage.- Part 2: Machine Learning.- Machine Due December 2007 Learning.- Bayesian Theory of Decision.- Clustering Type of publication Methods.- Foundations of Statistical Learning and Proceedings 2007. Approx. 200 p. (Surveys and Tutorials in the Applied Math- Model Selection.- Supervised Neural Networks and ematical Sciences, Band 2) Softcover Ensemble Methods.- Kernel Methods.- Markovian Due October 2007 Models for Sequential Data.- Feature Extraction and 35,26 € Manifold Learning Methods.- Part 3: Applications.- ISBN 978-0-387-73393-7 Speech and Handwriting Recognition.- Automatic 2008. XII, 298 p. Geb. Face Recognition.- Video Segmentation and [..] 117,65 € Fields of interest ISBN 978-1-4020-5819-6 Pattern Recognition; Image Processing and Comput- er Vision; Multimedia Information Systems

Target groups Graduates, researchers

Type of publication Graduate/advanced undergraduate textbook

Due December 2007

2008. Approx. 510 p. Also available online. (Advanced Informa- tion and Knowledge Processing) Geb.

90,90 € ISBN 978-1-84800-006-3 springer.com/booksellers Computer 31

R.H. Campbell, University of Illinois, Urbana-Champaign, IL, USA; X.-R. Cao, Hong Kong University of Sciences and Technology, J. Cardoso, Universidade da Madeira, Funchal, Portugal; M. Hepp, P.G. Naldurg, University of Illinois, Urbana-Champaign, IL, USA Hong Kong, China University of Innsbruck, Austria; M. Lytras, University of Patras, Greece (Eds.) Security and Survivability Stochastic Learning and The Semantic Web Analyzing, Modeling, and Verifying Dynamic Recovery in Inse- Optimization cure Systems Real-World Applications from Industry A Sensitivity-Based Approach

Security and Survivability presents new research on Semantic Web: Real-World Applications from In- Performance optimization is vital in the design and the emerging discipline of design and analysis of se- dustry offers a glimpse into the opening door of se- operation of modern engineering systems, includ- curity systems that are survivable. Such systems are mantic technologies by means of concentrated ex- ing communications, manufacturing, robotics, and designed to continue to provide verifiable security amples of semantic applications in real business logistics. Most engineering systems are too compli- guarantees, and allow the system to degrade grace- environments.  For quite a while, there has cated to model, or the system parameters cannot be fully, even under threat or actual incidence of attack. been evidence from academic research and early in- easily identified, so learning techniques have to be The book introduces a theory of recovery-oriented dustrial prototypes that semantic technology can applied. This is a multi-disciplinary area which has security and provides well-developed case studies help humans and machines substantially in access- been attracting wide attention across many disci- that corroborate the utility of the theory, addressing ing and using the unprecedented, and exponential- plines. Areas such as perturbation analysis (PA) in privilege-escalation and Denial of Service (DoS) at- ly growing, amount of information that the World discrete event dynamic systems (DEDSs), Markov tacks. Using their automated verification method- Wide Web provides. Now semantic technology is decision processes (MDPs) in operations research, ology, the authors formally prove for the first time moving from academic and industrial research in- reinforcement learning (RL) or neuro-dynamic pro- whether strategies such as selective filtering, strong to real products and applications.  This book gramming (NDP) in computer science, identification authentication, and client puzzles actually reduce the provides a series of case studies which demonstrate and adaptive control (I&AC) in control systems, vulnerability of a network to DoS attacks. how real benefits can be derived from the adop- share the common goal: to make the "best decision" tion of semantic technology in popular business do- to optimize system performance. This book provides Features mains, such as telecommunication, B2B integration, a unified framework based on a sensitivity point of Lays out a novel approach to surviving security at- healthcare, education, and others. Semantic Web: view. It also introduces new approaches and propos- tacks Shows how secure systems can be modeled and Real-World Applications from Industry summarizes es new research topics within this sensitivity-based engineered to work well – and fail well Case studies state-of-the art expertise and practical experiences framework. corroborate utility of theory Author (and professor) from outstanding technology [..] Roy Campbell is the Director of the National Securi- Features ty Agency designated University of Illinois Center of Features Combines currently prominent research on rein- Academic Excellence in Information Assurance Edu- Designed to create platforms for bringing experts forcement learning / neuro-dynamic programming cation and the Director of the Systems Software [..] together (key government representatives, industry with a unique research approach based on sensi- and academia) from different countries, to compile tivity analysis and discrete-event systems concepts Contents the most recent use of semantics and ontologies In- Presents a new perspective on a popular topic by a A Formal Description of Survivability.- Information cludes the real benefits to be derived from the adop- well respected expert in the field Access, Information Protection.- Modeling Insecu- tion of semantic web ontologies in real world situa- rity.- Modeling Recovery.- The Denial of Service Ex- Contents tions ample.- Modeling Access Control.- Modeling De- Perturbation Analysis of Queueing Systems.- Per- pendability. Contents turbation Analysis of Markov Chains.- Performance Contributing Authors-Foreword by Michael L. Sensitivities of Markov Processes.- Learning and Op- Fields of interest Brodie, Chief Scientist, Verizon Communications, timization with Perturbation Analysis.- Markov De- Data Structures, Cryptology and Information Theo- Cambridge, USA.- Preface.- Semantic Enterprises.- cision Processes.- Ergodic Systems.- Sample-Path- ry; Data Encryption; Coding and Information Theo- The Future of the Semantic Web for Enterprises.- Based Policy Iteration.- Reinforcement Learning.- ry; System Performance and Evaluation; Computer The Enterprise Semantic Web.- Finance and Gov- Stochastic Approximation.- Temporal Difference Communication Networks ernment.- Semantic Web Technologies for the Fi- Methods.- Identification and Adaptive Control.- nancial Domain.- Intelligent Search Engine for On- Constructing Sensitivity Formulas.- Event-Based Target groups line Access to Municipal Services.- Healthcare and Optimization of Markov Systems.- Estimating Ag- Researchers and practitioners in computer security Life Sciences.- Ontology-Based Data Integration for gregated Potentials. Biomedical Research.- Active Semantic Electronic Type of publication Medical Records.- Education.- Targeting Learning Monograph Fields of interest Discrete Mathematics in Computer Science; Artifi- Resources in competency-Based Organizations.- De- veloping [..] Due December 2007 cial Intelligence (incl. Robotics); Calculus of Varia- tions and Optimal Control; Optimization; Probabil- Fields of interest ity Theory and Stochastic Processes; Operation Re- Information Systems Applications (incl.Internet); 2007. Approx. 240 p. 25 illus. Geb. search/Decision Theory Information Systems and Communication Service; 69,50 € Target groups Multimedia Information Systems; Artificial Intel- ISBN 978-0-387-27627-4 Graduate students, system engineers, operations en- ligence (incl. Robotics); Database Management; e- gineers and researchers, complex system theorists, business and e-commerce artificial intelligence and reinforcement learning re- Target groups searchers, and the entire optimization community Industry professionals, researchers, and students in- Type of publication terested in the current state and future of semantic Monograph technology Type of publication Due November 2007 Contributed volume

2007. Approx. 500 p. Geb. Due November 2007

117,65 € ISBN 978-0-387-36787-3 2008. Approx. 328 p. (Semantic Web and Beyond, Band 6) Geb. 74,85 € 32 Computer springer.com/booksellers

ISBN 978-0-387-48530-0 C.G. Cassandras, Boston University, Boston, MA, USA; S. Lafor- O. Castillo, Tijuana Institute of Technology, Tijuana, Mexico; P. tune, University of Michigan, Ann Arbor, MI, USA Melin, Tijuana Institute of Technology, Tijuana, Mexico

Introduction to Discrete Event Type-2 Fuzzy Logic: Theory and Systems Applications

Introduction to Discrete Event Systems is a compre- This book describes new methods for building in- hensive introduction to the field of discrete event telligent systems using type-2 fuzzy logic and soft systems, offering a breadth of coverage that makes computing techniques. Soft Computing (SC) consists the material accessible to readers of varied back- of several computing paradigms, including type-1 grounds. The book emphasizes a unified modeling fuzzy logic, neural networks, and genetic algorithms, framework that transcends specific application ar- which can be used to create powerful hybrid intelli- eas, linking the following topics in a coherent man- gent systems. The authors extends the use of fuzzy ner: language and automata theory, supervisory con- logic to a higher order, which is called type-2 fuzzy trol, Petri net theory, Markov chains and queuing logic. Combining type-2 fuzzy logic with traditional theory, discrete-event simulation, and concurrent es- SC techniques, we can build powerful hybrid intel- timation techniques. This edition includes new ma- ligent systems that can use the advantages that each terial pertaining to the diagnosis of discrete event technique offers. We consider in this book the use of systems, decentralized supervisory control, and in- type-2 fuzzy logic and traditional SC techniques to terval-based timed automata and hybrid automata solve pattern recognition problems in realworld ap- models. This textbook is valuable to advanced-level plications. This book is intended to be a major refer- students and researchers in a variety of disciplines ence for scientists and engineers interested in apply- where the study of discrete event systems is relevant: ing type-2 fuzzy logic for solving problems in pattern control, communications, computer engineering, recognition, intelligent control, intelligent manufac- computer science, manufacturing engineering, oper- turing, robotics and automation. This book can also ations research, and industrial engineering. be used as a textbook or [..]

Features Features Includes numerous detailed examples and student Presents theory and applications of Type-2 Fuzzy exercises Second edition incorporates essential ele- Logic ments of Hybrid System modeling, thus contributing to bridging the existing gap between time-driven and Contents event-driven systems Introduction to Type-2 Fuzzy Logic.- Type-1 Fuzzy Logic.- Type-2 Fuzzy Logic.- A Method for Type-2 Contents Fuzzy Inference in Control Applications.- Design of Preface.- 1 Systems and Models.- 2 Languages and Intelligent Systems with Interval Type-2 Fuzzy Log- Automata.- 3 Supervisory Control.- 4 Petri Nets.- ic.- Method for Response Integration in Modular 5 Timed Models.- 6 Stochastic Times Automata.- 7 Neural Networks with Type-2 Fuzzy Logic.- Type-2 Markov Chains.- 8 Introduction to Queueing Theo- Fuzzy Logic for Improving Training data and Re- ry.- 9 Controlled Markov Chains.- 10 Introduction sponse Integration in Modular Neural Networks for to Discrete-Event Simulation.- 11 Sensitivity Analy- Image Recognition.- Fuzzy Inference Systems Type-1 sis and Concurrent Estimation.- Review of Probabil- and Type-2 for Digital Images Edge Detection.- Sys- ity Theory.- IPA Estimator.- Index.- About the Au- tematic Design of a Stable Type-2 Fuzzy Logic Con- thors. troller.- Experimental Study of Intelligent [..]

Fields of interest Fields of interest Control Engineering; Discrete Mathematics in Com- Appl.Mathematics/Computational Methods of Engi- puter Science; Systems Theory, Control; Mechani- neering; Artificial Intelligence (incl. Robotics) cal Engineering; Operations Research, Mathematical Programming; Industrial and Production Engineer- Target groups ing Engineers, researchers, and graduate students in computational intelligence and computer science Target groups Advanced-level students, and researchers where the Type of publication study of discrete event systems is relevant: control, Monograph communications, computer engineering, computer science, manufacturing engineering, operations re- Due January 2008 search, and industrial engineering

Type of publication 2008. Approx. 300 p. (Studies in Computational Intelligence, Band 91) Geb. Graduate/advanced undergraduate textbook 106,95 € Due December 2007 ISBN 978-3-540-76283-6

2007. Approx. 800 p. Geb.

80,20 € ISBN 978-0-387-33332-8 springer.com/booksellers Computer 33

O. Castillo, Tijuana Institute of Technology, Tijuana, Mexico; L. Xu, Zhejiang University, Hangzhou, China; S.-I. Ao, IAENG Secretariat, Hong Kong, China (Eds.)

Trends in Intelligent Systems and Computer Engineering

This volume contains contributions from partici- pants in the 2007 International Multiconference of Engineers and Computer Scientists. Topics covered include Automated planning, Expert system, Ma- chine learning, Fuzzy Systems, Knowledge-based systems, Computer systems organization, Comput- ing methodologies, and industrial applications. The book offers the up to date information on advances in intelligent systems and computer engineering and also serve as an excellent reference work for re- searchers and graduate students working on intelli- gent systems and computer engineering.

Features Covers a variety of subjects in the frontiers of intel- ligent systems and computer engineering and their industrial applications An excellent reference work for researchers and graduate students working in the field

Contents A Metamodel-Assisted Steady-State Evolution Strat- egy for Simulation-Based Optimization.- Automat- ically Defined Groups for Knowledge Acquisition from Computer Logs and Its Extension for Adap- tive Agent Size.- Robust Hybrid Sliding Mode Con- trol for Uncertain Nonlinear Systems Using Output Recurrent CMAC.- A Dynamic GA-based Rhythm Generator.- Evolutionary Particle Swarm Optimiza- tion.- Human Robot Interaction as a Cooperative Game.- Swarm and Entropic Modeling for Landmine Detection Robots.- Iris Recognition Based on 2D Wavelet and AdaBoost Neural Network.- A Novel Multi-Classifier for [..]

Fields of interest Communications Engineering, Networks; Computer Communication Networks; Signal,Image and Speech Processing; Artificial Intelligence (incl. Robotics); Electronic and Computer Engineering; Comput- er Systems Organization and Communication Net- works

Target groups Researchers and graduate students in intelligent sys- tems and computer engineering

Type of publication Contributed volume

Due February 2008

2008. Approx. 750 p. (Lecture Notes Electrical Engineering, Band 6) Geb.

144,40 € ISBN 978-0-387-74934-1 springer.com/booksellers Computer 34

S. Chakravarthy, University of Texas at Arlington, TX, USA; Q.C. W.Y. Chang, AcuMaestro, Inc. USA 117,65 € Jiang, ANTS Software Inc., Burlingame, CA, USA ISBN 978-1-4020-6455-5 Network-Centric Service Oriented Stream Data Processing Enterprise Issues and Solutions

The emergence of Enterprise services has triggered a Traditional database management systems (DBMSs) major paradigm shift in distributed computing: from are widely used in applications that require per- Object-Oriented Architecture (OOA) to Service-Ori- sistent storage and processing of ad hoc queries to ented Architecture (SOA). As the need grows to in- manage and process a large volume of data. A large corporate and exchange information across wire-line class of newer applications – in finance, computer and wireless networks, so grows the necessity to es- network management, telecommunications, home- tablish an infrastructure for high-distribution com- land security, sensor/pervasive computing, and envi- munities in a timely and safe manner. Network-Cen- ronmental monitoring – produce data continuously tric Service-Oriented Enterprise (NSCOE) is seen as and the data is typically presented in a data stream. heralding the next generation of mainstream Enter- The systems used to process data streams and pro- prise-business information collaboration solution vide for the needs of stream-based applications are that can enforce information and decision superior- Data Stream Management Systems (DSMSs). Stream ity in the decentralized, loosely-coupled, and highly Data Processing: Issues and Solutions presents a new interoperable service environments. Network-Cen- paradigm to meet the needs of these applications, in- tric Service Oriented Enterprise establishes a sys- cluding a detailed discussion of the techniques pro- tem-of-systems (SoS) view of information technolo- posed. This volume is intended as a reference book gies, offering a synergistic combination of data and for researchers and advanced-level students in com- information-processing capacity upon an innovative puter science. It is also appropriate for practitioners networked-management framework. in industry who are interested in developing applica- tions. Features The first comprehensive book about the emerging Features technology of Network-Centric Service-Oriented Includes important aspects of a QoS-driven DSMS Enterprise (NCSOE) Discusses the practical capa- (Data Stream Management System) Introduces ap- bility of a competitive ecosystem in terms of how to plications where a DSMS can be used and discuss- achieve decision superiority from exploiting infor- es needs beyond the stream processing model Dis- mation and situation awareness as a key enabler in cusses in detail the design and implementation of multiple sectors of the economy GIG (designed by MavStream Department of Defense) is directed toward providing critical [..] Contents Preface.- Introduction.- Stream Data Processing Contents Operators.- Stream Data Processing Architecture.- Dedication. Preface. Acknowledgments. 1: Informa- Overview of Stream Processing Systems.- Continu- tion Superiority. 2: Enabler of Information Superi- ous Query Modeling.- Capacity Modeling.- Schedul- ority. 3: Wireless Network Technologies. 4: Wire- ing Strategies.- Load Shedding and Admission Con- less Sensor Networks and Applications. 5: Building a trol.- DBMS Implementation Issues.- Applications of Wireless Transport Service. 6: Network and Service DBMS.- Beyond DBMS.- Index. Monitoring. 7: Service Quality Management. 8: Inte- grated Information Assurance. 9: Service Knowledge Fields of interest Management. 10: Network-Centric Service-Oriented Database Management; Information Storage Enterprises. Notes. References. Index. and Retrieval; Information Systems Applications (incl.Internet); Computer Communication Net- Fields of interest works; Multimedia Information Systems Management of Computing and Information Sys- tems; Computer Systems Organization and Com- Target groups munication Networks; Information Systems and Researchers and advanced-level students in comput- Communication Service; Computer Communica- er science tion Networks; Information Systems Applications (incl.Internet) Type of publication Monograph Target groups Systems integrators who want to create their own Due March 2008 competitive edge by leveraging existing technological innovations; planning architects, system design engi- neers, software engineers and architects in service or 2008. Approx. 250 p. (Advances in Database Systems, Band 35) Geb. technology companies; technical engineers who are responsible for planning or managing networked en- 94,75 € terprise IT applications systems; university students ISBN 978-0-387-71002-0 who would like to identify the trend of next genera- tion information management technology

Type of publication Monograph

Due October 2007

2008. Approx. 560 p. Geb. springer.com/booksellers Computer 35

H. Che, University of Texas at Arlington, TX, USA C.-h. Chen, Academia Sinica, Taipei, Taiwan, China; W. Härdle, F. Chen, Chalmers University of Technology, Göteborg, Sweden; Humboldt-University of Berlin, Germany; A. Unwin, University of K. Jokinen, University of Helsinki, Finland (Eds.) Augsburg, Germany (Eds.) Internet Architecture Speech Technology Evolution and Convergence Handbook of Data Visualization Theory and Applications

Data, voice, and video services have followed a clear Visualizing the data is an essential part of any da- evolutionary path towards an IP-centric solution. To ta analysis. Modern computing developments have New Trends in Speech Based Interactive Systems support such a solution, the Internet has been expe- led to big improvements in graphic capabilities and will give an overview of the research and application riencing two evolutionary transformations. First, the there are many new possibilities for data displays. of speech technologies in different areas. The basic underlying transport media of the Internet is con- This new volume in the series Springer Handbooks technology development areas include: Automat- verging towards a monolithic solution based on Eth- of Computational Statistics gives an overview of ic speech recognition technology, speech synthesis, ernet Technologies. Second, in addition to the tra- modern data visualization methods, both in theory spoken interaction, natural language understanding, ditional control plane and data plane, a third plane, and practice. There are definitive chapters on mod- speaker recognition, emotion in spoken dialogue sys- known as service plane, has emerged to support ern graphical tools such as mosaic plots, parallel co- tems, expressive speech synthesis, affective comput- more sophisticated services over the global Internet. ordinate plots and linked views. There are chapters ing, multimodal communication, interaction tech- Internet Architecture: Evolution and Convergence dedicated to graphical methodology for particular nologies, and animated agents. The application ar- will carefully examine the reasoning underlying ma- areas of statistics, for example Bayesian analysis, ge- eas include: in-vehicle information system and inter- jor changes with Internet Architecture, which lead nomic data and cluster analysis, as well as chapters action, military application, other industrial applica- to a converged IP centric solution. An ATM-based on software for graphics. Specialists from all over the tions such as for space, air traffic control, or compli- overlay model to an MPLS-based peering model will world have contributed papers on their areas of ex- cated control room interaction, simulator control, be covered and more. This book will also assist users pertise. etc., and application for special users and in enter- with the existing internet technologies and future tainment systems. General design and usability eval- trends provided by case studies. Internet Architec- Features uation methodologies from the user’s perspective ture: Evolution and Convergence is designed for pro- Complete overview of data visualization Compre- will also be included in the book. The overview of fessionals in industry, including [..] hensive coverage of the field, both in theory and each technology includes: 1. The history and the de- practice velopment of the technology. 2. What are the [..] Features -Provides an integrated view of ever evolving (not Contents Features static) Internet architecture and its convergence to- Data Visualization.- Principles.- Methodologies.- Se- Reviews new automatic speech recognition technol- wards an IP centric architecture -Includes protocol lected Applications. ogy and spoken dialogue systems Includes applica- functions implemented with internet routers   tions on in-vehicle information systems, military ap- Fields of interest plications, and other industrial speech applications Contents Statistics and Computing/Statistics Programs; Com- Focuses on human factors in automatic speech-based Review of Networking Fundamentals.-ATM Inter- putational Biology/Bioinformatics; Statistical Theo- systems networking.-MPLS Internetworking.-Migration to ry and Methods; Computer Imaging, Vision, Pattern Packet-based IP Internet.-IP Convergence.-Service Recognition and Graphics Contents Plane Architectures.-Node Level Design Issues.-Fun- Introduction.- Basic Research Trends.- ASR Devel- damental Design Issues:.-References.-Glossary.-In- Target groups opment/History.- Speech Recognition and Cogni- dex. Researchers, practitioners tion.- Speech Synthesis History. Expressive Speech Synthesis.- Spoken Interaction.- Emotions in Spo- Fields of interest Type of publication ken Dialogue Systems.- Affective Computing.- In- Communications Engineering, Networks; Com- Handbook teraction Technologies.- Multimodal Communica- puter Systems Organization and Communication tion.- Animated Agents.- Eye-Tracking.- New Appli- Networks; Computer Communication Networks; Due December 2007 cations and Application Areas.- In-Vehicle Informa- Information Systems Applications (incl.Internet); tion Communication Application.- Military Applica- Signal,Image and Speech Processing; Information tion.- Application for Special Users.- Other Industri- 2008. Approx. 1000 p., 569 figs., 50 tables (Springer Handbooks Systems and Communication Service of Computational Statistics) Geb. al Applications.- Ubiquitous Computing and Appli- cations in Home Environments.- Application in En- Target groups 266,43 € tertainment [..] -Professionals, engineers in networking technologies ISBN 978-3-540-33036-3 Fields of interest Type of publication Signal,Image and Speech Processing; User Interfaces Monograph and Human Computer Interaction; Cognitive Psy- chology; Psycholinguistics Due October 2008 Target groups Engineers and designers in industry, computer in- 2008. Approx. 300 p. Geb. terface designers, telecommunication engineers, 102,99 € ergonomists, work psychologists, university re- ISBN 978-0-387-75627-1 searchers and teachers, students on these topics Type of publication Contributed volume

Due April 2008

2008. Approx. 400 p. Geb.

89,83 € ISBN 978-0-387-73818-5 36 Computer springer.com/booksellers

H. Chen, The University of Arizona, Tucson, AZ, USA; C. Yang, The H. Chen, University of Arizona, AZ, USA; L. Brandt, Potomac, Chinese University of Hong Kong (Eds.) MD, USA; V. Gregg, Alexandria, VA, USA; R. Traunmüller, Institut 2008. Approx.784 p. (Integrated Series in Information Systems, für Informatics in Wirtschaft und Verwaltung, Linz, Austria; S. Band 17) Geb. Dawes, University of Albany - SUNY, NY, USA; E. Hovy, University Intelligence and Security of Southern California, CA, USA; A. Macintosh, Napier University, 144,40 € Informatics Edinburgh, UK; C.A. Larson, University of Arizona, AZ, USA (Eds.) ISBN 978-0-387-71610-7 Digital Government

E-Government Research, Case Studies, and Implementation Fields of interest Appl.Mathematics/Computational Methods of Engi- neering; Data Encryption; Artificial Intelligence (in- cl. Robotics); e-business and e-commerce; Informa- Digital Government: E-Govern- tion Systems ment Research, Case Studies, and Implementation provides the field with a Target groups definitive, interdisciplinary, and understandable Researchers, Engineers, Graduate Students in Com- work that surveys the field of digital government in putational Intelligence, Computer Science terms of key research, case studies of successful ap- plications in a variety of government settings, along Type of publication with discussions of current and future policy impli- Monograph cations. Each chapter will be prepared and carefully edited within a structured format by a known expert Due March 2008 on the chapter topic. The editors - who are also writ- ing chapters themselves - and the authors are well- known researchers and practitioners in digital gov- 2008. Approx. 200 p. Also available online. (Studies in Computa- ernment. They have all been on the forefront of the tional Intelligence, Vorläufiger Eintrag 99) Geb. IT and digital government research initiatives. To- 96,25 € gether the editors and expert chapter authors have ISBN 978-3-540-69207-2 developed a definitive textbook that can be used by researchers, practitioners and students across the discipline domains, of Information Systems, Infor- mation Science, Computer Science, Social Sciences, Public Policy and Business.

Features Information technology - as it has with so many as- pects of our business and everyday lives - is dramat- ically changing the way government manages data, shares data, plans, provides decision support and de- livers services. At the core of all these changes is digi- tal government or e-government. This is the first sys- tematic survey treatment of the area written by those individuals who are at the leading edge of the [..]

Contents Introduction to foundations of digital government.- The state of the art for digital government research.- The US e-government evolution.- E-government in Europe.- Introduction to information technology re- search.- History of digital government funding and research in the US.- Information usability for elec- tronic government.- User access to government sta- tistical information.- Data and knowledge integra- tion for e-government.- Data mining and informa- tion sharing for homeland security and disaster man- agement.- Law enforcement information sharing and analysis.- Geospatial information [..]

Fields of interest Information Systems; e-business and e-commerce; Political Science; Information Systems and Commu- nication Service; Information Systems Applications (incl.Internet); Operation Research/Decision Theory

Target groups Researchers and graduate level students in Informa- tion Systems, Computer Sciences, Social Sciences and Public Policy, practitioners in IT, Public Service, and consultants engaged in planning or implement- ing government initiatives

Type of publication Graduate/advanced undergraduate textbook

Due December 2007 springer.com/booksellers Computer 37

H. Chen, University of Arizona, Tucson, AZ, USA; E. Reid, Univer- H. Chen, University of Arizona, Tucson, AZ, USA; M.C. Roco, Na- sity of Arizona, Tucson, AZ, USA; J. Sinai, Logos Technologies, Ar- 2007. Approx. 640 p. (Integrated Series in Information Systems, tional Science Foundation, Arlington, VA, USA lington, VA, USA; A. Silke, University of Arizona, Tucson, AZ, USA; Vorläufiger Eintrag) Geb. B. Ganoz, Lauder School of Government and Diplomacy, Herzliya, Israel 123,59 € Mapping Nanotechnology ISBN 978-0-387-71612-1 Innovations and Knowledge Terrorism Informatics

Knowledge Management and Data Mining for Homeland Se- curity Mapping Nanotechnology Innovations and Knowl- edge will define the application of Information Technology’s systematic and automated knowledge mapping methodology to collect, analyze and report Terrorism informatics has been defined as the ap- nanotechnology research on a global basis. The re- plication of advanced methodologies, information sult of these analyses will be a systematic presenta- fusion and analysis techniques to acquire, integrate tion of the state of the art of nanotechnology, which process, analyze, and manage the diversity of ter- will include basic analysis, content analysis, and ci- rorism-related information for international and tation network analysis of comprehensive nanotech- homeland security-related applications. The vari- nology findings across technology domains, inven- ety of methods used in terrorism informatics are de- tors, institutions, and countries. Many sources will rived from Computer Science, Informatics, Statistics, be explored in detail to ensure the examination will Mathematics, Linguistics, Social Sciences, and Pub- be global in , comprehensive in scope, reli- lic Policy and they involve the collection of a mass able in content, and completely current. Among the of information from multiple sources and in numer- sources investigated and catalogued will be the nan- ous languages. Terror Informatics: Knowledge Man- otechnology patent and literature databases from the agement and Data Mining for Homeland Security US patent Office (USPTO), the European Patent Of- will provide an interdisciplinary and understand- fice (EPO), and the Japanese Patent Office (JPO). able textbook that surveys the state-of-the-art of ter- rorism informatics domain along three basic dimen- Features sions: methodological issues in terrorism research; Reflects recent growth in nanoscale science and en- information infusion techniques to support terror- gineering Analyzes an industry expected to reach $1 ism prevention, detection, and response; and legal, trillion by 2015 Includes analysis of Patent Office social, privacy, and data confidentiality challenges databases in the US, Europe and Japan and approaches. Contents Features Nanotechnology: the field.- Knowledge Mapping: Emphasizes the cutting-edge concepts, technologies, methodology.- Mapping nanotechnology innova- and practices that are being developed in terrorism tions and knowledge: research framework.- Mapping informatics to meet today’s worldwide challenges nanotechnology innovations via USPTO database Each of the 28 chapters in the book has been devel- (1978-2004): a longitudinal study.- Mapping nan- oped by leading expert on the chapter topic. Each otechnology innovations via USPTO database: re- chapter comprehensively reviews of the past and re- cent development.- Nanotechnology patent citation cent research work in the chapter area and many network topological analysis.- Federal funding and chapters include detailed case studies nanotechnology innovations: NSF funding analysis.- Mapping nanotechnology innovations via USPTO, Contents EPO, and JPO databases.- Patent literature citation Introduction to Terrorism Informatics, Information analysis.- Mapping nanotechnology knowledge via Fusion, Data Mining and Knowledge Management.- ISI citation [..] Trends, Achievements and Failures in Terrorism Re- search.- Methodological Challenges in Terrorism Fields of interest Research.- Case Study of First-Hand Research on Information Systems; Data Structures, Cryptology Terrorism.- MIPT Sharing Terrorism Information.- and Information Theory; Nanotechnology; Electron- Connections in the World of International Terror- ic and Computer Engineering; Database Manage- ism.- The Effect of Databases and Website Incon- ment; Technology Management stancy on the Terrorism Domain.- Root Causes of Terrorism and the Implications for Terrorism Infor- Target groups matics.- Mapping the Contemporary Terrorism Re- Researchers and students in the fields of information search Domain.- A Study of "Root Causes of Con- systems and management, computer science; practi- flict" Using [..] tioners in nanotechnology industries, policy makers and analysts in government Fields of interest Information Systems; Data Structures, Cryptolo- Type of publication gy and Information Theory; Information Systems Monograph and Communication Service; e-business and e-com- merce; Political Science Due March 2008 Target groups Counter-terrorism experts and professionals, aca- 2007. Approx. 300 p. (Integrated Series in Information Systems, demic researchers in information systems, computer Vorläufiger Eintrag) Geb. science, political science, and public policy, graduate 81,59 € students in these areas ISBN 978-0-387-71619-0 Type of publication Handbook

Due November 2007 38 Computer springer.com/booksellers

M.X. Cheng, University of Missouri, Rolla, MO, USA; D. Li, Renmin J.W. Chinneck, Carleton University, Ottawa, ON, Canada K.J. Cios, University of Colorado at Denver, CO, USA; W. Pedrycz, University of China, Beijing, China (Eds.) University of Alberta, Edmonton, AB, Canada; R.W. Swiniarski, San Diego State University, San Diego, CA, USA; L.A. Kurgan, Uni- Feasibility and Infeasibility in versity of Alberta, Edmonton, AB, Canada Advances in Wireless Ad Hoc and Optimization Sensor Networks Data Mining Algorithms and Computational Methods A Knowledge Discovery Approach Wireless ad hoc networks, mobile or static, have spe- cial resource requirements and different topology Feasibility and Infeasibility in Optimization is an ex- features, which make them different from classic pository book focused on practical algorithms related This comprehensive, senior through graduate level computer networks in resource management, rout- to feasibility and infeasibility in optimization. Part I textbook on data mining details the unique steps of ing, media access control, and QoS provisioning. The addresses algorithms for seeking feasibility quickly, the knowledge discovery process that prescribes the book presents papers written by distinguished re- including recent algorithms for the difficult cases of sequence in which data mining projects should be searchers in the field and focuses on the theoretical nonlinear and mixed-integer programs. Part II pro- performed. The book offers an authoritative treat- and experimental study of the following advanced vides algorithms for analyzing infeasibility by isolat- ment of all development phases from problem and research topics: security and trust, broadcasting and ing minimal infeasible (or maximum feasible) sub- data understanding through data preprocessing to multicasting; power control and energy efficiency, sets of constraints, or by finding the best repair for deployment of the results. This knowledge discov- and QoS provisioning. This book is a great reference the infeasibility. Part III describes surprising appli- ery approach is what distinguishes this book from tool for graduate students, researchers, and mathe- cations in areas such as classification, computation- other texts in the area. The text concentrates on da- maticians interested in studying mobile ad hoc and al biology, and medicine. Connections to constraint ta preparation, clustering and association rule learn- sensor networks. programming are shown. A main goal is to impart an ing (required for processing unsupervised data), de- understanding of the methods so that practitioners cision trees, rule induction algorithms, neural net- Features can make immediate use of existing algorithms and works, and many other data mining methods, focus- Presents the most recent research on the rapidly software, and so that researchers can extend the state ing predominantly on those which have proven suc- growing field of research on mobile ad hoc and sen- of the art and find new applications. The book is of cessful in data mining projects. Researchers, prac- sor networks Presents authored papers, written by interest to researchers, students, and practitioners titioners and students are certain to consider Data distinguished researchers in the field Focuses on across the applied sciences who are working on opti- Mining an indispensable resource in successfully ac- subtopics that have emerged from mobile ad hoc and mization problems. complishing the goals of their data mining projects. sensor network research, ie., QoS routing, broadcast and multicast Elaborates on several multicasting ap- Features Features proaches in mobile wireless ad hoc networks Dis- “I am extremely happy with this upcoming book. It Provides suite of exercisesIncludes links to instruc- cusses [..] is very well-written as well as impressively up-to-date tional presentationsContains appendices of relevant and comprehensive” Fred Hillier, Stanford Universi- mathematical material   Contents ty (ISOR Series Editor) As originator for many of the Preface.- Backbone Quality-of-Service Routing Pro- developments in the field, Chinneck is in an excellent Contents tocol for Heterogeneous Mobile Ad Hoc Networks position to write the authoritative, expository book Part I. Data Mining and Knowledge Discovery: (X. Du).- Optimal Path Selection in Ad Hoc Net- on the subject and create a website that collects all Introduction.- Knowledge Discovery Process.- works Based on Multiple Metrics (H. Badis, K. Al the ongoing developments. The website [..] Part II. Data Understanding: Data.- Concepts of Agha).- Analyzing Voice Transmission between Ad Learning, Classification and Regression.- Knowl- Hoc Networks and Fixed IP Networks Providing Contents edge Representation.- Part III. Data Preprocess- End-to-End Quality of Service (M.C. Domingo, D. Part I: Analyzing Infeasibility.- Isolating an Infeasi- ing: Databases, Data Warehouses and OLAP.- Fea- Remondo).- Separable Threshold Decryption for bility.- Methods Specific to Linear Programming.- ture Extraction and Selection Methods.- Discretiza- Ad-Hoc Wireless Networks (W. Susilo, F. Zhang, Methods Specific to Mixed Integer Programming.- tion Methods.- Part IV. Data Mining: Methods Y. Mu).- A Secure Group Communication Protocol Methods Specific to Nonlinear Programming.- Find- for Constructing Data Models: Unsupervised for Ad Hoc Wireless Networks (Y.-M. Tseng, C.-C. ing the Maximum Feasible Subset of Linear Con- Learning: Clustering.- Unsupervised Learning: Asso- Yang, D.-R. Liao).- Reliable Routing in Ad-hoc Net- straints.- Finding the Best Fix for an Infeasible Sys- ciation Rules.- Supervised Learning: Statistical Meth- works Using Direct [..] tem.- Part II: Reaching Feasibility Quickly.- Linear ods.- Supervised Learning: Decision Trees, Rule Al- Programming.- Mixed Integer Programming.- Non- gorithms and Their [..] Fields of interest linear Programming.- Part III: Applications.- Ana- Computer Communication Networks; Communica- lyzing Unboundedness in Linear Programs.- Ana- Fields of interest tions Engineering, Networks lyzing the Viability of Network Models.- Analyzing Data Mining and Knowledge Discovery; Informa- Multiple-Objective Linear Programs.- Data [..] tion Storage and Retrieval; Statistics for Engineer- Target groups ing, Physics, Computer Science, Chemistry & Geo- Researchers in the fields of networking and telecom- Fields of interest sciences; Pattern Recognition; Artificial Intelligence munications, graduate students and professors in- Optimization; Operation Research/Decision Theory; (incl. Robotics) terested in a wireless networks curriculum, and Mathematical Modeling and Industrial Mathemat- practitioners working on sensor net- ics; Engineering Economics, Organization, Logistics, Target groups works Marketing; Industrial and Production Engineering; Advanced-level students, researchers and practition- Econometrics ers in computer science Type of publication Contributed volume Target groups Type of publication Researchers and graduate students Graduate/advanced undergraduate textbook Due April 2008 Type of publication Due October 2007 Contributed volume 2008. Approx. 325 p. (Signals and Communication Technology) Geb. 2007. IV, 500 p. Geb. Due January 2008 82,39 € 74,85 € ISBN 978-0-387-68565-6 2008. Approx. 300 p. (International Series in Operations Research ISBN 978-0-387-33333-5 & Management Science, Band 118) Geb.

85,55 € ISBN 978-0-387-74931-0 springer.com/booksellers Computer 39

A. Clemm, Cisco Systems, USA; L. Zambenedetti Granville, Uni- C.A. Coello Coello, CINVESTAV-IPN, México City, México; G.B. La- P.H. Cole, University of Adelaide, SA, Australia; D.C. Ranasinghe, versidade Federal do Rio Grande do Sul, Porto Alegre, Brazil; R. mont, Air Force Institute of Technology, WPAFB, Dayton, OH, University of Adelaide, SA, Australia (Eds.) Stadler, The Royal Institute of Technology (KTH), Stockholm, USA; D.A. Van Veldhuizen, AFMC/DR, Wright-Patterson AFB, OH, Sweden (Eds.) USA Networked RFID Systems and Managing Virtualization of Evolutionary Algorithms for Solving Lightweight Cryptography Networks and Services Multi-Objective Problems Raising Barriers to Product Counterfeiting

18th IFIP/IEEE International Workshop on Distributed Sys- tems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007, Proceedings Solving multi-objective problems is an evolving ef- The book consists of a collection of works on utilis- fort, and computer science and other related disci- ing the automatic identification technology provid- plines have given rise to many powerful determin- ed by Radio Frequency Identification (RFID) to ad- dress the problems of global counterfeiting of goods. This book constitutes the refereed proceedings of istic and stochastic techniques for addressing these The book presents current research, directed to se- the 18th IFIP/IEEE International Workshop on Dis- large-dimensional optimization problems. Evolu- curing supply chains against the efforts of counterfeit tributed Systems, Operations and Management, tionary algorithms are one such generic stochastic operators, carried out at the Auto-ID Labs around DSOM 2007, held in San José, CA, USA, in October approach that has proven to be successful and widely the globe. The collection of works and the organi- 2007 in the course of the 3rd International Week on applicable in solving both single-objective and mul- sation of the book assume very little knowledge on Management of Networks and Services, Manweek ti-objective problems. This textbook is a second edi- the part of the reader on Networked RFID systems as 2007. The 20 revised full papers and 5 revised short tion of Evolutionary Algorithms for Solving Mul- the material provided in the introduction familiarises papers presented were carefully reviewed and select- ti-Objective Problems, significantly expanded and the reader with concepts, underlying principles and ed from 54 submissions. The papers are organized adapted for the classroom. The various features of vulnerabilities of modern RFID systems. The collec- in topical sections on decentralized and peer-to-peer multi-objective evolutionary algorithms are present- tion of works presented on highlighting the coun- management, fault detection and diagnosis, perfor- ed here in an innovative and student-friendly fash- terfeiting problem and problems with existing low mance tuning and dimensioning, problem detec- ion, incorporating state-of-the-art research. The cost RFID technology is an important guide to prac- tion and mitigation, operations and tools, service ac- book disseminates the application of evolutionary titioners, professionals and graduates in the area of counting and auditing, Web services and manage- algorithm techniques to a variety of practical prob- RFID systems application, implementation and inte- ment. lems, including test suites with associated perfor- mance based on a variety of appropriate metrics, gration. Fields of interest as well as serial and parallel algorithm implementa- Features Computer Communication Networks; Programming tions. Highlighting advanced RFID systems Presenting the Techniques; Systems and Data Security; Manage- use of lightweight cryptography to address security ment of Computing and Information Systems; Com- Features and privacy related issues puters and Society Designed for courses on Evolutionary Multi-objec- tive Optimization and Evolutionary Algorithms 2nd Fields of interest Target groups Edition is completely updated and presents the latest Computer Communication Networks; Engineering Researchers and professionals research Provides a complete set of teaching tutori- als, exercises and solutions Contains exhaustive ap- Economics, Organization, Logistics, Marketing; In- Type of publication pendices, index and bibliography formation Systems Applications (incl.Internet) Proceedings Contents Target groups Computer professionals in research and develop- Due October 2007 Basic Concepts.- Evolutionary Algorithm MOP Approaches.- MOEA Test Suites.- MOEA Testing ment and Analysis.- MOEA Theory and Issues.- Applica- Type of publication 2007. XIII, 269 p. (Lecture Notes in Computer Science, Band 4785) tions.- MOEA Parallelization.- Multi-Criteria Deci- Professional book Softcover sion Making.- Special Topics.- Appendix A: MOEA Classification and Technique Analysis.- Appendix 67,41 € Due November 2007 ISBN 978-3-540-75693-4 B: MOPs in the Literature.- Appendix C: Ptrue and PFtrue for Selected Numberic MOPs.- Appendix D: Ptrue and PFtrue for Side-constrained MOPs.- Ap- 2008. VIII, 355 p. Geb. pendix E: MOEA Software Availability.- Appendix F: MOEA-Related Information. 64,15 € ISBN 978-3-540-71640-2 Fields of interest Theory of Computation; Optimization; Probability Theory and Stochastic Processes; Algorithm Analysis and Problem Complexity; Artificial Intelligence (in- cl. Robotics); Numeric Computing

Target groups Students, researchers and computer scientists work- ing in evolutionary computation, genetic algorithms and artificial intelligence

Type of publication Graduate/advanced undergraduate textbook

Due October 2007

2007. XXII, 800 p. 50 illus. (Genetic and Evolutionary Computa- tion) Geb.

82,34 € ISBN 978-0-387-33254-3 40 Computer springer.com/booksellers

M. Colnaric, University of Maribor, Slovenia; D. Verber, Universi- ISBN 978-1-84800-051-3 M. Conti, Institute for Informatics and Telematics (IIT) - National ty of Maribor, Slovenia; W.A. Halang, FernUniversität Hagen, Ger- Research Council (CNR), Pisa, Italy many MobileMAN Distributed Embedded Control Systems Mobile Multi-Hop ad hoc Networks - Present and Future

Improving Dependability with Coherent Design

Features Addresses in an integrated way the mobile-ad-hoc- Very often, practical design of embedded systems network protocol stack: from enabling technologies lacks consistency resulting in computer control to middleware and applications; considering also systems that do not provide the performance they the socio-economic perspectives of this technolo- should. Most notably they lack the key property of gy Combines theoretical studies, simulation experi- dependability. Distributed Embedded Control Sys- ments to validate the solutions, prototyping, and ex- tems handles the domains encountered when design- perimentation on real test-beds ing a distributed embedded computer control system as an integrated whole. First to be discussed are some Contents basic issues about real-time systems and their prop- 1. Introduction. 2. Mobileman Architecture. 3. Wire- erties, specifically safety. Then, system and hardware less Technologies. 4. Networking. 5. Cooperation architectures are dealt with: areas like scheduling, Models and Mechanisms. 6. Middelware. 7. Applica- asymmetrical distributed multiprocessor architec- tions. 8. Economic Models. 9. Mesh Networks. tures, time-triggered communications, middleware, fault-tolerant peripherals, etc. Next, programming is- Fields of interest sues, embodying desired properties, basic language Computer Science, general; Computer Communica- subsets, object orientation and language support for tion Networks; Communications Engineering, Net- hardware and software specifications and co-design works are elaborated and finally, the prototype implemen- tation of a distributed embedded control system is Target groups given as a detailed example. Researchers and graduate students in computer sci- ence and electrical engineering, researchers Features and developers in telecommunication industry, re- Teaches the engineer which approaches and tech- searchers in the area, who are interested in aspects of nologies are best used for reliable and flexible im- ad hoc networking that are complementary to their plementation of distributed embedded control Em- activity, and researchers that want to approach and phasis on reliability to deal with the increasing use get a general view of this new area of distributed control in safety-critical systems En- courages verification of function and real-time per- Type of publication formance by simple ex tempore testing rather than Contributed volume rigid planned procedures Due August 2008 Contents Part I: Concepts.- Real-time Characteristics and Safety of Embedded Systems.- Multitasking.- Hard- 2008. Geb. ware and System Architectures.- Programming of Embedded Systems.- Part II: Implementation.- 105,93 € Hardware Platform.- Implementation of a Fault-tol- ISBN 978-1-4020-4402-1 erant Distributed Embedded System.- Asynchronous Real-time Execution with Runtime State Restora- tion.- Epilogue.

Fields of interest Control Engineering; Computer Systems Organiza- tion and Communication Networks; Communica- tions Engineering, Networks; Control Structures and Microprogramming; Engineering Design; Program- ming Languages, Compilers, Interpreters

Target groups Designers and engineers working with embedded systems in an industrial environment; researchers in- terested in distributed control systems, real-time ar- chitectures, programming languages and fault toler- ance; postgraduate students in control, electrical and computer engineering; libraries

Type of publication Monograph

Due December 2007

2008. Approx. 290 p. 101 illus. (Advances in Industrial Control) Geb.

106,95 € springer.com/booksellers Computer 41

D. Cook, Iowa State University, Ames, IA, USA; D.F. Swayne, AT&T S.B. Cooper, University of Leeds, UK; B. Löwe, Institute of Logic, E. Corchado, Escuela Politécnica Superior, Burgos, Spain; J.M. Labs, Florham Park, NJ, USA Amsterdam, the Netherlands; A. Sorbi, Universita di Siena, Italy Corchado, Universidad de Salamanca, Spain; A. Abraham, Norwe- (Eds.) gian University of Science and Technology, Trondheim, Norway (Eds.) Interactive and Dynamic Graphics New Computational Paradigms for Data Analysis Innovations in Hybrid Intelligent Changing Conceptions of What is Computable With R and GGobi Systems

In recent years, classical computability has expand- This richly illustrated book describes the use of in- ed beyond its original scope to address issues relat- Hybrid Artificial Intelligence Systems (HAIS) com- teractive and dynamic graphics as part of multidi- ed to computability and complexity in algebra, anal- bines symbolic and sub-symbolic techniques to con- mensional data analysis. Chapters include clustering, ysis, and physics. The deep interconnection between struct more robust and reliable problem solving supervised classification, and working with miss- "computation" and "proof" has originated much of models. This volume focused on "Hybrid Artificial ing values. A variety of plots and interaction meth- the most significant work in constructive mathe- Intelligence Systems" contains a collection of pa- ods are used in each analysis, often starting with matics and mathematical logic of the last 70 years. pers that were presented at the 2nd International brushing linked low-dimensional views and working Moreover, the increasingly compelling necessity to Workshop on Hybrid Artificial Intelligence Systems, up to manual manipulation of tours of several vari- deal with computability in the real world (such as held in 12 - 13 November, 2007, Salamanca, Spain. ables. The role of graphical methods is shown at each computing on continuous data, biological comput- This carefully edited book provides a comprehensive step of the analysis, not only in the early explorato- ing, and physical models) has brought focus to new overview of the recent advances in the hybrid intelli- ry phase, but in the later stages, too, when compar- paradigms of computation that are based on biologi- gent systems and covers a wide range of application ing and evaluating models. All examples are based cal and physical models. These models address ques- areas, including data analysis and data mining, in- on freely available software: GGobi for interactive tions of efficiency in a radically new way and even telligent control, pattern recognition, robotics, opti- graphics and R for static graphics, modeling, and threaten to move the so-called Turing barrier, i.e. mization, etc. The book is aimed at researchers, prac- programming. The printed book is augmented by a the line between the decidable and the un-decidable. titioners and postgraduate students who are engaged wealth of material on the web, encouraging readers This book examines new developments in the theo- in developing and applying advanced intelligent sys- follow the examples themselves. The web site has all ry and practice of computation from a mathematical tems principles to solving real-world problems. the data and code necessary to reproduce the analy- perspective, with topics ranging from classical com- ses in the book, along with movies demonstrating the Features putability to complexity, from biocomputing to [..] examples. The book may be used as a text [..] Proceedings of the Hybrid Artificial Intelligence Sys- Features tems Workshop (HAIS 07 – CAEPIA 2007) Recent Features Explores new developments in the theory and prac- developments in Hybrid Intelligent Systems The book's examples use the software R and GGobi tice of computation from a mathematical per- Illustrated examples, supplemented by movies on Fields of interest spective Includes topics ranging from classical com- the web, help he reader learn how to use interactive Appl.Mathematics/Computational Methods of En- putability to complexity, biocomputing, and quan- graphics for data anlaysis Full color figures illumi- gineering; Artificial Intelligence (incl. Robotics); Ap- tum computing Offers content that appeals to spe- nate high-dimensional data spaces Everything in the plications of Mathematics cialists and non-specialists alike Features contribu- book can be replicated by the reader with free soft- tors who are prominent scholars and internationally ware Target groups known specialists Researchers, engineers, graduate students in soft Contents computing and statistics Contents Introduction.- The toolbox.- Missing values.- Super- Preface.- Introduction.- Alan Turing's Legacy, and vised classification.- Cluster analysis.- Miscellaneous Type of publication New Computational Paradigms.- Section I. The Tur- topics.- Data sets. Monograph ing Model of Computation and its Applications to Logic, Mathematics, Philosophy and Computer Sci- Fields of interest Due October 2007 Statistical Theory and Methods; Statistics and Com- ence.- Section II. Logic, Algorithms, and Complex- puting/Statistics Programs; Data Mining and Knowl- ity.- Section III. Models of Computation from Na- edge Discovery; Bioinformatics; Visualization ture.- Section IV. Computable Analysis and Real 2008. XVI, 497 p. Also available online. (Advances in Soft Com- Computation.- Author Index puting, Band 44) Softcover Target groups 160,45 € Students, researchers Fields of interest Math Applications in Computer Science; Theory of ISBN 978-3-540-74971-4 Type of publication Computation; Mathematical Logic and Foundations; Monograph Philosophy; Quantum Computing, Information and Physics

Due November 2007 Target groups Researchers and graduate students in mathematics 2007. Approx. 205 p. (Use R) Softcover and philosophy with a special interest in logic and foundational issues in computer science 50,24 € ISBN 978-0-387-71761-6 Type of publication Contributed volume

Due January 2008

2008. 576 pp. 19 illus. Geb.

114,54 € ISBN 978-0-387-36033-1 42 Computer springer.com/booksellers

M. Cord, ENSEA, CERGY-PONTOISE, France; P. Cunningham, Uni- C. Czernohous, IBM Business Consulting Services, Stuttgart, Ger- R. Dahlhaus, Universität Heidelberg, Germany; J. Kurths, versity College Dublin, Ireland (Eds.) many Universität Potsdam,Germany; P. Maass, Universität Bremen, Germany; J. Timmer, Universität Freiburg, Germany (Eds.) Machine Learning Techniques for Pervasive Linux Multimedia Mathematical Methods in Signal Basistechnologien, Softwareentwicklung, Werkzeuge Processing and Digital Image Case Studies on Organization and Retrieval Analysis Thema dieser fundierten Einführung ist der Einsatz von Linux in eingebetteten Systemen. Dabei han- Processing multimedia content has emerged as a key delt es sich um rechnergestützte Systeme, die in ihre area for the application of machine learning tech- The aim of this volume is to bring together research Umgebung integriert sind und dort Steuerungsfunk- niques, where the objectives are to provide insight directions in theoretical signal and imaging process- tionen übernehmen oder zusätzliche Funktionen into the domain from which the data is drawn, and ing developed rather independently in electrical en- für den Benutzer bereitstellen. Einfache Beispiele to organize that data and improve the performance gineering, theoretical physics, mathematics and the sind PDAs (Personal Digital Assistants), Hand- of the processes manipulating it. Applying machine computer sciences.  In particular, mathemat- helds oder auch Mobiltelefone. Der Autor erläutert learning techniques to multimedia content involves ically justified algorithms and methods, the mathe- zunächst die Spezifika eingebetteter Systeme und special considerations – the data is typically of very matical analysis of these algorithms, and methods erklärt dann, welche Besonderheiten beim Einsatz high dimension, and the normal distinction between as well as the investigation of connections between von Linux als zugrundeliegendem Betriebssystem zu supervised and unsupervised techniques does not methods from time series analysis and image pro- beachten sind. Anschließend werden die zentralen always apply. This book provides a comprehensive cessing are reviewed. An  interdisci- Komponenten eines Linux-Systems vorgestellt und coverage of the most important machine learning plinary comparison of these methods, drawing up- die Programmierung unter Linux mithilfe gängiger techniques used and their application in this domain. on common sets of test problems from medicine and Werkzeuge im Detail dargelegt. Die Code-Beispiele Arising from the EU MUSCLE network, a program geophysical/enviromental sciences, is also addressed. orientieren sich dabei am Einsatz von Linux-Sys- that drew together multidisciplinary teams with ex- This volume coherently summarizes work car- temen auf PDAs und mobilen Endgeräten. Dieses pertise in machine learning, pattern recognition, ar- ried out in the field of theoretical signal and image Buch richtet sich an Software-Entwickler im Op- tificial intelligence, and image, video, text and cross- processing. It focuses on non-linear and non-para- er-Source-Umfeld. Vorausgesetzt werden grundle- media processing, the book first introduces the ma- metric models for time series as well as on adaptive gende Kenntnisse in der Programmiersprache C chine learning principles and techniques that are ap- methods in image processing. sowie in der Administration von Linux-Systemen. plied in multimedia data processing and [..] Contents Features Contents Multivariate time series analysis.- Multiscale approx- Grundlegende Einführung in das Thema Linux Part I: Introduction to Learning Principles for Mul- imation.- Local adaptive estimation of complex mo- für mobile Endgeräte Ausführliche Darstellung timedia Data – Introduction to Bayesian Methods tion and orientation patterns.- Inverse problems der Linux-basierten Programmierung für PDAs and Decision Theory; Supervised Learning; Unsu- and parameter identification.- Structural adaptive Berücksichtigt insbesondere die Entwicklung von pervised Learning and Clustering; Dimension Re- smoothing procedures.- Analysis of bivariate cou- Benutzeroberflächen duction. Part II: Multimedia Applications – Online pling by means of recurrence.- Surrogate methods.   Content-Based Image Retrieval Using Active Learn- Contents ing; Conservative Learning for Learning Object De- Eingebettete Systeme.- Hardware: Prozessoren, Spe- Fields of interest tectors; Machine Learning Techniques for Face Anal- icher, I/O.- Software: Bootloader, Kernel, Dateisys- Computer Imaging, Vision, Pattern Recognition ysis; Mental Search in Image Databases; Combining teme.- Projekte und Linux-Distributionen.- Be- and Graphics; Information and Communication, Textual and Visual Information for Semantic Label- nutzerschnittstellen.- Software-Entwicklung.- Pro- Circuits; Nonlinear Dynamics, Complex Systems, ing of Images and Videos; Classification and Cluster- grammiersprachen: C/C++, Java, Perl.- GCC: Cross Chaos, Neural Networks; Signal,Image and Speech ing of Music for Novel Music Access Applications; Compilation, Toolchain.- Hardware-Emulatoren.- Processing [..] Systementwicklung: Bibliotheken, Gerätetreiber, Netzwerke, Kernel-Funktionalität.- Anwendungsen- Target groups Fields of interest twicklung: Frameworks, Kommunikation. researchers in academic and industrial R + D Data Mining and Knowledge Discovery; Artificial Intelligence (incl. Robotics); Information Storage Fields of interest Type of publication and Retrieval; User Interfaces and Human Comput- Software Engineering/Programming and Operating Monograph er Interaction; Document Preparation and Text Pro- Systems; Computer System Implementation; Pro- cessing; Computer Imaging, Vision, Pattern Recog- gramming Techniques; Operating Systems nition and Graphics Due December 2007 Target groups Target groups Entwickler im Open-Source-Umfeld, Programmier- 2008. Approx. 290 p. (Understanding Complex Systems) Geb. Practioners, researchers, graduate students in er, Linux-Spezialisten machine learning 106,95 € Type of publication ISBN 978-3-540-75631-6 Type of publication Professional book Monograph Due July 2008 Due February 2008

2008. Etwa 450 S. 70 Abb. (X.systems.press) Geb. 2008. Approx. 320 p. (Cognitive Technologies) Geb. 59,95 € ISBN 978-3-540-75170-0 ISBN 978-3-540-20940-9 springer.com/booksellers Computer 43

E. Damiani, University of Milan, Italy; A. Dipanda, Université O. Danvy, BRICS, University of Aarhus, Denmark; H. Mairson, A. DasGupta, Purdue University, West Lafayette, IN, USA de Bourgogne, France; K. Yetongnon, Université de Bour- Brandeis University, Waltham, MA, USA; F. Henglein, DIKU, Uni- gogne, France; L. Legrand, Université de Bourgogne, France; P. versity of Copenhagen, Denmark; A. Pettorossi, DISP, University Schelkens, Vrije University of Brussels, Belgium; R. Chbeir, Univer- of Roma 'Tor Vergata', Italy (Eds.) Asymptotic Theory of Statistics and sité de Bourgogne, France (Eds.) Probability Automatic Program Development Signal Processing for Image A Tribute to Robert Paige Enhancement and Multimedia This book is an encyclopedic treatment of classic Processing as well as contemporary large sample theory, deal- ing with both statistical problems and probabilistic “Automatic Program Development” is a tribute to issues and tools. It is written in an extremely lucid Robert Paige (1947-1999), our accomplished and re- style, with an emphasis on the conceptual discussion Traditionally, signal processing techniques lay at the spected colleague, and moreover our good friend, of the importance of a problem and the impact and foundation of multimedia data processing and anal- whose untimely passing was a loss to our academic relevance of the theorems. The book has 34 chapters ysis. In the past few years, a new wave of advanced and research community. We have collected the re- over a wide range of topics, nearly 600 exercises for signal-processing techniques has delivered exciting vised, updated versions of the papers published in practice and instruction, and another 300 worked results, increasing systems capabilities of efficiently his honor in the Higher-Order and Symbolic Com- out examples. It also includes a large compendium exchanging image data and extracting useful knowl- putation Journal in the years 2003 and 2005. Among of 300 useful inequalities on probability, linear al- edge from them. Signal Processing for Image En- them there are two papers by Bob: (i) a retrospec- gebra, and analysis that are collected together from hancement and Multimedia Processing is an edited tive view of his research lines, and (ii) a proposal for numerous sources, as an invaluable reference for re- volume, written by well-recognized international re- future studies in the area of the automatic program searchers in statistics, probability, and mathemat- searchers with extended chapter style versions of the derivation. The book also includes some papers by ics. It can be used as a graduate text, as a versatile re- best papers presented at the SITIS 2006 Internation- members of the IFIP Working Group 2.1 of which search reference, as a source for independent read- al Conference. This book presents the state-of-the- Bob was an active member. All papers are related to ing on a wide assembly of topics, and as a window art and recent research results on the application of some of the research interests of Bob and, in partic- to learning the latest developments in contemporary advanced signal processing techniques for improving ular, to the transformational development of pro- topics. The book is unique in its detailed coverage of the value of image and video data. Signal Processing grams and their algorithmic derivation from formal fundamental topics such as [..] for Image Enhancement Video and Multimedia Pro- specifications. “Automatic Program Development” cessing is designed for a professional audience com- offers a renewed stimulus for continuing and deep- Features posed of practitioners and researchers in industry. ening Bob's research visions. A familiar touch is giv- Encyclopedic coverage of classical topics and at the This book is also suitable for advanced-level students en to the [..] same time of some of the most modern topics Versa- in computer science. tile research reference to anyone working on theoret- Features ical statistics and probability Emphasis on presenting Features Review of some techniques for automatic program the material in a lucid and accessible style, suitable Discusses feature-based techniques for deep, fea- development Applications of program transfor- for conceptual understanding of a very broad range ture-oriented analysis of images Introduces new re- mation to algorithm derivation Algorithm design of topics. sults on video coding on time-honored topic of se- methodology based on systematic derivations and curing image information applications in computer science and software engi- Contents neering Basic convergence concepts and theorems.- Metrics, Contents information theory, convergence, and Poisson ap- Image Restoration, Filtering and Compression.- Contents proximations.- More general weak and strong laws On-orbit Spatial Resolution Estimation of CBERS-2 From the contents Part I Robert Paige's Research: A and the Delta theorem.- Transformations.- More Imaging System Using Ideal Edge Target.- Distribut- Retrospective and a Proposal. Part II Robert Paige: general CLTs.- Moment convergence and uniform ed Pre-Processed CA-CFAR Detection Structure for Brother, Friend, Colleague. Part III Contributed Pa- integrability.- Sample percentiles and order statis- Non Gaussian Clutter Reduction.- Multispectral pers. tics.- Sample extremes.- Central limit theorems for Satellite Images Processing through Dimensional- dependent sequences.- Central limit theorem for Fields of interest ity Reduction.- SAR Image Compression based on Markov chains.- Accuracy of CLTs.- Invariance prin- Software Engineering/Programming and Operating Wedgelet-Wavelet.- Texture Analysis and Feature ciples.- Edgeworth expansions and cumulants.- Sad- Systems; Software Engineering; Programming Tech- Extraction.- 2 Texture Discrimination Using Hier- dlepoint approximations.- U-statistics.- Maximum niques; Programming Languages, Compilers, Inter- archical Complex Networks.- An Enhanced Detec- likelihood estimates.- M estimates.- The trimmed [..] tor of Blurred and Noisy Edges.- Face Recognition preters and Shape Analysis.- A3FD: Accurate 3D Face De- Fields of interest Target groups tection.- Two [..] Statistical Theory and Methods Institutional market and researchers, graduate stu- Fields of interest dents and university teachers in the field of computer Target groups Multimedia Information Systems; Signal,Image and sciences Students Speech Processing; Image Processing and Computer Type of publication Vision; Computer Communication Networks; Com- Type of publication Monograph puter Graphics; Information Storage and Retrieval Graduate/advanced undergraduate textbook

Target groups Due January 2008 Due June 2008 Advanced-level students and researchers in comput- er science 2008. Approx. 300 p. Geb. 2008. X, 680 p. (Springer Texts in Statistics) Geb. Type of publication 85,55 € 74,15 € Contributed volume ISBN 978-1-4020-6584-2 ISBN 978-0-387-75970-8

Due December 2007

2008. Approx. 341 p. (Multimedia Systems and Applications, Band 31) Geb.

106,30 € ISBN 978-0-387-72499-7 44 Computer springer.com/booksellers

R. Davis, Ipswich, UK G. De Micheli, Ecole Polytechnique Federale de Lausanne, L. De Raedt, University of Freiburg, Germany Switzerland; S. Mir, TIMA- Institut National Polytechnique de Grenoble, France; R. Reis, Universidade Federal do Rio Grande do Advanced Modelling with the ARIS Sul, Brazil (Eds.) Logical and Relational Learning

Design Platform From ILP to MRDM VLSI-SoC: Research Trends in VLSI and Systems on Chip Following on from Rob Davis’ successful introducto- This textbook covers logical and relational learn- ry book, ARIS Design Platform: Getting Started with Fourteenth International Conference on Very Large Scale In- tegration of System on Chip (VLSI-SoC2006), October 16-18, ing in depth, and hence provides an introduction to BPM, Rob now covers in detail some of the more ad- 2006, Nice, France inductive logic programming (ILP), multirelation- vanced concepts of using ARIS Business Architect. al data mining (MRDM) and (statistical) relational This is a practical ‘how-to’ guide and contains tips, learning (SRL). These subfields of data mining and techniques and short cuts gained from practical ex- machine learning are concerned with the analysis perience and explains clearly how to use ARIS and This book contains extended and revised versions of complex and structured data sets that arise in nu- why ARIS is a powerful tool for process modeling. of the best papers that were presented during the merous applications, such as bio- and chemoinfor- Advanced concepts such as the following are pre- fouteenth IFIP TC 10/WG 10.5 International Con- matics, network analysis, Web mining, natural lan- sented in this reader-friendly and concise guide: • ference on Very arge Scale Integration. The purpose guage processing, within the rich representations Matrix editor • Find and query • Model generation of this conference, sponsored by IFIP TC 10 WG offered by relational databases and computational • Method filters and method changes • Templates 10.5 and by the IEEE Council on Electronic Design logic. The author introduces the machine learning and fonts • Reports and semantic checks • Macros • Automation (CEDA), is to provide a forum to ex- and representational foundations of the field and ex- Transformations • Database administration • User change ideas and show industrial and academic re- plains some important techniques in detail by using management This easy-to-follow advanced text is a search results in the field of microelectronics design. some of the classic case studies centered around well- must have guide and reference for all users who want The current trend toward increasing chip integra- known ILP, MRDM and SRL systems. The book is to increase their ARIS skills, and for those who need tion and technology process advancements brings suitable for use in graduate courses and should be of to undertake advanced model and database manage- about stimulating new challenges both at the physi- interest to graduate students and researchers in com- ment. cal and system-design levels. For more information puter science, databases and artificial intelligence, as about the 300 other books in the IFIP series, please well as practitioners of data mining and [..] Contents visit www.springer.com. For more information about A practical ‘how-to guide, following the success of IFIP, please visit www.ifip.org. Features the author’s introductory text Offers tips, techniques First textbook on multi-relational data mining and and short cuts gained from practical experience Pro- Features inductive logic programming Self-contained and eas- vides guidance on the more advanced aspects of “Most recent volume from the VLSI-SoC Conference ily accessible Provides a complete overview of the ARIS Business Architect Series” field

Fields of interest Contents Contents Information Systems; Models and Principles; Simu- Oversampled Time Estimation Techniques for Pre- Introduction.- An Introduction to Logic.- Rep- lation and Modeling cision Photonic Detectors.- Electronic Detecting resentations for Mining and Learning.- Learning of DNA Absorption and Hybridization.- A CMOS as Search.- Generality in Logic.- Upgrading At- Target groups Mixed-Mode Sample-and-Hold Circuit for Pipelined tribute-Value Learning Systems.- Inducing Theo- Professionals, practitioners, industrial and commer- ADCs.- Long Synthesis of EXOR Projected Sum of ries.- Probabilistic Logic Learning and Statistical Re- cial users of ARIS Products.- Designing Routing and Message-Depen- lational Learning.- Kernel and Distance-Based Rela- dent Deadlock Free Netorks on Chips.- Human++, tional Learning.- Computational Aspects.- Conclu- Type of publication Emerging Technology for Body Area Networks, Re- sions Professional book sults from IMEC’s. Fields of interest Due June 2008 Fields of interest Artificial Intelligence (incl. Robotics); Database Processor Architectures Management; Information Storage and Retrieval; In- formation Systems Applications (incl.Internet) 2008. Approx. 300 p. 100 illus. Softcover Target groups Researchers and practitioners of VLSI. 53,45 € Target groups Lecturers, graduates, scientists ISBN 978-1-84800-110-7 Type of publication Proceedings Type of publication Graduate/advanced undergraduate textbook Due December 2007 Due February 2008 2008. Approx. 410 p. (IFIP International Federation for Informa- tion Processing, Band 249) Geb. 2008. Approx. 325 p. (Cognitive Technologies) Geb. 136,96 € 42,75 € ISBN 978-0-387-74908-2 ISBN 978-3-540-20040-6 springer.com/booksellers Computer 45

K. Deb, Indian Institute of Technology, Kanpur, India

Innovization

Innovative Solution Principles Using Multiobjective Optimiza- tion

Every designer wants to know what makes a product or process optimal. This book suggests a holistic ap- proach to optimization that involves two steps: find a set of trade-off optimal solutions involving two or more conflicting objectives related to the problem, and then analyze these high-performing solutions to determine solution principles that commonly pre- vail among these solutions. Since the solutions are optimal, such common principles are likely to exist; and since these principles are common to many so- lutions they are likely to provide robust, reliable so- lution principles. The author is one of the leading re- searchers in multiobjective optimization, and an ex- pert in design methodology. In this book he offers introductions to innovation in design; multiobjective optimization, in particular evolutionary multiobjec- tive optimization (EMO) techniques that find multi- ple, trade-off, optimal solutions; and knowledge ex- traction from multivariate data using graphical, re- gression and clustering [..]

Contents Introduction.- Innovation in Product and Process Design.- Monotonicity Principles for Knowledge Ex- traction.- Multiobjective Optimization.- Innoviza- tion Procedure.- Engineering Case Studies.- Chal- lenges in Automated Knowledge Extraction.- Con- clusions.- References

Fields of interest Artificial Intelligence (incl. Robotics); Engineering Design; Optimization; Pattern Recognition; Algo- rithm Analysis and Problem Complexity

Target groups Researchers, practitioners and students of computer science, optimization and design.

Type of publication Monograph

Due March 2008

2008. Approx. 300 p. Geb.

58,80 € ISBN 978-3-540-73172-6 springer.com/booksellers Computer 46

Z. Deng, University of Houston, TX, USA; U. Neumann, University N. Dershowitz, Tel Aviv University, Israel; A. Voronkov, University Y.G. Desmedt, Florida State University, Tallahassee, FL, USA (Ed.) of Southern California, Los Angeles, CA, USA (Eds.) of Manchester, UK (Eds.) Secure Public Key Infrastructure Data-Driven 3D Facial Animation Logic for Programming Artificial Intelligence and Reasoning Standards, PGP and Beyond

14th International Conference, LPAR 2007, Yerevan, Armenia, “Data-Driven 3D Facial Animation” systematically October 15-19, 2007, Proceedings describes the important techniques developed over Public Key Infrastructures (PKI) are a trust manage- the last ten years or so. Although 3D facial anima- ment technology for public keys, consisting of sev- tion is used more and more in the entertainment in- eral interconnected Certifying Authorities (CAs). dustries, to date there have been very few books that This book constitutes the refereed proceedings of The CAs issue certificates that establish ownership of address the techniques involved. Comprehensive the 14th International Conference on Logic for Pro- public keys, which can be used to support authenti- in scope, the book covers not only traditional lip- gramming, Artificial Intelligence, and Reasoning, cation, integrity and privacy. The structure of a PKI sync (speech animation), but also expressive facial LPAR 2007, held in Yerevan, Armenia, October can be quite complex, and securing PKIs has there- motion, facial gestures, facial modeling, editing and 15-19, 2007. The 36 revised full papers presented to- fore become a major concern, exacerbated with the sketching, and facial animation transferring. It pro- gether with 15 short papers and 3 invited talks were commercialization of the Internet. Secure Public Key vides an up-to-date reference source for academic carefully reviewed and selected from 78 submissions. Infrastructure: Standards, PGP and Beyond focuses research and for professionals working in the facial The papers address all current issues in logic pro- on security aspects of public key infrastructures, ad- animation field. An edited volume, the book brings gramming, logic-based program manipulation, for- dressing such issues as inadequacy of security checks together contributions from leading researchers and mal method, automated reasoning, and various kinds when certificates are issued, and revocation time. practitioners working in both academia and in the of AI logics. The editor presents several possible solutions leading animation studios. for withstanding malicious attacks, while laying the Fields of interest groundwork for future safeguards. Secure Public Key Features Artificial Intelligence (incl. Robotics); Program- Infrastructure: Standards, PGP and Beyond is de- The contributions span both active researchers in ming Techniques; Software Engineering; Logics and signed for practitioners and researchers in industry, academia and graphics/animation experts working in Meanings of Programs; Mathematical Logic and For- as well as advanced-level students in computer sci- leading studios There is no other book available that mal Languages ence and mathematics.   specifically and systematically describes the new and popular data-driven facial animation techniques de- Target groups Features veloped in recent years Researchers and professionals -Focus on security aspects of public key infrastruc- tures -Strategies to survive limited malicious attacks Contents Type of publication on public key infrastructures (PKI) -Most other Computer Facial Animation: A Survey.- Expressive Proceedings books on PKI focus solely on PGP or on X500/X509 Visual Speech Generation.- Data-driven Expres- -Deals with corrupt certification authorities (CAs) sive Speech Animation Synthesis and Editing.- Eye Due October 2007 and CAs whose computers were hacked Movements, Saccades, and Multi-Party Conversa- tions.- Realistic Eye Motion Synthesis by Texture Contents 2007. XIII, 562 p. (Lecture Notes in Computer Science, Band 4790) Preface.- Introduction.- The X509 Infrastructure.- Synthesis.- Learning Expressive Human-like Head Softcover Motion Sequences from Speech.- A User Interface The PGP Paradigm.- Trust Models.- Platform De- Technique for Controlling Blend Shape Interfer- 72,76 € pendencies/Independencies.- Revocation.- Boom or ence.- Sketching Articulation and Pose for Facial An- ISBN 978-3-540-75558-6 Bust or Alternatives?.- Index. imation.- Learning Controls for Blend Shapes Based Fields of interest Realistic Facial Animation.- Speech Motion Decom- Data Encryption; Computer Systems Organization position and Editing.- Facial Animation by Expres- and Communication Networks; Management of sion [..] Computing and Information Systems; Data Struc- Fields of interest tures, Cryptology and Information Theory; Operat- Computer Graphics; Simulation and Modeling ing Systems; Coding and Information Theory

Target groups Target groups Graduate students in computer graphics and graph- Practitioners and researchers in industry ics and animation researchers Type of publication Type of publication Contributed volume Graduate/advanced undergraduate textbook Due April 2008 Due November 2007 2008. Approx. 128 p. 20 illus. Geb. 2007. Approx. 338 p. 149 illus. in color. Softcover 42,75 € 82,34 € ISBN 978-0-387-27159-0 ISBN 978-1-84628-906-4 springer.com/booksellers Computer 47

R. Deutz, Aachen, Germany L. DiPippo, University of Rhode Island, Kingston, RI, USA; C.D. Gill, J. Diederich, American University of Sharjah, United Arab Emi- Washington University, St. Louis, MO, USA (Eds.) rates (Ed.) Joomla Design Patterns for Distributed Rule Extraction from Support Installation, Administration, Anwendung und Entwicklung Real-Time Embedded Systems Vector Machines

In diesem Buch erfahren Sie, wie Sie Ihre Web- site mit Joomla erstellen und verwalten. Im umfan- This book provides a taxonomy of distributed re- Features greichen Praxisteil wird der Aufbau einer Website al-time and embedded system design patterns, allow- Introduces a number of different approaches to ex- mit Joomla, beginnend bei der Installation, über ing the reader to understand how the patterns can tracting rules from support vector machines devel- die Umsetzung verschiedener Anforderungen an fit together to form a complete application. Based on oped by key researchers in the field Successful appli- die Website bis zur Einrichtung eines Webshops the information captured from previous DRE system cations are outlined and future research opportuni- gezeigt. Dabei ist die Darstellung so angelegt, dass development experience, the text explores the rela- ties are discussed für die Realisierung Programmierkenntnisse nicht tionships among all of the patterns described with- nötig sind. Der Leser erhält einen kompletten Leit- in. Several comprehensive examples are presented, illustrating how these patterns can be combined to Contents faden für die Erstellung einer Website. Für den fort- PART I: Introduction.- Rule extraction from support geschrittenen Nutzer bzw. Leser mit PHP-Kennt- build real applications, giving the reader motivation for further study and offering concrete descriptions vector machines – An introduction.- Rule extrac- nissen wird die Programmieurng von Erweiterun- tion from Support Vector Machines: An Overview gen für Joomla in der Praxis erläutert. Sie erhalten of pattern-oriented design of DRE systems. Devel- opers of DRE systems and members of the open- of Issues and Application in Credit Scoring.- PART einen Überblick über das Joomla-Framework und II: Algorithms and Techniques.- Rule Extraction die wichtigsten Funktionen. Darüber hinaus werden source middleware community, as well as advanced students of real-time and distributed systems and/or from Transfer Learning.- Rule Extraction from Lin- die Möglichkeiten der Sicherung einer Joomla-We- ear Support Vector Machines via Mathematical Pro- biste gegen Hackerangriffe behandelt. software engineering, will find Design Patterns for Distributed Real-Time and Embedded Systems to be gramming.- Rule Extraction based on Support and Prototype Vectors.- SVMT-Rule: Association Rule Features one of the most comprehensive pictures of DRE sys- Mining over SVM Classification Trees.- Using rele- Alles, was für die Erstellung einer Website mit Joom- tems available. vance vector machines to generate prototype based la benötigt wird. Die wichtigsten Joomla-Funktionen rules.- PART III: Applications.- Prediction of First- kompakt dargestellt. Sicherung von Joomla-Websites Features Day [..] gegen Hacker-Angriffe. Provides researchers and professionals with guide- lines for producing well-organized, reusable code in Fields of interest Fields of interest their DRE systems Presents material in a concise, ac- Appl.Mathematics/Computational Methods of Engi- Information Systems and Communication Service; cessible format, allowing for efficient application of neering; Artificial Intelligence (incl. Robotics) Software Engineering/Programming and Operating each pattern Contains contributions from experts in the field with experience designing, developing and Systems; Programming Techniques; Software Engi- Target groups evaluating complex mission-critical DRE systems in neering; Media Design Engineers, researchers, and graduate students in which the breadth of design considerations is essen- computational intelligence and computer science Target groups tial Administratoren, Entwickler, Anwender Type of publication Contents Monograph Type of publication Introduction.- Resource Management Patterns Sec- Professional book tion:   General Resource Management Pat- terns.- RM Specification and Enforcement Patterns.- Due January 2008 Due March 2008 RM Monitoring.- RM Actuation Patterns.- Schedul- ing Patterns Section: Scheduling Specification and 2008. Approx. 300 p. (Studies in Computational Intelligence, Enforcement Patterns.- Scheduling Actuation Pat- Band 80) Geb. 2008. Etwa 300 S. (Xpert.press) Geb. terns.- Engineering Patterns Section: System Engi- neering Patterns.- Real-Time Data Distribution Ex- 106,95 € 39,95 € ISBN 978-3-540-75389-6 ISBN 978-3-540-34529-9 amples.- Conclusion.- Index.   Fields of interest Computer Systems Organization and Commu- nication Networks; Special Purpose and Applica- tion-Based Systems; Electronic and Computer Engi- neering; Processor Architectures; Computer-Aided Engineering (CAD, CAE) and Design; System Per- formance and Evaluation

Target groups Researchers and professionals in real-time systems, distributed systems, software engineering, and/or a combination of these topics; graduate-level course specifically addressing software for DRE systems

Type of publication Contributed volume

Due February 2008

2008. Approx. 384 p. (Real-Time Systems Series, Band 24) Geb.

69,50 € ISBN 978-0-387-24357-3 48 Computer springer.com/booksellers

R. Dietze, Berlin C. Ding, Lawrence Berkeley National Laboratory, Berkeley, CA, A. Divakaran, Mitsubishi Electronic Research Laboratories, Cam- USA; H. Zha, Penn State University, State College, PA, USA bridge, MA, USA (Ed.) SunCluster Spectral Clustering, Ordering and Multimedia Content Analysis Hochverfügbarkeit unter Sun Solaris und OpenSolaris The Fullmoon Framework Ranking Theory and Applications Statistical Learning with Matrix Factorizations

Der Autor erläutert zunächst die Technologien der Multimedia Content Analysis: Theory and Hochverfügbarkeit, beschreibt die Bedingungen im Applications covers the latest in multime- Data mining methods are essential for analyzing the SunCluster-Umfeld und gibt im Anschluss einen de- dia content analysis and applications based on such ever-growing massive quantities of data. Data clus- taillierten Einblick in die Struktur des SunCluster analysis.  As research has progressed, it has tering is one of the key data mining techniques. In 3. Er behandelt sowohl Installation, Konfiguration, become clear that this field has to appeal to recent years, spectral clustering has been developed Einbindung eigener HA-Services, als auch den Be- other disciplines such as psycho-physics, media pro- as an effective approach to data clustering. It starts trieb, inklusive der Beschreibung und Bearbeitung duction, etc. This book consists of invited chapters with well-motivated objective functions; optimiza- von Fehlerszenarien, von Recoveryverfahren, Er- that cover the entire range of the field.  Some tion eventually leads to eigenvectors as the solutions, weiterungen während des Betriebs, der Software- of the topics covered include low-level audio-visu- with many clear and interesting algebraic properties. wartung und des Troubleshooting des SunCluster al analysis based retrieval and indexing techniques, Spectral clustering, ordering and ranking extensively 3. Zur Referenz wird im Anhang SunCluster 2 im the TRECVID effort, video browsing interfaces, con- uses matrix-based methods and algorithms. This ap- Kontrast beschrieben. Im Buch sind Runbooks und tent creation and content analysis, and multimedia proach is amenable to vigorous analysis and is ben- Beschreibungen zur Installation und zur Konfig- analysis-based applications, among others.  efiting from a treasury of knowledge of linear alge- uration sowohl der SunCluster-Software, als auch The chapters are written by leading researchers in bra and applied mathematics accumulated through der HA-Agentensoftware sowie der Services enthal- the multimedia field. the centuries. This exposition presents recent ad- ten. Das Buch schließt ab mit der Beschreibung von vances in this new subfield. New concepts are care- Testverfahren des SunCluster 3. Features fully developed and practical examples are extensive- Captures the most significant milestones in the mul- Features ly utilized to illustrate the ideas. A key feature are the timedia field. Includes chapters by the leading re- Verständnis von Cluster-Interna Dynamische Er- mathematical proofs outlined throughout the text in searchers in the field. Covers the latest in multimedia weiterung des Clusters Systemwartung unter Clus- reasonable detail which highlight the rigorous and content analysis and applications. Contains chapters terkontrolle principled quality of [..] on a range of topics including the TRECVID effort, low-level audio-visual analysis based retrieval, video Features Fields of interest browsing interfaces, and the human experience of Presents recent advances in the field of spectral Operating Systems multimedia, among others. clustering, an interdisciplinary text Mathematical Target groups proofs discussed throughout the text in reasonably Contents Systemadministratoren, Operatoren, Rechenzentren, heavy detail Includes applications to web The Human Experience of Multimedia.- An Systemhäuser, Consultingunternehmen and text mining and genomics Systematic Overview of the TRECVID Effort: Milestones and presentation  Challenges for the Future.- Content Creation and Type of publication Content Analysis: A Re-Examination of Content Contents Professional book Semantics.- Content Semantics Extraction.- Multi- Part 1 Basic Theory and Algorithms: Introduction.- media Content Analysis Overview.- Computational K-means clustering and spectral relaxation.- Spec- Due August 2008 Aesthetics.- Content Browsing on the Internet.- A tral graph clustering.- Multi-way spectral cluster- Survey of State-of-the-Art Multimedia.- Application ing.- Bipartite graph clustering.- Part 2 Advanced of Multimedia Content Analysis to Sports Video Ap- 2008. Etwa 500 S. (X.systems.press) Geb. Spectral Clustering and Ordering: Perturbation anal- plications.- Multimedia Content Analysis in Collab- ysis of spectral clustering.- Green's function.- Ran- oration with Content Creators.- Multimedia Content 59,95 € dom walk and probabilistic spectral clustering.- Se- Analysis Based Products and Possibilities for the Fu- ISBN 978-3-540-33805-5 mi-definite programming solution for spectral clus- ture. tering.- Spectral data ordering.- Part 3 Related unsu- pervised learning topics: Spectral ranking.- Further Fields of interest developments on PCA and SVD.- Nonlinear embed- Signal,Image and Speech Processing; Image Process- ding/representation.- Other [..] ing and Computer Vision; Electronic and Computer Engineering; Multimedia Information Systems Fields of interest Computational Science and Engineering; Manage- Target groups ment of Computing and Information Systems; Math Academic and industry researchers and practition- Applications in Computer Science; Statistics and ers. Computing/Statistics Programs; Statistics for Engi- neering, Physics, Computer Science, Chemistry & Type of publication Geosciences Contributed volume Target groups Senior undergraduate and graduate students, Due July 2008 researchers, practitioners 2008. Approx. 350 p. (Signals and Communication Technology) Type of publication Geb. Monograph 74,15 € Due August 2008 ISBN 978-0-387-76567-9

2008. Approx. 400 p. Geb.

65,91 € ISBN 978-0-387-30448-9 springer.com/booksellers Computer 49

A. Dong, University of Sydney, NSW, Australia; A. Moere, Vande, R. Downey, Victoria University of Wellington, New Zealand; D. T. Downey, Florida International University, Miami, FL, USA University of Sydney, NSW, Australia; J.S. Gero, George Mason Hirschfeldt, University of Chicago, IL, USA University, Fairfax, VA, USA (Eds.) Web Development with Java Algorithmic Randomness and Computer-Aided Architectural Complexity Using Hibernate, JSPs and Servlets Design Futures 2007

Proceedings of the 12th International CAAD Futures Confer- Web development is simpler than it seems, especial- ence This book is concerned with the theory of com- ly with the software tools freely available on the web. putability and complexity over the real numbers. This book breaks from the tradition of teaching a This theory was initiated by Turing, Grzegorczyk, history of web development and jumps to the good CAAD Futures is a biennial conference that aims to Lacombe, Banach, and Mazur and has seen rapid stuff from the outset so that students can start writ- promote the advancement of computer-aided archi- growth in recent years. Computability and complexi- ing real applications. It introduces readers to a 3- tectural design research and teaching. The confer- ty theory are two central areas of research in theoret- tiered, Model-View-Controller architecture by using ences are organised under the auspices of the CAAD ical computer science. Until recently, most work in Hibernate, JSPs, and Java Servlets. These three tech- Futures Foundation. The conference series started in these areas concentrated on problems over discrete nologies all use Java, so that a student with a good 1985 in Delft and has since traveled to major cities in structures, but there has been enormous growth of background in programming will be able to master Europe, Asia, and USA. This volume is the proceed- computability theory and complexity theory over the them. Java Server Pages are HTML pages that have ings of the 12th International Conference of CAAD real numbers and other continuous structures, espe- some data references in them. Java Servlet contain Futures, which took place in Sydney, Australia. The cially incorporating concepts of "randomness". One the business logic. Hibernate handles the data. This internationally refereed papers in this book present reason for this growth is that more and more com- book uses existing powerful technologies such as JSP, the state of the art in computer-aided architectural putation problems over the real numbers are being JavaBeans, Annotations, JSTL, Java 1.5, Hibernate, design research. The papers in this year's conference dealt with by computer scientists - in compu- Apache Velocity and Tomcat. It also presents Mod- theme, Integrating Technologies for Computer-Aid- tational geometry and in the modeling of dynami- el 1 architectures using Servlets and JSP as alterna- ed Design, provide the technological foundation for cal and hybrid systems. Scientists working on these tives to Perl and PHP. Written novice developers, new ways of thinking about using computers in de- questions come from such diverse fields as theoret- this book provides an introductory course in web de- signing and the use of computers in design itself as ical computer science, domain theory, logic, con- velopment for undergraduates as well [..] well as in the education of designers. Information structive mathematics, computer arithmetic, numeri- about the 2007 Conference and this book is avail- cal mathematics, [..] Features able at: http://www.arch.usyd.edu.au/kcdc/confer- Focuses on using existing tools that are freely avail- Contents ences/cf07 able on the web to speed up web development - A Preface.- Acknowledgments.- Introduction.- I. Back- student with a good background in programming Features ground.- Preliminaries.- Computability Theory.- will be able to develop a complete web site that ac- Part of an ongoing conference series that has been Kolmogorov Complexity of Finite Strings.- Relating cesses a database Uses Hibernate as the primary tool running for 22 years State-of-the-art CAAD research Plain and Prefix-Free Complexity.- Effective Reals.- to speed web development, as well as JSP Uses the and practice Broad topical coverage of applications II. Randomness of Sets.- Martin-Löf Randomness.- model-view-controller (mvc) approach for web de- of computing in architectural design Includes best Other Notions of Effective Randomness.- Algorith- velopment; also known as a three-tiered model practices about teaching and learning computing in mic Randomness and Turing Reducibility.- III. Rel- architectural design ative Randomness.- Measures of Relative Random- Contents ness.- The Quantity of K- and Other Degrees.- Ran- Browser-Server Communication.- Markup Lan- Contents domness-Theoretic Weakness.- Lowness for Other guage.- HTML forms.- Sending Data to Another From the contents Preface. Becoming Virtual.- Be- Randomness Notions.- Effective Hausdorff Dimen- Form.- The Truth About JSPs.- Using a Controller.- coming Educated.- Becoming Designed.- Algogram.- sion.- IV. Further Topics.- Omega as an Operator.- Registering a Servlet with Tomcat.- Servlet-JSP Di- Becoming Kiniesthetic.- Becoming Logical.- Being [..] rectory Structure.- Java beans.- Reorganizing the Supportive.- Being Virtual.- Becoming Tools.- Be- Bean.- Member Variables in Servlets.- Extending the coming Futuristic.- Becoming Determinable.- Being Fields of interest Bean.- Model, View Controller.- Required Valida- Creative.- Contact Author’s E-Mail Address. Author Algorithm Analysis and Problem Complexity; The- tion.- Saving a Bean to a Database.- HTML Informa- Index. ory of Computation; Computation by Abstract De- tion.- Style Sheets.- Form Elements.- Cookies.- Busi- vices ness Key in a Database.- Shopping Cart.- Shopping Fields of interest Cart Application.- Emailing a Confirmation.- MIME Target groups Design, general (Design, allgemein); Computer-Aid- Types.- Security.- Model 1 Architectures Using Java.- Researchers Scientists ed Engineering (CAD, CAE) and Design; Computer [..] Appl. in Arts and Humanities; Computers and Edu- Type of publication cation Fields of interest Monograph Information Systems and Communication Service; Target groups Information Systems Applications (incl.Internet) CAAD researchers, CAD researchers, design re- Due May 2008 searchers, graduate architecture students Target groups 2007. Approx. 600 pp. 40 illus. Geb. Undergraduates Type of publication Proceedings ISBN 978-0-387-95567-4 Type of publication Undergraduate textbook Due October 2007 Due November 2007 2007. Approx. 616 p. With CD-ROM. Geb. 2008. XIV, 284 p. 93 illus. Softcover 149,75 € ISBN 978-1-4020-6527-9 48,10 € ISBN 978-1-84628-862-3 50 Computer springer.com/booksellers

D. Draheim, Software Competence Center Hagenberg, Germany; D. Draheim, Software Comptence Center, Hagenberg, Austria; S. Dudoit, University of California, Berkeley, CA, USA; M.J. van der G. Weber, University of Auckland, New Zealand (Eds.) J. Grundy, University of Auckland, New Zealand; J. Hosking, Uni- Laan, University of California, Berkeley, CA, USA versity of Auckland, New Zealand; C. Lutteroth, University of Auckland, New Zealand; G. Weber, University of Auckland, New Trends in Enterprise Application Zealand Multiple Testing Procedures with Architecture Applications to Genomics Software Engineering Tools 2nd International Conference, TEAA 2006, Berlin, Germany, November 29 - Dezember 1, 2006, Revised Selcted Papers Trends of Software Engineering Tools and Platforms This book establishes the theoretical foundations of a general methodology for multiple hypothesis testing and discusses its software implementation in R and This book constitutes the thoroughly refereed post- The authors provide a high-level discussion of tools SAS. The methods are applied to a range of testing proceedings of the 2nd International Conference successfully used in today’s software engineering problems in biomedical and genomic research, in- on Trends in Enterprise Application Architecture, projects. Beyond state-of-the-art technology and cur- cluding the identification of differentially expressed TEAA 2006, held in Berlin, Germany, November 29 rent trends, the book also provides a discussion of vi- and co-expressed genes in high-throughput gene - December 1, 2006. The 24 revised full papers pre- sions and possible future trends of software develop- expression experiments, such as microarray experi- sented together with 1 invited talk were carefully re- ment. It explains how tools support several activities ments; tests of association between gene expression viewed and selected from numerous submissions in a software engineering life cycle. Tools for manag- measures and biological annotation metadata (e.g., for inclusion in the book. Their common purpose ing work products, for requirements engineering, de- Gene Ontology); sequence analysis; and the genetic is to identify problems or issues in enterprise appli- sign, coding, testing, version control, configuration mapping of complex traits using single nucleotide cation architecture and propose and evaluate a so- management, deployment, and documentation are polymorphisms. The book is aimed at both statisti- lution. Topics of interest are model driven architec- considered, as are tools for project management and cians interested in multiple testing theory and ap- ture, enterprise development environments, service tracking. The book summarizes the features of each plied scientists encountering high-dimensional test- oriented architecture, data integration, sizing and class of software engineering tools on a conceptual ing problems in their subject matter area. Specifical- cost estimation, performance benchmarking, mo- level, so that the reader is able to estimate the poten- ly, the book proposes resampling-based single-step bile workforce access, multi-channel architecture, tial risks and rewards of various software tools to de- and stepwise multiple testing procedures for control- autonomous computing, enterprise grid computing, cide which is best suited for their task. This makes ling a broad class of Type I error rates, defined as tail load balancing, and enterprise component platforms. the book a valuable resource for software develop- probabilities and expected values for [..] ers, solution providers, decision makers and project Fields of interest managers. Features Special Purpose and Application-Based Systems; This book provides a detailed account of the theoret- System Performance and Evaluation; Software Features ical foundations of proposed multiple testing meth- Engineering; Information Systems Applications Requirements analysis of software tools. The book ods and illustrates their application to a range of test- (incl.Internet) focuses on technologies that have been proven to add ing problems in genomics value in software engineering projects. The book em- Target groups phasizes the importance of several different tools, Contents Researchers and professionals which address all other software engineering activi- Multiple hypothesis testing.- Test statistics null dis- Type of publication ties. tribution.- Overview of multiple testing procedures.- Proceedings Single-step multiple testing procedures for control- Contents ling general Type I error rates.-Step-down Part 1: Software Tools.- Tools for different phases of multiple testing procedures for controlling the fam- Due October 2007 the software lifecycle - a taxonomy.- Project manage- ily-wise error rate.- Augmentation multiple testing ment, requirements engineering, design coding, test- procedures for controlling generalized tail probabil- 2007. X, 356 p. (Lecture Notes in Computer Science, Band 4473) ing, version control, configuration management, de- ity error rates.- Resampling-based empirical Bayes Softcover ployment, documentation.- Part 2: Tool Platforms.- multiple testing procedures for controlling general- Tool integration and extension: data/control/presen- ized tail probability error rates.- Simulation studies: 55,64 € tation/process integration of tools.- Examples: Assessment of test statistics null distributions.- Iden- ISBN 978-3-540-75911-9 LINUX/Unix.- VisualStudio.- Eclipse, Net- tification of [..] Beans.- Part 3: Tool Directins.- Current and future trends of tools: MDD, agents, autonomic computing, Fields of interest open source, agile methods, global software develop- Bioinformatics; Statistical Theory and Methods; ment.- Statistics for Life Sciences, Medicine, Health Sciences

Fields of interest Target groups Multimedia Information Systems; Software Engi- Researchers neering; Computer Communication Networks; Soft- ware Engineering/Programming and Operating Sys- Type of publication tems; Programming Techniques; Programming Lan- Monograph guages, Compilers, Interpreters Due December 2007 Target groups IT-architects, developers, project managers and sys- tem administrators 2007. Approx. 585 p. (Springer Series in Statistics) Geb.

Type of publication 74,85 € Professional book ISBN 978-0-387-49316-9

Due June 2008

2008. Approx. 400 p. Geb.

53,45 € ISBN 978-3-540-74939-4 springer.com/booksellers Computer 51

R. Dutta, NC State University, Raleigh, NC, USA; A.E. Kamal, Iowa J.L. Dvorak, Motorola iDEN Emerging Technologies, Boca Raton, 82,34 € State University, Ames, IA, USA; G.N. Rouskas, NC State Universi- FL, USA ISBN 978-0-387-69139-8 ty, Raleigh, NC, USA (Eds.) Moving Wearables into the Traffic Grooming for Optical Mainstream Networks Taming the Borg Foundations and Techniques

The term "Wearable Technology" encompasses a Traffic grooming is the name given to a family of op- wide spectrum of devices, services and systems for tical network design problems that has attracted sig- wireless communications and the web. Wearables nificant attention from both academia and indus- are by their nature closely associated with the per- try in the last decade or so. The huge bandwidth of son, and their use generates many social and even le- fiber optical networking is much larger than the typ- gal issues that have little to do with specific technolo- ical bandwidth demands experienced by network gies. This professional book discusses the character- service providers. This mismatch creates a need for istics and design elements required for wearable de- multiplexing the low rate traffic demands into opti- vices and systems to be widely adopted by the main- cal wavelength channels, but this requires costly elec- stream population for use in their everyday lives. tronic switching equipment, potentially offsetting the It shows how wearables can help people with benefit of cheap optical transport. Traffic grooming daily tasks without getting between the user and the refers to network design and resource allocation al- task. Moving Wearables into the Mainstream also in- gorithms that can enable cost-efficient use of both troduces concepts such as Operational Inertia that network bandwidth and electronic switching. Due to form a mindset conducive to designing wearables the increasing bandwidth of optical communication suitable for broad adoption by consumers. This book on the one hand, and the growing variety of traffic provides insight into legal and cultural issues poten- demand magnitudes on the other, traffic grooming tially unfamiliar to research engineers, as well as a has grown from a narrow research area to a main- broad discussion of technologies underlying wear- stream requirement for real world practitioners. This able devices. Moving Wearables into the [..] book presents the practical motivation, [..] Features Features Provides a broad discussion of the various technolo- Covers fundamental and theoretical concepts relat- gies underlying wearable devices Useful to practi- ed to traffic grooming as well as a wide range of ex- tioners of wearable research by giving an overview isting approaches Includes a description of various of areas outside their own that are relevant to wear- areas of research by the leading researchers in those ables and may form the context in which they con- areas Presents the practical motivation, theoretical duct their research Strives to answer how wearables description, and extant techniques for traffic groom- can be designed to help people with daily tasks with- ing in optical networks out getting between the users and the tasks they are trying to do Contents Introduction.- Section 1 Enabling Technology and Contents Standards.- Grooming Switches.- Control Plane Sup- Acknowledgments.- Preface.- Introduction To Wear- port for Traffic Grooming.- Mechanisms Enabling ables.- Background.- Wearable System Applications.- Grooming in First and Next Generation SONET/ Overview Of Wearable Systems.- Mainstream Wear- SDH.- Section 2 Theoretical Backround.- Complex- able Design.- Overview Of Mainstream Wearable ity Theory for Traffic Grooming.- Traffic Models Design .- Mainstream Wearable Design In Detail.- in Dynamic Traffic Grooming.- Hierarchical Traf- Supporting Technologies.- Awareness And Immer- fic Grooming.- Section 3 Static Traffic Grooming.- sion.- Communication And Power.- Mainstream Traffic Grooming in SONET Rings.- Traffic Groom- Wearable Systems User Interfaces.- Sight And Sound ing in Next Generation SONET/SDH Networks.- User Interfaces.- Emerging User Interfaces.- Some Large-Scale Hybrid Optoelectronic Networks.- Net- Tough Hurdles And The Future.- Social Issues Of work Dimensioning and Provisioning Exact Ap- Wearables.- Future Of Wearable Systems.- Why proaches.- Network [..] Tame The Borg?.- Glossary Of Wearable Terms.- In- dex.   Fields of interest Communications Engineering, Networks; Computer Fields of interest Communication Networks; Microwaves, RF and Op- Computer Communication Networks; Communi- tical Engineering cations Engineering, Networks; Information Sys- tems Applications (incl.Internet); Operating Sys- Target groups tems; Computer Systems Organization and Com- Students and engineers of optical network design munication Networks; Special Purpose and Applica- and traffic grooming tion-Based Systems

Type of publication Target groups Monograph Researchers and practitioners in industry; secondary, advance-level students Due March 2008 Type of publication Monograph 2008. Approx. 300 p. (Optical Networks) Geb.

106,30 € Due December 2007 ISBN 978-0-387-74517-6 2008. Approx. 404 p. 30 illus. Geb. 52 Computer springer.com/booksellers

L. Dybkjær, Natural Interactive Systems Laboratory, Brøndby, N. Döring, TU Ilmenau S. Džeroski, J. Struyf (Eds.) Denmark; W. Minker, University of Ulm, Germany (Eds.) Kompendium M-Learning Knowledge Discovery in Inductive Recent Trends in Discourse and Mit Handy, Handheld und Notebook erfolgreich lehren und Databases Dialogue lernen 5th International Workshop, KDID 2006 Berlin, Germany, September 18th, 2006 Revised Selected and Invited Papers

This book is a collection of eleven chapters which Im heutigen Mobilzeitalter gewinnen Handy, Hand- together represent an original contribution to the held und Notebook auch als Bildungsmedien an This book constitutes the thoroughly refereed joint field of (multimodal) spoken dialogue systems. The Bedeutung. Man spricht von M-Learning (Mobile postproceedings of the 5th International Workshop chapters include highly relevant topics, such as dia- Learning, auch Wireless, Nomadic oder Pervasive on Knowledge Discovery in Inductive Databases, logue modeling in research systems versus industri- learning), wenn diese mobilen, drahtlos vernetzten KDID 2006, held in Berlin, Germany, September al systems, evaluation, miscommunication and er- Endgeräte eingesetzt werden. M-Learning ist damit 18th, 2006 in association with ECML/PKDD. The 15 ror handling, grounding, statistical and corpus-based eine Erweiterung des Internet-basierten E-Learn- revised full papers presented together with 1 invit- approaches to discourse and dialogue modeling, da- ing. Die Autorin präsentiert den aktuellen Entwick- ed paper were carefully selected during two rounds ta analysis, and corpus annotation and annotation lungsstand in gut strukturierter, anschaulicher und of reviewing and improvement for inclusion in the tools. The book contains several detailed application verständlicher Weise. Sie stellt Szenarien vor, die in book. Bringing together the fields of databases, ma- studies, including, e.g., speech-controlled MP3 play- Schulen, Hochschulen und Unternehmen einsetzbar chine learning, and data mining the papers address ers in a car environment, negotiation training with sind, und beschreibt diese unter technischen, organ- various current topics in knowledge discovery and a virtual human in a military context, application of isatorischen und pädagogisch-didaktischen Aspek- data mining in the framework of inductive databases spoken dialogue to question-answering systems, and ten.   Mit dem Kompendium M-Learning er- such as constraint-based mining, database technolo- cognitive aspects in tutoring systems. The chapters halten Praktiker, Lehrende und Lernende eine gut gy and inductive querying. vary considerably with respect to the level of exper- strukturierte und didaktisch aufbereitete Einführung tise required in advance to benefit from them. How- mit zahlreichen Abbildungen, Tabellen, Übungsauf- Fields of interest ever, most chapters start with a state-of-the-art de- gaben sowie einem umfassenden Literaturverzeich- Database Management; Artificial Intelligence (incl. scription from which all readers from the spoken di- nis, Service-Anhang, Stichwortverzeichnis und Glos- Robotics) alogue community may benefit. Overview [..] sar. Target groups Features Features Researchers and professionals Unique and original contribution to the fields of spo- Die Vorteile von M-Learning kompakt dargestellt. ken dialogue systems and human-computer interac- Erprobte und bewährte M-Learning-Szenarien. Type of publication tion Covers hot topics such as miscommunication, Pädagogische, technische und organisatorische Hil- Proceedings error handling and recovery, evaluation, and sensi- fen für die Praxis.   tivity to the cognitive states of the user Includes sev- Due October 2007 eral highly relevant and original application studies Fields of interest concerning, e.g., MP3 players in a car environment, Media Design; Computers and Education; Informa- negotiation training in a military context, and [..] tion Systems Applications (incl.Internet); User Inter- 2007. X, 301 p. also available online. (Lecture Notes in Computer faces and Human Computer Interaction; Computer Science, Band 4747) Softcover Contents Applications Preface.- Contributing Authors.- Trends and Chal- 51,36 € lenges in Discourse and Dialogue.- 1 Where Do We Target groups ISBN 978-3-540-75548-7 Go From Here?.- 2 Designing Speech-controlled Dozenten, Pädagogen, Lehrer, Trainer, Weiterbild- Media File Selection for Automotive Systems.- 3 A ner in Unternehmen, Schulen und Hochschulen. Virtual Human Dialogue Model for Non-Team In- teraction.- 4 Evaluating Interactions with Spoken Type of publication Dialogue Telephone.- 5 Handling Miscommunica- Professional book tion: Why Bother?.- 6 Sorry I Didn’t Catch That!.- 7 GALATEA: A Discourse Modeller Support- Due July 2008 ing Concept-Level Error Handling in Spoken Dia- logue Systems.- 8 Partially Observable Markov Deci- 2007. Etwa 300 S. 150 Abb. (X.media.press) Geb. sion Processes with Continuous Observations for Di- alogue Management.- 9 [..] 39,95 € ISBN 978-3-540-69331-4 Fields of interest Linguistics (General); User Interfaces and Human Computer Interaction; Artificial Intelligence (incl. Robotics); Computational Linguistics

Target groups Advanced graduate students, PhD students, academ- ic and industrial researchers and practitioners

Type of publication Contributed volume

Due March 2008

2008. Approx. 345 p. (Text, Speech and Language Technology, Band 39) Geb.

149,80 € ISBN 978-1-4020-6820-1 springer.com/booksellers Computer 53

R.A. Earnshaw, University of Bradford, UK; J.A. Vince, University of A. Ebersbach, Regensburg, Germany; M. Glaser, Regensburg, Ger- A. Ebersbach, Regensburg; M. Glaser, Regensburg; R. Heigl, Re- Bournemouth, UK (Eds.) many; R. Heigl, Regensburg, Germany gensburg; A. Warta, Stuttgart

Digital Convergence - Libraries of Wiki Wiki the Future Web Collaboration Kooperation im Web

The convergence of IT, telecommunications, and Wikis are Web-based applications that allow all users Wikis sind webbasierte Anwendungen, die es allen media is changing the way information is collected, not only to view pages but also to change them. The Nutzern ermöglichen, Seiten nicht nur zu betra- stored and accessed. This is mainly due to reducing success of the Internet encyclopedia Wikipedia has chten, sondern auch zu ändern. Angeregt durch cost, increasing quality, and increasing bandwidth. drawn increasing attention from private users, small die Internet-Enzyklopädie Wikipedia entdecken Digital information preserves content accuracy (e.g. organizations and enterprises to the various possi- immer mehr private Nutzer und Kleinorganisa- digital television) in a way other systems do not. In- ble uses of wikis. Their simple structure and straight- tionen, aber auch Unternehmen die vielfältigen formation is ubiquitous and globally accessible, and forward operation make them a serious alternative Anwendungsmöglichkeiten von Wikis. Durch ein- can be held and accessed just as easily on a global to expensive content management systems and al- fachen Aufbau und unkomplizierte Bedienung network as on a local personal computer or in a lo- so provide a basis for many applications in the area stellen sie eine ernstzunehmende Alternative zu cal library. Devices are increasingly intelligent and of collaborative work. We show the practical use of teuren Content-Management-Systemen dar und are network-ready. User interfaces are more adapt- wikis in carrying out projects for users as well as for bilden die Grundlage für eine Fülle von Anwendun- able and flexible, and can be tailored to particular ap- maintainers. This includes a step-by-step introduc- gen im Bereich der kooperativen Arbeit. Das Buch plication domains. Digital intelligence is becoming tion to wiki philosophy, social effects and functions, beschreibt den praktischen Einsatz von Wikis zur seamless and invisible, enabling more attention to be a survey of their controls and components, and the Durchführung von Projekten sowohl für Anwen- paid to the content and the user’s interaction with it. installation and configuration of the wiki clones Me- der als auch für Betreiber. Dies umfasst eine schrit- This revolution is having effects on the development diaWiki and TWiki. In order to exemplify the possi- tweise Einführung in die Philosophie und Funktion- and organisation of information and artefact repos- bilities of the software, we use it as a project tool for sweise, einen Überblick über Bedienelemente und itories such as libraries, museums, and exhibitions, planning a conference. Komponenten sowie die Installation und Konfigura- and the way in which physical and digital aspects are tion der Wiki-Klone MediaWiki, TWiki und mediated to users. Features Confluence-Wiki. Am Beispiel einer Konferenzpla- Offers a guide to the application of Wikis Prac- nung werden die Einsatzmöglichkeiten der Software Features tice-oriented presentation with directly applica- als Projekttool dargestellt. This book presents key aspects in the rapidly ble tools CD-ROM with OpenSource Wiki Tools, a moving field of digital convergence in the areas of project data base with sample pages Features technology and information sciences. The chapters Bietet eine Anleitung zum Einsatz von Wikis im are written by international experts who are leaders Contents WWW Praxisorientierte Darstellung mit direkt um- in their fields. Preface to the Second Edition.- Wiki: The Wiki Con- setzbaren Tools CD-ROM mit OpenSource Wi- cept.- The Installation.- First Steps.- The Core Func- ki-Tools, Projektdatenbank mit Beispielseiten Contents tions of MediaWiki.- Formatting.- Multi-Page Struc- From the contents: From Boutique to Mass Digitiza- tures.- Components: the Function Pages.- Admin- Contents tion: the Library Project at Oxford.- Digital istration.- Life in MediaWiki.- TWiki, the Jack of Das Wiki-Konzept.- Unser erstes Wiki: Installa- Services in Academic Libraries: the Internet is Setting all Trades: Installing TWiki.- Working with TWi- tion.- Erste Schritte.- Kernfunktionen des Medi- Benchmarks.- Early History of Janet and Library De- ki.- Formatting in TWiki.- Searching in TWiki.- Us- aWikis.- Formatierung.- Seitenübergreifende Struk- velopments.- World-Class Universities Need World- er Permissions in TWiki.- Administering TWiki.- turierung.- Komponenten: die Funktionsseiten.- Class Libraries and Information Resources – but Designing a TWiki.- TWiki as a Project Kit: Pre- Administration.- Leben im MediaWiki. TWiki, der how can they be provided?- The International Di- liminary Thoughts: What is a Project.- Conceptual Tausendsassa: TWiki installieren.- Arbeiten mit mensions of Digital Science and Scholarship: Aspi- Phase: Collecting Ideas and Outlining the Project.- TWiki.- Formatierung im TWiki.- Suche im TWi- rations of the British Library in Serving the Interna- Composing the Project Plan.- Preparing for Your [..] ki.- Userrechte im TWiki.- TWiki administrieren.- tional Scientific and Scholarly Communities.- Con- Gestaltung des TWikis. TWiki als Projektbaukas- sortium of University Research Libraries (CURL) – Fields of interest ten: Vorüberlegungen.- Konzeptionsphase: Ideen Past, Present and Future.- For Better [..] Information Systems Applications (incl.Internet); sammeln und Projekt skizzieren.- Ausarbeitung Multimedia Information Systems; Document Prepa- des Projektplans.- Veranstaltungsvorbereitung.- Fields of interest ration and Text Processing; Media Design Veranstaltungsdurchführung [..] Information Storage and Retrieval; Information Sys- tems and Communication Service; User Interfaces Target groups Fields of interest and Human Computer Interaction Media designers, web designers, screen designers Information Systems Applications (incl.Internet); Multimedia Information Systems; Media Design; Target groups Type of publication Document Preparation and Text Processing Information Scientists and Librarians Professional book Target groups Type of publication Due November 2007 Mediendesigner, Webdesigner, Screendesigner Monograph Type of publication 2008. Approx. 400p. With CD-ROM. Softcover Due November 2007 Professional book 48,10 € 2007. Approx. 555 p. Geb. ISBN 978-3-540-35150-4 Due October 2007

128,35 € 2008. XXIV, 529 S. 137 Abb. Mit CD-ROM. (Xpert.press) Softcover ISBN 978-1-84628-902-6 39,95 € ISBN 978-3-540-35110-8 54 Computer springer.com/booksellers

N. Ehrentreich, RiverSource Investments, Minneapolis, MN, USA H. El Moussaoui, Fachhochschule Dortmund; K. Zeppenfeld, R. Elber, Cornell University, Ithaca, NY, USA Fachhochschule Dortmund Agent-Based Modeling Protein Modeling with AJAX The Santa Fe Institute Artificial Stock Market Model Revisited Bioinformatics and Biophysics Geschichte, Technologie, Zukunft

This book reconciles the existence of technical trad- At the core of biological complexity are the small ing with the Efficient Market Hypothesis. By analyz- In den letzen Jahren entwickelte sich das World machines that maintain the whole: the protein ing a well-known agent-based model, the Santa Fe Wide Web (WWW) stetig weiter. Jüngst geprägte molecules. Proteins are encoded by DNA sequences, Institute Artificial Stock Market (SFI-ASM), it finds Begriffe, wie Web 2.0 und AJAX, haben sich in der spontaneously adopt unique three-dimensional that when selective forces are weak, financial evolu- Welt der modernen Webentwicklung etabliert und shapes, and perform a wide range of biological func- tion cannot guarantee that only the fittest trading werden von interessierten Webentwicklern und tions in living systems. Scientists from a broad range rules will survive.Its main contribution lies in the ap- Webbenutzern mit Begeisterung aufgenommen. Das of disciplines are fascinated by these biological ma- plication of standard results from population genet- erhöhte Interesse, welches AJAX aktuell genießt, chines and use computational means to study the ics which have widely been neglected in the agent- ist auf visuell attraktive und hochinteraktive Web- evolution, biophysical properties and biological con- based community. This has led to various misinter- Applikationen zurückzuführen, die in ihrem Ver- text of proteins. This book discusses the interface be- pretations of previous simulation results. The book halten Desktop-Anwendungen ähneln. Doch was tween the different disciplines and the mixed sets of is able to finally establish the emergence of technical genau steckt hinter diesem neuen Schlagwort? Dieser theoretical and computational methods used by each trading for faster learning speeds in the SFI-ASM be- Frage wird in diesem Buch nachgegangen. Dabei to study proteins. Tools vary from machine learning yond a doubt. In emphasizing the importance of ge- wird auf einfache und nachvollvollziehbare Weise and statistical methods to text matching and identifi- netic drift as an important evolutionary factor and untersucht, ob es sich tatsächlich um eine neuartige cation of homologous proteins, to statistical physics analyzing its effects on various mutation operators, und „revolutionäre" Webtechnologie handelt, oder formulation of random energies and protein folding, this book provides agent-based modelers with several ob AJAX vielmehr ein Produkt bereits bestehender and to molecular dynamic simulations of proteins in tools to design better evolutionary algorithms. und bekannter Technologien darstellt, welches bloß action. Protein Modeling with Bioinformatics and unter einer neuen Bezeichnung eingeführt wurde. Biophysics will benefit scientists and advanced-level Contents Ferner sind die Motive für das aktuelle Interesse an students interested in this [..] Agent-Based Modeling in Economics: Introduc- AJAX ausführlich dargestellt. tion.- The Rationale for Agent-Based Modeling.- The Features Concept of Minimal Rationality.- Learning in Eco- Features Interdisciplinary approach to computational study of nomics.- Replicating the Stylized Facts of Fincan- Schnelle Einführung in das aktuelle Thema Stellt die proteins, based on notions from computer science, cial Markets.- The Santa Fe Institute Artificial Stock Hintergründe zu AJAX vor physics, chemistry and biology, offers an especially Market Model Revisited: The Original Santa Fe In- broad perspective on the field Traditionally proteins stitute Artificial Stock Market.- A Suggested Modifi- Contents were studied on the sequence, structure, or dynami- cation to the SFI-ASM.- An Analysis of Wealth Lev- Einleitung.- AJAX-Grundkenntnisse.- Angewandte cal and functional levels Outlines a complete hierar- els.- Selection, Genetic Drift, and Technical Trad- Technologien.- Vor- und Nachteile.- Bibliotheken chy of theoretical and computational studies used to ing.- Summary and Future Research. und Frameworks.- Fallbeispiel.- Fazit.- Anhang.- study proteins by researchers from different fields Quellenverzeichnis.- Literatur.- Online-Quellen. Fields of interest Contents Financial Economics; Artificial Intelligence (incl. Fields of interest The Darwin approach to proteins: Protein fami- Robotics); Operation Research/Decision Theory; Software Engineering lies (function, structure, and sequence). Protein se- Methodology and the History of Economic Thought; quences. Introduction to Protein structures. Fold Target groups Computer Appl. in Social and Behavioral Sciences recognition. Statistical mechanics of sequence space.- Studierende und Praktiker der Informatik und Elek- The Boltzmann approach to proteins: The hy- Target groups trotechnik drophobic force. Modeling protein energy and ther- Scientists modynamics. Ab-initio protein folding. Kinetics.- Type of publication Index. Type of publication German textbook Monograph Fields of interest Due November 2007 Simulation and Modeling; Bioinformatics; Theoreti- Due October 2007 cal and Computational Chemistry; Mathematical Bi- 2008. Etwa 150 S. (Informatik im Fokus) Softcover ology in General; Mathematical and Computational Physics; Computer Applications in Chemistry 2008. XVI, 230 p., 39 illus. (Lecture Notes in Economics and Math- ematical Systems, Band 602) Softcover 14,95 € ISBN 978-3-540-73112-2 Target groups 64,15 € Research scientists ISBN 978-3-540-73878-7 Type of publication Monograph

Due July 2008

2008. Approx. 350 p. 20 illus. Geb.

80,20 € ISBN 978-0-387-32988-8 springer.com/booksellers Computer 55

A. Elgammal, Rutgers State University, Piscataway, NJ, USA; B. D. Eppstein, University of California, Irvine, CA, USA; J.-C. Fal- R. Epstein, University of California, San Diego, CA, USA; G. Rosenhahn, Max-Planck-Center, Saarbruecken, Germany; R. magne, University of California, Irvine, CA, USA; S. Ovchinnikov, Roberts, NCR, San Diego, CA, USA; G. Beber, Gartner Consulting, Klette, University of Auckland, New Zealand (Eds.) San Francisco State University, CA, USA Stamford, CT, USA (Eds.)

Human Motion - Understanding, Media Theory Parsing the Turing Test

Modeling, Capture and Animation Interdisciplinary Applied Mathematics Philosophical and Methodological Issues in the Quest for the Thinking Computer Second Workshop, HumanMotion 2007, Rio de Janeiro, Brazil, October 20, 2007, Proceedings The focus of this book is a mathematical structure modeling a physical or biological system that can be Parsing the Turing Test is a landmark exploration of both the philosophical and methodological issues This book constitutes the refereed proceedings of in any of a number of `states.' Each state is charac- surrounding the search for true artificial intelligence. the Second Workshop on Human Motion, Human- terized by a set of binary features, and differs from Will computers and robots ever think and commu- Motion 2007, held in Rio de Janeiro, Brazil October some other neighbor state or states by just one of nicate the way humans do? When a computer cross- 20, 2007 in conjunction with ICCV 2007. The 22 re- those feature. A simple example of a `state’ is a par- es the threshold into self-consciousness, will it im- vised full papers presented were carefully reviewed tial solution of a jigsaw puzzle, which can be trans- mediately jump into the Internet and create a World and selected from 38 submissions. The papers are or- formed into another partial solution or into the final Mind? Will intelligent computers someday recog- ganized in topical sections on Motion Capture and solution just by adding or removing a single adjoin- nize the rather doubtful intelligence of human be- Pose Estimation, Body and Limb Tracking and Seg- ing piece. The evolution of such a system over time ings? Distinguished psychologists, computer scien- mentation and Activity Recognition. is considered. Such a structure is analyzed from alge- braic and probabilistic (stochastic) standpoints. tists, philosophers, and programmers from around Fields of interest the world debate these weighty issues – and, in effect, Simulation and Modeling; Artificial Intelligence (in- Features the future of the human race – in this important vol- cl. Robotics); Computational Biology/Bioinformat- Provides an algebraic framework and fundametal ume. ics; Biometrics results of Media Theory Reference for e-games, e- learning, e-genetics Features Target groups The most comprehensive analysis of The Turing Researchers and professionals Fields of interest Test - the ultimate benchmark of true artificial intel- Applications of Mathematics; Theory of Computa- ligence ever published Features new contributions Type of publication tion; Artificial Intelligence (incl. Robotics); Combi- from 37 eminent scholars in computer science, psy- Proceedings natorics chology and philosophy, including Ray Kurzwell, Noam Chomsky, Paul Churchland, John R. Sear- Target groups Due October 2007 le and Andrew Hodges Includes running commen- Scientists, researchers taries by Stevan Harnad, Kenneth Ford, Pat Hayes and others on Alan Turing's [..] 2007. X, 329 p. (Lecture Notes in Computer Science, Band 4814) Type of publication Softcover Monograph Contents From the contents Foreword. Acknowledgements. 51,36 € Due October 2007 Introduction. About the Editors. Part I. Setting the ISBN 978-3-540-75702-3 Stage. Part II. The Ongoing Philosophical Debate. Part III. The New Methodological Debates. Part IV. 2008. X, 328 p. 92 illus., some in color. Geb. Afterthoughts on Thinking Machines. 80,20 € ISBN 978-3-540-71696-9 Fields of interest Computational Linguistics; User Interfaces and Hu- man Computer Interaction; Artificial Intelligence (incl. Robotics); Philosophy of Language; Psycholin- guistics

Target groups Professionals, students

Type of publication Contributed volume

Due December 2007

2008. Approx. 535 p. Geb.

160,45 € ISBN 978-1-4020-6708-2 56 Computer springer.com/booksellers

M. Ericsson, University of Cambridge, UK (Ed.)

Quantum Information and Many Body Quantum Systems

In the last years a growing attention has been dedi- cated to many body quantum systems from the point of view of quantum information. Indeed, after the initial investigation of simple systems as single or two qubits, the need of understanding the character- istics of a realistic quantum information device leads necessarily to the study of many body quantum sys- tems. These studies are also driven by the very fast development of experiments which in the last years reach the goal of coherent control of a few qubits (ion traps, charge qubits, etc.) with a roadmap for further scaling and improvement of coherent control and manipulation techniques. This book gives a se- lection of current research topics in the field of quantum information for many body quantum systems together with open problems.

Features First book in this area New paradigm of performing quantum information tasks, such as quantum infor- mation transfer, quantum cloning and others, with- out direct control of the whole quantum system but using our knowledge of it has increased the need of tools to understand in details the behaviour of many body quantum system as we find them in nature New goals of the quantum information community lead to an [..]

Contents Preface.- Entanglement percolation in quantum net- works.- Classical simulation of strongly correlated systems.- Quantum information and many body the- ory.- Electronic Hong-Ou-Mandel interferometer for multi-mode entanglement detection.- Energy, entan- glement, and information transfer in many body sys- tems.- Infinite spin chains and algebras.- New results on MPS.- A quantum approach to classical statistical mechanics.- Atom-light teleportation.- Lieb Robin- son bounds in quantum spin systems and application to quantum information theory.- A metric approach to phase transitions.

Fields of interest Information and Communication, Circuits; Mathe- matics of Computing; Data Structures, Cryptology and Information Theory

Target groups Graduate students and researchers that want to get an overview and introduction to current develop- ments in the field

Type of publication Proceedings

Due January 2008

2008. Approx. 400 p. (CRM Series, Band 5) Softcover

26,75 € ISBN 978-88-7642-307-9 springer.com/booksellers Computer 57

A. Esposito, University of Naples, Italy; M. Faundez-Zanuy, Escola V. Esposito Vinzi, Università di Napoli, Italy; W.W. Chin, University L. Fan, Surrey University, Guildford, UK; H. Cruickshank, Surrey Universitaria Politecnica de Mataro, Spain; E. Keller, Université de of Houston, TX, USA; J. Henseler, Radboud Universiteit Nijmegen, University, Guilford, UK; Z. Sun, Surrey University, Guildford, Uk Lausanne, Switzerland; M. Marinaro, Università di Salerno, Italy The Netherlands; H. Wang, Beijing University of Aeronautics and (Eds.) (Eds.) Astronautics, Beijing, China (Eds.) IP Networking over Next- Verbal and Nonverbal Handbook of Partial Least Squares Generation Satellite Systems Communication Behaviours Concepts, Methods and Applications in Marketing and Related Fields International Workshop, Budapest, July 2007 COST Action 2101 International Workshop, Vietri sul Mare, Italy, March 29-31, 2007, Revised Selected and Invited Papers

The new volume of Computational Statis- With the boom of Internet, IP-based applications, tics represents a comprehensive overview of Partial such as WWW and multimedia, bave been an essen- This book constitutes the thoroughly refereed post- Least Squares (PLS) methods with specific reference tial part of our life, and there is an ever-increasing proceedings of the COST Action 2102 Internation- to their use in marketing and with a discussion of demand for accessing high-speed Internet services al Workshop on Verbal and Nonverbal Communi- the directions of current research and perspectives. anywhere and anytime. This trend unavoidably has cation Behaviours held in Vietri sul Mare, Italy, in The handbook covers the broad area of PLS meth- huge impacts on the design of the next-generation March 2007. The 26 revised full papers presented to- ods -from regression to structural equation model- satellite systems. On the other hand, with its broad- gether with 1 introductory paper comprise careful- ing applications, software and interpretation of re- casting nature and unique coverage, satellite systems ly reviewed and selected participants’ contributions sults. It features papers on the use and the analysis also can play an important role in the next-genera- and invited lectures given at the workshop. The pa- of latent variables and indicators by means of the tion Internet. For example, satellite systems can be pers are organized in topical sections on verbal and PLS path modeling approach from the design of the a good driver for the deployment of IPv6 in the In- nonverbal coding schema, emotional expressions, causal network to model assessment and improve- ternet, and can provide a fast way to reach end-users gestural expressions, analysis and algorithms for ver- ment. Within the PLS framework, the handbook al- because they do not rely on construction of a high- bal and nonverbal speech, as well as machine multi- so addresses advanced topics such as the analysis of speed terrestrial networks. The workshop proceed- modal interaction. multi-block, multi-group and multi-structured data, ings will focus on the IP networking of next-genera- tion satellite systems. Topics include IPv6 over satel- Fields of interest the use of categorical indicators, the study of inter- lites, new architectures of next-generation satellite Artificial Intelligence (incl. Robotics); User Inter- action effects, the integration of classification issues, systems, satellite and terrestrial network integration, faces and Human Computer Interaction; Informa- the validation aspects and the comparison between network monitoring and measurement, and perf- tion Systems Applications (incl.Internet); Computers the PLS approach and covariance based structural mance enhancement. and Society; Computers and Education equation modeling. Most chapters comprise a [..] Features Target groups Features Introduces the latest innovations and trends in IP- Researchers and professionals Up-to-date review of the PLS methods recently de- velopped and their applications in marketing Com- based applications and satellite networking Explains Type of publication plete and comprehensive overview of the field Fo- many aspects of advanced satellite networking sys- Proceedings cus both on statistical methodology and selected real tems, such as deployment of IPv6 over satellites, world problems working with WLAN and WiMax, and rules con- cerning multi-segment networks (including satel- Due October 2007 Contents lites). Covers hot-button issues such as security, ar- Methods: PLS Path Modeling: Concepts, Model Es- chitecture improvement, resource allocation, video 2007. XII, 325 p. (Lecture Notes in Computer Science, Band 4775) timation and Assessment.- PLS Path Modeling: Ex- networking, and [..] Softcover tensions.- PLS Path Modeling with Classification Is- sues.- PLS Path Modeling for Customer Satisfaction Contents 51,36 € Studies.- PLS Regression.- Applications to Market- New Architecture for Next Generation Broadband ISBN 978-3-540-76441-0 ing and Related Areas.- Tutorials with Didactic Ap- Satellite Systems -- the Satsix Approach.- SATLIFE: proach. A Big Step into the Enhancement of the Regenera- tive Satellite Generation.- SATSIX Satellite System Fields of interest and Network.- Fast IP Handover Between Satellite Statistics and Computing/Statistics Programs; Statis- Network and Wireless LAN Network for high-speed tical Theory and Methods; Marketing trains.- SATSIX Mobility Architecture and its Per- formance Evaluation.- Cross-Layer Anticipation of Target groups Resources Allocatino for Multimedia Applicatinos Scientists over DVB-RCS Based on SIP Signalling.- Radio Re- source Management for Next Generation DVB-RCS Type of publication Systems.- SATSIX: A Network Architecture for Next Handbook [..]

Due February 2008 Fields of interest Information Systems and Communication Service; Information Systems Applications (incl.Internet); 2008. Approx. 850 p. (Springer Handbooks of Computational Space Exploration and Astronautics Statistics) Geb.

266,43 € Target groups ISBN 978-3-540-32825-4 Professionals involved in research, development, and implementation, of next-generation networks and satellite systems

Type of publication Proceedings

Due February 2008

2008. Approx. 350 p. Geb.

114,54 € 58 Computer springer.com/booksellers

ISBN 978-0-387-75427-7 R.T. Farouki, University of California, Davis, CA, USA H. Fathi, Aalborg University, Denmark; S.S. Chakraborty, Finland University, Finland; R. Prasad, Aalborg University, Denmark Pythagorean-Hodograph Curves: A Framework for VoIP in IP-based Algebra and Geometry Inseparable Wireless Heterogeneous Networks

Signaling, Mobility, Security By virtue of their special algebraic structures, Pythagorean-hodograph (PH) curves offer unique advantages for computer-aided design and manu- Nowadays, the convergence of systems and services facturing, robotics, motion control, path planning, reaches another dimension. Users experience several computer graphics, animation, and related fields. wireless systems such as the general packet radio ser- This book offers a comprehensive and self-contained vice (GPRS) system, the universal mobile telecom- treatment of the mathematical theory of PH curves, munication system (UMTS), and wireless local area including algorithms for their construction and ex- networks (WLANs) and demand ubiquitous mobile amples of their practical applications. Special fea- services including real-time services, and high data tures include an emphasis on the interplay of ideas rate applications. It is therefore natural to forecast from algebra and geometry and their historical ori- the convergence of these existing systems towards gins, detailed algorithm descriptions, and many fig- an IP-based wireless heterogeneous network. In this ures and worked examples. The book may appeal, in new heterogeneous system, the user expects to roam whole or in part, to mathematicians, computer scien- seamlessly while using real-time services. The service tists, and engineers. providers should therefore provide applications that are independent of access infrastructures and should Features support seamless user experience in any kinds of net- Fantastic new textbook on mathematical background works (cellular, WLAN etc.). On the other hand, it is to computer-aided geometric design. important to note that the envisioned convergence Fields of interest of different systems is preceded by the convergence Computational Mathematics and Numerical Analy- of different types of traffic. Voice and data traffic are sis; Geometry; Algebra; Computer Imaging, Vision, usually treated [..] Pattern Recognition and Graphics; Numerical and Features Computational Methods in Engineering; Automotive The provision of real-time services in wireless het- and Aerospace Engineering erogeneous networks requires a set of time-efficient Target groups control mechanisms to support a VoIP session with Students, researchers and professionals in mathe- acceptable quality. In this book, we specifically focus matics, computer science, computer aided geometric on mechanisms that affect the VoIP user satisfaction design, engineering and manufacturing while not explicitly involved in the media session (i.e. the coded speech). This relates to the extra delays in- Type of publication troduced by the security and the [..] Graduate/advanced undergraduate textbook Contents 1. Introduction: Background, Due October 2007 Motivation, Challenges, Session Setup Delay in IP Multimedia Subsystem, Authentication De- 2008. XVI, 728 p. 204 illus. (Geometry and Computing, Band 1) lay in WLAN 802.11b, Handover Delay at the Net- Geb. work Layer, Secure Handover at the Network Lay- er 2. Overview of IP-based Wireless Heterogeneous 64,15 € Networks: Introduction, Access Networks Consid- ISBN 978-3-540-73397-3 ered, IEEE 802.11b, 3GPP Cellular Systems: GPRS/ UMTS, Integration of WLAN and GPRS/UMTS, Re- al-time service: Voice over IP, VoIP in the IP Multi- media Subsystem 3. Models for Delay Analysis: Ran- dom Error Process, Correlated Error Process, Impact of Signaling on Real-time Services: [..]

Fields of interest Communications Engineering, Networks; Comput- er Systems Organization and Communication Net- works; Signal,Image and Speech Processing

Target groups Graduate level students, engineers and researchers active in the area of Wireless Networks and Commu- nications

Type of publication Monograph

Due March 2008

2008. Approx. 300 p. Geb.

96,25 € ISBN 978-1-4020-6630-6 springer.com/booksellers Computer 59

R. Featherstone, The Australian National University, Canberra, D. Fellner, Technische Universität Braunschweig G. Fey, University of Bremen, Germany; R. Drechsler, University of ACT, Australia Bremen, Germany Computer-Grafik Rigid Body Dynamics Algorithms Robustness and Usability in Modern Design Flows Die Computer-Grafik hat sich als eigenständige Rigid Body Dynamics Algorithms presents the sub- Disziplin innerhalb der Informatik etabliert und ject of computational rigid-body dynamics through bildet die zentrale Grundlage vieler praktischer An- The size of technically producible integrated circuits the medium of spatial 6D vector notation. It explains wendungen. Das vorliegende Buch zielt auf die Ver- increases continuously. But the ability to design and how to model a rigid-body system and how to ana- mittlung grundlegender Algorithmen und Metho- verify these circuits does not keep up with this devel- lyze it, and it presents the most comprehensive col- den, bietet aber auch einen detaillierten Überblick opment. Therefore today’s design flow has to be im- lection of the best rigid-body dynamics algorithms zu aktuellen Entwicklungen der Computer-Grafik. proved to achieve a higher productivity. In Robust- to be found in a single source. The use of spatial vec- Schwerpunkte bilden effiziente Darstellungsal- ness and Usability in Modern Design Flows the cur- tor notation greatly reduces the volume of algebra gorithmen in 2D und 3D, fotorealistische Visual- rent design methodology and verification methodol- which allows systems to be described using fewer isierung, Hardware-gestützte Anzeigeverfahren ogy are analyzed, a number of deficiencies are iden- equations and fewer quantities. It also allows prob- und Szenengraph-basierte Techniken. Die Algo- tified and solutions suggested. Improvements in the lems to be solved in fewer steps, and solutions to be rithmen werden dabei in Java vorgestellt und sind methodology as well as in the underlying algorithms expressed more succinctly. In addition algorithms vielfach auch als Java-Beans verfügbar. So erhält are proposed. An in-depth presentation of prelimi- are explained simply and clearly, and are expressed der Leser die Möglichkeit, das Verhalten dieser Al- nary concepts makes the book self-contained. Based in a compact form. The use of spatial vector nota- gorithmen im Detail studieren und neue Algorith- on this foundation major design problems are tar- tion facilitates the implementation of dynamics algo- men aus bestehenden Modulen in einfacher geted. In particular, a complete tool flow for Synthe- rithms on a computer: shorter, simpler code that is Weise erstellen zu können. Ein umfangreiches Liter- sis for Testability of SystemC descriptions is present- easier to write, understand and debug, with no loss aturverzeichnis gibt Hinweise auf die weiterführende ed. The resulting circuits are completely testable and of efficiency. Unique features include: A comprehen- Literatur. Abgerundet werden die einzelnen Kapi- test pattern generation in polynomial time is possi- sive collection of the best rigid-body dynamics algo- tel durch Übungsaufgaben zur Selbstkontrolle und ble. Verification issues are covered in even more de- rithms Use of spatial (6D) vectors to [..] Unterstützung des Einstieges in die Praxis. tail. A whole new paradigm for formal design verifi- cation is suggested. This is [..] Features Features Contains a comprehensive collection of the best Vermittlung grundlegender Algorithmen und Meth- Features rigid-body dynamics algorithms Shows how the use oden Einfaches Erstellen neuer Algorithmen aus More automation for time consuming tasks Power- of spatial (6D) vectors greatly reduces the volume of bestehenden Modulen Übungsaufgaben und umfan- ful tools by exploiting formal techniques Visionary algebra and simplifies the computer code to imple- greiches Literaturverzeichnis Aktuelle Entwicklun- approach for formal design verification Debugging ment algorithms Expresses algorithms both mathe- gen der Computer-Grafik   at the source level becomes easy Robustness against matically and in pseudocode for easy translation to error prone manual interventions computer programs Includes a new chapter on how Contents to build computer-oriented models of rigid-body Überblick.- Grafische Ausgabegeräte.- Farben und Contents systems Provides [..] Farbmodelle.- Eingabegeräte.- 2D Darstellungsele- Dedication. List of Figures. List of Tables. Preface. mente und Algorithmische Grundlagen.- Attribute 1. Introduction. 2. Preliminaries. 3. Algorithms and Contents von Ausgabeelementen.- Transformationen und Data Structures. 4. Synthesis. 5. Property Generation. Introduction.- Spatial Vector Algebra.- Dynamics Abbildungen in 2D.- Windowing and Clipping.- 6. Diagnosis. 7. Summary and Conclusions. Refer- of Rigid Body Systems.- Modelling Rigid Body Sys- Übergang von 2D auf 3D.- 3D Darstellungsele- ences. Index of Symbols. Index.   tems.- Inverse Dynamics.- Forward Dynamics - In- mente.- Transformationen und Abbildungen in 3D.- ertia Matrix Methods.- Forward Dynamics - Propa- Szenengrafen.- Entfernen verdeckter Karten und Fields of interest gation Methods.- Closed Loop Systems.- Hybrid Dy- Flächen.- Grundlagen der Fotorealistischen Darstel- Circuits and Systems; Mathematical Logic and For- namics and Other Topics.- Accuracy and Efficiency.- lung.- Fortgeschrittene Techniken der Fotorealistis- mal Languages; Electronics and Microelectronics, In- Contact and Impact. chen Darstellung. strumentation

Fields of interest Fields of interest Target groups Simulation and Modeling; Artificial Intelligence (in- Computer Graphics; Computer Imaging, Vision, Persons who work in the area of computer aided de- cl. Robotics); Theoretical and Applied Mechanics; Pattern Recognition and Graphics sign of circuits and systems, in particular, those who Automation and Robotics; Numerical and Compu- are interested in new methods to further increase the tational Methods in Engineering; Computer-Aided Target groups productivity within the design flow; includes tool de- Engineering (CAD, CAE) and Design Studenten und Dozenten der Informatik, velopers, researchers, and graduate students Praktiker und Entwickler von Computer-Grafik Target groups Type of publication Students and engineers interested in rigid-body sys- Type of publication Monograph tems German textbook Due January 2008 Type of publication Due January 2009 Monograph 2008. Approx. 250 p. Geb. 2009. Etwa 350 S. 200 Abb. in Farbe (X.media.press) Geb. Due December 2007 106,95 € 29,95 € ISBN 978-1-4020-6535-4 Originally published as volume 22 in the series: The Springer In- ISBN 978-3-540-20378-0 ternational Series in Engineering and Computer Science

2008. Approx. 350 p. Geb.

106,95 € ISBN 978-0-387-74314-1 60 Computer springer.com/booksellers

J. Filipe, INSTICC, Setubal, Portugal; H. Coelhas, INSTICC, Setubal, J.K. Fischer, Köln P. Fischer, P. Hofer Portugal; M. Saramago, INSTICC, Setubal, Portugal (Eds.) Medienrecht und Medienmärkte Lexikon der Informatik E-business and Telecommunication Networks

Second International Conference, ICETE 2005, Reading, UK, Die Medienmärkte konvergieren. Digitalisierung Begriffskompetenz in der Informatik: Das Lexikon October 3-7, 2005. Selected Papers und technische Innovationen führen zu wachsenden der Informatik vermittelt die heute notwendige Verzahnungen und Kompatibilitäten der tradi- Sicherheit im Umgang mit der Begriffswelt der tionellen Medien- und Kommunikationsplattfor- Informatik. Die Auswahl der über 6000 Kurzdef- men. Musik-, Film- oder TV-Inhalte können über initionen unter mehr als 5000 Stichworten ist This book constitutes the refereed proceedings of the Internet oder mobile Telekommunikation verbreit- repräsentativ und aktuell, wobei auf die Erwähnung Second International Conference on E-business and et werden und sind als digitale Datensätze schnell von Produkten und kurzlebigen Kenndaten Telecommunication Networks, ICETE 2005, held in verfügbar. „Triple Play" und Interaktionsange- weitestgehend verzichtet wird. Querverweise und Reading, UK, on October 3-7, 2005. The 85 revised bote liefern Massen- und Individualommunika- thematisch vernetzte Begriffserklärungen erle- full papers presented were carefully reviewed and se- tion aus einer Hand. Mit dem Zusammenwachsen ichtern die Einordnung der Begriffe in größere lected from 151 submissions. The papers are orga- der Märkte gewinnt die Gesamtheit der medien- Zusammenhänge. Großer Wert wird auf die sprach- nized in topical sections on Global Communication rechtlichen Rahmenbedingungen für die Branchen- liche Darstellung gelegt: Angaben zur Wortherkun- Information Systems and Services, Security and Reli- beteiligten zunehmend an Bedeutung. Das Buch ver- ft, Konzept zur Verwendung von Anglizismen, Gen- ability in Information Systems and Networks, Wire- mittelt einen strukturierten Überblick über das Me- der-Korrektheit. Für die 14. Auflage wurde dem Ge- less Communication Systems and Networks, and dienrecht, die Rechtsbeziehungen der Beteiligten biet der Datensicherheit besondere Aufmerksamkeit Multimedia Signal Processing. und die Entwicklung der Märkte. Neben den gewidmet. Das Lexikon der Informatik ist für jeden, rechtsspezifischen Aspekten der Konvergenz werden der sich in die Welt der Informatik begrifflich sich- Fields of interest u.a. Fragen der Vertragsgestaltung und der Abgren- er und kompetent bewegen will, ein unverzichtbarer e-business and e-commerce; Systems and Data Se- zung von Lizenzrechten thematisiert. Begleiter. Der Schwerpunkt der Überarbeitung zur curity; Data Structures, Cryptology and Informa- 14. Auflage lag auf dem Gebiet der Datensicherheit. tion Theory; Computer Communication Networks; Features Computer Systems Organization and Communica- Handbuch für die Medienwirtschaft systematische Features tion Networks Darstellung des Ineinandergreifens der Rechtsge- Repräsentativ und aktuell. Über 6000 Kurzdefini- biete und der wirtschaftlichen Signifikanz systema- tionen unter mehr als 5000 Stichworten Sprach- Target groups tisierende Schaubilder zu den Rechtsverhältnissen lich dichte und kurze, thematisch vernetzte Researchers and professionals der am Produktions- und Verwertungsprozess Begriffserklärungen Förderung der begrifflichen Type of publication Beteiligten Vernetzung durch Querverweise Mit Angaben zur Proceedings Wortherkunft, Konzept zur Verwendung von An- Contents glizismen, Gender-Korrektheit Einführung, Begriff.- Rechtsgrundlagen.- Presse- Due November 2007 und Rundfunkrecht.- Recht der neuen Medi- Fields of interest en, Internetrecht.- Telekommunikationsrecht.- Computer Science, general 2007. XIII, 293 p. (Communications in Computer and Information Persönlichkeitsrechte.- Medieninhalte, Copyright.- Science, Band 3) Softcover Film- und TV-Recht.- Musikrecht.- Verlagsrecht.- Target groups Medienmärkte und Medienkonvergenz. Schüler, Studierende, Praktiker 62,06 € ISBN 978-3-540-75992-8 Fields of interest Type of publication Media Law; Media Management; Media Design Dictionary

Target groups Due October 2007 Medienwirtschaft, Medienrechtler, Studenten (Medi- enrecht/Medienwirtschaft) Ursprünglich erschienen bei Smart Books Type of publication Handbook 2008. XVIII, 966 S. Softcover

Due December 2007 14,95 € ISBN 978-3-540-72549-7

2008. Etwa 250 S. Geb.

39,95 € ISBN 978-3-540-72221-2 springer.com/booksellers Computer 61

U. Flegel, University of Dortmund, Germany L.d. Floriani, Università di Genova, Italia; M. Spagnuolo, Univer- C.A. Floudas, Princeton University, NJ, USA; P.M. Pardalos, Dept. sità di Genova, Italia (Eds.) of Industrial and Systems Engineering, University of Florida, Gainesville, USA (Eds.) Privacy-Respecting Intrusion Shape Analysis and Structuring Detection Encyclopedia of Optimization

Several techniques have been developed in the liter- With our society's growing dependency on informa- ature for processing different aspects of the geome- The goal of the Encyclopedia of Optimization is to tion technology systems (IT), IT security is crucial. try of shapes, for representing and manipulating a introduce the reader to a complete set of topics that To properly respond to misuse or abusive activity shape at different levels of detail, and for describing a show the spectrum of research, the richness of ideas, in IT systems, one needs to establish the capability shape at a structural level as a concise, part-based, or and the breadth of applications that has come from to detect and understand improper activity. Intru- iconic model. Such techniques are used in many dif- this field. In 2000, the first edition was widely ac- sion Detection Systems observe activity occurring in ferent contexts, such as industrial design, biomedical claimed and received high praise. J.B. Rosen crowned the IT system, record these observations in audit da- applications, entertainment, environmental monitor- it "an indepensible resource" and Dingzhu Du laud- ta, and analyze collected audit data to detect misuse. ing, or cultural heritage. This book covers a variety of ed it as "the standard most important reference in Collecting and processing audit data for misuse de- topics related to preserving and enhancing shape in- this very dynamic research field." Top authors such tection conflicts with expectations and rights of sys- formation at a geometric level, and to effectively cap- as Herbert Hauptman (winner of the Nobel Prize) tem users regarding their privacy. A viable solution turing the structure of a shape by identifying relevant and Leonid Khachiyan (the Ellipsoid theorist) con- is replacing personal data with pseudonyms in audit shape components and their mutual relationships. tributed and the second edition keeps these seminal data. Privacy-Respecting Intrusion Detection intro- entries. The second edition builds on the success of duces technical purpose binding, restricting the link- Features the former edition with more than 150 completely ability of pseudonyms in audit data, to the amount Relevant, up-to-date account of research by major new entries, designed to ensure that the reference required for misuse detection. Also, it limits the re- European research consortium. addresses recent areas where optimization theories covery of original personal data to pseudonyms in- and techniques have advanced. Particularly heavy volved in a detected misuse scenario. This book in- Contents attention resulted in health science and transporta- cludes case studies with constructively validated so- Shape Interrogation - Stefanie Hahmann, Alexan- tion, with entries such as "Algorithms for Genomics," lutions by providing [..] der Belayev, Laurent Buse, Gershon Elber, Bernard "Optimization and Radiotherapy [..] Mourrain, Christian Roessl.- Recent Advances in Features Remeshing of Surfaces - Pierre Alliez, Marco At- Features Includes broad systematic introduction into the tene, Craig Gotsman, Giuliana Ucelli.- Multi-resolu-  • Comprehensive reference work for a grow- problem — from legal framework to developing re- tion Analysis - George-Pierre Bonneau, Gershon El- ing field of crucial importance to researchers in a va- quirements and general models with technical solu- ber, Stefanie Hahmann, Basile Sauvage.- Subdivision riety of subject areas including industrial engi- tions for multilateral security Demonstrates how so- Surfaces and Applications - Chiara Eva Catalano, neering, operations research and mathematics &nb- lutions can be designed and evaluated while rigor- Ioannis Ivrissimtzis, Ahmad Nasri.- Skeletal Struc- sp;• Revised and expanded edition of successful ref- ously adhering to derived requirements   tures - Silvia Biasotti, Dominique Attali, Jean-Daniel erence work published by Kluwer Academic Publish- Boissonnat, Herbert Edelsbrunner, Gershon Elber, ers in 2001  • Enhanced online content, up-to- Contents Michela Mortara, Gabriella Sanniti di Baja, [..] date cross references, and entries keyed to MSC sub- -Foreword by Richard A. Kemmerer, University of ject [..] California, Santa Barbara, USA.- Introduction and Fields of interest Background.- Introduction.- Authorizations.- An Visualization; Computer Graphics; Image Processing Fields of interest Architectural Model for Secure Authorizations.- Tra- and Computer Vision; Geometry Optimization; Algorithms; Mathematical Modeling ditional Security Objectives.- Personal Data Protec- and Industrial Mathematics tion Objectives.- Technical Enforcement of Multilat- Target groups eral Security.- Pseudonyms - A Technical Point of Graduate Students, researchers and professionals in Target groups View.- An Architectural Model for Pseudonymous computer graphics, geometric and solid modeling, Students, scientists, engineers and researchers in Authorizations.- Comparing Architectures.- Audit computational geometry, scientific visualization, and academia, industry and government Data Pseudonymization.- Set-Based Approach.- Re- computer vision quirements, Assumptions and Trust Model.- Model- Type of publication ing Conditions for Technical Purpose Binding.- [..] Type of publication Contributed volume Contributed volume Fields of interest Due July 2008 Systems and Data Security; Computer Communica- Due November 2007 tion Networks; Data Encryption; Information Sys- tems Applications (incl.Internet); Data Structures, 2008. eReference. Cryptology and Information Theory; Computer Sys- 2008. XVI, 296 p. 156 illus. With colour appendix. (Mathematics 2.290,75 € tems Organization and Communication Networks and Visualization) Geb. ISBN 978-0-387-74759-0 85,55 € Target groups ISBN 978-3-540-33264-0 Professionals and graduate-level students

Type of publication Monograph

Due November 2007

2007. Approx. 327 p. 60 illus. (Advances in Information Security, Band 35) Geb.

82,34 € ISBN 978-0-387-34346-4 62 Computer springer.com/booksellers

C.A. Floudas, Princeton University, NJ, USA; P.M. Pardalos, Univer- M. Foegen, wibas IT Maturity Services GmbH, Darmstadt; M. V. Fomichov, K.E.Tsiolkovsky Russian State Technological Univer- sity of Florida, Gainesville, USA (Eds.) Solbach, wibas IT Maturity Services GmbH, Darmstadt; C. Raak, sity wibas IT Maturity Services GmbH, Darmstadt Encyclopedia of Optimization Semantics-Oriented Natural Der Weg zur professionellen IT Second Edition Language Processing Eine praktische Anleitung für das Management von Veränderungen mit CMMI, ITIL oder SPICE Mathematical Models and Algorithms

The goal of the Encyclopedia of Optimization is to introduce the reader to a complete set of topics that This book examines key issues in designing seman- show the spectrum of research, the richness of ideas, Es besteht Handlungsbedarf: Obwohl wir wissen, was tics-oriented natural language processing systems. and the breadth of applications that has come from ein professionelles IT-Projekt auszeichnet, scheitern A broad conceptual framework for describing struc- this field. In 2000, the first edition was widely ac- etwa 30% aller Projekte und weitere 50% haben Zeit-, tured meanings of NL-texts is obtained by defining a claimed and received high praise. J.B. Rosen crowned Kosten-, Funktionalitäts- oder Qualitätsprobleme. new class of formal languages called standard knowl- it "an indepensible resource" and Dingzhu Du laud- Dieses Buch hilft Ihnen zu handeln: Es ist ein Leit- edge languages (SK-languages) using a system the- ed it as "the standard most important reference in faden für eine erfolgreiche Veränderung, die Ihr oretical approach. Readers will gain knowledge of this very dynamic research field." Top authors such Unternehmen am Markt und Sie beruflich weit- these languages and will learn a way of building se- as Herbert Hauptman (winner of the Nobel Prize) erbringt. Das Buch gibt eine kurze und praxisori- mantic representations using them. With extensive and Leonid Khachiyan (the Ellipsoid theorist) con- entierte Übersicht über die Maßnahmen, die für use of examples and illustrations to clarify complex tributed and the second edition keeps these seminal eine erfolgreiche Veränderung von Arbeitsweisen material and demonstrate practical applications, gen- entries. The second edition builds on the success of im IT-Projektmanagement, d.h. für eine erfolgre- erous historical and bibliographical notes, end-of- the former edition with more than 150 completely iche Prozessverbesserung notwendig sind. Beson- chapter exercises, and glossaries, this book will serve new entries, designed to ensure that the reference deres Augenmerk wird auf die kritischen Erfol- as an ideal graduate-level textbook, as well as a good addresses recent areas where optimization theories gsfaktoren wie Führung durch das Management, reference for researchers and practitioners who deal and techniques have advanced. Particularly heavy Organisationsentwicklung, konkrete Umsetzung with the various problems involving semantics of attention resulted in health science and transporta- in der täglichen Arbeit sowie die Institutional- natural language texts. tion, with entries such as "Algorithms for Genomics," isierung der Veränderungen gelegt. Der Weg zur professionellen IT wird aufgezeigt anhand einer "Optimization and Radiotherapy [..] Features ausführlichen Fallstudie und der beigelegten "Land- Substantially formal treatment of issues for design- Features karte der Veränderung". ers of natural language processing systems Presents  • Comprehensive reference work for a grow- an in-depth treatment of NL semantics and a math- ing field of crucial importance to researchers in a va- Features ematical model of a linguistics database Extensive riety of subject areas including industrial engi- Sehr praxisorientiert: Step-by-Step-Anleitung Inklu- use of examples and illustrations to clarify complex neering, operations research and mathematics &nb- sive „Landkarte der Veränderung“ in DIN A1 material and demonstrate practical applications End sp;• Revised and expanded edition of successful ref- Contents of chapter exercises, historical and bibliographical erence work published by Kluwer Academic Publish- Inhalt und Aufbau dieses Buchs.- Sie sind un- notes, and glossaries enrich the text ers in 2001  • Enhanced online content, up-to- zufrieden - So geht es nicht weiter.- Sie haben date cross references, and entries keyed to MSC sub- kein klares Bild, was auf Sie zukommt.- Nie- Contents ject [..] mand sieht einen wirklichen Grund für eine Preface.- Mathematical Models for Designing Natu- ral Language Processing Systems as a New Field of Fields of interest Veränderung.- Niemand will mitmachen - Sie sind Studies for Systems Science.- A Mathematical Model Optimization; Operations Research, Mathematical alleine.- Ihnen ist unklar, was und wo Sie anpack- for Describing a System of Primary Units of Concep- Programming; Algorithms; Calculus of Variations en müssen.- Das Management hat keine Zeit, die tual Level Used by Linguistic Processors.- A Math- and Optimal Control; Optimization; Mathematical Veränderungen zu führen.- Alle glauben, mit einem ematical Model for Describing Structured Mean- Modeling and Industrial Mathematics einem neuen Projekthandbuch wird alles gut.- Die Prozessverbesserung soll nebenher gemacht wer- ings of Natural Language Sentences and Discours- Target groups den.- Die Projekte und der Betrieb dürfen keine es.- A Study of the Expressive Possibilities of SK-lan- Students, scientists, engineers and researchers in Zusatzaufwände haben.- Alle möchten wieder zur al- guages.- The Analysis of the Possibilities of Using academia, industry and government ten Tagesordnung zurück.- [..] SK-languages for Solving Some Important Problems of Computer Science.- A Mathematical Model of a Type of publication Fields of interest Linguistic Database.- A New Method of Fulfilling [..] Encyclop(a)edia Information Systems; Management; Organiza- tion/Planning; Management of Computing and In- Fields of interest formation Systems; Software Engineering Systems Theory, Control; Language Translation and Due July 2008 Linguistics; Algorithms; Discrete Mathematics in Target groups Computer Science; Information Systems Applica- 2008. Approx. 4000 p. Geb. Entwickler, Projektleiter, Manager und tions (incl.Internet) Qualitätsverantwortliche in Unternehmen 2.059,75 € Target groups ISBN 978-0-387-74758-3 Type of publication Graduate students, researchers and practitioners Professional book Type of publication Graduate/advanced undergraduate textbook Due October 2007

Due June 2008 2008. XX, 212 S., 59 Abb. Mit Poster. Geb.

39,95 € 2008. Approx. 360 pgs. (IFSR International Series on Systems Sci- ISBN 978-3-540-72471-1 ence and Engineering, Band 26) Geb. ISBN 978-0-387-72924-4 springer.com/booksellers Computer 63

P. Forer, University of Auckland, New Zealand; A. Yeh, University H.D. Foster, Mentor Graphics, Plano, TX, USA; A.C. Krolnik, LSI H.J. Friedrich, Stuttgart of Hong Kong, Hong Kong; J. He, University of Hong Kong, Hong Logic Corporation, Allen, TX, USA Kong (Eds.) Tontechnik für Mediengestalter Creating Assertion-Based IP Advances in GIS Research Töne hören - Technik verstehen - Medien gestalten

Assertion-based IP is much more than a compre- Spatial and geographic data and the information sys- hensive set of related assertions. It is a full-fledged Tontechnik für Mediengestalter beschreibt nicht nur tems which handle them are a major IT growth area reusable and configurable transaction-level verifica- die Grundlagen der Tontechnik, sondern vermit- for the 21st century. This book assembles the work tion component, which is used to detect both inter- telt gerade auch das für Mediengestalter wichtige of a number of leading researchers concerned with esting and incorrect behaviors. Upon detecting in- Zusatzwissen für Gestaltung und Produktionsorgan- developing new models for describing, analysing and teresting or incorrect behavior, the assertion-based isation. Die Grundlagen werden anschaulich erklärt, visualising such data. The authors address themes IP alerts other verification components within a so dass auch Menschen ohne große mathematis- in data modelling, data error management, remote simulation environment, which are responsible for che Vorkenntnisse die physikalischen Phänomene sensing techniques, neural networks, agent-based taking appropriate action. The focus of this book wie Interferenzen oder Raumakustik begreifen systems, generalisation, interactive cartography and is to bring the assertion discussion up to a higher können. Das Buch verzichtet auf Patentlösungen networked decision support systems.The collection level and introduce a process for creating effective, und setzt auf das Verständnis der akustischen und provides an exciting and authoritative selection of reusable, assertion-based IP, which easily integrates technischen Zusammenhänge. Gerade für Auszu- work occuring at the forefront of GIS and spatial da- with the user’s existing verification environment, in bildende und Berufseinsteiger ist die Beschrei- ta handling. other words the testbench infrastructure. The guid- bung der Arbeitsabläufe ein wichtiges Hilfsmit- ing principles promoted in this book when creating tel, um im Produktionsalltag von Anfang an zu Features an assertion-based IP monitor are: modularity—as- bestehen. Der Mediengestalter arbeitet mit einer The book provides a cross section of cutting-edge re- sertion-based IP should have a clear separation be- Vielzahl von unterschiedlichen Menschen zusam- search beeing pursued by researchers in geograph- tween detection and action clarity—assertion-based men, deren Bedürfnisse er für seine Arbeit kennen ic information science and spatial data handling. As IP should be written initially focusing on capturing und berücksichtigen muss. Das Buch sensibilisiert such it gives insights into developments of new tech- intent (versus optimizations) A [..] deshalb auch für das Umfeld einer Produktion in niques in data management, analysis and visualisa- verschiedenen typischen Arbeitsfeldern. tion. Features Demonstrates a systematic process for formal speci- Features Contents fication and formal testplanning Demonstrates effec- Praxisrelevante Erläuterung der Audiotech- Triangles and Computational Geometry - Cluster- tive use of assertions languages beyond the tradition- niken Darstellung des gestalterischen und organ- ing/Grouping - Learning and Reasoning - Geometric al language construct discussions No existing books isatorischen Worflows Modeling - Data Quality, Metadata - Multiscale Da- that talk about either formal testplanning or guide- Fields of interest ta - Constraints-based approaches - Environmental lines for creating assertion-based verification IP Data Models - Distributed Databases/Network So- Media Design; Document Preparation and Text Pro- lutions - GIS: Systems and Science - Generalization Contents cessing; Multimedia Information Systems; Informa- and Compression - Interoperability - Time - Appli- Foreword.- Preface.- Introduction.- Definitions and tion Systems Applications (incl.Internet) cations - Exploratory Data Visualization - Compu- Terminology.- The Process.- Bus-Based Design Ex- Target groups tational Geometry (Overlay) - Query and Interface ample.- Interfaces.- Arbiters.- Controllers.- Datapath Mediengestalter Bild/Ton, SAE-Absolventen, Musik- - Triangulated Irregular Networks and Contours - Units. Generalization - Geometric Models - Three-Dimen- er mit eigenem Studio, Auszubildende zum Medi- sional Modeling. Fields of interest engestalter, SAE-Studenten, Toningenieure Circuits and Systems; Computer-Aided Engineering Type of publication Fields of interest (CAD, CAE) and Design; Electronic and Computer Professional book Geoinformation/Cartography; Environmental Com- Engineering puting/Environmental Modelling; Systems and In- formation Theory in Engineering; Geography; Land- Target groups Due January 2008 scape/Regional and Municipal Planning; Monitor- Design and verification engineers; SoC/ASIC design ing/Environmental Analysis/Environmental Ecotox- project managers 2008. Etwa 330 S. (X.media.press) Geb. icology Type of publication 39,95 € Target groups Professional book ISBN 978-3-540-71869-7 scientists/researchers in many disciplines (e.g. geog- raphy, geoinformatics, surveying, urban planning, Due December 2007 environmental sciences....); libraries; institutes

Type of publication 2008. Approx. 200 p. (Series on Integrated Circuits and Systems) Proceedings Geb. 106,95 € Due May 2008 ISBN 978-0-387-36641-8

2008. Approx. 800 p. 300 illus. Geb.

149,75 € ISBN 978-3-540-43456-6 64 Computer springer.com/booksellers

J. Friesen, Winnipeg, Canada T.L. Friesz, Pennsylvania State University, University Park, PA, USA B. Furht, Florida Atlantic University, Boca Raton, FL, USA (Ed.)

Beginning Java™ SE 6 Platform Dynamic Optimization and Encyclopedia of Multimedia

From Novice to Professional Differential Games

Encyclopedia of Multimedia, Second Edition provides easily accessible coverage of important con- This core book, Beginning Java SE 6 Platform, intro- Dynamic Optimization and Differential Games has cepts, issues and technology trends in the field of duces Java programmers who are new to the latest been written to address the increasing number of multimedia technologies, systems, techniques, and Java SE 6 platform. It does not waste their time re- Operations Research and Management Science prob- applications.  Hundreds of leading researchers hashing basic Java knowledge. Instead, this book will lems (that is, applications) that involve the explic- and world experts have contributed to this compre- give them what they need to know regarding the new it consideration of time and of gaming among mul- hensive collection of more than 250 entries. Over and enhanced features in Java SE 6. tiple agents. It is a book that will be used both as a 1300 heavily-illustrated pages (including 120 new textbook and as a reference and guide to engineers, and long entries) present concise overviews Features operation researchers, applied mathematicians and of all aspects of software, systems, web tools & First among the few on Java SE 6 platform Re- social scientists whose work involves the theoreti- hardware that enable video, audio & develop- al-world examples driven book written by Jeff cal aspects of dynamic optimization and differential ing media to be shared & delivered electronical- Friesen, notable industry Java expert and author Ex- games. Included throughout the text are detailed ex- ly. Borko Furht, Editor-in-Chief, in col- ercises and quiz at the end of each chapter – may planations of several original dynamic and game-the- laboration with the Editorial Board, have sur- make for a good textbook oretic mathematical models which are of particular veyed and divided the field of multimedia into spe- relevance in today’s technologically-driven-global cific topics that collectively encompass foundations, Contents economy: revenue management, supply chain man- technologies, applications, and emerging elements Java SE 6 Overview.- Core Libraries.- GUI Toolkits: agement, electric power systems, urban freight sys- behind web technologies, wireless information trans- AWT.- GUI Toolkits: Swing.- International- tems, dynamic congestion pricing, dynamic traffic fer, and audio-visual formatting and storage.  ization.- JDBC.- Monitoring and Management.- Net- assignment, electronic commerce and the Internet. Borko Furht is also the Founder and [..] working.- Scripting.- Security.- Common Annota- In addition, there will be some more traditional ap- tions (Web Services).- New and Improved Tools.- plications with useful pedagogical content included Performance Enhancements.-Quiz Answers. Features in Chapter 1. -120+ new & long entries -10 new Board members, plus new contributors -2 volume set Fields of interest Features   Programming Techniques Will be of interest to students, researchers, and prac- titioners of OR/MS, Industrial Engineering, Sup- Target groups Fields of interest ply Chain Management, Applied Economics, Trans- Multimedia Information Systems; Database Man- Beginner to Intermediate Java programmers/devel- portation, and Economic Geography. These fields opers. agement; Computer Imaging, Vision, Pattern Recog- are very actively working on the new, high-interest nition and Graphics; Information Storage and Re- problems that require the strengthening of modeling Type of publication trieval; Computer Communication Networks; Cod- skills to solve dynamic optimization problems and Professional book ing and Information Theory dynamic games While the mathematics of continu- ous time games can [..] Type of publication Due November 2007 Encyclop(a)edia Contents Preface.- Introduction.- Nonlinear programming Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Due August 2008 Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest and discrete time optimal control.- The classical Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, calculus of variations and optimal control in con- Oman, Qatar, Palestine: Jordan Book Center tinuous time.- Infinite dimensional mathemati- 2008. Approx. 1010 p. Geb. cal programming.- Static Cournot-Nash-Bertrand 2007. Approx. 500p. Softcover games and finite dimensional variational inequali- 405,53 € ties.- Cournot-Nash-Bertrand differential games.- ISBN 978-0-387-74724-8 ISBN 978-1-59059-830-6 Stochastic differential variational inequalities and stochastic dynamic games.- Dynamic supply, pro- duction and distribution planning.- Dynamic traffic assignment.- Dynamic competitive revenue manage- ment in competition.- Index.

Fields of interest Operation Research/Decision Theory; Optimization; Game Theory, Economics, Social and Behav. Sci- ences; Mathematical Modeling and Industrial Math- ematics; Production/Logistics

Target groups Students, practitioners, researchers

Type of publication Monograph

Due November 2007

2007. Approx. 480 p. (International Series in Operations Research & Management Science) Geb.

79,07 € ISBN 978-0-387-72777-6 springer.com/booksellers Computer 65

G. Fusai, Università del Piemonte Orientale, Novara, Italy; A. Ron- 74,85 € K.-P. Fähnrich, Universität Leipzig; C.v. Husen, Fraunhofer-Institut coroni, ESSEC, Cergy Pontoise, France ISBN 978-3-540-22348-1 für Arbeitswirtschaft und Organisation IAO, Stuttgart (Eds.) Implementing Models in Entwicklung IT-basierter Quantitative Finance: Methods and Dienstleistungen

Cases Co-Design von Software und Services mit ServCASE

This book puts numerical methods into action for Egal ob es um multimediale Lernangebote per the purpose of solving concrete problems arising Internet, moderne Logistikdienstleistungen in quantitative finance. Part one develops a com- oder komplexe Versicherungsangebote geht: prehensive toolkit including Monte Carlo simula- Die passende Software wird für Dienstleister tion, numerical schemes for partial differential equa- zunehmend zum Erfolgsfaktor. Dies gilt sowohl tions, stochastic optimization in discrete time, copu- für Unterstützungssysteme im Back-Office-Bere- la functions, transform-based methods and quadra- ich als auch für die Interaktion mit dem Kunden ture techniques. The content originates from class im Front-Office-Bereich. Wachsender Zeit- und notes written for courses on numerical methods for Kostendruck sowie hohe Qualitätsanforderungen finance and exotic derivative pricing held by the au- unterstreichen zusätzlich die Notwendigkeit ein- thors at Bocconi University since the year 2000. Part er integrierten Entwicklung von Software und Ser- two proposes eighteen self-contained cases cover- vices. Dennoch fehlten bisher in der Dienstleis- ing model simulation, derivative valuation, dynam- tungswirtschaft exemplarische Vorgehensweisen, ic hedging, portfolio selection, risk management, sta- Methoden und Werkzeuge. Diese Problematik tistical estimation and model calibration. It encom- aufgreifend präsentieren die Autoren das im passes a wide variety of problems arising in markets Forschungsprojekt ServCASE entstandene Referenz- for equity, interest rates, credit risk, energy and exot- modell für das Co-Design von Software und Services. ic derivatives. Each case introduces a problem, devel- Insbesondere umfasst das Referenzmodell Vorge- ops a detailed solution and illustrates empirical re- hensweisen, Methoden und die Beschreibung einer sults. Proposed algorithms are implemented [..] werkzeugunterstützten Entwicklungsplattform. So vermittelt das Buch neben den theoretischen Grund- Features lagen die praktische Anwendung der Methode. Fills a gap in the current published literature by de- livering a case-study collection together with a self- Contents contained course on major numerical methods de- Einführung.- Bedarfserhebung.- veloped and used by the finance industry Learn-  Herausforderungen und Lösungsansätze in ing-by-doing approach: all steps detailed in a self- der Praxis.-Konzepte.- Umsetzung und Werkzeuge contained way Covers a range of numerical meth- für das Co-Design.- Anwenderfallstudien.- ods Blends theoretical presentation and practical im- Ausblick.  plementations Originality in the choice of cases Pro- vides [..] Fields of interest Information Systems; Management; Software Engi- Contents neering; Management of Computing and Informa- Contents: Part I: Methods. Finite Difference Meth- tion Systems ods; Numerical Solution of Linear Systems; Basic Monte Carlo; Advanced Monte Carlo; Quadrature Target groups Methods; Laplace Transforms; Structuring Depen- Unternehmenspraktiker in Dienstleistungsentwick- dence using Copula Functions; Dynamic Program- lung und im Software Engineering; Wirtschaftswis- ming - Part II: Cases. Portfolio Selection: "Optimiz- senschaftler, Informatiker ing an Error"; Alpha, Beta, and Beyond; Automatic Trading: Winning or Losing in a kBit; Estimating the Type of publication Risk Neutral Density; An "American" Monte Car- Professional book lo; Fixing Volatile Volatility; An Average Problem; Quasi Monte Carlo; Lookback Options: A Discrete Due December 2007 Problem; Electrifying the Price of Power; A Sparkling [..] 2008. XII, 338 S. 153 Abb. Geb.

Fields of interest 64,95 € Quantitative Finance; Computational Mathematics ISBN 978-3-7908-1943-4 and Numerical Analysis; Partial Differential Equa- tions; Numerical Analysis

Target groups MSs students, Ph.D. candidates, teachers and re- searchers in applied finance, traders and model de- velopers at financial, insurance and industrial insti- tutions

Type of publication Monograph

Due December 2007

2007. XIX, 686 p. 145 illus., 4 in color. Also available online. (Springer Finance) Geb. 66 Computer springer.com/booksellers

M. Gagnaire, ENST, Paris, France; J. Kuri, France Telecom Research J. Gama, University of Porto, Portugal; M.M. Gaber, University of D. Gardner-Bonneau, Principal, Bonneau and Associates, Portage, and Development, San Francisco, CA, USA; M. Koubaa, ENIT, Tu- Sydney, Australia (Eds.) OR, USA; H.E. Blanchard, AT&T Shannon Labs, Middletown, NJ, nis, Tunisia USA (Eds.) Learning from Data Streams Network Planning and Traffic Human Factors and Voice Engineering Processing Techniques in Sensor Networks Interactive Systems

Translucent Optical WDM Networks Sensor networks consist of distributed autonomous devices that cooperatively monitor an environment. Human Factors and Voice Interactive Systems, Sec- ond Edition provides in-depth information on cur- This book focuses on two types of approaches to Sensors are equipped with capacities to store infor- rent topics of major interest to speech application optical network design. One approach is network mation in memory, process this information and developers,  and updates material from chap- planning for the routing and wavelength alloca- communicate with their neighbors. Processing data ters that appeared in the previous edition. The first tion (RWA) problem within the context of static or streams generated from wireless sensor networks has nine chapters of the book cover issues related to in- permanent traffic demands. The other approach is raised new research challenges over the last few years teractive voice response systems, including both mo- traffic engineering which also addresses the RWA due to the huge numbers of data streams to be man- bile and multimodal device user interfaces as well as problem but it approaches it within the context of aged continuously and at a very high rate. The book classic automated telephone systems. The remain- random or transient traffic demands. The research provides the reader with a comprehensive overview ing chapters cover special topics including synthet- method used for these two approaches involves of stream data processing, including famous proto- ic speech and the design of speech applications to Scheduled Lightpath Demands (SLD). SLD is a dy- type implementations like the Nile system and the enhance accessibility to people with disabilities and namic but deterministic traffic demand that typical- TinyOS operating system. The set of chapters covers the ever-growing population of older adults. Human ly corresponds to a Virtual Optical Private Network the state-of-art in data stream mining approaches us- Factors and Voice Interactive Systems, Second Edi- (OPVN).  The format of this book is based on ing clustering, predictive learning, and tensor analy- tion is a collection of applied research and scholar- optimization techniques and a great majority of re- sis techniques, and applying them to applications in ly synthesis contributions by seasoned professionals search is in the context of industrial contracts. This security, the natural sciences, and education. This re- in the field that highlight continuing efforts to study book analyzes the impact of time-space correlation search monograph delivers to researchers and grad- human interaction with speech technologies. between traffic demands (SLDs) on optical network uate students the state of the art in data stream pro- cessing in sensor networks. The huge [..] design. It also discusses the impact of physical layer Features impairments on optical network design. Features Includes in-depth information on current topics of major interest to speech application developers such Features Shows how to apply machine learning techniques to as use of speech technologies in automobiles, speech Analyzes the impact of time-space correlation be- stream data processing Details data stream mining in mobile phones among others tween traffic demands (SLDs) on optical network de- approaches using clustering, predictive learning, and tensor analysis techniques Presents applications in sign. Discusses the impact of physical layer impair- Contents security, the natural sciences, and education Includes ments on optical network design. Approaches net- IVR Usability Engineering Using Guidelines and descriptions of famous prototype implementations work planning for the routing and wavelength allo- Analyses of End-to-End Calls.- User Interface De- like the Nile system and the TinyOS operating sys- cation (RWA) problem within the context of stat- sign for Natural Language Systems: From Research tem ic or permanent traffic demands. Addresses traffic to Reality.- Linguistics and Psycholinguistics in IVR engineering for the RWA problem within the Contents Design.- Designing the Voice User Interface for Au- context of random or [..] 1 Introduction (Gama, Gaber).- Part I: Overview: 2 tomated Directory Assistance.- Spoken Language In- terfaces for Embedded Applications.- Speech Gener- Contents Sensor Networks (Barros) - 3 Data Stream Process- ation in Mobile Phones.- Voice Messaging User In- WDM Optical Networks Characteristics.- Optical ing (Gama, Rodrigues) - 4 Data Stream Processing terface.- Silence Locations and Durations in Dialog Enabling Technologies for WDM Systems.- WDM in Sensor Networks (Gaber).- Part II: Data Stream Management.- Using Natural Dialogs as the Basis for Optical Network Design: A First Approach.- Net- Management Techniques in Sensor Networks: 5 Da- Speech Interface Design.- Telematics: Artificial Pas- work Planning.- Network Engineering.- Traffic ta Stream Management Systems and Architectures senger and Beyond.- A Language to Write [..] Grooming.- Traffic Engineering.- Lightpath Rerout- (Hammad, Ghanem, Aref, Elmagarmid, Mokbel) - 6 Querying of Sensor Data (Trigoni, Guitton, Sko- ing for Traffic Engineering.- Impact of Physical Lay- Fields of interest rdylis) - 7 Aggregation and Summarization in Sensor er Impairments on Optical Network Design Signal,Image and Speech Processing; User Interfaces Networks (Shrivastava, Buragohain) - 8 Sensory Data and Human Computer Interaction Fields of interest Monitoring (Cardell-Oliver).- Part III: Mining Sen- Communications Engineering, Networks; Computer sor Network Data Streams: 9 Clustering Techniques Target groups Communication Networks; Microwaves, RF and Op- in [..] Speech technology application developers, user in- tical Engineering terface designers, human factors specialists doing re- Fields of interest search in the speech technology field Target groups Information Storage and Retrieval; Computer Com- Research engineers and graduate students in optical munication Networks; Signal,Image and Speech Pro- Type of publication and telecommunications networks cessing; Communications Engineering, Networks; Contributed volume Artificial Intelligence (incl. Robotics) Type of publication Monograph Target groups Due December 2007 Researchers and libraries Due July 2008 Originally published as Volume 498 in the series: The Kluwer In- Type of publication ternational Series in Engineering and Computer Science Monograph 2008. Approx. 400 p. (Optical Networks) Geb. 2008. Approx. 350 p. (Signals and Communication Technology) Due October 2007 106,30 € Geb. ISBN 978-0-387-76563-1 74,85 € 2007. X, 244p. 73 illus. Also available online Geb. ISBN 978-0-387-25482-1 69,50 € ISBN 978-3-540-73678-3 springer.com/booksellers Computer 67

M. Garofalakis, Bell Labs, Murray Hill, NJ, USA; J. Gehrke, Cornell A. Gelbukh, Instituto Politécnico Nacional, Vallejo, Mexico; À.F. University, Ithaca, NY, USA; R. Rastogi, Bell Labs, Murray Hill, NJ, Kuri Morales, Tizapán San Angel, Mexico (Eds.) USA (Eds.) MICAI 2007: Advances in Artificial Data Stream Management Intelligence Processing High-Speed Data Streams 6th Mexican International Conference on Artificial Intelli- gence, Aguascalientes, Mexico, November 4-10, 2007, Pro- ceedings Traditional Database Management Systems are built on the concept of persistent data sets, that are stored reliably in stable storage and queried/updated sever- This book constitutes the refereed proceedings of the al times throughout their lifetime. For several emerg- 6th Mexican International Conference on Artificial ing application domains, however, data arrives and Intelligence, MICAI 2007, held in Aguascalientes, needs to be processed on a continuous (24x7) basis, Mexico, in November 2007. The 116 revised full pa- and they need data-processing algorithms and sys- pers presented were carefully reviewed and select- tems that work over continuous data streams. This ed from numerous submissions for inclusion in the book is the first in-depth treatment of this important book. The papers are organized in topical sections on topic, covering basic data stream techniques, data computational intelligence, neural networks, knowl- stream synopses, mining data streams, advanced data edge representation and reasoning, agents and mul- stream computations, and systems and architectures tiagent systems, machine learning and data mining, for data stream management systems. image processing, computer vision, and robotics, natural language processing, speech processing and Contents human-computer interfaces, planning and schedul- Part I: Introduction.- Part II: Computation of Basic ing, bioinformatics and medical applications, indus- Stream Synopses.- Part III: Mining Data Streams.- trial applications, and intelligent tutoring systems. Part IV: Advanced Topics.- Part V: Systems and Ar- chitectures.- Part VI: Applications. Fields of interest Artificial Intelligence (incl. Robotics); Computation Fields of interest by Abstract Devices; Mathematical Logic and Formal Database Management; Information Storage and Re- Languages; Image Processing and Computer Vision trieval; Computer Applications; Signal,Image and Speech Processing Target groups Researchers and professionals Target groups Scientists and libraries Type of publication Proceedings Type of publication Graduate/advanced undergraduate textbook Due October 2007 Due January 2008 2007. XXIV, 1234 p. (Lecture Notes in Computer Science, Band 4827) Softcover 2008. Approx. 400 p. (Data-Centric Systems and Applications) Geb. 121,98 € ISBN 978-3-540-76630-8 58,80 € ISBN 978-3-540-28607-3 springer.com/booksellers Computer 68

C. Georgiou, University of Cyprus, Cyprus; A.A. Shvartsman, MIT, F. Geraets, Deutsche Bahn AG, Berlin, Germany; L. Kroon, NS M. Gertz, University of California at Davis, CA, USA; S. Jajodia, Cambridge, MA, USA Reizigers, Utrecht, The Netherlands; A. Schoebel, University of George Mason University, Fairfax, VA, USA (Eds.) Göttingen, Germany; D. Wagner, University of Karlsruhe, Ger- many; C. Zaroliagiis, University of Patras, Germany (Eds.) Do-All Computing in Distributed Handbook of Database Security

Systems Algorithmic Methods for Railway Applications and Trends Cooperation in the Presence of Adversity Optimization

International Dagstuhl Workshop, Dagsthl Castle, Germany, The Handbook of Database Security: Applications June 20-25, 2004, 4thInternational Workshop, ATMOS 2004, & Trends, an edited volume by renowned re- Do-All Computing for Distributed Systems: Coop- Bergen, Norway, September 16-17, 2004, Revised Selected searchers within data security, provides an up-to- eration in the Presence of Adversity studies algorith- Papers date overview of data security models, techniques, mic issues associated with cooperative execution of and architectures in a variety of data management multiple independent tasks by distributed comput- applications and settings. This edited volume repre- ing agents including partitionable networks. Recent This state-of-the-art survey constitutes papers that sents the most comprehensive work on numerous results have shed light on the understanding of how were selected after an open call that followed the In- data security aspects published in the last ten years. adversity affects efficiency, by presenting failure-sen- ternational Dagstuhl-Seminar on Algorithmic Meth- Handbook of Database Security: Applications and sitive upper and lower bounds for Do-All in sever- ods for Railway Optimization, held in Dagstuhl Cas- Trends places a particular focus on data-centric secu- al models for computation. The ability to cooper- tle, Germany, in June 2004. The second part of the rity aspects that reach beyond traditional and well- atively perform a collection of tasks is key to solv- volume constitutes the refereed proceedings of the studied data security aspects in databases. It also cov- ing a broad array of computation problems rang- 4th International Workshop on Algorithmic Meth- ers security in advanced database systems, data pri- ing from distributed search to distributed simula- ods and Models for Optimization of Railways, AT- vacy and trust management, and data outsourcing, tion and multi-agent collaboration which is intro- MOS 2004, held in Bergen, Norway, in September and outlines directions for future research in these duced within this book. Do-All Computing for Dis- 2004 in the context of the combined conference AL- fields. Handbook of Database Security: Applications tributed Systems: Cooperation in the Presence of GO 2004. The volume covers algorithmic methods and Trends is designed for a professional audience Adversity is structured to meet the needs of a for analyzing and solving problems arising in rail- composed of practitioners and researchers in indus- professional audience composed of researchers and way optimization with special focus on the interplay try and academia as a reference book. This volume is practitioners in industry. This volume is also suitable between railway and other public transport systems. also suitable for advanced-level students in [..] for graduate-level students in computer science. Beside algorithmics and mathematical optimization, the relevance of formal models and the influence of Features Features applicational aspects for problem modeling are con- Most comprehensive work on data security aspects Most significant algorithmic solution developed and sidered as well. The papers also address experimen- published in the last 10 years Includes SQL stan- available today for do-all computing for distributed tal studies and or useful prototype implementations. dards and security in commercial and open-source systems (including partitionable networks) The first The 17 revised full papers presented were carefully database management systems Outlines future re- monograph that deals with do-all computing for dis- reviewed [..] search direction in the field   tributed systems   Fields of interest Contents Contents Algorithm Analysis and Problem Complexity; Data Preface.- List of Contributors.- Recent Advances in List of Figures.- List of Symbols.- Foreword by Structures; Discrete Mathematics in Computer Sci- Access Control.- Access Control Models for XML.- Michel Raynal.- Authors’ Preface.- Introduction.- ence; Artificial Intelligence (incl. Robotics); Comput- Access Control Policy Languages in XML.- Database Distributed Cooperation Problems: Models and Def- er Graphics; Numeric Computing Issues in Trust Management and Trust Negotia- initions.- Synchronous Do-All with Crashes: Using tion.- Index Structures for Outsourced Databases.- Perfect: Knowledge and Reliable Multicast.- Syn- Target groups Towards Secure Data Outsourcing.- Managing and chronous Do-All with Crashes and Point-to-Point Researchers and professionals Querying Encrypted Data.- Security in Data Ware- Messaging.- Synchronous Do-All with Crashes and houses and OLAP Systems.- Security for Workflow Restarts.- Synchronous Do-All with Byzantine Fail- Type of publication Systems.- Secure Semantic Web Services.- Geospa- ures.- Asynchrony and Delay-Sensitive Bounds.- Proceedings tial Database Security.- Security Re-engineering for Analysis of Omni-Do in Asynchronous Partition- Databases: Concepts and Techniques.- Database Wa- able Networks.- Competitive Analysis of Omni-Do Due October 2007 termarking for Copyright Protection.- Database [..] in Partitionable Networks.- Cooperation in the Ab- sence of [..] 2007. XVI, 321 p. (Lecture Notes in Computer Science, Band 4359) Fields of interest Systems and Data Security; Database Management; Fields of interest Softcover Data Encryption; Information Storage and Retrieval; Computer Communication Networks; Operating 49,22 € Computer Communication Networks; Data Struc- Systems; Theory of Computation; Algorithm Anal- ISBN 978-3-540-74245-6 tures, Cryptology and Information Theory ysis and Problem Complexity; Computer Systems Organization and Communication Networks; In- Target groups put/Output and Data Communications Professional audience

Target groups Type of publication University and industry researchers and graduate Contributed volume students in Computer Science

Type of publication Due December 2007 Monograph 2008. Approx. 579 p. Geb. Due December 2007 147,50 € ISBN 978-0-387-48532-4 2008. Approx. 243 pp. Geb.

106,30 € ISBN 978-0-387-30918-7 springer.com/booksellers Computer 69

S. Ghosh, University of Texas, Tyler, TX USA F. Giannotti, ISTI-CNR, Pisa, Italia; D. Pedreschi, Università di Pisa, P. Gluchowski, Technische Universität Chemnitz; R. Gabriel, Italia (Eds.) Universität Bochum; C. Dittmar, Steria-Mummert Consulting AG, Düsseldorf Innovative Network Analysis and Mobility, Data Mining and Privacy Design Management Support Systeme und Geographic Knowledge Discovery A Modeling and Simulation Approach Business Intelligence

Computergestützte Informationssysteme für Fach- und The technologies of mobile communications and Führungskräfte   Innovative Network Analysis and Design ubiquitous computing pervade our society, and wire- presents an accessible, thorough examination of less networks sense the movement of people and ve- network design based on modeling and simula- hicles, generating large volumes of mobility data. Seit mehr als dreissig Jahren werden Anstrengun- tion, rather than the traditional OSI/ISO layered This is a scenario of great opportunities and risks: on gen unternommen, um eine bessere Unterstützung paradigm.  Part I focuses on the ele- one side, mining this data can produce useful knowl- betrieblicher Fach- und Führungskräfte bei der ments that comprise networking, their properties, edge, supporting sustainable mobility and intelligent Bewältigung ihrer dispositiven Arbeiten mit and the underlying control and coordination algo- transportation systems; on the other side, individual computergestützten Informationssystemen zu er- rithms that govern how the elements interact with privacy is at risk, as the mobility data contain sensi- reichen. Das Buch greift die unterschiedlichen, each other to define the nature and overall behavior tive personal information. A new multidisciplinary in der betrieblichen Praxis bewährten System- of the network.  Part II describes and research area is emerging at this crossroads of mobil- und Konzeptkategorien auf und ordnet diese his- employs behavior modeling and asynchronous dis- ity, data mining, and privacy. This book assesses this torisch, funktional und architektonisch ein. Im tributed simulation as a scientific approach.  research frontier from a computer science perspec- Vordergrund stehen dabei die aktuellen tech- This approach permits any design concept under tive, investigating the various scientific and techno- nologischen Strömungen im Business Intelli- consideration to be studied, experimented, and ana- logical issues, open problems, and roadmap. The edi- gence-Umfeld, welche sich in Data Warehouse-Ar- lyzed scientifically and later incorporated in- tors manage a research project called GeoPKDD, Ge- chitekturkonzepten, On-Line Analytical Process- to a prototype network design. Professionals, policy ographic Privacy-Aware Knowledge Discovery and ing-Lösungen und Data Mining-Systemen man- makers, and advanced students in network design, Delivery, funded by the EU Commission and involv- ifestieren. Daneben werden aufsetzende betrieb- information systems, computer and communications ing 40 researchers from 7 countries, and this book swirtschaftliche Anwendungssystemlösungen einge- engineering, networking, and consulting will find tightly integrates and relates their [..] hend behandelt, beispielsweise für die Themenfelder the book an essential and practical resource. It is also Balanced Scorecard, Analytisches Customer Rela- highly suitable for short [..] Contents tionship Management sowie Planung Mobility, Data Mining, and Privacy: A Vision of Features und Budgetierung.    Convergence.- Basic Concepts of Movement Da-  This text/reference on innovative network ta.- Characterising the Next Generation of Mobile Features design provides the fundamentals of advanced net- Applications Through a Privacy-Aware Geographic Darstellung und Einordnung aktueller working and thoroughly describes a unique model- Knowledge Discovery Process.- Wireless Network computergestützter Informationssysteme Enger ing and simulation-based approach to prototype net- Data Sources: Tracking and Synthesizing Trajec- Bezug zu inhaltlichen und organisatorischen be- work design. tories.- Privacy Protection: Regulations and Tech- triebswirtschaftlichen Fragestellungen Strukturierte Contents nologies, Opportunities and Threats.- Trajectory Übersicht über ein vielschichtiges Themengebiet  * Introduction * Origin of networking and its Data Models.- Trajectory Database Systems.- To- unter Beachtung modernster Technologien und ak- role in the information age * Definition and funda- wards Trajectory Data Warehouses.- Privacy and tueller Anwendungsschwerpunkte Aktualisiert um mental attributes of networking * History and evolu- Security in Spatio-temporal Data and Trajectories.- neue technologische Strömungen und Begriffe tion of networking * Network design fundamentals Knowledge Discovery from Geographical Data.- Spa- Contents * Role of modeling and simulation in future network tio-temporal Data [..] Management Support Systeme und Business design * ATM networking principles * Buffer archi- Fields of interest Intelligence - Anwendungssysteme zur tecture and management design for ATM networks * Data Mining and Knowledge Discovery; Database Unterstützung von Managementaufgaben.- Routing algorithms in ATM networks * IP + ATM = Management; Computers and Society; Legal Aspects Arbeitsaufgaben und -prozesse der Fach- und IVCC? * IVCC as a new networking algorithm * Dis- of Computing Führungskräfte.- Klassische Ausprägungen der Man- tributed computing architectures for ATM network agement Support Systeme.- Business Intelligence.- nodes * Network management * Self-healing algo- Target groups Datenbereitstellung: Data Warehousing.- Daten- rithms in ATM networks * Network topology and [..] Researchers and professionals analyse: On-Line Analytical Processing und Data Mining.- Präsentation und Datenzugriff: Reporting Fields of interest Type of publication und Portale.- Analyseorientierte Anwendungssys- Computer Systems Organization and Communi- Monograph cation Networks; Computer Communication Net- teme mit speziellem betriebswirtschaftlichen Schwer- works; Computer System Implementation; Comput- punkt.- Gestaltung und Betrieb von BI-Lösungen.- Due December 2007 ing Methodologies; Simulation and Modeling Aktuelle Tendenzen bei Business [..]

Target groups 2008. Approx. 460 p. Geb. Fields of interest  Professionals, advanced students Information Systems; Information Systems Applica- 80,20 € tions (incl.Internet); Business/Management Science, Type of publication ISBN 978-3-540-75176-2 general; Management Monograph Target groups Praktiker, Studenten Due June 2008 Type of publication 2008. Approx. 305 p. 125 illus. Geb. Monograph

53,45 € Due October 2007 ISBN 978-0-387-21296-8

Ursprünglich erschienen unter dem Titel: Management Support Systeme. Computergestützte Informationssysteme für Fach- und Führungskräfte

2007. XX, 408 S. 116 Abb. Softcover 70 Computer springer.com/booksellers

29,95 € M. Glöggler, Siena, Italien A. Goel, MIT-Zaragoza Logistics Center, Spain ISBN 978-3-540-23543-9 Suchmaschinen im Internet Fleet Telematics

Funktionsweisen, Ranking Methoden, Top Positionen Real-Time Management and Planning of Commercial Vehicle Operations

Suchmaschinen stellen das am meisten genutzte Hilfsmittel im Internet dar, um Informationen, Di- In the past 30 years, commercial transport traffic enstleistungen und Produkte im Internet zu find- has more than doubled in both Europe and North en. 90% aller User beginnen ihre Suche über Such- America, while Asian traffic has likely increased even maschinen. Das größte Problem für Contentanbieter more. As any mismatch between supply and demand ist, von ihrer Zielgruppe über Suchmaschinen auch can result into significant disturbances of manufac- tatsächlich gefunden zu werden. In diesem Zusam- turing processes, just-in-time practices necessitate menhang ist die Rangposition in der Suchergeb- punctual, reliable, and flexible transportation. Fleet nisliste ein äußerst wichtiges Kriterium, das di- Telematics: Real-Time Management and Planning of rekte Auswirkung auf den wirtschaftlichen Erfolg Commercial Vehicle Operations combines wireless eines Webauftritts hat. Dieses Buch beschreibt telematics systems with dynamic vehicle routing al- verständlich, wie Suchmaschinen funktionieren und gorithms and vehicle-positioning systems to produce nach welchen Kriterien Rangpositionen bestimmt a telematics-enabled information system that can werden. Eine detaillierte Handlungsanleitung gibt be employed by commercial fleet operators for re- exakt vor, wie Webseiten zu optimieren sind, um al-time monitoring, control, and planning. The book eine der ersten Positionen bei Suchmaschinen zu presents a Messaging & Fleet Monitoring Sys- erzielen. Nach dem Lesen dieser Lektüre verfügt der tem that automatically identifies deviations between Leser über das gesamte Wissen, um Webseiten bei the planned and the current state of the transporta- Suchmaschinen optimal zu positionieren. Der Inhalt tion system and a Dynamic Planning System (DPS) der 2. Auflage wurde vollständig aktualisiert. that provides real-time decision support considering the current state of the transportation system. Features Richtige Platzierung von Websites bei Suchmaschi- Features nen Webauftritten den wirtschaftlichen Erfolg sich- Demonstrates how commercial fleet telematics sys- ern Effiziente Methoden zur Optimierung der Rang- tems can be integrated into management informa- position Detaillierte Anleitungen tion systems without telematics functionality Pro- vides a fleet monitoring system to support commu- Contents nication between drivers and dispatchers. Based on Definition Webkatalog.- Definition Suchmaschi- this, timely dynamic decisions not only become pos- nen.- Definition Meta-Suchmaschinen.- Definition sible, but timely, in case of disturbances and any Pay Per Click-Suchmaschinen.- Das Systemfeld der means of changes to plans in vehicle routing and dis- Suchmaschinen.- Client-Server-Prinzip.- HTTP Pro- patching, as well [..] tokoll.- HTML Dokumente.- Funktionsweisen von Suchmaschinen.- Informationsbeschaffung.- Date- Contents naufbereitung und Analyse.- Erstellung eines Such- Introduction.- Telematics.- Commercial vehicle op- maschinen Index.- Relevanzbestimmung.- Der Such- erations.- Management information systems.- Mod- prozess.- Optimierung von Web Sites.- Bestimmung els for routing a fleet of commercial vehicles.- Dy- von Keywords.- Optimierung des Document Head- namic vehicle routing.- Conclusions.- Bibliography.- er.- Optimierung des Document Body.- HTTP Pro- Symbols and abbreviations.- Index. tokoll richtig eingesetzt.- Link Popularity und Click Popularity.- [..] Fields of interest Operation Research/Decision Theory; Information Fields of interest Systems; Regional Science; Economics/Management Information Systems Applications (incl.Internet); In- Science, general; Engineering Economics, Organiza- formation Systems and Communication Service tion, Logistics, Marketing; Production/Logistics

Target groups Target groups Content Anbieter, Werbeagenturen, Online Mar- Practitioners, researchers in transportation, IS and keting Agenturen, Multimedia Agenturen, Un- OR ternehmen im eCommerce, Studenten der Fachbere- iche Marketing und Informatik Type of publication Monograph Type of publication Professional book Due November 2007

Due July 2008 2008. Approx. 200 p. (Operations Research/Computer Science Interfaces Series, Band 40) Geb. 2008. Etwa 300 S. (Xpert.press) Geb. 90,90 € 44,95 € ISBN 978-0-387-75104-7 ISBN 978-3-540-21521-9 springer.com/booksellers Computer 71

E. Goetz, Dartmouth College, Hanover, NH, USA; S. Shenoi, Uni- D. Goldberg, University of Illinois at Urbana-Champaign, IL, USA; 58,80 € versity of Tulsa, OK, USA (Eds.) K. Sastry, University of Illinois at Urbana-Champaign, IL, USA ISBN 978-0-387-35374-6 Critical Infrastructure Protection Genetic Algorithms

The Design of Innovation

The information infrastructure---comprising com- puters, embedded devices, networks and software Genetic Algorithms: The Design of Innovation il- systems---is vital to day-to-day operations in every lustrates how to design and implement scalable ge- sector: information and telecommunications, bank- netic algorithms that solve hard problems quickly, ing and finance, energy, chemicals and hazardous reliably, and accurately. This revised edition of the materials, agriculture, food, water, public health, landmark The Design of Innovation includes recent emergency services, transportation, postal and ship- results and new groundbreaking material. The core ping, government and defense. Global business and chapters have been updated and some chapters have industry, governments, indeed society itself, cannot been thoroughly rewritten. The chapter on scalable function effectively if major components of the criti- GA design introduces other key techniques, includ- cal information infrastructure are degraded, disabled ing the Dependency Structure Matrix GA (DSMGA), or destroyed. Critical Infrastructure Protection de- which sheds light on probabilistic model builders scribes original research results and innovative ap- such as the Bayesian Optimization Algorithm. A ma- plications in the interdisciplinary field of critical in- jor new chapter demonstrates practical scalability of frastructure protection. Also, it highlights the impor- GAs on a problem with over a billion variables, and tance of weaving science, technology and policy in shows how these results can be used to obtain rou- crafting sophisticated, yet practical, solutions that tine solutions to important problems. Genetic Algo- will help secure information, computer and network rithms is an essential reference for the innovation re- assets in the various critical infrastructure sectors. searcher – from the social and behavioral sciences, Areas of coverage include: [..] the natural sciences, the humanities, or the arts – or Features for the specialist in GAs and evolutionary computa- First book in annual series on Critical Infrastructure tion. Protection Features Contents Provides an entrée into the world of scalable genetic Themes and Issues.- On the Security Implications of algorithms and innovation Combines two decades Disruptive Technologies.- Cyber Security: Are Eco- of hard-won research results in a single volume to nomic Incentives Adequate?.- Government Interven- provide a step-by-step guide to designing genetic al- tion in Information Infrastructure Protection.- In- gorithms that scale well with problem size and diffi- frastructure Security.- Security of Information Flow culty Includes additional new results and algorithms, in the Electric Power Grid.- Securing Positive Train and two new chapters: "Principled Efficiency En- Control Systems.- Lessons Learned from the Ma- hancement Techniques" and "A Billion Variables and roochy Water Breach.- Reducing Risk in Oil and Gas Beyond" Production Operations.- Control Systems Security.- Contents Securing Current and Future Process Control Sys- List of Figures.- List of Tables.- Preface.- Acknowl- tems.- Security Strategies for SCADA Networks.- Se- edgments.- Genetic Algorithms and Innovation.- curity Enhancements for Distributed Control [..] Making Genetic Algorithms Fly.- Three Tools of Fields of interest Conceptual Engineering.- Goals and Elements of GA Computer Science, general Design.- Understanding Building Blocks.- A Design Approach to Problem Difficulty.- Ensuring Building Target groups Block Supply.- Ensuring Building Block Growth.- Researchers, faculty members and graduate students, Making Time for Building Blocks.- Deciding Well.- as well as for policy makers, practitioners and other Mixing, Control Maps, and GA Success.- Designing individuals with interests in homeland security Scalable Genetic Algorithms.- Principled Efficiency Enhancement Techniques.- A Billion Variables and Type of publication Beyond.- Cool Technology, Philosophical [..] Proceedings Fields of interest Due December 2007 Artificial Intelligence (incl. Robotics); Appl.Mathematics/Computational Methods of Engi- neering; Optimization; Computing Methodologies; 2008. Approx. 415 p. (IFIP International Federation for Informa- Engineering, general; Mechanical Engineering tion Processing, Band 253) Geb. Target groups 136,96 € Researchers and practitioners in genetic algorithms ISBN 978-0-387-75461-1 and evolutionary computation Electrical and com- puter engineers interested in computational intelli- gence, soft computing, and intelligent control Com- puter scientists and AI researchers

Type of publication Monograph

Due May 2008

2008. Approx. 350 p. Geb. 72 Computer springer.com/booksellers

M.C. Golumbic, University of Hafia, Israel M. Gondran, Université Pierre et Marie Curie - CNRS, France; M. Y. Gong, NEC Laboratories America, Inc., Cupertino, CA, USA; W. Minoux, Université Pierre et Marie Curie - CNRS, France Xu, NEC Laboratories America, Inc., Cupertino, CA, USA Fighting Terror Online Graphs, Dioïds and Semirings Machine Learning for Multimedia The Convergence of Security, Technology, and the Law New Models and Algorithms Content Analysis

Fighting Terror Online The Convergence of Security, Technology, and the Law Martin Charles Golumbic The primary objectives of Graphs, Dioïds and Semir- Challenges in complexity and variability of multime-   The unprecedented events that have taken ings: New Models and Algorithms are to emphasize dia data have led to revolutions in machine learning place in recent years have led legislators and gov- the deep relations existing between the semiring and techniques. Multimedia data, such as digital images, ernments throughout the world to reconsider and dioïd structures with graphs and their combinatori- audio streams and motion video programs, exhibit restructure their policies regarding security issues. al properties, while demonstrating the modeling and richer structures than simple, isolated data items. A Today, worldwide attention is being given to a new problem-solving capability and flexibility of these number of pixels in a digital image collectively con- security threat, in the form of global terrorism. Le- structures. In addition the book provides an exten- veys certain visual content to viewers. A TV video gal systems are being called upon to provide a re- sive overview of the mathematical properties em- program consists of both audio and image streams sponse to these threats, in all areas of life, includ- ployed by “nonclassical” algebraic structures, which that unfold the underlying story.  To recog- ing the online environment. Among its many tools, either extend usual algebra (i.e., semirings), or corre- nize the visual content of a digital image, or to un- global terror also uses advanced technological meth- spond to a new branch of algebra (i.e., dioïds), apart derstand the underlying story of a video program, we ods. This fact presents a difficult challenge to poli- from the classical structures of groups, rings, and may need to label sets of pixels or groups of image cymakers. Therefore, we have chosen to focus this fields. and audio frames jointly. Machine Learning for Mul- book on the issue of formulating appropriate policy timedia Content Analysis introduces machine learn- at the interface between security and technology, hu- Features ing techniques that are particularly powerful and ef- man rights and economic policy. The fundamental A modern treatment of Graph Theory and its theo- fective for modeling spatial, temporal structures of issue – the tension between security needs and civ- retical developments and recent algorithmic applica- multimedia data and for accomplishing common il rights – is not new. A great deal of experience has tions tasks of multimedia content analysis. This book sys- been amassed in various countries in this [..] tematically covers these techniques in an intuitive Contents fashion and demonstrates their applications [..] Fields of interest Pre-Semirings, Semirings and Dioïds.- Combinato- Criminology & Criminal Justice; Computers and So- rial Properties of (Pre-) Semirings.- Topology in Or- Features ciety; Criminal Law dered Sets/ Topological Dioïds.- Solving Linear Sys- First book dedicated to the multimedia community tems in Dioïds.- Linear Dependence and Indepen- to address unique problems and interesting applica- Type of publication dence in Semi-Modules and Moduloïds.- Eigenval- tions of machine learning in this area Includes exam- Monograph ues and Eigenvectors of Endomorphisms.- Dioïds ples of unsupervised learning, generative models and and Nonlinear Analyses.- Collected Examples of discriminative models Includes Maximum Margin Due December 2007 Monoïds, (Pre-) Semirings and Dioïds.- Bibliogra- Markov (M3) networks, which strives to combine the phy.- Index. advantages of both the graphical models and Support Vector Machines (SVM)   2008. 180 pp Geb. Fields of interest Operations Research, Mathematical Programming; Contents 65,91 € Computer Systems Organization and Communi- Preface.- Introduction.- Unsupervised Learning.- Di- ISBN 978-0-387-73577-1 cation Networks; Combinatorics; Operation Re- mension Reduction.- Data Clustering Techniques.- search/Decision Theory; Discrete Mathematics in Generative Graphical Models.- Introduction of Computer Science; Mathematical Modeling and In- Graphical Models.- Markov Chains and Monte Car- dustrial Mathematics lo Simulation.- Markov Random Fields and Gibbs Sampling.- Hidden Markov Models.- Inference and Target groups Learning for General Graphical Models.- Discrimi- Students and researchers in Applied Mathematics native Graphical Models.- Maximum Entropy Model and Operations Research, as well as industry and Conditional Random Field.- Max-Margin Clas- sifications.- A. Appendix.- References.- Index. &nb- Type of publication sp; Monograph Fields of interest Due February 2008 Multimedia Information Systems; Artificial Intelli- gence (incl. Robotics); Information Storage and Re- trieval; Database Management; Computer Graphics; 2008. Approx. 415 p. (Operations Research/Computer Science Interfaces Series, Band 41) Geb. Biometrics

106,95 € Target groups ISBN 978-0-387-75449-9 Advanced-level students and researchers in comput- er science

Type of publication Monograph

Due November 2007

2008. Approx. 295 p. 20 illus. (Multimedia Systems and Applica- tions, Band 30) Geb.

82,34 € ISBN 978-0-387-69938-7 springer.com/booksellers Computer 73

S. Gorlatch, Univ. of Muenster, Germany; M. Bubak, Institute of D.H. Greene, Xerox Palo Alto Research Center, Palo Alto, CA, USA; M. Grotegut C.S. AGH, Krakow, Poland; T. Priol, IRISA/INRIA, Rennes, France D.E. Knuth, Stanford University, Palo Alto, CA, USA (Eds.) Windows Vista Mathematics for the Analysis of Achievements in European Algorithms Research on Grid Systems In diesem Buch soll das Anwender-Betriebssystem Windows Vista detailliert und anschaulich (mit Il- This monograph, derived from an advanced comput- lustrationen und Grafiken) beschrieben werden. This volume comprises the edited proceedings of er science course at Stanford University, builds on Der Autor erläutert den Aufbau dieses Betrieb- the 2006 CoreGRID Integration Workshop the fundamentals of combinatorial analysis and com- ssytems und führt durch die erfolgreiche Instal- (CGIW'2006), held October 2006 in Krakow, Poland. plex variable theory to present many of the major lation, insbesondere bei Unternehmen. Weitere A “Network of Excellence” funded by the European paradigms used in the precise analysis of algorithms, Themen sind die Features von Windows Vista, Be- Commission’s Sixth Framework Program, Core- emphasizing the more difficult notions. The authors trieb und Wartung. Die Zielgruppe sind versierte GRID, aims to strengthen and advance scientific and cover recurrence relations, operator methods, and Quereinsteiger, in der IT-Branche Tätige sowie er- technological excellence in the area of Grid and Peer- asymptotic analysis in a format that is terse enough fahrene Unternehmensadministratoren, die etwa die to-Peer technologies by bringing together a critical for easy reference yet detailed enough for those with Vorgängerversion kennen. Schwerpunkt ist das Ar- mass of well-established researchers from 41 Euro- little background. Approximately half the book is de- beiten mit Windows Vista. Der Leser benötigt für pean research institutions. Achievements in Euro- voted to original problems and solutions from exam- das Verständnis des Buchtextes IT-Grundkenntnisse pean Research on Grid Systems covers, though is not inations given at Stanford. und sollte mit Client-Betriebssystemen, Office und limited to, the following topics: knowledge and da- Internet vertraut sein. Darüber hinaus ist das Werk ta management; programming models; system ar- Features zur Prüfungsvorbereitung für die MCP-Prüfung chitecture; Grid information, resource and work- A collection of some fundamental mathematical (Microsoft certified professional) geeignet. flow monitoring services; resource management and techniques that are required for the analysis of algo- scheduling; systems, tools and environments; trust rithms Is very well written; the style and the mathe- Features and security issues on the Grid. Designed for a pro- matical exposition make the book pleasant to read Darstellung der gesamten Funktionalität von Win- fessional audience of industry practitioners and re- A wide range of topics are covered, including many dows Vista Fundierte Beschreibung des neuen Re- searchers, Achievements in European Research on of the major paradigms used in the analysis of algo- leases Praxisorientiert und sofort umsetzbar Grid Systems is also suitable for advanced-level stu- rithms, in an extremely concise manner (one hun- Fields of interest dents in computer science.   dred plus pages) Contains a wealth of highly original, Operating Systems; Information Systems Applica- [..] Features tions (incl.Internet) Brings together worldwide distinguished leaders Contents Target groups in research and industry within Grid Computing Binomial Identities.- Recurrence Relations.- Opera- Administratoren, Dozenten, Consultants Presents best papers, following additional round of tor Methods.- Asymptotic Analysis.- Bibliography.- peer-review Appendices.- Index. Type of publication Professional book Contents Fields of interest From the Contents Preface.- Divide et Impera: Par- Algorithm Analysis and Problem Complexity; Algo- titioning Unstructured Peer-to-Peer Systems to Im- rithms; Numerical Analysis; Computational Math- Due November 2007 prove Resource Location.- Passive End-to-End Pack- ematics and Numerical Analysis; Mathematics of etloss Estimation for Grid Traffic Monitoring.- Val- Computing 2008. Etwa 500 S. 200 Abb. (X.systems.press) Geb. idating Desktop Grid Results by Comparing Inter- mediate Checkpoints.- Using ReflexD for a Grid So- Target groups 59,95 € lution to the N-Queens Problem: A Case Study.- In- Advanced undergraduate and graduate students in ISBN 978-3-540-38882-1 tegrating the Palantir Grid Meta-Information Sys- Computer Science and Applied Mathematics tem with GRMS.- Integration of the Enanos Exe- cution Framework with GRMS for Grid Purposes.- Type of publication User-Transparent Scheduling for Software Compo- Graduate/advanced undergraduate textbook nents on the Grid.- Problem Solving Environment for Distributed [..] Due November 2007

Fields of interest Hardcover edition originally published as volume 1 in the series: Computer Communication Networks; Database Progress in Computer Science and Applied Logic (PCS) Management; Computer Systems Organization and Communication Networks; Information Systems and Communication Service; Data Structures; Pro- 2008. X, 132 p. (Modern Birkhäuser Classics) Softcover cessor Architectures 37,34 € Target groups ISBN 978-0-8176-4728-5 Professionals and advanced-level students

Type of publication Contributed volume

Due November 2007

2008. Approx. 300 p. 20 illus. Geb.

117,65 € ISBN 978-0-387-72811-7 74 Computer springer.com/booksellers

M. Grotegut, Berlin D. Grune, Vrije Universiteit, Amsterdam, The Netherlands; C.J.H. ISBN 978-0-387-20248-8 Jacobs, Vrije Universiteit, Amsterdam, The Netherlands Windows Server 2008 Parsing Techniques 2/e

In diesem Buch wird die Funktionalität des Win- dows Servers 2008 detailliert und anschaulich Parsing, also referred to as syntax analysis, has been beschrieben. Die Zielgruppe sind in der IT-Branche and continues to be an essential part of computer Tätige, sowohl erfahrene Administratoren, die die science and linguistics. Today, parsing techniques Vorgängerversion kennen, als auch Neueinsteiger. are also implemented in a number of other dis- Schwerpunkt ist somit die Einrichtung, Planung, ciplines, including but not limited to, document Konzeption sowie der Betrieb eines Netzwerkes mit preparation and conversion, typesetting chemical Windows Servern 2008. Der Leser benötigt für das formulae, and chromosome recognition. This sec- Verständnis des Buchtextes IT-Grundkenntnisse ond edition presents new developments and dis- und sollte mit Client-Betriebssystemen, Office und coveries that have been made in the field. Pars- Internet vertraut sein. ing techniques have grown considerably in impor- tance, both in computational linguistics where such Features parsers are the only option, and computer science, Einführung in neue Features, Unterschiede zur where advanced compilers often use general CF Vorversion Vorbereitung für die Lehre sowie Schu- parsers. Parsing techniques provide a solid lungsunterlage Einführung in neue Technologie basis for compiler construction and contribute to all existing software: enabling Web browsers to ana- Contents lyze HTML pages and PostScript printers to analyze Schnellstart/Was ist neu?- Historie – Entwicklung PostScript. Some of the more advanced techniques von Windows NT.- Longhorn Versionen, Innerer are used in code generation in compilers and in data Aufbau/Kernel/Treiber/HAL.- Installation, Hard- compression. In linguistics, the importance of formal ware.- Storage.- Active Directory.- Benutzerverwal- grammars was recognized [..] tung.- Netzwerkprotokolle.- Netzwerkdienste (DNS, WINS, ...).- Betrieb, Backup.- Unternehmenstech- Features nologien.- Migrationsaspekte. Accessible, yet comprehensive introduction to pars- ing techniques helps readers to quickly gain a broad Fields of interest understanding of subject Summarizes more than 700 Operating Systems; Information Systems Applica- papers referenced in the book, saving readers count- tions (incl.Internet) less hours Many exercises include hints and partial solutions, making it ideal for self-study or classroom Target groups use Extensive bibliography, and annotated bibliogra- Administratoren, Systemintegratoren, Systemana- phy on website, help interested readers to find [..] lysten, Consultants, Dozenten Contents Type of publication Introduction.- Grammars as a Generating Device.- Professional book Introduction to Parsing.- General Non-Direction- al Parsing.- Regular Grammars and Finite-State Au- Due June 2008 tomata.- General Directional Top-Down Parsing.- General Directional Bottom-Up Parsing.- Deter- 2008. Etwa 1000 S. (X.systems.press) Geb. ministic Top-Down Parsing.- Deterministic Bot- tom-Up Parsing.- Non-Canonical Parsers.- General- 79,95 € ized Deterministic Parsers.- Substring Parsing.- Pars- ISBN 978-3-540-34672-2 ing as Intersection.- Parallel Parsing.- Non-Chon- sky Grammars and Their Parsers.- Error Handling.- Practical Parser Writing and Usage.- Annotated Bib- liography.- Hints and Solutions to Selected Prob- lems.- [..]

Fields of interest Programming Techniques; Software Engineer- ing/Programming and Operating Systems; Program- ming Languages, Compilers, Interpreters; Document Preparation and Text Processing; Language Transla- tion and Linguistics

Target groups Researchers, recreational mathematicians, and ad- vanced graduate students

Type of publication Monograph

Due December 2007

Originally published by Ellis Horwood Ltd, Prentice Hall, UK.

2008. XXIV, 664 p. 288 illus. (Monographs in Computer Science) Geb.

58,80 € springer.com/booksellers Computer 75

P. Grzybek, University of Graz, Austria (Ed.) G. Grätzer, University of Manitoba, Winnipeg, MB, Canada T. Grötker, Synopsys Inc., Aachen, Germany; U. Holtmann, Synop- sys Inc., Aachen, Germany; H. Keding, Synopsys Inc., Aachen, Ger- many; M. Wloka, Synopsys Inc., Aachen, Germany Contributions to the Science of Text More Math Into LaTeX and Language The Developer's Guide to Word Length Studies and Related Issues Debugging "Gratzer’s book is a solution." -European Mathe- matical Society Newsletter   For close to two decades, Math into Latex has been the standard in- This volume contains a collection of contributions troduction and complete reference for writing arti- The Developer's Guide to Debugging is a book for to the science of language, focusing on the study of cles and books containing mathematical formulas. both professional software developers seeking to word length in particular. Within a synergetic frame- In this fourth edition, the reader is provided with broaden their skills and students that want to learn work, the word turns out to be a central linguistic important updates on articles and books. An impor- the tricks of the trade from the ground up. With unit, as is clearly outlined in the Editor's preface. The tant new topic is discussed: transparencies (comput- small examples and exercises it is well suited to ac- book's first chapter is an extensive introduction to er projections). Key features of More Math into La- company a CS course or lecture. At the same time it the history and state of the art of word length stud- tex, 4th edition: - Installation instructions for PC and can be used as a reference guide to address problems ies. The studies included unify contributions from Mac users - An example-based, visual approach and as the need arises. This book goes beyond the level three important linguistic fields, namely, linguistics a gentle introduction with the Short Course - A de- of simple source code debugging scenarios. In ad- and text analysis, mathematics and statistics, and tailed exposition of multiline math formulas dition, it covers the most frequent real-world prob- corpus and data base design, which together give a with a Visual Guide - A unified approach to Tex, La- lems from the areas of program linking, memory ac- comprehensive approach to the quantitative study tex, and the AMS enhancements - A quick introduc- cess, parallel processing and performance analysis. of text and language and word length studies. The tion to creating presentations with computer projec- The picture is completed by chapters covering static broad spectrum of word length studies covered with- tions From earlier reviews of Math into Latex: "There checkers and techniques to write code that leans well in this volume will be of interest to experts working are several Latex guides, but this one wins hands towards debugging. While the focus lies on C and C in the fields of general linguistics, text scholarship down for the elegance of its approach and breadth of ++, the workhorses of the software industry, one can and related fields, and, understanding language as coverage." -Amazon.com Best of 2000, Editor’s [..] apply many techniques described in The Developer's one example of complex semiotic systems, the vol- Guide to Debugging to programs written in other ume should be of interest for scholars from other Features languages. fields as well. - Installation instructions for PC and Mac users - An example-based, visual approach and a gentle Features Features introduction with the Short Course - A detailed It’s got the right focus. It is not restricted to a specif- Presents a collection of papers on the quantitative exposition of multiline math formulas with a ic combination of compiler, debugger, and operat- study of language, in particular word length studies Visual Guide - A unified approach to Tex, Latex, and ing system. At the same time it is not too high lev- the AMS enhancements - A quick introduction to el; it contains examples that can be reproduced with Contents creating presentations with computer projections open source software on different UNIX and Win- Preface. Papers by: Peter Grzybek; Simone Ander- dows platforms. It remains focused on software de- sen and Gabriel Altmann; Gordana Antic, Emmerich Contents bugging and does not drift into areas such as fixing Kelih and Peter Grzybek; August Fenk and Gertraud Preface.- Introduction.- Setting Up.- Part I. Typing broken hardware. It is complete. Software debugging Fenk-Oczlon; Primoz Jakopin; Reinhard Koehler; your first article.- Part II. Text and math.- Typing [..] Victor V. Kromer; Werner Lehfeldt; Anatolij A. Po- text.- Text environments.- Typing math.- Multiline likarpov; Otto A. Rottmann; Ernst Stadlober and math displays.- Part III. Document structure.- La- Contents Mario Djuzelic; Udo Strauss, Peter Grzybek and TeX documents.- Standard LaTeX document class- 1. INTRODUCTION 2. BASIC DEBUGGING 3. Gabriel Altmann; Marko Tadic; Dusko Vitas, Gor- es.- AMS documents.- Part IV. Presentations and MORE DEBUGGING 4. LINKER PROBLEMS 5. dana Pavlovic-Lazetic and Cvetana Krstev; Andrew pdf files.- Simple presentations.- Presentations on MEMORY PROBLEMS 6. MEMORY PROFILING Wilson; Gejza Wimmer and Gabriel Altmann. Con- steroids.- Hyperlinks and pdf files.- Part V. Cus- 7. STATIC CHECKERS 8. WRITING DEBUG-ABLE tributing Authors. Author Index. Subject Index. tomization.- Customizing LaTeX.- Part VI. Long CODE 9. ADVANCED DEBUGGING 10. DE- Documents.- BibTeX.- MakeIndex.- amsrefs.- Books BUGGING PARALLEL PROGRAMS 11. PERFOR- Fields of interest in LaTeX.- Appendix A. Math symbol tables.- Ap- MANCE MEASUREMENT 12. GENERAL HINTS Computational Linguistics; Mathematical Logic and pendix B. Text symbol tables.- Appendix C. [..] 13. SUMMARY Appendices   A Access to Formal Languages; Theoretical Linguistics Tools   B Source code References Fields of interest Target groups Document Preparation and Text Processing; Math- Fields of interest Computational linguists ematical Software; Math Applications in Computer Software Engineering/Programming and Operating Science; Programming Languages, Compilers, Inter- Systems; Circuits and Systems; Programming Lan- Type of publication preters; Media Design; Computer Applications guages, Compilers, Interpreters; Software Engineer- Contributed volume ing; Programming Techniques; Control Engineering Target groups Due October 2007 Undergraduates, graduate students, typesetters, re- Target groups searchers in STM fields The target audience is rather broad: people writing (or planning/learning to write) software in C or C+ 2008. XII, 350 p. (Text, Speech and Language Technology, Band Type of publication 31) Softcover +. Debugging is an integral part of software develop- Manual ment. 42,75 € ISBN 978-1-4020-4069-6 Due October 2007 Type of publication Professional book

Originally published by Birkhauser Boston Due January 2008

2007. Approx. 650 p. 44 illus. Softcover 2008. Approx. 300 p. Geb. 42,75 € ISBN 978-0-387-32289-6 69,50 € ISBN 978-1-4020-5539-3 76 Computer springer.com/booksellers

O. Guler, University of Maryland, Baltimore, MD, USA B. Gustafsson, Uppsala University, Uppsala, Sweden J.A. Gutierrez, Emerson Corporation, St. Louis, MO, USA; B.S.R. Armstrong, University of Wisconsin, Milwaukee, WI, USA Foundations of Optimization in High Order Difference Methods for Finite Dimensions Time Dependent PDE Precision Landmark Location for Machine Vision and Photogrammetry

This book is intended as a textbook to be used The subject of this book is high order finite differ- Finding and Achieving the Maximum Possible Accuracy in a first graduate level course, and covers the ence methods for time dependent PDE. The idea fundamental principals of optimization in finite is to give an overview of the basic theory and con- dimensions.  It develops the necessary back- struction principles by using model examples. The ground material in multivariable calculus using co- book also contains a general presentation of the tech- The applications of image-based measurement ordinates as well as in a coordinate-free manner, so niques and results for well-posedness and stability, are many and various: image-guided surgery, mo- that the recent developments such as semidefinite with inclusion of the three fundamental methods of bile-robot navigation, component alignment and programming can be dealt with ease.  All the analysis both for PDE in its original and discretized photogrammetry, among others. This book address- standard topics of mathematical programming, such form: the Fourier transform, the eneregy method es the problem of measurement error associated with as necessary and sufficient optimality conditions and the Laplace transform. Various types of wave determining the location of landmarks in images. for optimality, convex analysis and duality, are cov- propagation problems are treated in specific detail The least possible photogrammetric uncertainty in ered in great detail, often from multiple points of since high order methods are particularly effective a given situation is determined using the Cramér– view.  A distinctive feature of this book is its for these problems. Rao Lower Bound (CRLB). This monograph pro- set of worked-out examples and problems, including vides the reader with: the most complete treatment hundreds of well-chosen problems and important Fields of interest to date of precision landmark location and the engi- examples. Computational Mathematics and Numerical Analy- neering aspects of image capture and processing; de- sis; Partial Differential Equations tailed theoretical treatment of the CRLB; a software Features tool for analyzing the potential performance-specif- Covers the fundamental principles of optimization Target groups ic camera/lens/algorithm configurations; two nov- in finite dimensions Develops the necessary back- Researchers and graduate students el algorithms which achieve precision very close to ground material in multivariable calculus using co- the CRLB; a method for determining the accuracy ordinates as well as in a coordinate–free manner, so Type of publication of landmark location; a downloadable MATLAB® that the recent developments such as semidefinite Monograph package to assist the reader with applying theoreti- programming can be dealt with ease All the standard cally-derived results to practical engineering config- topics of mathematical programming, such as neces- Due December 2007 urations. sary and sufficient optimality conditions for optimal- Features ity, [..] 2008. Approx. 350 p. (Springer Series in Computational Mathe- matics, Band 38) Geb. Shows the reader how to derive theoretical limits to Contents the precision of landmark identification in electronic Calculus in Vector Spaces.- Unconstrained Opti- 85,55 € images MATLAB® package assists the reader with ap- mization.- Convex Analysis.- Theory of Convex ISBN 978-3-540-74992-9 plying theoretical results in real engineering systems Polyhedra.- Some Basic Optimization Algorithms.- Steps outside the usual earth-sciences and civil-engi- Theory of Lagrange Multipliers.- Semi-infinite Pro- neering base of photogrammetry to improve anima- gramming.- Duality Theory and Convex Program- tion, medical imaging and robotic vision applications ming.- References.- Index. Contents Fields of interest Introduction.- Physics of Digital Image Formation.- Optimization; Calculus of Variations and Optimal Analytical Framework for Landmark Location Un- Control; Optimization; Operations Research, Mathe- certainty.- Two-dimensional Unconstrained Numer- matical Programming; Applications of Mathematics ical Integration.- Computational Tools.- Experimen- tal Validation.- Results.- Conclusions. Target groups Graduate Students and Researchers in optimization, Fields of interest operations research Image Processing and Computer Vision; Automa- tion and Robotics; Remote Sensing/Photogramme- Type of publication try; Signal,Image and Speech Processing; Imaging / Graduate/advanced undergraduate textbook Radiology; Statistics for Engineering, Physics, Com- puter Science, Chemistry & Geosciences Due May 2008 Target groups Engineers and scientists working in photo- and 2008. Approx. 350 p. Geb. videogrammetry, in image metrology or in industrial 50,24 € automation also in human-motion analysis and mo- ISBN 978-0-387-34431-7 tion capture for medicine, virtual reality and digital animation systems; corporate libraries of companies working in the above areas

Type of publication Monograph

Due December 2007

2008. Approx. 160 p. 78 illus. Geb.

90,90 € ISBN 978-1-84628-912-5 springer.com/booksellers Computer 77

M.A. Gutierrez, EPFL VRlab, Switzerland; F. Vexo, EPFL VRlab, F. Hacklin, ETH Zurich, Switzerland J.-L. Hainaut, University of Namur, Belgium; E.A. Rundensteiner, Switzerland; D. Thalmann, EPFL VRlab, Switzerland Worcester Polytechnic Institute, Worcester, MA, USA; M. Kirch- berg, Massey University, Auckland, New Zealand; M. Bertolotto, Management of Convergence in University College Dublin, Ireland; M. Brochhausen, Saarland Uni- Stepping into Virtual Reality: A versity, Germany; P. Chen, Deakin University, VIC, Australia; S. Si- Innovation said Cherfi, CEDRIC-CNAM, Paris, France; M. Doerr, Foundation Practical Approach for Research and Technology, Heraklion, Greece; H. Han, Drex- Strategies and Capabilities for Value Creation Beyond Blurring el University, Philadelphia, PA, USA; S. Hartmann, Massey Uni- Industry Boundaries versity, New Zealand; J. Parsons, Memorial University of New- foundland, Canada; G. Poels, Ghent University, Belgium; C. Rol- Virtual reality techniques are increasingly becoming land, Université Paris 1 Sorbonne, France; J. Trujillo, University of indispensible in many areas including medicine, en- Alicante, Spain; E. Yu, University of Toronto, Canada; E. Zimlanyi, Throughout the past decade, the phenomenon of tertainment, architecture, education and manufac- University of Brussels, Belgium (Eds.) technological convergence has increasingly gained turing, with VR tools being used for testing and pro- managerial attention. In this special form of techno- totyping products at design stages, as well as for cre- logical change, the coming-together of previously Advances in Conceptual Modeling - ating applications in finished products. This book distinct knowledge bases gives rise to the creation of looks at how to generate advanced virtual reality Foundations and Applications new applications and business models. When such worlds. It covers principles, techniques, devices and innovations emerge at the intersection of industries, ER 2007 Workshops CMLSA, FP-UML, ONISW, QoIS, RIGiM, mathematical foundations, beginning with basic def- the resulting creative destruction may exceed previ- SeCoGIS, Auckland, New Zealand, November 5-9, 2007, Pro- initions, and then moving on to the latest results ously established industry boundaries. As a conse- ceedings from current research and exploring the social impli- quence, convergence does not only promise the cre- cations of these.    Very practical in its ation of new value, but may imply significant disrup- approach, the book is fully illustrated in colour and tions to established industries. Based on investigat- contains numerous examples, exercises and This book constitutes the refereed joint proceedings ing 26 firms within the ICT industry, this book high- case studies. Careful reading of this textbook will al- of six international workshops held in conjunction lights implications of the convergence phenomenon low students and practitioners alike to gain a with the 26th International Conference on Concep- on firms’ innovation management practices, and de- practical understanding of virtual reality concepts, tual Modeling, ER 2007, in Auckland, New Zealand, rives strategic guidelines for building and sustaining devices and possible applications. in November 2007. The 40 revised full papers pre- business models beyond blurring industry bound- sented were carefully reviewed and selected from 114 Features aries. submissions. Topics addressed by the workshops are Carefully balanced between fundamentals and ap- conceptual modeling for life sciences applications Contents plications, this book also looks at topics not normal- (CMLSA 2007), foundations and practices of UML Introduction.- Fundamentals of convergence and in- ly covered in the literature such as proprioception, (FP-UML 2007), ontologies and information systems novation.- An evolutionary perspective on conver- physiological signal analysis, and the social implica- for the semantic Web (ONISW 2007), quality of in- gence.- Capabilities for coevolutionary contingency.- tions of these new techniques. formation systems (QoIS 2007), requirements, in- Conclusions. tentions and goals in conceptual modeling (RIGiM Contents 2007), and semantic and conceptual issues in geo- Fields of interest Part 1: The Fundamentals – Definitions.- Mathemat- graphic information systems (SeCoGIS 2007). Technology Management; Information Systems ical and Computer Sciences Foundations.- Virtual Fields of interest World Creation.- Part 2: Applications and Devices – Target groups Information Systems Applications (incl.Internet); Feedback Virtual Devices.- Input Virtual Devices.- Scientists, professionals Virtual Reality Applications.- Social Implication of Database Management; Information Storage and Re- Virtual Reality Techniques Type of publication trieval; Artificial Intelligence (incl. Robotics); Com- Monograph puter Applications in Geosciences; Information Sys- Fields of interest tems Computer Graphics; Multimedia Information Sys- tems; User Interfaces and Human Computer Interac- Due October 2007 Target groups tion Researchers and professionals 2008. XVIII, 260 p. 33 illus. (Contributions to Management Sci- Target groups ence) Geb. Type of publication Undergraduate/graduate students on Virtual Real- Proceedings ity courses and professional programmers and re- 90,90 € searchers requiring an understanding of Virtual Re- ISBN 978-3-7908-1989-2 Due October 2007 ality concepts.

Type of publication 2007. XIX, 420 p. (Lecture Notes in Computer Science, Band 4802) Softcover Graduate/advanced undergraduate textbook 59,92 € Due August 2008 ISBN 978-3-540-76291-1

2008. Approx. 230 p. 71 illus., 58 in color. Softcover

53,45 € ISBN 978-1-84800-116-9 78 Computer springer.com/booksellers

J.O. Hamblen, Georgia Tech, Atlanta, GA, USA; T.S. Hall, Southern P. Hamilton, Seeheim-Jugenheim N. Hammer, Fachhochschule Gelsenkirchen Adventist University, Collegedale, TN, USA; M.D. Furman, Univer- sity of Florida, Gainesville, FL, USA Wege aus der Softwarekrise Mediendesign für Studium und

Rapid Prototyping of Digital Verbesserungen bei der Softwareentwicklung Beruf Systems SOPC Edition Grundlagenwissen und Entwurfssystematik in Layout, Ty- pografie und Farbgestaltung Seit den 1970er Jahren ist der Softwarebau in der Krise und hat diese bis heute nicht überwunden! Fol- New to this edition is an introduction to embedded gt man aktuellen Statistiken, so gehen immer noch operating systems for SOPC designs.  The Mediendesign für Studium und Beruf sensibil- mehr als die Hälfte aller in der IT-Produktion einge- µClinux OS is configured for Altera's DE1 and DE2 isiert Sie für die Mediengestaltung und vermit- setzten Mittel verloren. Angekündigte Programme boards and is provided on a DVD along with telt das notwendige Basiswissen in Layout, Far- verzögern sich um Monate oder bleiben aufgrund several application programs. Featuring four accel- bgestaltung und Typografie. Buch und CD bieten technischer Defizite weit hinter den in sie geset- erated tutorials on the Quartus II and Nios II design wertvolle Hilfestellung für alle, die per Desktop Pub- zten Erwartungen zurück. Im Fokus der Betrachtun- environments, this edition progresses from introduc- lishing Briefbögen, Flyer oder Präsentationen er- gen stehen Softwareentwickler sowie deren Rollen tory programmable logic to full-scale SOPC design stellen oder Webseiten gestalten wollen. Mittels und Arbeitsweisen in der IT-Produktion. Das Werk integrating hardware implementation, software de- praktischer Übungsaufgaben und selbstevaluierbar- greift diese und weitere Themen auf, hinterfragt velopment, operating system support, state-of-the- er Quizzes können Sie Ihren erworbenen Kenntnis- die zugrunde gelegten Annahmen, fahndet nach art I/O, and IP cores. This edition features Altera's stand überprüfen. Anhand von komplexeren En- Lösungen und überträgt diese auf industrietaugliche new 7.1 Quartus II CAD and Nios II SOPC tools and twurfsaufgaben mit begleitender Entwurfssystem- Arbeitskonzepte. Hierzu werden Performance-Fak- includes projects for Altera's DE1, DE2, UP3, UP2, atik erproben Sie Ihre gestalterischen Fertigkeiten. toren definiert und Maßnahmen vorgestellt, um sig- and UP1 FPGA development boards. Laboratory Mediendesign ist deshalb ein Lern- und Anleitungs- nifikante Verbesserungen herbeizuführen. Für Per- projects provided on the book's DVD include com- buch für Studierende und Auszubildende der Me- sonalentwickler und Führungskräfte in der IT sowie plete projects for video graphics and text, mouse and dienberufe und für alle diejenigen, die einfache bis für Softwareentwickler, die sich mit Ihrer Weit- keyboard input, and three separate computer exam- mittelkomplexe Gestaltungsaufgaben in ihrem indi- erqualifizierung auseinandersetzen und diese voran- ples including a Nios II "reference" design for the viduellen Arbeitsgebiet selbst bewältigen müssen. bringen wollen. DE2, DE1, and UP3 FPGA boards. Features Features Features Praxisorientierte Darstellung des Mediendesigns Anleitung und Anregungen zum Projektmanage- Includes Student Laboratory Tutorials and Projects Berücksichtigt sowohl kreatives als auch pragmatis- ment Arbeitsmethodik und Arbeitstechniken für er- using the latest CAD tools and newest FPGA boards ches Gestalten Ermöglicht permanente Überprüfung folgreiche Softwareentwicklung Praxislösungen und from Altera Integrates student projects into the text- des gelernten Fachwissens Checklisten. book and software Covers SoPC design using proces- Contents sor cores and C application programs Provides infor- Fields of interest Was ist Design?- Layout.- Wahrnehmung.- Ele- mation on porting RTOS to an FPGA processor core Software Engineering; Programming Languages, mentares Gestalten.- Layoutsystematik.- Rasterlay- Contains source files and additional example files on Compilers, Interpreters; Information Systems out.- Farbgestaltung.- Typografie.- Schrifthistorie.- the enclosed CD-ROM for all designs presented Typologie.- Typoklassifikation.- Typosemantik.- Ty- Target groups poergonomie.- Satzgestaltung.- Rastertypografie.- Contents IT-Entwickler, Projektmanager, CIOs, Consultants, Layout und Typo on Screen. Tutorial I: The 15 Minute Design.- FPGA Devel- Personalentwickler opment Board Hardware and I/O Features.- Pro- Fields of interest grammable Logic Technology.- Tutorial II: Sequen- Type of publication Media Design; Document Preparation and Text Pro- tial Design and Hierarchy.- FPGAcore Library Func- Professional book cessing tions.- Using VHDL for Synthesis of Digital Hard- ware.- Using Verilog for Synthesis of Digital Hard- Due January 2008 Target groups ware.- State Machine Design: The Electric Train Auszubildende und Studierende der Medienberufe; Controller.- A Simple Computer Design: The µP 3.- Mediengestalter VGA Video Display Generation using FPGAs.- In- 2008. Etwa 200 S. 36 Abb. Geb. terfacing to the PS/2 Keyboard and Mouse.- Lega- 29,95 € Type of publication cy Digital I/O Interfacing Standards.- FPGA ISBN 978-3-540-72869-6 Professional book Robotics Projects.- A RISC Design: Synthesis of the MIPS Processor [..] Due March 2008 Fields of interest Circuits and Systems; Computer-Aided Engineering 2008. Etwa 250 S. 650 Abb. Mit CD-ROM. (X.media.press) Geb. (CAD, CAE) and Design; Engineering Design; Elec- tronic and Computer Engineering 29,95 € ISBN 978-3-540-73217-4 Target groups Undergraduates and first year graduates in EE, CmpE and CS Systems areas

Type of publication Undergraduate textbook

Due November 2007

2008. Approx. 432 p. With DVD. Softcover

56,66 € ISBN 978-0-387-72670-0 springer.com/booksellers Computer 79

M. Harders, ETH Zurich, Switzerland S. Harper, University of Manchester, UK; Y. Yesilada, University of H.G. Hase, O. Göbel Manchester, UK (Eds.) Surgical Scene Generation for VoIP-Technologie Web Accessibility Virtual Reality-Based Training in Einführung, Übersicht, Planung und Sicherheit Medecine Research Foundations

Das Buch beschreibt die technischen und or- Web Accessibility tends to be considered as a Web Recent years have brought about a drastic change ganisatorischen Grundlagen des Einsatzes der Design challenge and therefore existing relevant in patient awareness and acceptance of adverse ef- VoIP-Technologie. Dabei wird auf die SIP-Pro- books are prescriptive tutorials on how to achieve fects in medical care. The combination of this pro- tokoll-basierte Technik, auf die H.323-basierte Tech- Web accessibility. However there are hundreds, if cess with an increasing focus on patient safety has nik und auf die Skype-basierte Technik ausführlich not thousands, of research scientists, engineers, and put traditional educational paradigms in the medical eingegangen. Das Buch soll den Leser in die Lage research & development programmers work- area to the test. The potential of training approaches versetzen, Entscheidungen über den Einsatz von ing in academia and industry to advance the current using virtual reality techniques has been recognized VoIP-Technologie und über die technische und or- Web, and to make developments in the next Web, for sometime and a key element of VR-based train- ganisatorische Einführung von VoIP-Technologie in accessible. This book, containing a strong founda- ing is the ability to generate various scenarios. There- Organisationen treffen zu können. Dabei wird detail- tion of research, is aimed at academics, sci- fore, the book examines in detail the main compo- liert auf die Sicherheitsaspekte der VoIP-Technolo- entists, engineers, and postgraduate students as the nents required to define a scenario, in the context of gie eingegangen. definitive, foundational text on Web Accessibility surgical scene generation: •Generation of the scene from a deeply research perspective. Written by lead- Features geometry •Modelling of organ appearance •Defini- ing experts in the field, it will provide not only an Praktische Hilfestellung bei Auswahl, Planung, tion of biomechanical parameters The book is the overview of existing research but will look to future Einführung und Betrieb von VoIP-Technologie ideal reference for any reader involved in generating developments and include expert opinions. This kind unter dem besonderen Aspekt der Sicherheit und training scenarios, as well as in VR-based training in of insight cannot be derived purely from existing re- rechtlicher Aspekte general. search publication stores such as Google Scholar. If Contents Features you need to know about deeper Web Accessibility, SIP-Technologie – Aufbau, Protokolle und Provides an extensive overview of related work in the and about current and future trends, this is the [..] Standards.- H.323-Technologie – Aufbau, Pro- three different directions of scene generation and in- Features tokolle und Standards.- Skype-Technologie – troduces specific solutions in detail. Written from a research perspective, this is a unique Aufbau, Protokolle und Standards.- VoIP und Contents ‘how to’ book, on Web accessibility Each chapter Sicherheit – Gefährdungen, Schwachstellen und Introduction.- Surgical Education.- Geometry.- Rele- is written by an acknowledged expert in the field A Schutzmaßnahmen.- VoIP-Software.- VoIP-Hard- vance to Surgical Education.- Process Elements.- Da- definitive research text and ideal research primer for ware.- Organisatorische und technische Einführung ta Acquisition.- Uterine Image Acquisition.- Healthy postgraduates von VoIP.- Troubleshooting und Netzwerkmanage- Anatomy Generation.- Shape Prediction.- Pathol- ment bei VoIP.- Rechtliche Hinweise. Contents ogy Integration.- Skeleton-based Design.- Cellular Understanding Disabilities.- Visual Impairments.- Fields of interest Automata Growth Model.- Particle System Growth Cognitive and Learning Impairments.- Hearing Information Systems and Communication Service; Model.- Volumetric Representation.- Appearance.- Impairments.- Ageing.- What is Web Accessibili- Information Systems Applications (incl.Internet); Texturing in Computer Graphics.- Relevance to Sur- ty?.- Evaluation and Methodologies.- Best practice Computer Systems Organization and Communi- gical Education.- Data Acquisition and Enhance- and guidelines.- Automated evaluation / validation cation Networks; Computer Communication Net- ment.- In-vivo Image Acquisition.- Image Enhance- and correction.- Site Conformance & Evalu- works; Management of Computing and Information ment.- Base Texture Generation.- Texture Genera- ation Methodologies.- End User Evaluations.- Ap- Systems tion for Laparoscopic Simulation.- Texture Genera- plications.- Assitive Technologies.- Convention- tion [..] al Browsers.- Specialised Browsers.- Browser Aug- Target groups IT-Verantwortliche, Entwickler, Administratoren Fields of interest mentation.- Transcoding.- Authoring Tools and Simulation and Modeling; Computer Graphics Document Engineering.- Specialised Areas (Quick Overviews).- Education.- Specialist Documents.- Type of publication Professional book Target groups Multimedia and [..] Researchers-Game Developers-Digital Model Builders Fields of interest Due July 2008 Information Systems Applications (incl.Internet); Multimedia Information Systems; User Interfaces Type of publication 2008. Etwa 250 S. (Xpert.press) Geb. Monograph and Human Computer Interaction; Document Preparation and Text Processing; Computers and 39,95 € Due April 2008 Society; Media Design ISBN 978-3-540-32737-0 Target groups 2008. 80 illus. in color. Geb. Researchers, Academincs, Research & Develop- ment staff 74,85 € ISBN 978-1-84800-106-0 Type of publication Contributed volume

Due March 2008

2008. Approx. 300 p. Geb.

79,13 € ISBN 978-1-84800-049-0 80 Computer springer.com/booksellers

M. Haun, Altrip T. Hauser, Starnberg; C. Wenz, Starnberg X. He, Peking University, China; S. Xu, Peking University, China

Handbuch Informationstechnologie Moodle 2.0 Process Neural Networks

E-Learning mit dem Open-Source-Lernsystem Theory and Applications

Menschen werden zunehmend in IT-Entschei- dungsprozesse involviert oder sind von ihnen betrof- E-Learning war lange Hype, dann kam der Einbruch. Part of the new series, Advanced Topics in Science fen. Gerade die aktive Mitgestaltung von Organisa- Mittlerweile hat sich der Markt gewandelt: statt and Technology in China, this book proposes the tionsprozessen verlangt ein fundiertes Wissen über komplett Online-basierter Maßnahmen ist Blended concept and model of a process neural network for Informationstechnologie. Auch die Privatsphäre Learning, die Verbindung von realen Kursen und the first time, showing how it expands the mapping bleibt von dieser Thematik nicht unberührt, da auch virtueller Lernplattform, zum Schlagwort geworden. relationship between the input and output of tradi- hier die Informationstechnologie eine zunehmend Eine der erfolgreichsten Lösungen auf diesem Gebi- tional neural networks, and enhancing the expres- wichtige Rolle spielt.  Das Buch bereitet die et ist die Open-Source-Plattform Moodle, sie eignet sion capability for practical problems, with broad ap- Grundlagen der Informationstechnologie prax- sich auch für größere Projekte und wird ständig plicability to solving problems relating to process in isorientiert auf und ermöglicht so das Treffen weiterentwickelt. Die Autoren behandeln Moodle practice. Some theoretical problems such as continu- zielorientierter Entscheidungen. Nach dem aus Sicht der vier Personengruppen, die - neben ity, functional approximation capability, and com-  "Alles-aus-einem-Buch-Prinzip" vermit- den Teilnehmern selbst - mit der Plattform arbeit- puting capability, are strictly proved. The application telt es das entscheidende Wissen über Begriffe und en. Trainer erfahren, wie Sie mit Moodle didaktisch methods, network construction principles, and opti- Grundprinzipien.   hochwertige Schulungen erstellen, Kursersteller ler- mization algorithms of process neural networks in Features nen, neue Kurse einzurichten und zu verwalten, practical fields, such as nonlinear time-varying sys- Grundlagen der Informationstechnologie f? die Administratoren erarbeiten die Konfigurationsein- tem modeling, process signal pattern recognition, Praxis Basiswissen, das zielorientierte Entscheidun- stellungen und die Installation von Erweiterungen. dynamic system identification, and process forecast, gen erleichtert Webentwickler erfahren, wie sie Moodle anpassen, are introduced in detail. There are rich illustrations eigene Templates und Icons entwickeln und Er- for information processing flow and the mapping Contents weiterungen programmieren. Das Buch bietet einen relationship between inputs and outputs of process Information: umfassenden Überblick – angereichert durch Praxis- neural networks. Informationstheorie; Informationswissenschaft.- erfahrungen aus Projekten der Autoren. Technologie: Software-Technik; Hardware-Technik; Features Kommunikationstechnik.- Anwendungen.- Ausblick Features Proposes concept and model of a process neural net- (Zukunftstechnologie). Fundierte Einführung in die Nutzung von Moo- work for the first time Shows how a process neural dle. Darstellung der mediendidaktischen Grund- network improves the expressing capability of ar- Fields of interest lagen. Mit zahlreichen Praxisbeispielen. Erstes tificial neural networks Proves theory and proper- Information Systems; Information Systems and deutschsprachiges Buch zu Moodle 2.0.   &nb- ties of process neural networks such as continuity, Communication Service; Management sp; functional approximation ability, and computing power Shows how a process neural network can pro- Target groups Contents cess time-varying signals directly and has extensive Praktiker Teil I: Einführung.- Moodle im Schnelldurchlauf.- adaptability [..] Blended Learning.- Installation auf einem Test- Type of publication system.- Teil II: Moodle für Administratoren.- Contents Professional book Kurskonfiguration im Detail.- Teilnehmerver- Introduction.- Artificial Neural Networks.- Process waltung.- Kurssicherungsstrategien.- Teil III: Neurons.- FeedForward Process Neural Networks Due May 2008 Moodle für Kursersteller.- Kursverwaltung.- and Theoretical Issues.- Learning Algorithm of Pro- Kurssicherungsstrategien.- Häufige Arbeitsschritte cess Neural Networks.- FeedBack Process Neural vereinfachen.- Teil IV: Moodle für Trainer.- Kurs Networks.- Multi-aggregation Process Neural Net- 2008. XIV, 560 S. 106 Abb. 14 Tab. Geb. verwalten.- Mit Teilnehmern kommunizieren.- works.- Design and Construction of Process Neural 79,95 € Lernaktivitäten und didaktische Alternativen.- Teil Networks.- The Applications of Process Neural Net- ISBN 978-3-540-20704-7 V: Moodle anpassen.- Neue Lernaktivitäten und works. Module hinzufügen.- Eigene Lernaktivitäten und Module entwickeln.- Eigene [..] Fields of interest Artificial Intelligence (incl. Robotics); Pattern Recog- Fields of interest nition Media Design; Multimedia Information Systems; In- formation Systems Applications (incl.Internet); User Target groups Interfaces and Human Computer Interaction; Com- Students and researchers interested in artificial neu- puters and Education ral networks, time-varying information processing, and machine learning Target groups Praktiker in Aus- und Weiterbildung, E-Learn- Type of publication ing-Entwickler, Web-Designer, Trainer, Adiminis- Monograph tratoren und Programmierer Due November 2007 Type of publication Professional book Distribution rights in China: Zhejiang University Press Due January 2009 Jointly published with Zhejiang University Press

2009. Etwa 600 S. 200 Abb. (X.media.press) Geb. 2008. Approx. 325 p. 85 illus. (Advanced Topics in Science and 49,95 € Technology in China ) Geb. ISBN 978-3-540-46371-9 127,33 € ISBN 978-3-540-73761-2 springer.com/booksellers Computer 81

B. Hefley, Carnegie Mellon University, Pittsburgh, PA, USA; W. M. Hepp, University of Innsbruck, Austria; P. De Leenheer, Vrije P. Hitzler, Universität Karlsruhe; M. Krötzsch, Universität Karl- Murphy, IBM Almaden Research Center, San Jose, CA, USA (Eds.) Universiteit Brussel, Belgium; A. de Moor, Vrije Universiteit Brus- sruhe; S. Rudolph, Universität Karlsruhe; Y. Sure, Universität Karl- sel, Belgium; Y. Sure, University of Karlsruhe, Germany (Eds.) sruhe Service Science, Management and Engineering (SSME) Ontology Management Semantic Web Semantic Web, Semantic Web Services, and Business Applica- Grundlagen Education for the 21st Century tions

Das Buch Semantic Web – Grundlagen vermittelt IBM has taken the lead in recognizing that college Managing ontologies and annotated data throughout als erstes deutschsprachiges Lehrbuch die Grund- graduates need new skills to address business and their life-cycles is at the core of semantic systems of lagen des Semantic Web in verständlicher Weise. technical issues in a service business environment. all kinds.  Ontology Management, an edited Es ermöglicht einen einfachen und zügigen Ein- Because services depend critically on people work- volume by senior researchers in the field, provides stieg in Methoden und Technologien des Seman- ing together and with technology to provide val- an up-to-date, concise and easy-to-read reference on tic Web und kann z.B. als solide Grundlage für die ue for others, these new skills include the ability this topic. This volume describes rele- Vorbereitung und Durchführung von Vorlesungen to integrate across traditional disciplinary areas vant tasks, practical and theoretical challenges, lim- genutzt werden. Die Autoren trennen dabei sauber to obtain globally effective solutions. Service Sci- itations and methodologies, plus available software zwischen einer intuitiven Hinführung zur Verwen- ence, Management and Engineering (SSME) is one tools. The editors discuss integrating the conceptu- dung semantischer Technologien in der Praxis ein- such approach to properly focusing al and technical dimensions with a business view on erseits, und der Erklärung formaler und theoretisch- education and research on services, and to prepar- using ontologies, by stressing the cost dimension of er Hintergründe andererseits. Nur für letzteres wer- ing tomorrow’s graduates to work in an expanding ontology engineering and by providing guidance on den Grundkenntnisse in Logik vorausgesetzt, die services economy. This contributed volume was de- how up-to-date tooling helps to build, maintain, and sich bei Bedarf jedoch durch zusätzliche Lektüre und veloped from the IBM-hosted conference on Octo- use ontologies.  Also included is a one- mit Hilfe eines entsprechenden Kapitels im Anhang ber 5-7, 2006, designed to discuss the current sta- stop reference on all aspects of managing ontological aneignen lassen. Das Lehrbuch richtet sich primär tus and foster the development and advancement of data and best practices on ontology management for an Studenten mit Grundkenntnissen in Informatik SSME.  Contributions explore the ways SSME a number of application domains. Ontology Man- sowie an interessierte Praktiker welche sich im Bere- has been introduced into curricula, services research agement is designed as a reference or secondary text ich Semantic Web fortbilden möchten. that is underway or is planned, and recom- for researchers and advanced-level students studying mended actions for academia and governments to semantic systems, Semantic Web [..] Features establish SSME as its own discipline. Erstes deutschsprachiges Lehrbuch zum Thema Features Autoren arbeiten in einer der weltweit führenden Features -Provides a one-stop reference on all aspects of man- Forschungsgruppen zum Semantic Web Provides a unique insight into the evolving field aging ontological data -Disseminates experiences, of SSMEProvides exemplars for educators and in- lessons learned, and best-practices on ontology man- Contents dustrial leaders in service science education and agement from a number of application domains Praktische Einführung: Syntax und Intuition.- Solide trainingContributors  have international back-   Grundlagen: Semantik.- Aktuelles Thema: Regel- grounds with SSME experience and educationRead- sprachen.- Ontologien in der Praxis: Erstellung und ers will derive an understanding of education needs Contents Anwendung.- Offene Fragestellungen.- Anhang. and programs offering in SSME -Dedications.- Foreword by Professor Di- Prädikatenlogik.   eter Fensel, DERI, University of Innsbruck.- Ac- Fields of interest knowledgements.- List of Reviewers.- List of Au- Fields of interest Business/Management Science, general; The Com- thors.-Overview.- Ontologies: State of the Art, Busi- Information Storage and Retrieval puting Profession; Technology Management; Com- ness Potential, and Grand Challenges.- Infrastruc- puting Milieux; Information Systems; Management ture.-Engineering and Customizing Ontologies: The Target groups of Computing and Information Systems Human-Computer Challenge in Ontology Engi- Dozenten und Studenten der Informatik neering.- Integrated Environments for Ontology Type of publication Management.- Ontology Reasoning with Large Data Type of publication Contributed volume Repositories.- Evolution, Alignment, And The Busi- German textbook ness Perspective.- Ontology Evolution: State-of-the- Due January 2008 art and Future Directions.- Ontology Alignments: Due October 2007 An Ontology [..] 2008. Approx. 355 p. (Service Science: Research and Innovations 2008. X, 277 S. 40 Abb. (eXamen.press) Softcover in the Service Economy) Geb. Fields of interest Information Systems Applications (incl.Internet); In- 24,95 € 106,30 € formation Systems and Communication Service; Ar- ISBN 978-3-540-33993-9 ISBN 978-0-387-76577-8 tificial Intelligence (incl. Robotics); e-business and e- commerce; Database Management; Multimedia In- formation Systems

Target groups Advanced-level students and researchers in comput- er science

Type of publication Contributed volume

Due December 2007

2008. Approx. 314 p. (Semantic Web and Beyond, Band 7) Geb.

82,39 € ISBN 978-0-387-69899-1 82 Computer springer.com/booksellers

P. Holleczek, Universität Erlangen-Nürnberg, Erlangen; B. Vo- A. Holovaty, Chicago, IL, USA; J. Kaplan-Moss, Lawrence, KS, USA B. Holtschke, Accenture GmbH, München; H. Heier, Accenture gel-Heuser, Universität Kassel (Eds.) GmbH, Düsseldorf; Th. Hummel, Accenture GmbH, München The Definitive Guide to Django Mobilität und Echtzeit - PEARL 2007 Quo Vadis CIO? Web Development Done Right Fachtagung der GI-Fachgruppe Echtzeitsysteme (real-time) Boppard, 6./7. Dezember 2007 Ziel ist es, die geänderte Rolle des CIO vor dem Django, the Python-based equivalent to Ruby’s Hintergrund grundlegender Entwicklungen und Rails Web development framework, is presently Trends aufzuzeigen. Wie kann der CIO mit bes- Mit ihrer Jahrestagung 2007 bietet die GI-Fach- one of the hottest topics in Web development to- timmten Entscheidungen auf neue Herausforderun- gruppe Echtzeitsysteme und PEARL Nutzern und day. Its creator (and co-author of this book) Adri- gen reagieren? Im ersten Teil des Buches werden Herstellern ein Forum an, auf dem neue Trends und an Holovaty has since become a superstar of sorts grundlegende Trends dargestellt, die eine veränderte Entwicklungen zu folgenden Themengebieten aus due to the compelling array of Web applications he’s CIO-Rolle bedingen. Im zweiten Teil des Buches dem Bereich der "Mobilität und Echtzeit" vorgestellt built using Django, including most notably http:// werden dann verschiedene Entscheidungsfelder als werden. Abgedeckt werden folgende Sachgebiete: www.chicagocrime.org/. Along with Django lead de- Reaktion auf diese Trends dargestellt, die auf die Po- Safety, Security, Kommunikation, Automotive, Be- veloper Jacob Kaplan-Moss, they’re writing this book sition - bzw. die Entscheidungsmglichkeiten  - triebssysteme, Robotik, Ressourcenmanagement mit with the intention of making it the definitive guide des CIO's zugeschnitten sind. Anwendungsbeispielen, Konzepten und Entwick- to the technology. Django: Web Development Done lungsumgebungen. Right is broken into three parts, with the first intro- Features ducing Django fundamentals such as installation and Darstellung der Treiber für das Geschäft des CIO. Features configuration, and creating the components that ul- Erläuterung der Entscheidungsmöglichkeiten des Jahrestagung 2007 der GI-Fachgruppe "Echtzeitsys- timately together power a Django-driven website. CIO. Bietet Orientierung in einem neuen Manage- teme und PEARL" Neue Trends und Entwicklungen Part II delves into the more sophisticated features of ment-Feld. Mit Anwendungsbeispielen Django, such as outputting non-HTML non-html Contents Fields of interest content such as RSS feeds and PDFs, caching, and Cost and Value.- IT-Industrialisierung.- Technolo- Computer Systems Organization and Communi- user management. Part III serves as a detailed refer- gie und Technologiefortschritt.- Embedded Product cation Networks; Computer Communication Net- ence to Django’s many configuration options and IT.- Multiprojekt-/Programm-Management.- Strate- works; Software Engineering/Programming and Op- commands. [..] gische IT.- IT-Organisation.- IT-Architektur.- Opti- erating Systems Features mierung des IT-Servicemanagements.- Sourcingkon- Target groups This is the first Django book Authored by the cre- tinuum.- Optimierte Governacestrukturen und - Wissenschaftler, Doktoranden, Studenten ators and developers of Django Adrian Holovaty and prozesse. Jacob Kaplan-Moss, this high-profile duo continues Type of publication to win numerous awards for their compelling Web Fields of interest Proceedings applications Both a tutorial on creating websites us- Management of Computing and Information ing Django, and a reference guide for more advanced Systems; Information Systems and Communica- developers tion Service; Information Systems Applications Due November 2007 (incl.Internet); Management; Technology Manage- Contents ment 2008. Etwa 150 S. (Informatik aktuell) Softcover Part 1: Getting Started.- Introduction to Django.- Getting Started.- Creating Models.- The Admin Site.- Target groups 39,95 € Writing Views.- The Template Engine.- Form Pro- IT-Führungskräfte in Industrie- und Serviceun- ISBN 978-3-540-74836-6 cessing.- Part 2: Django's Sub-Frameworks.- Gener- ternehmen ic Views.- Extending The Template Engine.- Out- putting Non-HTML Content.- Users, Sessions, and Type of publication Registration.- Comments.- Caching.- Integrating Professional book With Legacy Databases.- Customizing The Django Admin.- Internationalization and Localization.- De- Due March 2008 ploying Django.- Part 3: Reference.- Appendix. Mod- el Definition.- Appendix. Database API.- Appendix. 2008. Etwa 250 S. (Xpert.press) Geb. Generic Views.- Appendix. Built-In Template.- [..] 39,95 € Fields of interest ISBN 978-3-540-74588-4 Special Purpose and Application-Based Systems

Target groups All levels of web developers

Type of publication Professional book

Due December 2007

Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center

2008. Approx. 400 p. Softcover

37,40 € ISBN 978-1-59059-725-5 springer.com/booksellers Computer 83

J. Holub, Czech Technical University of Prague, Czech Republic; J.-P. Homann, Berlin J.-P. Homann, Berlin, Germany J. Ždárek, Czech Technical University of Prague, Czech Republic (Eds.) Praxis Digitales Colormanagement Color Management

Implementation and Application of Druckproduktion mit ICC-Profilen, der ISO 12647-2 und PDF/ Principles and Practical Applications Automata X-1a

12th International Conference, CIAA 2007, Prague, Czech Re- The use of differing input and output equipment public, July 16-18, 2007, Revised Selected Papers Anhand ausgewählter Lösungen werden die Strate- (scanners, monitors, printers, etc.) in computer-aid- gien des Bandes "Digitales Colormanagement" in die ed publishing often results in the unsatisfactory Praxis umgesetzt. Aufbauend auf den übergreifenden reproduction of color originals in print and on- This book constitutes the thoroughly refereed post- Themen High-End Digitalproof und Monitorkalib- line media. The theoretical principles of a theory proceedings of the 12th International Conference on rierung folgen Kapitel für einzelne Anwendergrup- of color, color measurement, and offset printing Implementation and Application of Automata, CIAA pen. Dies sind Fotografen, Grafiker, Inhouse-Repro are indispensable for calibrating the overall course 2007, held in Prague, Czech Republic, in July 2007. in der Agentur, Automatisierung in der Reprofir- of production.This volume, printed in four-color The 23 revised full papers and 7 revised poster pa- ma und ISO 12647-2 in der Druckerei. Für Produk- throughout, provides not only this, but also numer- pers presented together with the extended abstracts tioner gibt es in den einzelnen Kapiteln nochmals ous tips and tricks on how to work with color in pre- of 4 invited lectures were carefully reviewed and se- kurze Zusammenfassungen. Die beigelegte CD-ROM press. And it does so in a practical and graphic man- lected from 79 submissions and have gone through enthält exklusive Testdaten für die Kontrolle des ner. This edition pays special attention to a digital two rounds of reviewing and improvement. The pa- Colormanagement-Workflows, Musterprofile und media production workflow that makes use of Adobe pers cover various topics in the theory, implementa- Demoversionen von Anwendungsprogrammen. Ein Photoshop.The accompanying CD-ROM includes tion, and applications of automata and related struc- wichtiger Schwerpunkt ist dabei der Einsatz von De- numerous demo versions of color management tools. tures. viceLink-Profilen für die Farbkonvertierung bzw. Farboptimierung von PDF/X-1a-Druckdaten. Features Fields of interest With a large part of the book devoted to illustra- Computation by Abstract Devices; Algorithm Anal- Features tions, it is especially suited to providing occupational ysis and Problem Complexity; Logics and Meanings Das "Kochrezept" zur Erstellung von Druckdaten, groups from the areas of design, image editing, and of Programs; Mathematical Logic and Formal Lan- rechtsverbindlichen Digitalproofs und dem standar- offset printing with efficient access to the principles guages disierten Druck Best Practice für Produktionsagen- and practical applications of digital color manage- turen, Vorstufenbetriebe und Druckereien mentA presentation of how to use Photoshop and Target groups ICC-profilesA CD-ROM for Mac and Windows with Researchers and professionals Contents an array of demo software Einleitung.- Der digitale Proof.- Softproof.- Fo- Type of publication tograf: Von der RGB-Datei zum ISOcoated-Proof.- Contents Proceedings Grafik: ISOcoated PDF/X-1a erstellen und proofen.- From the contents:The Color Theory of Ideal Col- Von der Grafik zur Reproduktion.- Druck nach ISO ors.- The Color Theory of Real Colors.- Color Due October 2007 12647-2. Swatch Catalogue for the LCH Color Spectrum.- Foundations of Color Management.- Foundations Fields of interest of Print and Reproduction.- The ICC Standard and 2007. XIII, 324 p. (Lecture Notes in Computer Science, Band 4783) Media Design; Document Preparation and Text Pro- Softcover PostScript.- Scanning Optimization Using Standard cessing; Computer Graphics Profiles.- Individual Profiles and Complete Docu- 51,36 € ments.- Important Addresses.- Index.- CD-ROM for Target groups ISBN 978-3-540-76335-2 Macintosh and Windows. Grafiker, Werbeagenturen, Verlage, Druckvorstufen- betriebe, Inhouse-Publishing, Druckereien, freie Fields of interest Ausbildungsinstitute, Hochschulen, Berufsschulen, Document Preparation and Text Processing; Com- Designer puter Graphics

Type of publication Target groups Professional book Graphic designers, advertising and multimedia agen- cies, publishers, pre-press firms, in-house publishers, Due April 2008 printers, independent educational institutes, univer- sities, technical schools 2008. Etwa 220 S. 500 Abb. in Farbe. Mit CD-ROM. (X.media.press) Geb. Type of publication Professional book 129,95 € ISBN 978-3-540-33803-1 Due April 2008

2008. Approx. 220 pp. 200 figs., 120 in color., with CD-ROM. (X.media.publishing) Geb.

64,15 € ISBN 978-3-540-67119-0 84 Computer springer.com/booksellers

V. Honavar, Iowa State University, Ames, IA, USA; D. Caragea, C. Hood, Hood Group, Northampton, UK; S. Wiedemann, Hood C. Hood, Hood Group, Northampton, UK; S. Wiedemann, Hood Iowa State University, Ames, IA, USA Group, Munich, Germany; S. Fichtinger, Hood Group, Munich, Group, München; S. Fichtinger, U. Pautz Germany; U. Pautz, Hood Group Munich, Germany Collaborative Knowledge Anforderungsmanagement und Acquisition from Semantically Requirements Management Anforderungsentwicklung Disparate, Distributed Data Sources Interface between Requirements Development and all other Engineering Processes Die Schnittstelle zwischen Anforderungs-Entwicklung und allen anderen Prozessen des Systems Engineering

This is the first book to offer a cohesive treatment of Requirements Management has proven itself to be the research problems in collaborative knowledge ac- Anforderungsmanagement hat sich in den letzten an enormous potential for the optimisation of devel- quisition from semantically disparate information Jahre als enormes Potential zur Optimierung von opment projects throughout the last few years. Espe- sources & approaches for addressing the prob- Entwicklungsprojekten herauskristallisiert. Gerade cially in the climate of an increasingly competitive lems. The book discusses the fundamental advances in einem Klima immer schärfer werdenden Wet- market Requirements Management helps in carrying in this area covering a broad range & complex- tbewerbs hilft das Anforderungsmanagement, En- out developments faster, cheaper and with a higher ity of research issues. The approach taken incorpo- twicklungen schneller, kostengünstiger und qual- quality. This book focusses on the interfaces of Re- rates a synergistic synthesis of insights, algorithms itativ hochwertiger durchzuführen. Dieses Buch quirements Management to the other disciplines of & results drawn from multiple areas including: fokussiert die Schnittstellen des Anforderungsman- Systems Engineering, for example Project Manage- • Artificial Intelligence – especially machine learn- agements zu den anderen Disziplinen des Systems ment, Change Management and Configuration and ing, data mining, knowledge representation & Engineering, beispielsweise dem Projektmanage- Version Management. To this end, an introduction inference, intelligent agents & multi-agent sys- ment, dem Änderungsmanagement und dem Kon- into Requirements Management and Requirements tems; • Information Systems – especially databases, figurations- und Versionsmanagement. Dazu wer- Development is given, along with a short sketch of information integration, semantic web; & • Dis- den neben einem Einstieg in das Anforderungsman- Systems Engineering, and especially the necessary in- tributed computing & software engineering (e.g. agement und die Anforderungsentwicklung und puts and resulting outputs of Requirements Manage- service-oriented computing). Written for researchers einem kurzen Abriß des Systems Engineering ins- ment are explained. Using these flows of information & graduate students as well as advanced prac- besondere die notwendigen Inputs und resultieren- it is shown how Requirements Management can sup- titioners in data mining, semantic technologies, AI, den Outputs des Anforderungsmanagements erklärt. port and optimse the other project disciplines and Information integration, the semantic web, & Anhand dieser Informationsflüsse wird gezeigt, wie how very important therefore a functioning Require- information systems, this accessible [..] enorm wichtig ein funktionierendes Anforderungs- ments Management is for all areas of development. management für alle Entwicklungsbereiche ist. Features Fields of interest The first book to offer: • Comprehensive treatment Features Software Engineering; Information Systems; Man- of the theoretical framework, algorithms & ap- Anforderungsmanagement als Grundlage der Syste- agement; Management of Computing and Informa- plications involving knowledge acquisition from mentwicklung Standardwerk für Anforderungsman- tion Systems large distributed autonomous data repositories • agement und seine Schnittstellen mit den anderen Treatment of the theoretical framework for integra- Target groups Projektdisziplinen tion of information, from a user’s point of view • Software engineers, project managers, consultants Theoretically well-founded algorithms for learning Fields of interest classifiers from semantically heterogeneous informa- Type of publication Software Engineering; Information Systems; Man- tion sources Professional book agement; Management of Computing and Informa- tion Systems Contents Due November 2007 Introduction.- Learning Predictive Models from Da- Target groups ta Revisited.- Learning Predictive Models from Dis- Software-Ingenieure, Projektmanager in Softwareen- tributed Data.- Self-Describing Data Sources and 2008. Approx. 220 p. Geb. twicklung und Qualitätssicherung, Consultants Programs.- Bridging the Semantic Gap.- Learning Predictive Models from Semantically Disparate Da- 64,15 € Type of publication ta.- Learning Predictive Models from Partially Speci- ISBN 978-3-540-47689-4 Professional book fied Data.- Steps Toward a Collaborative Knowledge Acquisition Environment.- Summary and Discussion Due August 2008

Fields of interest 2008. Etwa 250 S. (Xpert.press) Geb. Information Storage and Retrieval; Information Sys- tems Applications (incl.Internet) 49,95 € ISBN 978-3-540-34898-6 Target groups Researchers, Graduates

Type of publication Monograph

Due May 2008

2008. Approx. 250 p. Also available online. (Advanced Informa- tion and Knowledge Processing) Geb.

80,20 € ISBN 978-1-84628-894-4 springer.com/booksellers Computer 85

E. Hossain, University of Manitoba, Winnipeg, MB, Canada; V.K. E. Hossain, University of Manitoba, Winnipeg, MB, Canada; K.K. Bhargava, University of British Columbia, Vancouver, BC, Canada 2007. Approx. 450 p. Geb. Leung, Imperial College, London, UK (Eds.) (Eds.) 82,34 € Wireless Mesh Networks Cognitive Wireless Communication ISBN 978-0-387-68830-5 Networks Architectures and Protocols

The book includes a set of research and survey arti- The proposed book includes a set of research and cles featuring the recent advances in theory and ap- survey articles featuring the recent advances in the- plications of wireless mesh networking technology ory and applications of cognitive radio technology which will be a significant component in the next for the next generation (e.g., fourth generation) wire- generation (e.g., fourth generation) mobile commu- less communication networks. Cognitive radio has nication networks. Wireless mesh networks consist emerged as a promising technology for maximizing of mesh clients and mesh routers, where the mesh the utilization of the limited radio bandwidth while routers form a wireless infrastructure/backbone accommodating the increasing amount of services and interwork with the wired networks to provide and applications in the wireless networks. A cogni- multihop wireless Internet connectivity to the mesh tive radio transceiver is able to adapt to the dynam- clients. Wireless mesh networking has emerged as ic radio environment and the network parameters one of the most promising concept for self-organiz- to maximize the utilization of the limited radio re- ing and auto-configurable wireless networking to sources while at the same time providing flexibility provide adaptive and flexible wireless Internet con- in wireless access. Development of cognitive radio nectivity to mobile users. This concept can be used technology has to deal with technical and practical for different wireless access technologies such as considerations as well as regulatory requirements, IEEE 802.11, 802.15, 802.16-based WLAN, WPAN, and therefore, there is an increasing interest on this and WMAN technologies. Potential application sce- technology among the researchers and the spectrum narios for wireless mesh networks include access and policy makers. The contributed articles cover both backhaul support for cellular networks, home net- the theoretical concepts (e.g., [..] works, enterprise [..]

Features Features Presents a unified view of the cognitive radio tech- Presents a unified view of the wireless mesh net- nology (both theory and practice) Offers a compre- works (both theory and practice) Offers a compre- hensive treatment of state-of-the-art cognitive ra- hensive treatment of the state-of-the-art of wireless dio technology Covers a wide range of topics mesh networking technology Covers of a wide range starting from information-theoretic analysis to pro- of topics starting from information-theoretic analysis tocol design and optimization issues, and test-bed to protocol design and optimization issues, and test- results Includes contributions from world-class re- bed results Includes contributions from world-class searchers in this area researchers in this area

Contents Contents Fundamental Issues in Cognitive Radio.- Informa- Challenges and Issues in Designing Architectures tion Theoretic Analysis of Cognitive Radio Systems.- and Protocols for Wireless Mesh Networks.- Ar- Coexistence and Dynamic Sharing in Cognitive Ra- chitectures and Deployment Strategies for Wire- dio Networks.- Cooperative Spectrum Sensing.- less Mesh Networks.- End-to-End Design Principles A Protocol Suite for Cognitive Radios in Dynam- for Broadband Cellular Mesh Networks.- Medium ic Spectrum Access Networks.- OFDM-Based Cog- Access Control and Routing Protocols for Wireless nitive Radios for Dynamic Spectrum Access Net- Mesh Networks.- Channel Assignment Strategies for works.- Link Adaptation in OFDM-Based Cognitive Wireless Mesh Networks.- Optimal Resource Allo- Radio Systems.- UWB-based Cognitive Radio Net- cation for Wireless Mesh Networks.- Resource Al- works.- Degrees of Cooperation in Dynamic Spec- location and Cost in Hybrid Solar/Wind Powered trum Access for Distribution Cognitive Radios.- WLAN Mesh Nodes.- Scheduling, Routing and Re- Cognitive MAC Protocols for Dynamic Spectrum lated Cross-Layer Management through Link Activa- Access.- Game Theoretic Learning [..] tion Procedures in [..]

Fields of interest Fields of interest Communications Engineering, Networks; Com- Communications Engineering, Networks; Computer puter Communication Networks; Microwaves, RF Communication Networks; Signal,Image and Speech and Optical Engineering; Artificial Intelligence (in- Processing; Microwaves, RF and Optical Engineer- cl. Robotics); Computer Systems Organization and ing; Electronic and Computer Engineering; Comput- Communication Networks; Signal,Image and Speech er Systems Organization and Communication Net- Processing works

Target groups Target groups Graduate students in wireless communications, re- Graduate students, researchers in academia and in- searchers in academia and industry in wireless com- dustry, practitioners working in the area of wireless munications, practitioners working in the area of technology and telecommunications in general wireless technology and telecommunications in gen- eral Type of publication Contributed volume Type of publication Contributed volume Due November 2007

Due December 2007 2007. Approx. 480 p. Geb. 86 Computer springer.com/booksellers

117,65 € S. Huang, City University of Hong Kong, China; D. MacCallum, X. Huang, University of Canberra, ACT, Australia; Y.-S. Chen, Na- ISBN 978-0-387-68838-1 University of Minnesota, MN, USA; D.-Z. Du, University of Texas at tional Taipei University, San Shia, Taipei County, Taiwan; S.-I. Ao, Dallas, TX, USA (Eds.) IAENG Secretariat, Hong Kong, China (Eds.)

Network Security Advances in Communication Systems and Electrical Engineering

This book provides a reference tool for the increas- ing number of the scientists whose research is related This volume contains contributions from partici- to sensor network security. The book is organized in- pants in the 2007 International Multiconference of to several sections, each including some chapters ex- Engineers and Computer Scientists Topics covered ploring a specific topic. Network security is attract- include communications theory, communications ing great attention and there are many research top- protocols, network management, wireless networks, ics waiting to be studied. In this book, the topics cov- telecommunication, electronics, power engineering, ered include network design and modeling, network control engineering, signal processing, and industri- management, data management, security and appli- al applications. The book will offer the states of arts cations. The aim, intent, and motivation of this book of tremendous advances in communication systems is to provide a reference tool for the increasing num- and electrical engineering and also serve as an excel- ber of scientists whose research is more or less in- lent reference work for researchers and graduate stu- volved in network security. dents working with/on communication systems and Features electrical engineering. Contains the most current techniques and advances Features in network security Covers a variety of subjects in the frontiers of intel- Contents ligent systems and computer engineering and their Conventional Cryptographic Primitives.- A Cryp- industrial applications An excellent reference work tographic Framework for the Controlled Release of for researchers and graduate students working in Certified Data.- Mechanical Verification of Crypto- the field Deals with theories and applications for the graphic Protocols.- Scalable Group Key Management modern communications and electrical engineer- for Secure Multicast: A Taxonomy and New Direc- ing, including wireless communications, mobile net- tions.- Secure Metering Schemes.- Web Forms and working, and ubiquitous computing communica- Untraceable DDoS Attacks.- Attacks and Counter- tions Covers a [..] measures in Sensor Networks: A Survey.- Efficient Contents Trapdoor-Based Client Puzzle Against DoS Attacks.- Cooperative Transmission to Increase Gain by Em- Security Issues of Mobile Ad Hoc Networks.- Rout- ploying Pre-Coding Scheme.- High Capacity and ing Security in Ad Hoc Wireless Networks.- Insid- Reliable Technique for Wireless Personal Area Net- er Threat Assessment: Models, Analysis, and Tools.- works.- Including Adaptive Behavior in a Wireless Toward [..] Network System.- Classification Technique Using Fields of interest Neural Networks and Clustering Architecture for Coding and Information Theory; Data Structures, Wireless Sensor Networks.- PALMS: A Reliable and Cryptology and Information Theory; Special Pur- Incentive-Based P2P Live Media Streaming System.- pose and Application-Based Systems; Data Encryp- A Novel Dynamical Compressing of XML Data for tion; Computer Communication Networks Transmission on Networks.- An Authenticated Key Management Scheme for Hierarchical Wireless Sen- Target groups sor Networks.- A New Approach in Scheduling for Researchers in Computer Science and Computer En- Differentiated [..] gineering, Operations Research, and Mathematics Fields of interest Type of publication Communications Engineering, Networks; Computer Monograph Communication Networks; Signal,Image and Speech Processing; Electronic and Computer Engineering; Computer Systems Organization and Communica- Due April 2008 tion Networks; Power Engineering

2008. Approx. 370 p. Geb. Target groups Communication systems engineers and electrical en- 106,30 € gineers as well as researchers and graduate students ISBN 978-0-387-73820-8 working with communication systems and electrical engineering

Type of publication Contributed volume

Due February 2008

2008. Approx. 695 p. (Lecture Notes Electrical Engineering, Band 4) Geb.

144,40 € ISBN 978-0-387-74937-2 springer.com/booksellers Computer 87

M. Hyslop, Onyx Group, UK R.R. Höppel, Frankfurt S. Iannuzzi, Palmyra, NJ, USA; A. Jones, A. Freeman

Critical Information Infrastructures Der Ruby-Atlas Beginning ASP.NET 2.0 Web

Resilience and Protection Services in C# From Novice to Professional Der Ruby-Atlas bietet eine umfassende Darstel- lung der Implementierung von Prototypen mittels The world moves on Critical Information Infras- der objektorientierten Skriptsprache Ruby. Dabei tructures, and their resilience and protection is of vi- werden Strukturen und Sprachelemente von Web Services are the ideal technology for anyone tal importance. Starting with some basic definitions Ruby zunächst ausführlich beschrieben und dann who wants to deploy and consume services and func- and assumptions on the topic, this book will go on detaillierte Konzepte entwickelt, die für eine er- tionality over the web, in a secure, platform indepen- to explore various aspects of Critical Infrastructures folgreiche Erstellung von Prototypen besonders dent manner, for example, stock reports, timetable throughout the world – including the technologi- geeignet sind. Basis des Textes sind ein fundiertes data, banking credentials, etc. This book covers the cal, political, economic, strategic and defensive. This Tutorium und eine sorgfältig erstellte und mit latest Microsoft technologies for developing web ser- book will be of interest to the CEO and Academic Beispielen angereicherte Referenz zu dieser Skript- vices (the .NET 2.0 platform, C# language, and Visu- alike as they grapple with how to prepare Critical In- sprache. Zahlreiche Spezialthemen, z.B. fort- al Studio 2005 development environment,) with an formation Infrastructures for new challenges. geschrittene Objektorientierung, Persistenz, En- emphasis on security, probably the most important Features twurfsmuster und die Anbindung von C-Biblio- consideration for developers wanting to make their Thorough investigation of various elements of crit- theken, vervollständigen diesen Überblick. Das Buch web services practical and useful. Previous knowl- ical information infrastructures historically and in richtet sich vor allem an erfahrene Programmierer, edge of these technologies is recommended, but not today's society Comprehensive structure relevant die an der effizienten Erstellung von Prototypen in- essential. The book is in a classic tutorial-based style. and accessible to both professionals and academics teressiert sind und komplexe Softwareprojekte real- Starting with the basic functionality behind web ser- New work in emerging subject matter of timely im- isieren möchten. Alle Code-Beispiele können von vices, and an overview of Visual Studio 2005, and portance einer zugehörigen Website heruntergeladen werden. how web services fit into it, the authors go on to Zudem bietet das Buch ein komplexes Pro- show you how to build a basic but secure web ser- Contents gramm-Beispiel, das auch in ein [..] vice, build SOAP and HTTP clients, debug your web Definitions and Assumptions.- Critical Infrastruc- services, add exception handling, consume web ser- tures and Critical Information Infrastructures: Ap- Features vices and deploy them for others to utilize in [..] proaches by Geography.- Critical Infrastructures and Kompakte Einführung in die objektorientierte Critical Information Infrastructures: by Type.- Criti- Skriptsprache Ruby Grundlegende Darstellung des Features cal Information Infrastructure.- Some Political, Eco- Prototypings mittels Ruby Umfassender Referen- Totally up-to-date—covers .NET 2.0, C#, and Vi- nomic, Social, Technological, Environmental, Le- zteil zur Sprache und Standardbibliothek von Ruby sual Studio 2005 Security is very important for web gal and Other Process Effects on Critical Infrastruc- Praxisnahes Programm-Beispiel  Alle Code- services—this is given special treatment Little direct tures.- Comments on Standards In Information Se- Beispiele zum Downloaden im Web competition from other books - no dedicated .NET curity, Disaster Recovery, Business Continuity and 2.0 web services books Contents Business Resilience.- A Tangential Threat To OECD Entwicklungsgeschichte von Ruby.- Interpreter- Contents Resilience: The 21st Century East India Company.- aufruf.- Kommandozeilenargumente.- Modellierung Part 1: Understanding XML Web Services. Introduc- Resilience and Outsourcing Call Centers [..] in UML.- Syntaktische Konventionen.- Einsatz tion to XML Web Services. Getting Started with Vi- Fields of interest von Kontrollstrukturen und Fehlerbehandlung.- sual Studio 2005. Developing XML Web Services Us- Systems and Data Security; Computers and Society Beispiel: Adressmanager.- Grundlegende Sprachmit- ing Visual Studio .NET. Building the Credit Card tel.- Eingebaute Funktionalität.- Die Standardbiblio- Validation Service.- Part 2: XML Web Services and Target groups thek.- Fortgeschrittene Objektorientierung mit Ru- Clients. Building a SOAP Client. Building an HTTP Researchers and professionals concerned with criti- by.- Graphische Benutzerschnittstellen.- Ruby als Client. Data Types in XML Web Services. Exception cal infrastructure protection Glue Language.- Persistenz.- Kryptographie.- Die C- Handling. Debugging XML Web Services with Vi- Schnittstelle.- Entwurfsmuster mittels Ruby.- sual Studio .NET. Publishing and Discovering XML Type of publication Verteilte Anwendungen.- Ruby und das Web. Web Services.- Part 3 Advanced XML Web Services. Monograph State Management. The DataSet and XML Web Ser- Fields of interest vices. Caching and Application Events. Securing Software Engineering/Programming and Operating Due October 2007 XML Web [..] Systems; Programming Techniques; Software Engi- neering; Programming Languages, Compilers, Inter- Fields of interest 2007. XI, 360 p. Geb. preters Programming Techniques

106,95 € Target groups Target groups ISBN 978-0-387-71861-3 Professionals in der IT-Branche, Softwareentwickler, Beginner and Intermediate developers with some Programmierer, Dozenten prior .NET experience who need a solid introduction to Web Services Type of publication Professional book Type of publication Professional book Due January 2008 Due August 2008 2008. Etwa 500 S. 100 Abb. (Xpert.press) Geb. Distribution rights for Hongkong, Taiwan, RepKor, Singapore, 49,95 € Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest ISBN 978-3-540-00762-3 Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center

2008. Approx. 400 p. Softcover

ISBN 978-1-59059-726-2 88 Computer springer.com/booksellers

H. Ichikawa, The University of Electro-Communications, Japan; K. Ikeuchi, The University of Tokyo, Japan; D. Miyazaki, The Uni- N. Ince, Istanbul Technical University, Ankara, Turkey; A. Bragg, W.-D. Cho, UCN/CUS Ajou University, Korea; I. Satoh, National In- versity of Tokyo, Japan (Eds.) Raleigh, NC (Eds.) stitute of Informatics, Japan; H.Y. Youn, Sungkyunkwan Universi- ty, Korea (Eds.) Digitally Archiving Cultural Objects Recent Advances in Modeling Ubiquitous Computing Systems and Simulation Tools for Communication Networks and 4th International Symposium, UCS 2007, Tokyo, Japan, A large number of cultural heritage objects around November 26-28, 2007, Proceedings the world are deteriorating or being destroyed due Services to the work of natural disasters, such as earthquakes and floods, and human-inflicted destruction, such as This book constitutes the refereed proceedings of the war and vandalism. In the wake of these threats, 3D This book contains a selection of papers presented 4th International Symposium on Ubiquitous Com- data becomes a critical component to permanent- at a symposium organized under the aegis of COST puting Systems, UCS 2007, held in Tokyo, Japan, in ly recording the shapes of these important objects Telecommunications Action 285. COST (European November 2007. The 16 revised full papers and 8 re- so that they might be passed down to future genera- Cooperation in the field of Scientific and Technical vised short papers presented were carefully reviewed tions. Digitally Archiving Cultural Objects describes Research) is a framework for scientific and techni- and selected from 96 submissions. The papers are thorough research and methods for preserving cul- cal cooperation, allowing the coordination of nation- organized in topical sections on security and priva- tural heritage objects through the use of 3D digital al research on a European level. The main objective cy, context awareness, sensing systems and sensor data. These methods were developed through using of the Action is to enhance existing tools and devel- network, middleware, modeling and social aspects, computer vision and computer graphics technolo- op new modeling and simulation tools for research smart devices, and network. gies. This data can also be used for simulation and in emerging multi-service telecommunications net- restoration purposes as well as towards various mul- works in the areas of model performance improve- Fields of interest timedia applications. This comprehensive book is or- ments, multilayer traffic modeling, and the impor- Computer Communication Networks; Soft- ganized into four parts. Part 1 describes various sen- tant issue of evaluation and validation of the new ware Engineering; Special Purpose and Applica- sors designed to obtain data. Part 2 contains a collec- modeling tools. tion-Based Systems; Information Systems Applica- tion of papers that describe the geometric pipeline, tions (incl.Internet); User Interfaces and Human converting obtained data into a [..] Contents Computer Interaction; Computers and Society A Review of High Performance Simulation Tools Features and Modeling Concepts.- Using Visualization Tech- Target groups Editors are experts in the field of digital preservation niques in Multilayer Traffic Modeling.- A Multilevel Researchers and professionals Thorough approach to digital preservation Approach for the Modeling of Large TCP/IP Net- works.- Cross-Layer Interaction in Wireless Ad-Hoc Type of publication Contents Networks.- Multilayer Description of Large-Scale Proceedings Introduction.- Shaping Rectification of 3D Data Ob- Communication Networks.- Modeling and Simula- tained by a Moving Range Sensor by Using Image tion of TCP Performance with Link Layer Retrans- Sequences.- The Climbing Sensor: 3D Modeling of Due November 2007 mission and Fragmentation for Satellite-UMTS Net- Narrow Areas by Using Space-Time Analysis.- In- works.- The Design of a FPGA-Based Traffic Light verse Polarization Raytracing: Estimating Surface Control System.- Distributed Multihop Clustering 2007. XIII, 307 p. (Lecture Notes in Computer Science, Band 4836) Shapes of Transparent Objects.- Robust Simulta- Softcover Approach for Sensor Networks.- Toward Flexible neous Registration of Multiple Range Images.- A High Throughput [..] 51,36 € Fast Simultaneous Alighnment of Multiple Range ISBN 978-3-540-76771-8 Images.- Parallel Alignment of a Large Number of Fields of interest Range Images.- Simultaneous Determination of Reg- Computer Systems Organization and Communica- istration and Deformation Parameters Among 3D tion Networks; Information Systems and Communi- Range Images.-Parallel Processing of Range Data cation Service Merging.- Adaptively [..] Target groups Fields of interest Practicing engineers and academic researchers in the Computer Imaging, Vision, Pattern Recognition and field of telecommunications networks Graphics; Image Processing and Computer Vision; Computing Methodologies; Simulation and Model- Type of publication ing Proceedings

Target groups Due December 2007 Researchers and practitioners interested in digital archival methods, computer vision, and computer graphics technologies 2008. XX, 466 p. Geb.

Type of publication 144,40 € Contributed volume ISBN 978-0-387-73907-6

Due December 2007

2008. Approx. 540 p. Geb.

123,00 € ISBN 978-0-387-75806-0 springer.com/booksellers Computer 89

Institut für Mobilitätsforschung - IFMO, Berlin (Ed.) T. Issariyakul, Vancouver, BC, Canada; E. Hossain, Winnipeg, MB, Canada Utopian Realitites An Introduction to Network Darstellung und Analyse gängiger Methoden der Zukunfts- forschung - Innovative Ansätze und Methoden der Zukunfts- Simulator NS2 forschung im Design und ihre Übertragbarkeit auf die zukun- ftsorientierte Mobilitätsforschung The proposed book will be a beginners’ guide for network simulator NS2. NS2 is an open-source dis- „Utopian Realities" untersucht, auf welche Art diese crete event simulator designed mainly for network- in der Studie als „Kreativwissenschaften" bezeich- ing research. NS2 has been widely accepted as a reli- neten Disziplinen Zukunftsschau betreiben, mit able simulation tool for computer communication welchen Methoden sie Unsicherheit begegnen und networks both in academia and industry. However, wie sie die Zukunft durch ihre Arbeit beeinflussen. surprisingly, there is no book, by which researchers Vor diesem Hintergrund sind die Leitfragen von and students can use to learn NS2. From our expe- „Utopian Realities": Welche Ansätze der Zukunftss- rience with network simulation during the last few chau gibt es neben den etablierten Methoden der years, we have observed that it is not at all easy for a Zukunftsforschung? Für welche Fragestellungen und beginner to grasp the basis architecture and concepts welche Zeiträume sind sie besonders geeignet? Wie of NS2. For a beginner, developing customized sim- lassen sie sich in einen interdisziplinären Kanon der ulation modules is virtually out of question. This is Zukunftsforschung integrieren? due to the absence of any comprehensive tutorial on NS2 and the fact that the resources available on NS2 Features (through online) are quite limited. The major objec- Die Methoden der Zukunftsforschung werden auf tive of this book is to fill in this vacuum. Intended for das Thema Mobilität angewandt researchers in industry working in the area of com- munication networks, the book will be also valuable Contents to senior undergraduate students and [..] Einleitung.- Teil I - Grundlagen: Zugänge zu Zukun- ft.- Methoden der Zukunftsforschung.- Kreativität.- Features Zwischenergebnis.- Teil II - Der Umgang mit The book provides a guideline on how to setup, use, Zukunft im Design: Design.- Teil III - Ergebnisse and extend NS2. This book presents a layered ap- der Arbeit: Kritische Würdigung der Methoden proach to introduce communication networking der Zukunftsforschung.- Zukunftsschau im De- protocols and their simulation using NS2. The book sign.- Kreative Zukunftsschau.- Kommunikation der includes a large number of examples (e.g., codes) Zukunftsschau.- Die ideale Zukunftschau. on simulation using NS2. The book contatins sup- plementary material (e.g., simulation exercises) for Fields of interest classes and laboratories on telecommunications net- Automotive and Aerospace Engineering; Simulation working. and Modeling; Computers and Society; Economic Growth; Information Systems; Quality of Life Re- Contents search Introduction.-Network Simulator NS2.-C++ and OTcl Linkage.-Implementation of Discrete Event Target groups Simulation in NS2.-Base Classes and Inheritance Leser in der Wissenschaft, Zukunftsforscher in der Concept in NS2.-Node Connection and Packet Flow Industrie, Studierende Mechanism.-Applications and Transport Control Type of publication Protocols.-Related Supporting Classes.-Post Simu- Monograph lation Processing.-Slected Extension Samples.-Oth- er NS2 Classes.-Importing MATLAB into NS2.-Re- view of Probability Principles and Random Vari- Due December 2007 ables.-Review of Objected Oriented Programming by OTcll.-Various Tips and Troubleshooting.-Tcl/OTcl 2008. Etwa 150 S. 10 Abb. (Mobilitätsverhalten in der Freizeit) Command List.-NS2 Command List.-Index. Geb. Fields of interest 99,95 € Communications Engineering, Networks; Simula- ISBN 978-3-540-75890-7 tion and Modeling; Computer Systems Organization and Communication Networks; Computer Commu- nication Networks; Electronic and Computer Engi- neering; System Performance and Evaluation

Target groups researchers in the industry working in the area of telecommunications networking, professors, and se- nior undergraduate and graduate students

Type of publication Monograph

Due April 2008

2008. Approx. 400 p. Geb.

107,11 € ISBN 978-0-387-71759-3 springer.com/booksellers Computer 90

T. Ito, Nagoya Institute of Technology, Nagoya, Japan; H. Hat- O. Jacob, Fachhochschule Neu-Ulm (Ed.) A.K. Jain, Michigan State University, East Lansing, MI, USA; P. Fly- tori, University of Liverpool, UK; M. Zhang, University of Wollon- nn, University of Notre Dame, IN, USA; A.A. Ross, West Virginia gong, NSW, Australia; T. Matsuo, Nagoya Institute of Technology, University, Morgantown, WV, USA (Eds.) Nagoya, Japan (Eds.) ERP Value

Signifikante Vorteile mit ERP-Systemen Handbook of Biometrics Rational, Robust, and Secure Negotiations in Multi-Agent Systems Systemen zum Enterprise Resource Planning, kurz Biometrics is a rapidly evolving field with applica- ERP-Systemen, geht der Ruf voraus, enorme Kosten tions ranging from accessing one’s computer to gain- zu verursachen. Hingegen bleibt der Nutzen von ing entry into a country. The deployment of large- ERP-Systemen für Unternehmen oftmals unklar. scale biometric systems in both commercial and This book addresses all aspects of negotiation mech- Das Buch geht der Frage nach, wie Unternehmen government applications has served to increase the anisms in multi-agent systems, including Multi-Is- den Einsatz von ERP-Systemen durch das Gener- public’s awareness of this technology. This rapid sue Negotiations, Concurrent Negotiations, Strat- ieren signifikanter Kosten- oder Nutzenvorteile op- growth has highlighted the challenges associated egy-proof Mechanisms, Rational Argumentation, timieren können. Konkrete Erfahrungsberichte aus with designing and deploying biometric systems. In- Auctions and Voting, and so on. These issues are be- der Praxis beleuchten verschiedenartige Aspekte der deed, the problem of biometric authentication is a ing explored by researchers from different commu- Kosten-/Nutzenoptimierung von ERP-Systemen: Grand Challenge in its own right. Significant growth nities in Multi-Agent systems. They are, for instance, Vom Architekturmanagement (z.B. ERP-Konsoli- in biometric research in recent years has resulted in being studied in agent negotiation, multi-issue ne- dierung) über die Implementation (z.B. Adaptive the development of innovative sensors, new algo- gotiations, auctions, mechanism design, electron- Computing) bis hin zum Betrieb von ERP-Systemen. rithms, enhanced test methodologies and novel ap- ic commerce, voting, secure protocols, matchmak- Das Buch wendet sich an Praktiker und IT-Leiter, plications. The Handbook of Biometrics compris- ing & brokering, argumentation, and co-opera- die ihr ERP-System optimieren wollen. Es wendet es chapters authored by prominent Biometric re- tion mechanisms. This workshop will bring together sich zugleich an Unternehmensleitungen, die mit searchers describing the fundamentals and the latest researchers from these communities to learn about ihren IT-Verantwortlichen nach Wegen der Kosten-/ innovations in their areas of expertise. This unique each other ’s approaches, form long-term collabora- Nutzenoptimierung suchen. Ein Buch von Praktik- and timely volume is designed for researchers and tions, and cross-fertilize the different areas to accel- ern für Praktiker! advanced-level students in computer science. It is erate progress towards scaling up to larger and more also suitable for Biometric and Computer Security realistic applications. Features professionals. Überblick über Methoden zur Optimierung von Features ERP-Systemen. Ein Buch von Praktikern für Praktik- Features Recent advances in multi-agent systems er. Es werden unterschiedliche Aspekte des ERP-Ein- No other single book succinctly captures the ad- satzes beleuchtet.     vancements made in all aspects of biometrics in re- Contents cent years while presenting the reader with a funda- Part I Theories for Complex Multi-agent Systems.- Contents mental understanding of basic concepts in various Negotiation Agents’ Decision Making Using Markov Optimierung des ERP-Einsatzes durch ein biometric traits A comprehensive book with chap- Chains.- A Multi-Issue Negotiation Protocol among Prozess-Kosten-Management-System.- ters authored by prominent researchers in biometrics Nonlinear Utility Agents : A Preliminary Report.- Grundlagen von Dynamic IT-Services.- Ein-   A Decentralized Model for Multi-attribute Negotia- satz von Dynamic IT-Services für ERP.-- Koexisten- tions with Incomplete Information and General Util- zszenarien mehrerer ERP-Standards (SAP / Nav) in Contents ity Functions.- A General Model for Pareto Optimal einem internationalen Konzern.- Stammdatenman- Foreword by James L. Wayman, San Jose State Uni- Multi-Attribute Negotiations.- Cooperation-based agement in einem globalen ERP-System.- Grund- versity.- Preface.- Introduction to Biometrics.- Fin- Multilateral Multi-issue Negotiation for Crisis Man- lagenartikel ERP Value - Dimensionen der Opti- gerprint Recognition.- Face Recognition.- Iris Recog- agement.- A Fuzzy Logic-based Approach for Flex- mierung von ERP-Systemen.- Erfolgreicher Betrieb nition.- Hand Geometry Recognition.- Gait Recog- ible Self-interested Agent Team Forming.- Part II und Unterhalt von ERP im Mittelstand.- Innerbe- nition.- The Ear as a Biometric.- Voice Biomet- Practical Approach for Complex Multi-agent [..] triebliches Pricing von ERP-Systemen.- ERP im vali- rics.- A Palmprint Authentication System.- On- dierten Umfeld.- Prozesse und Organisation Line Signature Verification.- 3D Face Recogni- Fields of interest des Change Managements.- Grenzen klassischer [..] tion.- Automatic Forensic Dental Identification.- Appl.Mathematics/Computational Methods of Engi- Hand Vascular Pattern Technology.- neering; Artificial Intelligence (incl. Robotics) Fields of interest Introduction to Multibiometrics.- Multispectral Face Management of Computing and Information Sys- Recognition.- Multibiometrics Using Face and Ear.- Target groups tems; Information Systems and Communication Ser- Engineers, researchers, and graduate students in Incorporating Ancillary Information in Multibio- vice; Database Management; Information Systems metric [..] computational intelligence and multi-agent systems Applications (incl.Internet); Management; Technol- ogy Management Type of publication Fields of interest Monograph Pattern Recognition; Image Processing and Comput- Target groups er Vision; Data Encryption; Data Structures, Cryp- CIOs, IT-Manager, Beratungsunternehmen, Consul- tology and Information Theory; Computer Imaging, Due January 2008 tants, Projektleiter Vision, Pattern Recognition and Graphics; Multime- dia Information Systems Type of publication 2008. Approx. 180 p. (Studies in Computational Intelligence, Band 89) Geb. Professional book Target groups Research scientists 106,95 € Due March 2008 ISBN 978-3-540-76281-2 Type of publication Handbook 2008. Etwa 250 S. (Xpert.press) Geb.

39,95 € Due November 2007 ISBN 978-3-540-74439-9 2008. Approx. 566 p. Geb.

58,80 € ISBN 978-0-387-71040-2 springer.com/booksellers Computer 91

Y. Jiang, Norwegian University of Science and Technology, D. Johanning, Bergisch Gladbach K. Jäger, Stuttgart Trondheim, Norway; Y. Liu, National University of Singapore, Sin- gapore Linux-Server Ajax in der Praxis

Stochastic Network Calculus Installation, Konfiguration, Administration, Härtung Grundlagen, Konzepte, Lösungen

The development of an information theory for Im vorliegenden Buch werden wichtige Server unter Ajax hat das Web zu einer Plattform für Anwen- stochastic service guarantee analysis has been iden- Linux in ihrer Funktionalität, der Konfiguration und dungssoftware gemacht. Beispiele wie Google Maps, tified as a grand challenge for future networking re- Administration vorgestellt. Die Auswahl der betra- GMail oder Flickr demonstrieren eindrucksvoll, search. Towards it, Stochastic Network Calculus, the chteten Server orientiert sich dabei an typischen An- welches Potential in dieser Technologie steckt. probabilistic version or generalization of the (deter- forderungen der Infrastruktur eines Unternehmen- Dieses Buch bietet allen, die bereits Web-Anwen- ministic) Network Calculus, has been recognized snetzwerkes. Dazu gehören unter anderem DNS- dungen entwickeln und sich noch nicht mit Ajax be- by researchers as a crucial step. This book is devot- und DHCP-Server sowie Firewalls und Router und fasst haben, aber auch traditionellen Software-En- ed to a comprehensive treatment of this active re- auch Verzeichnisdienste wie LDAP. Zudem wird twicklern, die den Sprung ins Web machen möchten, search area, which covers the results from the au- auch ein Server für WLAN-Klients konfiguriert. Des einen gründlichen und verständlichen Einstieg in die thors as well as other researchers in this area. This weiteren werden Server betrachtet, die verschiedene Technologie. Anhand vieler praxisnaher Beispiele book presents an overall picture for the state of the Dienste im Netz zur Verfügung stellen, wie z.B. werden alle nötigen Konzepte vermittelt, häufige art of stochastic QoS analysis research by providing Datei-Dienste (Samba und NFS), Druck-Dienste, Probleme werden angesprochen und bewährte basic introductory material on the subject as well as Mail-Server-Dienste oder Web-basierte Dienste wie Lösungen vorgestellt. Das Buch eignet sich durch discussing the most recent research in the area. Top- Apache. Die Sicherheit von Servern und Netzwerken seinen Aufbau gleichermaßen als Fachbuch und ics covered include Traffic Models and Server Mod- wird mit den Themen Backup, sichere Installation Nachschlagewerk und erleichtert somit nicht nur els for Stochastic Network Calculus, and Indepen- und Härtung von Linux sowie der Netzwerkanalyse den Einstieg, sondern auch die tägliche Arbeit mit dent Case Analysis and its applications. Researchers abgehandelt. Das Buch wird abgerundet durch eine Ajax. Die technischen Grundlagen und Konzepte and graduates in the area of performance evaluation kompakte Darstellung der Netzwerk-Grundlagen. werden ergänzt durch eine umfassende Auseinander- of computer communication networks will benefit setzung mit den Themen Sicherheit, Usability und hugely from this comprehensive volume. Features Barrierefreiheit. Kompakte und fundierte Darstellung aller wichti- Features gen Server unter Linux Berücksichtigt dabei beson- Features First book to address Stochastic Network Calcu- ders die Erfordernisse von Unternehmensnetzw- Zahlreiche Beispiele und Techniken für modern- lus, a recently developed theory for stochastic qual- erken Behandelt die für die Praxis relevanten The- ste Web-Anwendungen Konkrete Lösungen De- ity of service (QoS) analysis in computer networks men der Sicherheit von Servern und Netzen Enthält sign-Patterns Presents a general picture for the state of the art of ein Repetitorium wichtiger Netzwerkgrundlagen stochastic QoS analysis research Provides a compre- Contents hensive treatment of recent developments and results Contents Einführung.- Was ist Ajax ?- Ajax im Kontext von in this active research area Einführung und Grundlagen.- Netzwerke.- TCP/ Web 2.0.- Wie Ajax das Web verändert.- Die richti- IP.- Domain Name System - DNS.- Dynamic Host gen Werkzeuge.- Web-Browser.- Die Eclipse-IDE.- Contents Configuration Protocol - DHCP.- Firewall.- Linux Web-Server.- JavaScript Grundlagen.- Eine Sprache Introduction to Network Calculus.- Determinis- für Netzwerkadministratoren.- Netzwerk-Infrastruk- neu entdecken.-Einbindung in HRML-Dokumente.- tic Network Calculus.- Traffic Models for Stochas- tur-Server.- DHCP-Server.- DNS-Server.- Verze- Das Typisierungskonzept von JavaScript.- Funktio- tic Network Calculus.- Server Models for Stochas- ichnisdienst-Server - LDAP.- Firewall und Router.- nen.- Fehlerbehandlung.- Ausblick: JavaScript 1.7 tic Network Calculus.- Stochastic Network Calcu- Proxy-Server.- Host Access Point für WLAN.- Di- und 2.0.- Das Document Object Model (DOM).- Ein lus.- Independent Case Analysis.- Applications of enste-Server.- Datei-Dienste.- Samba-Server.- NFS- Modell für HTML- und XML-Dokumente.-Die ver- Stochastic Network Calculus.- Summary and Open Server.- Druck-Dienste.- LPD.- Cups.- Mail-Server.- schiednen DOM-Versionen.- HTML-DOM.- Doku- Problems WWW-Server Apache.- Lokale Suchmaschine.- Lin- mentenmanipulaitonen mit innerHTML.- Client- ux, Sicherheit und Servermanagement.- Linux für Server Kommunikaiton.- Asynchrone anfragen.- Fields of interest Server-Dienste installieren.- Das System "härten".- Web-Services.- Verteilte Systeme [..] System Performance and Evaluation; Computer Backup und [..] Communication Networks; Computer Systems Or- Fields of interest ganization and Communication Networks Fields of interest Programming Techniques; Programming Languages, Software Engineering/Programming and Operating Compilers, Interpreters; Software Engineering Target groups Systems; Operating Systems; Computer Communi- Researchers, Academics, Graduates cation Networks Target groups Softwareentwickler, Programmierer Type of publication Target groups Monograph Administratoren im UNIX/Linux-Umfeld und Ad- Type of publication ministratoren im Windows-Umfeld, die nach Linux Professional book Due May 2008 migrieren möchten Due November 2007 Type of publication 2008. Softcover Professional book 2008. Etwa 450 S. 20 Abb. (Xpert.press) Geb. 74,85 € ISBN 978-1-84800-126-8 Due January 2008 49,95 € ISBN 978-3-540-69333-8 2008. Etwa 700 S. 70 Abb. (X.systems.press) Geb.

59,95 € ISBN 978-3-540-22363-4 92 Computer springer.com/booksellers

B. Kagström, Umea University, Umea, Sweden; E. Elmroth, Umea R. Kaiser, Tübingen R. Kaiser, Tübingen University, Umea, Sweden; J. Dongarra, University of Tennessee, Knoxville, TN, USA; J. Wasniewski, Technical University of Den- mark, Kongens Lyngby, Denmark (Eds.) C++ mit dem Borland C++Builder C++ with Borland C++Builder

2007 An Introduction to the ANSI/ISO Standard and Object-Orient- Applied Parallel Computing ed Windows Programming Einführung in den C++-Standard und die objektorientierte State of the Art in Scientific Computing. 8th International Windows-Programmierung Workshop, PARA 2006, Umea, Sweden, June 18-21, 2006, Re- vised Selected Papers C++ with the Borland C++Builder presents compre- hensively and systematically all language elements Dieses Buch verbindet eine systematische of the ANSI/ISO standard of C++. Contexts and lan- Einführung in die Programmiersprache C++ und die guage concepts are in the foreground. The author This book constitutes the thoroughly refereed post- Windows-Programmierung mit dem C++Builder uses Borland C++Builder as development sys- proceedings of the 8th International Workshop on (früher von Borland, jetzt von CodeGear). Alle tem. This visual system is the C++ variant of the Pas- Applied Parallel Computing, PARA 2006, held in Sprachelemente und Konzepte von Standard-C++ cal development system Delphi and makes a simple Umeå, Sweden, in June 2006. This volume contains (C-Grundlagen, objektorientierte Programmierung, development of programs for Windows possible. Al- 4 keynote lectures and 86 revised papers of 15 in- Exception-Handling, Templates und die STL) wer- most all examples and exercises are Windows pro- vited minisymposia arranged on the following top- den ausführlich und praxisnah behandelt. Weitere grams. However, since the ANSI/ISO standard of C ics: stretching time and length scales in biomolec- Themen sind objektorientierte Analyse und Design, ++ is in the foreground, this book is also suitable for ular modelling, recent advances in dense linear al- Templates und ihre Anwendungen am Beispiel der readers who work with other compilers. The class li- gebra, cfd applications for high performance com- Klassen und Algorithmen der STL. Das Buch eignet brary of the C++Builder (VCL) is used as an example puting, hpc environments: visualization and paral- sich gleichermaßen zum Selbststudium und als of a class hierarchy. The CD-ROM contains many lelization tools, tools, frameworks and applications Lehrbuch für Fachhochschulen und Universitäten. examples and exercises with solutions. for high performance computing, grid data manage- Es wendet sich sowohl an Anfänger als auch an er- ment, simulations in geophysics and space physics, fahrene C++-Programmierer und enthält zahlreiche Features tools for parallel performance analysis, grids for sci- Beispiele und Übungsaufgaben mit Lösungen. Systematical and comprehensive introduction to all entific computing, simulations of materials, novel elements of the ANSI/ISO standard of C++ With Features data formats and algorithms for dense linear algebra Version 6 of the Borland C++Builder as develop- Fundierte, systematische Einführung in die Pro- computations, bioinformatics and computational bi- ment system CD-ROM with examples and exercises ology, scientific visualization and hpc applications, grammiersprache C++ auf der Basis des ISO-Stan- software tools for parallel cfd applications, and mul- dards Verwendet als Entwicklungssystem den Bor- Contents ti-scale physics. The 45 revised full papers papers of land C++ Builder 2007 Vermittelt umfassendes From the contents: The Integrated Development [..] Grundwissen und anwendungsorientiertes Fachwis- Environment.- The Component Palette.- Elemen- sen tary Data Types and Statements.- Structured Data Fields of interest Types and Predefined Classes.- Statements and Im- Fields of interest Mathematics of Computing; Software Engineer- pressions.- Functions.- Modular Programming in Programming Languages, Compilers, Interpreters; ing/Programming and Operating Systems; Algo- Namespaces.- Object-Oriented Programming.- The Programming Techniques; Software Engineer- rithm Analysis and Problem Complexity; Systems Visual Component Library (VCL).- Templates and ing/Programming and Operating Systems; Software and Information Theory in Engineering; Computa- the STL.- Miscellaneous.- Bibliography.- Index. tional Mathematics and Numerical Analysis Engineering Fields of interest Target groups Target groups Programming Languages, Compilers, Interpreters; Praktiker und Studierende der Informatik und Researchers and professionals Programming Techniques Wirtschaftsinformatik an Universitäten und Fach- Type of publication hochschulen Target groups Proceedings Practitioners and students of Computer Science and Type of publication Economics IT Due October 2007 Professional book Type of publication Due October 2007 2007. XXIX, 1192 p. (Lecture Notes in Computer Science, Band Professional book 4699) Softcover 2008. XXIV, 1187 S. Mit CD-ROM. (Xpert.press) Geb. Due April 2008 117,70 € ISBN 978-3-540-75754-2 69,95 € ISBN 978-3-540-69575-2 2008. Approx. 1000 p. With CD-ROM. Geb. 64,15 € ISBN 978-3-540-01027-2 springer.com/booksellers Computer 93

R. Kaiser, Tübingen R. Kaiser, Tübingen, Germany H. Kalva, Florida Atlantic University, Boca Raton, FL, USA; J.-B. Lee, Sarnoff Corp., Princeton, NJ, USA C++ mit Microsoft Visual C++ C++ with Microsoft Visual C++2005 The VC-1 and H.264 Video Eine Einführung in den ANSI/ISO C++ Standard und in die ob- An Introduction to the C++ Standard and Object Oriented jektorientierte Windows-Programmierung Windows Programming Compression Standards for Broadband Video Services

'C++ mit Microsoft Visual C++ 2005' stellt alle C++ with Microsoft Visual C++2005 provides Sprachelemente des ANSI/ISO C++-Standards comprehensive and systematic coverage of all lan- The MPEG committee recently standardized the umfassend und systematisch dar. Dabei stehen guage features of the C++ standard. The main fo- MPEG AVC (H.264) video coding standard. This is a Zusammenhänge und Sprachkonzepte im Vorder- cus is on language concepts and their context, highly efficient compression standard that can make grund vor Detailinformationen, die man auch in der rather than on details which are available in the on- high-quality video services possible over broadband Online-Hilfe findet. Verwendet wird Microsoft Vi- line help. The book uses Microsoft Visual studio networks. A competing standard developed by Mi- sual Studio 2005 als Entwicklungssystem. Dieses vi- 2005 as development system. This visual program- crosoft, VC-1 was standardized in SMPTE in August suelle System ermöglicht die einfache Entwicklung ming environment facilitates easy development of 2005, and this novel standard is also seeing signifi- von Programmen für Windows. Fast alle Beispiele Windows .Net programs. Most examples and exer- cant industry interest. These two standards are ex- und Übungen sind Windows .Net Programme. cises are Windows .Net programs. However, as the pected to form the basis for high-quality broadband Da der ANSI/ISO-Standard von C++ im Vorder- focus is on the C++ standard, the book is also suit- video services. The VC-1 and H.264 Video Compres- grund steht, ist dieses Buch aber auch für andere able for readers working with other compilers. The sion Standards for Broadband Video Services cov- Compiler geeignet. Dabei wird von Anfang an mit author presents the principles of object-oriented ers these video coding standards as well as issues in den Konzepten der objektorientierten Program- analysis and design along with object-oriented pro- broadband video delivery over IP networks. This mierung gearbeitet und die Vorteile der Klassen gramming and the .Net Framework class library as professional reference is designed for industry prac- aus der Standardbibliothek von C++ gegenüber den an example of a class hierarchy. titioners, including video engineers, and profession- entsprechenden konventionellen Sprachelementen als in consumer electronics, telecommunications and Features aufgezeigt. .Net Framework wird als Klassenhier- media compression industries. This volume is also Comprehensive overview of all language features of archie vorgestellt, Templates und ihre Anwendun- suitable as a secondary text for advanced-level stu- the C++ standard With Micosoft Visual Studio 2005 gen am Beispiel der Klassen und Algorithmen der dents in computer science and electrical engineering. STL behandelt. Die beiliegende CD-ROM enthält die as development system With fully worked out solu- Lösungen aller Übungsaufgaben. tions to exercises and questions on the accompany- Features ing CD-ROM No other reference book on the new VC-1 standard Features covers VC-1 in detail First reference book to cover Fields of interest Stellt alle Sprachelemente des ANSI/ISO C++-Stan- the two new key video technologies for broadband Programming Languages, Compilers, Interpreters; dards umfassend und systematisch dar Verwendet video services Authors of this book have been work- Programming Techniques; Software Engineering; Microsoft Visual Studio 2005 als Entwicklungssys- ing on video compression and communications for Software Engineering/Programming and Operating tem Vermittelt umfassendes Grundwissen und an- more than 12 years wendungsorientiertes Fachwissen Die CD-ROM Systems enthält Lösungen zu allen Übungsaufgaben Contents Target groups -Preface.- Multimedia Systems.- Syntax Hi- Practitioners and students of Computer Science; pro- Fields of interest erarchies and Encapsulation.- HRD Models grammers Programming Languages, Compilers, Interpreters; and Rate Control.- Transform and Quanti- Programming Techniques Type of publication zation.- Intra Prediction.- Inter Pre- diction.- In-Loop Deblocking Operations Target groups Professional book and Out-Loop Deringing.- Interlace Han- Praktiker sowie Studierende der Informatik und dling.- Bitstream Syntax.- HD-DVD and Blu- Wirtschaftsinformatik an Universitäten und Fach- Due July 2008 ray Provisions.- IPTV Provisions.- Index. hochschulen   Type of publication 2008. Approx. 900 p. With CD-ROM. Softcover Fields of interest Professional book 64,15 € Multimedia Information Systems; Information Stor- ISBN 978-3-540-69821-0 age and Retrieval; Computer Communication Net- Due March 2008 works; Computer Imaging, Vision, Pattern Recog- nition and Graphics; Information Systems Applica- 2008. Etwa 1100 S. Mit CD-ROM. (Xpert.press) Geb. tions (incl.Internet)

69,95 € Target groups ISBN 978-3-540-23869-0 Professionals

Type of publication Monograph

Due March 2008

2008. XX, 320 p. 20 illus. (Multimedia Systems and Applications, Band 41) Geb.

115,35 € ISBN 978-0-387-71042-6 94 Computer springer.com/booksellers

M.Y. Kao (Ed.) M.Y. Kao (Ed.) A. Karasaridis, AT&T Labs, Middletown, NJ, USA

Encyclopedia of Algorithms Encyclopedia of Algorithms DNS Security

The Encyclopedia of Algorithms will provide a com- The Encyclopedia of Algorithms will provide a com- This book provides a comprehensive coverage of prehensive set of solutions to important algorithmic prehensive set of solutions to important algorithmic DNS security. It gives the reader an in depth under- problems for students and researchers interested in problems for students and researchers interested in standing of how DNS works securely. After reading quickly locating useful information. The first edi- quickly locating useful information. The first edi- the book, the reader will be able to complete the set- tion of the reference will focus on high-impact solu- tion of the reference will focus on high-impact solu- up of DNS knowing which architecture and what tions from the most recent decade; later editions will tions from the most recent decade; later editions will type of software and configuration it will need to widen the scope of the work. Nearly 500 entries will widen the scope of the work. Nearly 500 entries will have given the working environment (e.g., large, be organized alphabetically by problem, with suben- be organized alphabetically by problem, with suben- medium or small corporation, educational organiza- tries allowing for distinct solutions and special cases tries allowing for distinct solutions and special cases tion, government). to be listed by the year. An entry will include: a de- to be listed by the year. An entry will include: a de- scription of the basic algorithmic problem the input scription of the basic algorithmic problem; the input Features and output specifications the key results examples and output specifications; the key results; examples Supported by a website which will cover addendums of applications citations to the key literature. Open of applications; citations to the key literature. Open and corrections, as well as additional configuration problems, links to downloadable code, experimen- problems, links to downloadable code, experimen- scripts and code that implements algorithms pre- tal results, data sets, and illustrations may be provid- tal results, data sets, and illustrations may be provid- sented in the book Includes illustrations of various ed. All entries will be written by experts with links ed. All entries will be written by experts with links concepts, architecture plots, graphs Contains exam- to Internet sites that outline their research work will to Internet sites that outline their research work will ples of uses and configurations, results of simula- be provided. The entries will be peer-reviewed. This be provided. The entries will be peer-reviewed. This tions, installation and setup instructions defining reference will be published in print and on defining reference will be published in print and on [..] line. The [..] Contents Introduction: Why DNS Security is important.- DNS Features Features Overview: Protocol, Architecture and Applications.- No similar reference work on Algorithms is current- No comparable reference work on Algorithms is cur- Protocol Security Extensions-DNSSEC and beyond.- ly available Comprehensive A-Z coverage of this rently available A-Z organization allows easy, intu- DNS Vulnerabilities.- Monitoring and Detection of complex subject area makes this volume easily acces- itive access to professionals and researchers inter- Security Breaches.- Prevention, Protection and Miti- sible to professionals and researchers in all fields who ested in a particular aspect of Algorithms Targeted gation of DNS attacks. are interested in a particular aspect of Algorithms literature references provide additional value for re- Targeted literature references provide additional val- searchers looking to study a topic in more detail Use- Fields of interest ue for researchers looking to study a topic in more ful for scholars, researchers, and professionals who Communications Engineering, Networks; Data detail Entries are cross-linked with journal articles work in other fields — such as mathematics, [..] Structures, Cryptology and Information Theory; Da- ta Encryption; Computer Communication Networks Fields of interest Contents Mathematics of Computing; Computer Science, gen- VLSI.- Distributed Computing.- Parallel Processing.- Target groups eral; Theory of Computation; Applications of Mathe- Automated Design.- Robotics.- Graphics.- Data Base Network and system administrators, operations per- matics; Math Applications in Computer Science; Nu- Design.- Software Tools.- Sorting.- Searching.- Data sonnel, and network design/architecture profession- merical Analysis Structures.- Computational Geometry.- Linear Pro- sals as well as researchers in the applied network se- gramming. curity community Target groups Computer scientists working in a wide range of areas Fields of interest Type of publication such as Bioinformatics, Cryptography, Data Com- Algorithm Analysis and Problem Complexity; Theo- Professional book pression, Medical Informatics, Network and Com- ry of Computation; Algorithms; Appl.Mathematics/ munication Protocols, Artificial Intelligence, and Computational Methods of Engineering; Mathemat- Due August 2008 Pattern Recognition; scholars, students, and pro- ics of Computing; Applications of Mathematics fessionals who work in fields such as mathematics, 2008. Approx. 300 p. Geb. statistics, computational biology, economics, finance Target groups and stochastics, medical informatics, data mining, Computer scientists working in a wide range of areas 41,20 € industrial engineering, and decision science such as Bioinformatics, Cryptography, Data Com- ISBN 978-0-387-76545-7 pression, Medical Informatics, Network and Com- Type of publication munication Protocols, Artificial Intelligence, and Encyclop(a)edia Pattern Recognition; scholars, students, and pro- fessionals who work in fields such as mathematics, Due July 2008 statistics, computational biology, economics, finance and stochastics, medical informatics, data mining, industrial engineering, and decision science 2008. eReference. Type of publication 367,71 € Encyclop(a)edia ISBN 978-0-387-30162-4

Due June 2008

2008. Approx. 1500 p. Geb.

330,63 € ISBN 978-0-387-30770-1 springer.com/booksellers Computer 95

S. Kartalopoulos, University of Oklahoma, Tulsa, OK, USA J. Katz, University of Maryland, College Park, MD, USA A. Kelemen, University at Buffalo, NY, USA; A. Abraham, Norwe- gian University of Science and Technology, Trondheim, Norway; Y. Liang, University at Buffalo, NY, USA (Eds.) Next Generation Intelligent Optical Digital Signatures Networks Computational Intelligence in From Access to Backbone Medical Informatics Digital Signatures is the first and only book to ex- plain the underlying cryptographic principles and techniques used in designing the secure digital sig- The book covers protocols and other significant is- nature schemes being utilized today. This book will Medical Informatics (MI) is an emerging interdisci- sues of the next generation optical network for un- help the reader understand and appreciate the se- plinary science that deals with clinical health-relat- dergraduate and graduate students, researchers, and curity guarantees provided by digital signatures. ed information, its structure, acquisition and use. MI managers in industry. Topics are discussed without Full descriptions, detailed constructions, and for- is grounded in the principles of computer science, complex math, but with citations to references for mal proofs of security are provided for essentially all computational intelligence, as well as the clinical and those interested in an advanced math level. known provably-secure signature schemes; state-of- basic sciences. This book deals with the application the-art signature schemes used extensively in prac- of computational intelligence in medical informatics. Features tice are also explained in detail. A valuable refer- Addressing the various issues of medical informatics Covers protocols and other significant issues of the ence book for researchers and industry practitioners, using different computational intelligence approach- next generation optical networks Digital Signatures can also be used as a tutorial for es is the novelty of this edited volume. This volume self-study by advanced-level students in computer comprises of 15 chapters including an introductory Contents science, or as a textbook in a seminar on signature chapter giving the fundamental definitions and some Introduction.- Digital Networks.- WDM Technology schemes.  Preface written by Moti Yung. &nb- important research challenges. Chapters were select- and Networks.- Next Generation SONET/SDH.- The sp; ed on the basis of fundamental ideas/concepts rather Optical Transport Network.- Network Synchroniza- than the thoroughness of techniques deployed. tion.- Network Performance.- Network Protection Features & Fault Management.- Network Security.- Con- - Contains full descriptions and formal proofs of al- Features clusion. most all known provably-secure signature schemes Reports recent research results on computational in- - Includes details on state-of-the-art signature telligence in medical informatics Fields of interest schemes used extensively in practice - Explains many Communications Engineering, Networks; Comput- of the the underlying methodologies for construct- Contents er Communication Networks; Computer Systems ing secure signature schemes - Appropriate for prac- Review of Computational Intelligence for Gene- Organization and Communication Networks; Ap- titioners and students; will serve well as a reference Gene and Gene-Environment Interactions in Dis- plied Optics, Optoelectronics, Optical Devices; Mi- or as a text for self-study   ease Mapping.- Intelligent Approaches to Mining crowaves, RF and Optical Engineering; Signal,Image the Primary Research Literature: Techniques, Sys- and Speech Processing Contents tems, and Examples.- Intuitionistic Fuzzy Set: Appli- Preface by Moti Yung.- Background.- Introduction.- cation to Medical Image Segmentation.- Decompos- Target groups Preliminaries and Number-Theoretic Background.- able Aggregability in Population Genetics and Evo- Senior level undergraduate students, graduate stu- Definitions of Security.- On The Existence of Dig- lutionary Computations: Algorithms and Computa- dents, technical managers, research and development ital Signature Schemes.- Main Feasibility Results.- tional Complexity.- Evolutionary Learning of Neu- engineers, technical marketers Signature Schemes Based on the RSA Problems.- ral Structures for Visuo-Motor Control.- Dimension Signature Schemes in Practice.- Introduction to the Type of publication reduction for performing discriminant analysis for Random Oracle Model.- Signature Schemes from Professional book Microarrays.- Auxiliary tool for the identification of Identification Schemes.- Hash-and-Sign Signature genetic [..] Schemes.- Standards and Standardized Schemes.- In- Due December 2007 dex. Fields of interest Appl.Mathematics/Computational Methods of Engi- 2008. Approx. 350 p. Geb. Fields of interest neering; Artificial Intelligence (incl. Robotics); Bioin- Data Encryption; Data Structures, Cryptology and formatics 82,34 € Information Theory; Computer Communication ISBN 978-0-387-71755-5 Networks; Computer Systems Organization and Target groups Communication Networks; Coding and Information Engineers, medical practitioners, researchers, and Theory; Communications Engineering, Networks graduate students in medical informatics, bioinfor- matics, and computational intelligence Target groups Professionals in industry Type of publication Monograph Type of publication Monograph Due January 2008

Due November 2007 2008. Approx. 390 p. (Studies in Computational Intelligence, Band 85) Geb. 2008. Approx. 250 p. Geb. 139,05 € 69,50 € ISBN 978-3-540-75766-5 ISBN 978-0-387-27711-0 96 Computer springer.com/booksellers

U.B. Kjaerulff, Aalborg University, Aalborg, Denmark; A.L. Mad- F. Klawonn, University of Applied Sciences Braun- J.P.C. Kleijnen, Tilburg University, The Netherlands sen, HUGIN Expert A/S, Aalborg, Denmark schweig/Wolfenbuettel, Germany Design and Analysis of Simulation Bayesian Networks and Influence Introduction to Computer Graphics Experiments Diagrams: A Guide to Construction Using Java 2D and 3D and Analysis Simulation is a widely used methodology in all the Computer graphics comprises the creation and rep- Applied Science disciplines. It provides a flexible, Probabilistic networks, also known as Bayesian net- resentation of simple graphical elements and im- powerful and intuitive tool for investigating how to works and influence diagrams, have become one of ages as well as modern techniques for virtual reali- design a process or system, and how to maximize its the most promising technologies in the area of ap- ty. In order to apply computer graphics techniques efficiency. Simulation's effectiveness depends greatly plied artificial intelligence, offering intuitive, effi- correctly, a basic understanding of the fundamental on how well the simulation experiments are designed cient, and reliable methods for diagnosis, prediction, concepts is required. This book provides an intro- and analyzed. Design and Analysis of Simulation decision making, classification, troubleshooting, and duction to the most important basic concepts cou- Experiments will focus on this crucial phase in the data mining under uncertainty. Bayesian Networks pling the technical background and theory immedi- overall process of applying simulation. The book will and Influence Diagrams: A Guide to Construction ately with practical examples and applications. The include the best of both classic and modern methods and Analysis provides a comprehensive guide for reader can follow up the theory and then literally see of simulation experimentation, and as a result, it will practitioners who wish to understand, construct, the theory at work in numerous example programs. provide a state-of-the-art treatment of the topic. This and analyze intelligent systems for decision support With only elementary knowledge of the program- book will be the standard reference book on the topic based on probabilistic networks. Intended primarily ming language Java, the reader will be able to create for both researchers and sophisticated practitioners for practitioners, this book does not require sophisti- his or her own images and animations immediately in the area, and it will be used as a textbook in cours- cated mathematical skills or deep understanding of using Java 2D and Java 3D. Written for second year es or seminars focusing on this topic. the underlying theory and methods nor does it dis- undergraduate and above students, this book will be Features cuss alternative technologies for reasoning under un- an essential tool for those studying computer science Jack Kleijnen is considered one of the world’s top certainty. The theory and methods presented are il- and computer engineering. A website for this book authorities on simulation and its uses in a variety of lustrated through more than 140 examples, and exer- includes programs with source code, exercises with problem-solving domains. Professor Kleijnen has cises are included for the reader to check his/her lev- solutions and slides as teaching material. worked in the fields of operations research, manage- el of understanding. The techniques and [..] Features ment science, industrial engineering, mathematical Features Provides theory and praxis in combination Focus- statistics, economics, nuclear engineering, comput- Comprehensive introduction to probabilistic net- es on Java 3D (and 2D) Contains many easy to un- er science, and information systems. He has a thor- works Written specifically for practitioners of ap- derstand example programs Additional exercises, so- ough and wide-ranging understanding of problems plied artificial intelligence Complete guide to under- lutions, example programs, slides for lecturers and in these [..] stand, construct, and analyze probabilistic networks links to select websites can be found on a comple- mentary website for this book Contents Contents Preface.- Introduction.- Black Box Metamodels.- Introduction.- Networks.- Probabilities.- Probabilis- Contents Low-Order Polynomial Regression.- Metamodels tic Networks.- Solving Probabilistic Networks.- Elic- Introduction.- Basic principles of two-dimensional and Designs: A Single Factor.- Low-Order Polyno- iting the Model.- Modeling Techniques.- Data-Driv- graphics.- Drawing lines and curves.- Areas, text and mial Models and Designs: Multiple Factors.- Low- en Modeling.- Conflict Analysis.- Sensitivity Analy- colour.- Basic principles of three-dimensional graph- Order Polynomial Models and Screening Designs: sis.- Value of Information Analysis. ics.- Modelling three-dimensional objects.- Visible Hundreds of Factors.- Kriging Metamodels.- Latin surface determination.- Illumination and shading.- Hypercube Sampling (LHS) and other Space-Filling Fields of interest Special effects and virtual reality.- Appendix: Use- Designs.- Cross-Validation of Metamodels.- Conclu- Statistics and Computing/Statistics Programs; Prob- ful links.- Appendix: Example programs.- Appendix: sions and Further Research. ability and Statistics in Computer Science; Data Min- References to Java 2D classes and methods.- Ap- ing and Knowledge Discovery; Artificial Intelligence pendix: References to Java 3D classes and methods.- Fields of interest (incl. Robotics); Operations Research, Mathemati- Bibliography.- Index Probability Theory and Stochastic Processes; Sta- cal Programming; Probability Theory and Stochastic tistical Theory and Methods; Mathematical Mod- Processes Fields of interest eling and Industrial Mathematics; Operation Re- Computer Graphics; Computer Imaging, Vision, search/Decision Theory; Industrial and Production Target groups Pattern Recognition and Graphics Engineering; Engineering Design Practitioners Target groups Target groups Type of publication Intermediate undergraduates Researchers and practitioners Monograph Type of publication Type of publication Undergraduate textbook Monograph Due January 2008

Due February 2008 Due November 2007 2008. Approx. 300 p. (Information Science and Statistics) Geb.

65,91 € 2008. Approx. 285 p. (Undergraduate Topics in Computer Sci- 2008. Approx. 416 p. (International Series in Operations Research ISBN 978-0-387-74100-0 ence) Softcover & Management Science, Band 111) Geb. 32,05 € 74,85 € ISBN 978-1-84628-847-0 ISBN 978-0-387-71812-5 springer.com/booksellers Computer 97

A. Klenke, Johannes Gutenberg-Universität Mainz, Germany J. Knowles, University of Manchester, UK; D. Corne, Heriot-Watt A. Kohl, Macromedia Akademie für Medien, München University, Edinburgh, UK; K. Deb, Indian Institute of Technology, Kanpur, India (Eds.) Probability Theory Flash 8 ActionScript

A Comprehensive Course Multiobjective Problem Solving Ein Lehr- und Übungsbuch from Nature

Aimed primarily at graduate students and re- From Concepts to Applications Flash und ActionScript sind bei der Gestaltung in- searchers, this text is a comprehensive course in teraktiver Websites nicht mehr wegzudenken. Im er- modern probability theory and its measure-theoret- sten Teil des Buches werden Programmierkonzepte ical foundations. It covers a wide variety of topics, Multiobjective problems involve several competing sowie wesentliche Strukturen der Scriptsprache Ac- many of which are not usually found in introduc- measures of solution quality, and multiobjective evo- tionScript (AS) anhand praktischer Übungsbeispiele tory textbooks, such as: limit theorems for sums of lutionary algorithms (MOEAs) and multiobjective eingeführt. Der Leser erhält dabei eine Auswahl ef- random variables; martingales; percolation; Markov problem solving have become important topics of fizienter Lösungen zu verschiedenen Problemstellun- chains and electrical networks; construction of research in the evolutionary computation commu- gen an die Hand, die in nahezu jedem Flash-Projekt stochastic processes; Poisson point processes and in- nity over the past 10 years. This is an advanced text auftreten. Der zweite Teil geht von einzelnen, um- finite divisibility; large deviation principles and sta- aimed at researchers and practitioners in the area fangreicheren Workshops aus, in deren Verlauf eine tistical physics; Brownian motion; and stochastic in- of search and optimization. The book focuses on vollständige Webseite erstellt wird. Dieser Praxisteil tegral and stochastic differential equations. The the- how MOEAs and related techniques can be used to orientiert sich an spezifischen Elementen, die für ein ory is developed rigorously and in a self-contained solve problems, particularly in the disciplines of sci- Webscripting wichtig sind: komplexe Preloader, ge- way, with the chapters on measure theory interlaced ence and engineering. Contributions by leading re- scriptete (Animations-)Effekte, über XML generierte with the probabilistic chapters in order to display the searchers show how the concepts of multiobjective dynamische Menüs, modularer Aufbau mit swf, eine power of the abstract concepts in the world of prob- optimization can be used to reformulate and resolve Bildgalerie, Templates, Flashspiele und Komponen- ability theory. In addition, plenty of figures, comput- problems in broad areas such as constrained opti- ten. Vorausgesetzt werden Grundkenntnisse in Ac- er simulations, biographic details of key mathemati- mization, coevolution, classification, inverse mod- tionscipting. Die Workshops sind auf der Buch-CD- cians, and a wealth of examples support and enliven elling and design. The book is distinguished from ROM enthalten und können schrittweise nachvollzo- the presentation. other texts on MOEAs in that it is not primarily gen werden. about the algorithms, nor specific applications, but Features about the concepts and processes involved in solv- Features A comprehensive and modern introduction to ing problems using a multiobjective approach. Each Mit praktischen Übungen und anschaulichen the most important fields of probability theory. A chapter [..] Beispielen Alle Übungen auch auf CD-ROM unique selection of topics, including many not usual- ly found in introductory texts. Contents Contents Introduction.- Fundamentals.- Connections to Na- Teil 1: Bedeutung von Actionscript (AS).- Vorge- Contents ture.- Formulating a Problem.- Single-Objective hensweise beim Programmieren (Problemanalyse, Basic Measure Theory.- Independence.- Generat- Problems.- Dealing with Many Objectives.- Applica- Programmablaufplan, Pseudocode).- Strukturi- ing Functions.- The Integral.- Moments and Laws tions.- Conclusions.- MOEA: Triumph of Natural erte/funktionale Programmierung, OOA/OOP.- of Large Numbers.- Convergence Theorems.- Lp- Computing.- References.- Index. Struktur von AS, Versionen AS 1.0, 2.0, 3.0.- El- Spaces and Radon-Nikodym Theorem.- Condition- emente (Datentypen, Operatoren, Ausdrücke, al Expectations.- Martingales.- Optional Sampling Fields of interest Variablen und Arrays, Funktionen, Objekte bzw. Theorems.- Martingale Convergence Theorems and Artificial Intelligence (incl. Robotics); Optimization; Klassen).- Komponenten.- Debugging.- Editoren their Applications.- Backwards Martingales and Ex- Engineering Design; Theory of Computation (beispielhaft Eclipse).- Typische Problemstellun- changeability.- Convergence of Measures.- Proba- gen und Lösungen.- Teil 2: Workshops zu einer dy- bility Measures on Product Spaces.- Characteristics Target groups namischen modularen Webseite.- Konzeption ein- Functions and Central Limit Theorem.- Infinitely Practitioners, researchers and graduate students in er Webseite.- Preloader.- Intro (geskriptete Anima- Divisible Distributions.- Markov Chains.- Conver- optimization, design, natural computing tion).- Geskriptete Effekte (z.B. [..] gence of Markov Chains.- Markov Chains and Elec- trical Networks.- [..] Type of publication Fields of interest Monograph Media Design; Information Systems Applications Fields of interest (incl.Internet); Multimedia Information Systems Probability Theory and Stochastic Processes; Statisti- Due December 2007 cal Theory and Methods; Statistical Physics Target groups Flash- und Web-Entwickler, Flash-Interessierte, Me- Target groups 2008. Approx. 300 p. (Natural Computing Series) Geb. diengestalter Advanced undergraduate and graduate students; Re- 69,50 € searchers Type of publication ISBN 978-3-540-72963-1 Professional book Type of publication Graduate/advanced undergraduate textbook Due May 2008

Due December 2007 2008. Etwa 500 S. Mit CD-ROM (X.media.press) Geb.

2008. Approx. 625 p. (Universitext) Softcover 49,95 € ISBN 978-3-540-35179-5 58,80 € ISBN 978-1-84800-047-6 98 Computer springer.com/booksellers

Y. Kompatsiaris, Informatics and Telematics Institute, Ther- D. Konaté, Virginia Tech, Blacksburg, VA, USA (Ed.) S. Konishi, Kyushu University, Fukuoka, Japan; G. Kitagawa, The mi-Thessaloniki, Greece; P. Hobson, Motorola Laboratory, UK Institute of Statistical Mathematics, Tokyo, Japan (Eds.) Mathematical Modeling, Simulation, Visualization and e- Information Criteria and Statistical Semantic Multimedia and Modeling Ontologies Learning

Theory and Applications Proceedings of an International Workshop held at Rockefeller Foundation' s Bellagio Conference Center, Milan, Italy, 2006 The Akaike information criterion (AIC) derived as an estimator of the Kullback-Leibler information dis- crepancy provides a useful tool for evaluating sta- This book draws together experts from the multime- This book is a collection of articles written by some tistical models, and numerous successful applica- dia, the knowledge and the integrated multi- of the most prominent leading applied mathemati- tions of the AIC have been reported in various fields media-knowledge domains to explore how knowl- cians, as well as articles from young and promising of natural sciences, social sciences and engineering. edge technologies can be exploited to create new scientists from Africa, Asia and Europe. The com- One of the main objectives of this book is to pro- multimedia applications, & how multimedia mon objective of these articles is to present an im- vide comprehensive explanations of the concepts and technologies can provide new contexts for the use portant issue which is currently widely discussed in derivations of the AIC and related criteria, includ- of knowledge technologies. The step-by-step ap- scientific investigation with major human, economic ing Schwarz’s Bayesian information criterion (BIC), proach guides the reader from fundamental enabling or ecological implications. One main feature of the together with a wide range of practical examples of technologies of ontologies, analysis and reasoning, series, which the current book exemplifies, is that model selection and evaluation criteria. A secondary through to applications which have hitherto had each article is as deep as an expert lecture but is also objective is to provide a theoretical basis for the anal- less attention such as personalisation of multime- self-contained, so that even isolated scientists with ysis and extension of information criteria via a sta- dia content and personalised content adap- limited resources can profit greatly from it. Anoth- tistical functional approach. A generalized informa- tation. Thorough coverage of all relevant topics is er feature of this book is that each article is meant to tion criterion (GIC) and a bootstrap information cri- given, including ontologies for low level multime- present a collection of open questions which can fuel terion are presented, which provide unified tools for dia feature representation, higher level multimedia undergraduate or graduate research activities even in modeling and model evaluation for a diverse range systems representations, application of multimedia smaller or more isolated scientific communities. of models, including various types of nonlinear mod- ontologies for visual analysis and finally us- els and model estimation [..] age of multimedia and knowledge technolo- Fields of interest gies for applications. Presenting a fundamental work Computational Mathematics and Numerical Anal- Features which can serve as a reference book for researchers ysis; Mathematical Modeling and Industrial Mathe- With the development of modeling techniques, it has and graduate students going [..] matics; Visualization; Mathematics of Computing; been required to construct model selection criteria, Math. Appl. in Environmental Science; Game Theo- relaxing the assumptions imposed AIC and BIC Features ry/Mathematical Methods Provides comprehensive treatment of multimedia Contents ontologies' development & application from Target groups Concept of statistical modeling.- Statistical models.- multiple perspectives, going beyond single applica- Research scientists, undergraduate and graduate stu- Information criterion.- Statistical modeling by AIC.- tions Presents a step-by-step approach taking the dents Generalized information criterion GIC.- Statistical reader from the fundamental enabling technologies modeling by GIC.- Theoretical development and of ontologies, analysis & reasoning, through Type of publication asymptotic properties of the GIC.- Bootstrap infor- to applications which have hitherto had less atten- Proceedings mation criterion.- Bayesian information criteria.- tion, such as personalisation of multimedia content Various model evaluation criteria. & [..] Due December 2007 Fields of interest Contents Statistical Theory and Methods; Data Mining and Introduction and overview.- Multimedia Ontolo- 2008. Approx. 400 p. Geb. Knowledge Discovery; Probability and Statistics in gies.- Low level.- High level ontological representa- 74,85 € Computer Science; Simulation and Modeling; Com- tion and meta-ontologies.- Application specific on- putational Biology/Bioinformatics; Econometrics tologies.- Analysis and Reasoning.- Visual analysis ISBN 978-3-540-74338-5 and use of context.- Constraint reasoning.- Reason- Target groups ing applied to a specific domain.- Applications.- Per- Researchers sonalised Summaries.- Content adaptation.- Medical or animal application.- Conclusion Type of publication Monograph Fields of interest Information Systems Applications (incl.Internet); Due November 2007 Multimedia Information Systems; Information Stor- age and Retrieval; Image Processing and Computer Vision; Pattern Recognition; Artificial Intelligence 2008. Approx. 290 p. (Springer Series in Statistics) Geb. (incl. Robotics) 69,50 € Target groups ISBN 978-0-387-71886-6 Researchers, Graduate students

Type of publication Contributed volume

Due June 2008

2008. Approx. 286p. Geb.

90,90 € ISBN 978-1-84800-075-9 springer.com/booksellers Computer 99

A. Kopra, mental images, Berlin, Germany A. Kornai, MetaCarta Inc., Cambridge MA, USA G. Kortuem, Lancaster University, Lancaster, UK; J. Finney, Lan- caster University, Lancaster, UK; R. Lea, University of British Columbia, BC, Canada; V. Sundramoorthy, Lancaster University, Writing mental ray® Shaders Mathematical Linguistics Lancaster, UK (Eds.)

A Perceptual Introduction Smart Sensing and Context Mathematical Linguistics introduces the mathemati- cal foundations of linguistics to computer scientists, Second European Conference, EuroSSC 2007, Kendal, England, The current documentation of mental ray in Render- October 23-25, 2007, Proceedings engineers, and mathematicians interested in natural ing with mental ray and Programming mental ray is language processing. The book presents linguistics as uniquely thorough in its description of mental ray's a cumulative body of knowledge from the ground up: features and programmable extensibility. However, no prior knowledge of linguistics is assumed. Previ- This book constitutes the refereed proceedings of the with the increasing use of mental ray by artists and ous textbooks in this area concentrate on syntax and Second European Conference on Smart Sensing and programmers in visual effects and broadcast produc- semantics - this comprehensive volume covers an ex- Context, EuroSSC 2007, held in Kendal, England, tion, a different description of mental ray’s extensi- tremely rich array of topics also including phonology October 23-25, 2007. The 16 revised full papers and bility is required, an approach that takes the aesthet- and morphology, probabilistic approaches, complex- one invited paper were carefully reviewed and select- ics of rendering into account. “Writing mental ray ity, learnability, and the analysis of speech and hand- ed from over 51 submissions. The papers are orga- shaders” describes the varieties of shader program- writing. As the first textbook of its kind, this book is nized in topical sections on Spatial and Motion Con- ming from the point of view of increasing perceptual useful for those in information science (information text, Human Behavior as Context, Context Frame- complexity: from color, to the effects of light, to the retrieval and extraction, search engines) and in nat- works and Platforms and Sensing Technologies and manipulation of shape, to the output of the final im- ural language technologies (speech recognition, op- Case Studies. age. This is not a documentation organized around tical character recognition, HCI). Exercises suitable the structure of software, but rather based on our for the advanced reader are included, as well as sug- Fields of interest perception of the visual world. Other features of the gestions for further reading and an extensive bibliog- Information Systems Applications (incl.Internet); book are also designed for programmers in produc- raphy. Information Systems and Communication Service; tion. Many intermediate programmers work from Data Mining and Knowledge Discovery; Computer examples they use as templates for their own pro- Features Communication Networks; User Interfaces and Hu- grams. This book includes many example [..] Aims to teach linguistics to the reader but presumes man Computer Interaction only knowledge of mathematics at the undergraduate Features level The material was hitherto available only in the Target groups A tutorial introduction to mental ray shader pro- research literature Wide applicability in information Researchers and professionals gramming Includes the full source code for 100 science (information retrieval, information extrac- shaders and illustrated with over 200 rendered scenes tion, search engines) and in natural language tech- Type of publication and diagrams Cross-references with the first two vol- nologies (speech recognition, OCR, HCI) Proceedings umes of mental ray handbooks Contents Due October 2007 Contents Introduction.- The Elements.- Phonology.- Mor- Introduction - Structure: The structure of the scene phology.- Syntax.- Semantics.- Complexity.- Linguis- - The structure of a shader - Shaders in the scene - 2007. X, 301 p. (Lecture Notes in Computer Science, Band 4793) tic Pattern Recognition.- Speech and Handwriting.- Color: A single color - Color from orientation - Col- Softcover Simplicity.- Bibliography.- Index. or from position - The transparency of a surface - 51,36 € Color from functions - The color of edges - Light: Fields of interest ISBN 978-3-540-75695-8 Lights - Light on a surface - Shadows - Reflection - Language Translation and Linguistics; Applications Refraction - Light from other surfaces - Shape: Mod- of Mathematics; Signal,Image and Speech Process- ifying surface geometry - Modifying surface orienta- ing; Mathematical Logic and Formal Languages; tion - Creating geometric objects - Space: Environ- Probability Theory and Stochastic Processes; Pattern ment - Atmosphere - Volume - Image: Changing the Recognition lens - Rendering image components - Modifying the final image - Appendices: [..] Target groups Graduates, advanced graduates, researchers, software Fields of interest engineers in natural language technology Computer Graphics; Computer-Aided Engineering (CAD, CAE) and Design; Computer Appl. in Arts Type of publication and Humanities; Media Design Graduate/advanced undergraduate textbook

Target groups Due December 2007 Computer graphics students and researchers, CAD/ CAE software programmers, digital visual effects programmers and artists, feature animation design 2008. Approx. 305 p. (Advanced Information and Knowledge programmers and artists, designers and program- Processing) Geb. mers of 3D modeling applications 82,34 € Type of publication ISBN 978-1-84628-985-9 Handbook

Due November 2007

2008. Approx. 600 p. 730 (156 colored) ill. (mental ray® Hand- books, Band 3) Softcover

139,05 € ISBN 978-3-211-48964-2 springer.com/booksellers Computer 100

M.R. Kosorok, University of North Carolina, Chapel Hill, NC, USA D. Kossmann, ETH Zürich; D. Kossmann, Paris A.G. Kostianoy, Lomonosov Moscow State University, Moscow, Russia; A.N. Kosarev, Lomonosov Moscow State University, Moscow, Russia (Eds.) Introduction to Empirical Processes Controlling & IT im Einkauf and Semiparametric Inference The Black Sea Environment

Dieses Buch behandelt alle Aspekte des Einkaufs- controllings mit seinen Prozessen und IT-Werkzeu- This book provides a self-contained, linear, and uni- gen. Es bietet ein Methoden-Definitionsgerüst, mit This book presents a systematic description of the fied introduction to empirical processes and semi- dem Varianzen als Funktion von veränderten Vo- knowledge accumulated on the physical oceanogra- parametric inference. These powerful research tech- lumina und veränderten Preisen berechnet werden phy, marine chemistry and pollution, marine biolo- niques are surprisingly useful for developing meth- können. Somit kann bestimmt werden, welche Preis- gy and geology, meteorology and hydrology of the ods of statistical inference for complex models and in steigerung den Marktverhältnissen – sowohl für das Black Sea. It presents the principal characteristic fea- understanding the properties of such methods. The eingekaufte Produkt als auch für die verwendeten tures of the environmental conditions of the sea and targeted audience includes statisticians, biostatisti- Vormaterialien -, den Währungsschwankungen und their changes in the second half of the 20th centu- cians, and other researchers with a background in der Verhandlungsleistung des Einkäufers zuzurech- ry. At present, the principal problems of the Black mathematical statistics who have an interest in learn- nen sind. Ferner beschreibt das Buch die verschiede- Sea are related to the estimation of the intensity of ing about and doing research in empirical process- nen Preis- und Konditionssysteme und führt als the chemical pollution of the sea and its impact upon es and semiparametric inference but who would like neues Preissystem den "generischen Preis" ein. Ein the biota. Special attention is given to the socioeco- to have a friendly and gradual introduction to the weiterer Schwerpunkt ist die Beschreibung von IT- nomic, legal, and political issues in the Black Sea re- area. The book can be used either as a research ref- Architekturen (u.a. Web Service), die das Supplier gion. This publication is based on numerous obser- erence or as a textbook. The level of the book is suit- Relationship Management unterstützen. Alle Metho- vational data collected by the authors of the various able for a second year graduate course in statistics or den werden von einem Demo-System begleitet, das chapters during sea expeditions, on the archive data biostatistics, provided the students have had a year of dem Leser zugänglich ist. of several Russian and Ukrainian oceanographic in- graduate level mathematical statistics and a semester stitutions, as well as on a large body of scientific lit- of probability.The book consists of three parts. The Features erature, mainly published in Russian editions. This first part is a concise overview of all of the main con- Einführung des neuen Preissystems des "Gener- book is aimed at specialists concerned with research cepts covered in the [..] ischen Preises" Beschreibung von IT-Architekturen in the various fields of [..] für Supplier Relationship Management Mit komplet- Features tem, web-basierten Demo-System Features A self-contained, linear, and unified introduction to Presents in a systematic description the knowledge empirical processes and semiparametric inference Fields of interest accumulated on the physical oceanography, marine Homework problems are also included at the end of Management of Computing and Information Sys- chemistry and biology, and pollution of the Black each chapter tems; Information Systems and Communication Ser- Sea. Based on numerous observational data of the vice; Finance /Banking; Information Systems Appli- authors, on archival data of several Russian oceano- Fields of interest cations (incl.Internet); Management; Technology graphic institutions and on the broad scientific liter- Statistical Theory and Methods Management ature mainly published in Russian editions. Target groups Target groups Fields of interest Statisticians, researchers, grad students. IT-Manager, Beratungsunternehmen, Consultants, Atmospheric Protection/Air Quality Control/Air Type of publication Controlling Pollution; Environmental Computing/Environmen- Monograph tal Modelling; Monitoring/Environmental Analy- Type of publication sis/Environmental Ecotoxicology; Statistics for En- Professional book gineering, Physics, Computer Science, Chemistry & Due April 2008 Geosciences Due July 2008 2008. Approx. 490 p. (Springer Series in Statistics) Geb. Target groups Scientists, engineers, graduate students in the field 74,15 € 2008. Etwa 250 S. (Xpert.press) Geb. of environmental sciences, risk assessment and risk ISBN 978-0-387-74977-8 controlling, toxicology and ecology; decision-makers 49,95 € in government, industrial and regulatory bodies ISBN 978-3-540-23616-0 Type of publication Reviews

Due November 2007

2008. Approx. 380 p. Also available online. (Water Pollution, Teil 5Q) Geb.

266,43 € ISBN 978-3-540-74291-3 springer.com/booksellers Computer 101

M. Kowalkiewicz, SAP Research Australia, Brisbane, Australia; M.E. D. Kragic, Royal Institute of Technology, Stockholm, Sweden; V. W. Kresse, Technical University Neubrandenburg, Germany; D.M. Orlowska, The University of Queensland, Brisbana, Australia; T. Kyrki, Lappeenranta University of Technology, Lappeenranta, Danko, Environmental Systems Research Institute, Wien, Austria Kaczmarek, Poznan University of Economics, Poznan, Poland; W. Finland (Eds.) (Eds.) Abramowicz, Poznan University of Economics, Poznan, Poland Lecture Notes in Electrical Eng. Vol Springer Handbook of Geographic Web Information Extraction and 13 Information Integration

Currently there is a gap between the research con- Computer science provides a powerful tool that was Currently, there exists an overburdening growth ducted in computer vision and robotics commu- virtually unknown three generations ago. Comput- in the number of reliable information sources on nities. There are many characteristics in common er science has changed the shape of many classical the Internet. At the same time, temporal and cogni- in computer vision research and vision research in domains. Often domains have become more simi- tive resources of human users are not changing. In robotics. Despite having these common interests, lar than before. On the other hand new applications an effort to curtail the information overload result- however, “pure” computer vision has seen significant have emerged that were technically not feasible with- ing from this conflict, recent research has attempt- theoretical and methodological advances during the out the support of a computer. Those developments ed to provide methods and tools for web content ex- last decade which many of the robotics researchers lead to new high-level domains. One of them is Ge- traction and aggregation. Success in these areas will are not fully aware of. On the other hand, the manip- ographic Information. Some of the classical fields of greatly enhance business processes, and provide in- ulation and control capabilities of robots as well as knowledge are geodesy (surveying), cartography, and formation seekers with new tools allowing them to the range of application areas have developed greatly. geography. Electronics have revolutionized geodetic reduce their time and cost involvement. This book In robotics, vision can not be considered an isolated methods. Cartography has faced the dominance of focuses on web content extraction and deep web da- component, but it is instead a part of a system result- the computer that results in simplified cartographic ta integration, and the methods and tools used, as ing in an action. Thus, in robotics the vision research products. All three fields make use of basic compo- well as analyzing the limitations of existing technol- must include consideration of the control of the sys- nents such as the Internet and databases. Geodesy ogy and solutions. This volume presents an accessi- tem, in other words, the entire perception-action may be interpreted as the input-component, cartog- ble, well-organized and comprehensive survey of this loop. This requires that a holistic system approach is raphy may be interpreted as the output-component, discipline. Professionals, researchers, and academics useful and could provide significant advances in this and geography may be interpreted as one of many involved in information technology will all find this application domain. Assembled here is a collection of application of Geographic Information. Fast and mo- book a timely and essential reference. some of the state of the [..] bile Internet access as well as a comprehensive [..]

Features Features Contents Extensive analysis of existing systems in Web Con- Demonstrates state of the art in applying computer Basics.- Computer Science.- Modelling, Conceptual tent Extraction and Deep Web Data Extraction A vision in robotics Discusses contrasting viewpoints Scheme Language.- Encoding.- Telecomunication.- comprehensive overview of the subject, both the- of computer vision vs robotics Provides current and Mathematics and Statistics.- Databases.- Hardware.- oretical and practical Presentation and discussion future challenges discussed from research perspec- Geometry.- Image Processing.- Data Mining, Knowl- of original content and data extraction methods, tive Covers vision considered as a component of an edge Discovery.- Geoinformatics.- Geographic Infor- designed to be used by non-specialist users (all ap- action generating intelligent system mation Systems.- Geodesy.- Data Capture.- 3D-GIS.- proaches to date present methods requiring a degree Spatial Data Infrastructures, Web-GIS.- Portrayal, in CS to be used) Contents Cartography.- Metadata, Data Quality.- Standards.- Part Based People Detection on A Mobile Robot.- Applications.- Annexes.- Contents Model-Based 3-D Pose Estimation and Feature Introduction.- Section I. Web Content Extraction: Tracking for Robot Assisted Surgery with Medical Fields of interest Information Extraction and Aggregation in Con- Imaging.- Reasoning and Vision.- Image-Based Vi- Geoinformation/Cartography; Information Sys- temporary Economy.- Web Content Extraction and sual Servoing with Extra Task Related Constraints tems and Communication Service; Computer Ap- Aggregation.- Practical Aspects of Content Aggre- in A General Framework for Sensor-Based Robot plications in Geosciences; Monitoring/Environ- gation.- Using XPath in Web Content Extraction.- Systems.- Early Reactive Grasping with Second Or- mental Analysis/Environmental Ecotoxicology; Sample Proof-of-concept Prototype of a Web Con- der 3D Feature Relations.- Interactive Perception: Appl.Mathematics/Computational Methods of Engi- tent Extraction System.- Empirical Analysis of Ro- Closing the Gap Between Action and Perception.- neering bustness of Content Extraction Systems.- Section Wald's Sequential Analysis for Time-Constrained II. Deep Web Data Extraction: Information Integra- Vision Problems.- Constant Time Sliding Window Target groups tion.- Deep Web in a Context of Information Inte- Filter SLAM as A Basis for Metric Visual Percep- Scientists at universities and in industry, Practition- gration.- A Method for Deep Web Information Inte- tion.- More Vision [..] ers, Libraries gration. Model of a Deep Web Information Integra- tion System.- [..] Fields of interest Type of publication Computer Imaging, Vision, Pattern Recognition and Handbook Fields of interest Graphics; Image Processing and Computer Vision; Information Systems Applications (incl.Internet); In- Automation and Robotics; Artificial Intelligence (in- Due March 2009 formation Storage and Retrieval; Database Manage- cl. Robotics) ment; Data Mining and Knowledge Discovery Target groups 2009. Approx. 1200 p. With DVD-ROM. Geb. Target groups Researchers and professionals 266,43 € Professionals, researchers and academics in informa- ISBN 978-3-540-72678-4 tion technology Type of publication Monograph Type of publication Monograph Due April 2008

Due April 2008 2008. Approx. 260 p. (Lecture Notes Electrical Engineering, Band 13) Geb. 2008. Approx. 255 p. (Web Information Systems Engineering and Internet Technologies Book Series, Band 5) Geb. 82,39 € ISBN 978-0-387-75521-2 89,83 € ISBN 978-0-387-72769-1 102 Computer springer.com/booksellers

W. Kresse, Technical University Neubrandenburg, Germany; D.M. W. Kriha, Hochschule der Medien, Stuttgart; R. Schmitz, D. Krishnaswamy, Advanced Technology R&DQualcomm Inc., San Danko, Environmental Systems Research Institute, Wien, Österre- Hochschule der Medien, Stuttgart Diego, USA; T. Pfeifer, Waterford Institute of Technology, Water- ich (Eds.) ford, Ireland; D. Raz, The Technion, Haifa, Israel (Eds.) Internet-Security aus Software- Springer Handbook of Geographic Sicht Real-Time Mobile Multimedia Information Services Ein Leitfaden zur Software-Erstellung für sicherheitskritische Bereiche 10th IFIP/IEEE International Conference on Management, of Multimedia and Mobile Networks and Services, MMNS 2007, Computer science provides a powerful tool that was San José, USA, October 31 - November 2, 2007, Proceedings virtually unknown three generations ago. Comput- Die Praxis zeigt, dass bei der Entwicklung großer, er science has changed the shape of many classical komplexer Softwaresysteme Sicherheitsaspekte oft domains. Often domains have become more simi- gar nicht oder erst sehr spät berücksichtigt werden. This book constitutes the refereed proceedings of the lar than before. On the other hand new applications IT-Security-Spezialisten werden in die Entwick- 10th IFIP/IEEE International Conference on Man- have emerged that were technically not feasible with- lung neuer Systeme oft nicht eingebunden, und Soft- agement of Multimedia and Mobile Networks and out the support of a computer. Those developments wareentwicklern fehlt häufig das Bewusstsein für Services, MMNS 2007, held in San José, USA, Octo- lead to new high-level domains. One of them is Ge- Sicherheitsprobleme und die nötigen Detailkennt- ber 31 - November 2, 2007 in the course of the 3nd ographic Information. Some of the classical fields of nisse, vorhandene Lösungen richtig einzusetzen. Hi- International Week on Management of Networks knowledge are geodesy (surveying), cartography, and er setzt das Buch an und schlägt eine Brücke von der and Services, Manweek 2007. The 14 revised full pa- geography. Electronics have revolutionized geodetic Softwaresicht zu mehr netzwerkorientierten Aspek- pers and 5 revised short papers presented were methods. Cartography has faced the dominance of ten der Internet-Security. Ziel der Autoren ist es, bei carefully reviewed and selected from 46 submissions. the computer that results in simplified cartographic Entwicklern und Projektleitern ein grundlegendes The papers are organized in topical sections on ser- products. All three fields make use of basic compo- Sicherheitsbewusstsein zu schaffen und ihnen einen vices and user experience, wireless and cellular net- nents such as the Internet and databases. Geodesy Leitfaden für den Bau sicherer verteilter Systeme an works, monitoring and control, multicast and IPTV may be interpreted as the input-component, cartog- die Hand zu geben. Sicherheitsprobleme werden an- as well as resource management. raphy may be interpreted as the output-component, hand konkreter Beispiele diskutiert und passende and geography may be interpreted as one of many Fields of interest Lösungen aufgezeigt. application of Geographic Information. Fast and mo- Computer Communication Networks; Multime- bile Internet access as well as a comprehensive [..] Features dia Information Systems; Information Storage and Praxisorientierte Darstellung Alle Aspekte der Soft- Retrieval; User Interfaces and Human Comput- Contents wareentwicklung sicherer IT-Systeme Anschauliche er Interaction; Information Systems Applications Basics.- Computer Science.- Modelling, Conceptual Beispiele wie ebay, bahn.de, Mozilla Langjährige Er- (incl.Internet); Communications Engineering, Net- Scheme Language.- Encoding.- Telecomunication.- fahrung der Autoren in sicherheitskritischen Bere- works Mathematics and Statistics.- Databases.- Hardware.- ichen (u.a. Telekom, UBS) Geometry.- Image Processing.- Data Mining, Knowl- Target groups edge Discovery.- Geoinformatics.- Geographic Infor- Contents Researchers and professionals mation Systems.- Geodesy.- Data Capture.- 3D-GIS.- Einführung.- Security aus soziologischer Sicht.- Das Type of publication Spatial Data Infrastructures, Web-GIS.- Portrayal, Herstellen von Vertrauensbeziehungen als zentrales Proceedings Cartography.- Metadata, Data Quality.- Standards.- Problem der Internet-Security.- Ein erstes Beispiel: Applications.- Annexes.- Der Online-Fahrkartenverkauf der Deutschen Bahn.- Wo liegen mögliche Sicherheitsprobleme?- Due October 2007 Fields of interest Wie können sie gelöst werden?- Mechanismen der Geoinformation/Cartography; Information Sys- Netzwerksicherheit.- Verschlüsselung, Digitale Sig- tems and Communication Service; Computer Ap- 2007. XII, 197 p. (Lecture Notes in Computer Science, Band 4787) natur, Hashfunktionen.- SSL, IPSec.- Firewall-Ar- Softcover plications in Geosciences; Monitoring/Environ- chitekturen.- Drahtlose Netze.- Load Balancing.- mental Analysis/Environmental Ecotoxicology; Von kanalbasierter zu tokenbasierter Sicherheit.- 62,06 € Appl.Mathematics/Computational Methods of Engi- Warum tokenbasierte Sicherheit?- Web Services.- ISBN 978-3-540-75868-6 neering XML Security.- Single Sign On.- Ausblick.- eros.org.- Target groups [..] Scientists at universities and in industry, Practition- Fields of interest ers, Libraries Software Engineering; Computer Communication Type of publication Networks; Software Engineering/Programming and Handbook Operating Systems; Information Systems Applica- tions (incl.Internet); Data Encryption

Due April 2009 Target groups Softwareentwickler, Projektmanager, IT-Securi- 2009. eReference. ty-Spezialisten, Dozenten und Studenten der Infor- matik 296,31 € ISBN 978-3-540-72680-7 Type of publication Professional book

Due December 2007

2007. Etwa 300 S. (Xpert.press) Geb.

49,95 € ISBN 978-3-540-22223-1 springer.com/booksellers Computer 103

D. Kroening, Computer Science, ETH, Zuerich, Switzerland; O. W. Krämer, Karlsruhe, Germany; U. Kulisch, R. Lohner, Karlsruhe, L.S. Kuchment, Russian Academy of Sciences, Moscow, Russia Strichman, Technion - Israel Institute of Technology, Haifa, Israel Germany Generation of River-Runoff Decision Procedures Numerical Toolbox for Verified

An Algorithmic Point of View Computing II Advanced Numerical Problems The main idea of the book is to present the up-to- date understanding of the main runoff generation processes in different physiographic conditions, to A decision procedure is an algorithm that, given a outline the developed physically based models of decision problem, terminates with a yes/no answer. these processes, and to suggest the approaches to Here, the authors focus on deciding logics that are Fields of interest modeling of the runoff generation according to time- expressive enough to model real problems, and, on Computational Mathematics and Numerical Analy- space scales, practical hydrological problems and the other hand, are still decidable. Specifically, the sis; Software Engineering/Programming and Operat- available geographic and hydrometeorological in- book focuses on decision procedures for decidable ing Systems formation. The book is based to a considerable ex- fragments of first-order logic that are commonly tent on experience of the Russian school of experi- used in automated verification, theorem-proving and Type of publication mental and theoretical hydrology and own results of compiler optimization. The techniques described in Monograph the author and his collaborates. The physically based the book draw from fields such as graph theory, log- models of main processes of runoff generation is re- ics and operations research, and are routinely used in Due November 2008 viewed including models of rainfall and snow inter- industry. The authors introduce the basic concepts, ception, snow cover formation and snowmelt, ver- and then, in separate chapters, study decision proce- tical heat and moisture transfer in the freezing and dures for each of the following logics: proposition- 2008. Approx. 370 pp. Geb. thawing soil, vertical movement of the soil moisture al logic; equalities and uninterpreted functions; lin- 64,00 € and evapotranspiration, overland, subsurface, and ear arithmetic; bit vectors; arrays; pointer logic and ISBN 978-3-540-60470-9 ground flow, water movement in river channels. The quantified formulas. They also study the problem of consideration of models contains describing numer- deciding combined theories and dedicate a chapter ical [..] to the interplay between a SAT solver and a decision procedure for the [..] Features Specialist modelling of hydrological processes Hy- Contents drological forecasting Researches the hydrological Basic Concepts and Background.- Decision cycle and climate system Procedures for Propositional Logic.- Equalities and Uninterpreted Functions.- Decision Procedures for Contents Equality Logic.- Linear Arithmetic.- Bit-Vectors.- Chapter 1  Runoff generation mechanisms Arrays.- Pointer Logic.- Quantified Formulas.- De- Chapter 2  Processes of snow cover forma- ciding Combined Theories.- Propositional Encod- tion and snowmelt Chapter 3  Vertical water ings.- App. A, The SMT-LIB Initiative.- App. B, Pro- movement in the soil and evapotranspiration Chap- gramming a Decision Procedure ter 4  Horizontal movement of water in the river basin and in the river channel networks Chap- Fields of interest ter 5  Construction of the models of runoff Mathematical Logic and Formal Languages; Logics generation Chapter 6  Impacts of land use and and Meanings of Programs; Theory of Computation; climate change on runoff Chapter 7  Runoff Software Engineering; Artificial Intelligence (incl. forecasting Chapter 8  Estimating the extreme Robotics) floods characteristics Target groups Fields of interest Graduate students, researchers Math. Applications in Geosciences; Environmental Type of publication Computing/Environmental Modelling; Waste Water Graduate/advanced undergraduate textbook Technology / Water Pollution Control / Water Man- agement / Aquatic Pollution

Due February 2008 Target groups Research workers, professionals, and graduate stu- 2008. Approx. 300 p. (Texts in Theoretical Computer Science. An dents in hydrology and water resources engineering. EATCS Series) Geb. Type of publication 64,15 € Monograph ISBN 978-3-540-74104-6 Due June 2008

2007. 300 p. (Water Science and Technology Library, Band 53) Geb.

106,95 € ISBN 978-1-4020-3965-2 104 Computer springer.com/booksellers

C.-C. Kuo, University of Southern Califronia, Los Angeles, CA, USA; M. Kurzynski, Wroclaw University of Technology, Wroclaw, P. Kügler, Universität Linz, Austria; W. Windsteiger, Universität S.-H. Tsai, Mindtek, Inc., Kaohsiung City, Taiwan; L. Tadjpour, Uni- Poland; E. Puchala, Wroclaw University of Technology, Wroclaw, Linz, Austria versity of Southern California, Glendale, CA, USA; Y.-H. Chang, Poland; M. Wozniak, Wroclaw University of Technology, Wroclaw, University of Southern California, Los Angeles, CA, USA Poland; A. Zolnierek, Wroclaw University of Technology, Wro- claw, Poland (Eds.) Algorithmische Methoden

Precoding Techniques for Digital Band 1: Zahlen, Vektoren, Polynome Communication Systems Computer Recognition Systems 2

"Algorithmische Methoden" ist ein Lehrbuch This book presents the results of the 5th Interna- zur Computer-orientierten Begleitung der This book offers a comprehensive treatment on "pre- tional Conference on Computer Recognition Sstems Analysis und Linearen Algebra. Es werden gängige coding techniques for communication systems" to CORES’07 held 22-25 October 2007 in Hotel Tum- Fragestellungen der Analysis und linearen Alge- researchers, practical engineers and graduate stu- ski, Wroclaw, Poland. It brings together original re- bra diskutiert und unter Verwendung der Soft- dents who are working in the fields of signal process- search results in both methodological issues and dif- warepakete Matlab und Mathematica auch am Com- ing and communications. The book contains two ferent application areas of pattern recognition. The puter beantwortet. Mathematische Standard-Al- parts: fundamentals and system applications. The contributions cover all topics in pattern recognition gorithmen werden im Detail vorgestellt und deren first part provides an overview of existing precoding including: Classification and interpretation of text, Umsetzung in Computerprogramme besprochen. techniques. From this tutorial overview, readers can video, voice; statistical, soft and structural methods Zusätzlich wird erläutert, wie in Mathematica understand the evolution of precoding and the prin- of pattern recognition; image processing, analysis und Matlab eingebaute Funktionen zur Lösung ciples of various precoding schemes. The sec- and interpretation; machine learning; data and Web der diskutierten Probleme herangezogen werden ond part discusses the application of state-of- mining; knowledge-based decision support systems; können. Die Inhalte sind nach den verschiedenen the-art precoding schemes to current and/or emerg- advanced signal processing methods or special hard- Datentypen, etwa Polynome, reelle Funktionen und ing communication systems to combat impairments ware architecture. Matrizen, gegliedert. Im Vordergrund stehen die such as inter-symbol interference (ISI), multiaccess Repräsentierung der Objekte am Computer, Grun- interference (MAI) and the Doppler effect. Those Features doperationen auf diesen Objekten und typische communication systems include: orthogonal fre- Presents the latest results in computer recognition Fragestellungen, die im Zusammenhang mit diesen quency division multiplexing (OFDM), multiuser systems, pattern recognition, machine learning, web Objekten auftreten. Im Buch werden die Algorith- OFDM, MC-CDMA, multi-input and multi-output and data mining men dazu in Pseudocode erklärt. Elektronisches Be- (MIMO) and ultra wideband (UWB) radio systems. gleitmaterial beinhaltet konkrete Programme für Finally, discussion on advanced topics and an exten- Contents Mathematica und Matlab, alle Beispiele [..] sive list of references [..] Part I Image Processing and Computer Vision.- Part II Features, Learning, and Clssifiers.- Part III Speech Features Features and Word Recognition.- Part IV Medical Applica- Gliederung anhand von mathematischen Daten- The first book focusing on modern precoding tech- tions.- Part V Various Applications. strukturen Theoretischer Hintergrund zu niques for modern digital communications systems Existenz, Eindeutigkeit und Datenstabilität Includes tutorial and advanced materials to serve Fields of interest Veranschaulichung durch Beispiele, bewusster both beginners and experienced researchers Discuss- Appl.Mathematics/Computational Methods of Engi- Verzicht auf Beweise Lösung aufwändigerer Rechen- es the application of the precoding techniques to ex- neering; Pattern Recognition; Artificial Intelligence beispiele am Computer in Gleitkommaarithmetik isting and emerging communication systems (incl. Robotics); Applications of Mathematics; Infor- und rationaler Arithmetik Gegenüberstellung von mation Systems and Communication Service Contents numerischen und symbolischen Lösungsmethoden Algorithmen für Matlab und Mathematica als [..] Overview of Precoding Techniques.- Precoding Target groups Techniques for ISI Channels.- Precoding Techniques Researchers, engineers, graduate students in pattern Contents for Multiple Access Channels.- Precoding Tech- recognition, computational intelligence, computer 1) Grundbegriffe und Grundfragen einer algorith- niques for MIMO Channels.- Precoding Techniques science and information engineering mischen Mathematik: Problemspezifikation.- Kondi- for Non-Ideal Channel Information at Tx.- Precod- tion eines Problems.- Algorithmen und deren ing for OFDM Systems.- Precoding for MC-CDMA Type of publication Eigenschaften.- Vom Algorithmus zum Computer- Systems.- Precoding for UWB Systems.- Precoding Proceedings programm.- 2) Mengen, Tupel und Funktio- for Next Generation MIMO Communication Sys- nen.- 3) Zahlbereiche: Darstellung am Computer.- tems.- Conclusion and Future Research Directions. Due October 2007 4) Vektoren.- 5) Polynome, Polynomfunktionen und Fields of interest Rationale Funktionen: Darstellung am Computer.- Communications Engineering, Networks; Coding 2008. XVIII, 863 p. Also available online. (Advances in Soft Com- Polynomdivision mit Rest.-Polynomauswertung.- and Information Theory; Computer Communica- puting, Band 45) Softcover Polynominterpolation. tion Networks; Signal,Image and Speech Processing; 245,03 € Fields of interest Computer Systems Organization and Communica- ISBN 978-3-540-75174-8 Algorithms; Computational Mathematics and Nu- tion Networks; Electronic and Computer Engineer- merical Analysis ing Target groups Target groups Bachelor-Studenten der Mathematik in den ersten Researchers, practical engineers and graduate stu- beiden Jahren, Studenten naturwissenschaftlich- dents in the fields of signal processing and commu- er oder technischer Fächer mit Interesse an rasch- nications er Umsetzung von mathematischen Algorithmen, Type of publication sowie Dozenten. Monograph Type of publication German textbook Due March 2008 Due February 2008 2008. Approx. 500 p. Geb.

85,55 € 2008. Etwa 150 S. (Mathematik kompakt) Softcover ISBN 978-0-387-71768-5 18,90 € ISBN 978-3-7643-8434-0 springer.com/booksellers Computer 105

S. Lahlou, EDF R&D, France (Ed.) M. Lang, National University of Ireland, Galway, Ireland; W. Wo- A.M. Langer, Columbia University, New York, NY, USA jtkowski, Boise State University, Boise, ID, USA; G. Wojtkowski, Boise State University, Boise, ID, USA; S. Wrycza, University of Designing User Friendly Gdansk, Sopot, Poland; J. Zupancic, University of Maribor, Preser- Analysis and Design of Information Augmented Work Environments nova, Slovenia (Eds.) Systems From Meeting Rooms to Digital Collaborative Spaces The Inter-Networked World

ISD - Theory, Practice, and Education In any software design project, the analysis stage – documenting and designing technical requirements Features for the needs of users - is vital to the success of the project. This book provides a thorough introduction Gathers, summarises and puts into perspective ma- Information Systems Development (ISD) progresses and survey to all aspects of analysis. This edition pro- terial from some of the most prominent teams who rapidly, continually creating new challenges for the vides new features including: Additional chapters on pioneered the domain of AE. Authors approach is professionals involved. New concepts, approaches system Development Life Cycle and Data Element grounded in actual experience. They have designed and techniques of systems development emerge con- Naming Conventions and Standards; more cover- and operated real augmented workspaces which are stantly in this field. Progress in ISD comes from re- age on converting logical models to physical mod- in daily use. This is a growing market - good practice search as well as from practice. This conference will els, how to generate DDL and testing database func- is not yet established, and building such augmented discuss issues pertaining to information systems de- tionalities; expansion of database section with con- rooms is not routine, so such contructions will in- velopment (ISD) in the inter-networked digital econ- cepts such as denormalization, security and change volve [..] omy. Participants will include researchers, both ex- control; developments on new design and technolo- perienced and novice, from industry and academia, gies, particularly in the area of web analysis and de- Contents as well as students and practitioners. Themes will in- sign. A revised Web/Commerce chapter addresses Augmented environments and design.- Towards a clude methods and approaches for ISD; ISD educa- component middleware for complex systems design; global concept of collaborative space.- Cognitive at- tion; philosophical, ethical, and sociological aspects new Case Studies. This book is a valuable resource tractors and designing workspaces with users.- Co- of ISD; as well as specialized tracks such as: distribut- and guide for all information systems students, prac- design approaches for early phases of augmented en- ed software development, ISD and knowledge man- titioners and professionals who need an in-depth un- vironments.- Computer and software architecture agement, ISD and electronic business / electronic derstanding of the principles of the analysis and [..] in AE.- Distributed cognition and visualisation.- De- government, ISD in public sector organizations, IOS. signing social architectures based on cooperative Features buildings, roomware, ambient displays and mobile Features Offers a complex set of tools covering all types of devices.- Ubiquitous working environments.- Pat- Presents the latest and greatest concepts, approach- systems, including legacy, transactional, database terns for augmented collaborative spaces.- Evaluat- es, and techniques of systems development - a noto- and web/ecommerce topics, providing a wide range ing cognitive and communicational dimensions of riously transitional field Illustrates the newest design of topics and integrating them within a common professional activity.- Workspace.- Privacy design and development in information systems, in applica- method for the successful analyst/designer Presents [..] tions engineering and reengineering, as well as issues a set of good practices that allow professionals to concerned with teaching and learning in this field Fields of interest adjust to the constraints and needs of any business Multimedia Information Systems; User Interfaces Contents without adhering to any particular methodology of and Human Computer Interaction  - Preface. -Methods and Approaches for ISD. systems design -ISD Education. -Philosophical, Ethical, and Socio- Contents Target groups logical Aspects of ISD. -Distributed Software Devel- Introduction.- System Development Life Cycle: Academic, Students, Professionals involved in the opment. -ISD and Knowledge Management. -ISD Steps in Analysis and Design.- The User Interface.- CHI, CSCW, UBIcomp, Cobuild communities. and Electronic Business. -ISD and Electronic Gov- Overview of Analysis Tools.- Process Based Tools.- ernment. - ISD in Public Sector Organiza- Type of publication Logic Data Modeling.- Web User Interface Tools.- tions. -IOS. -Index. Reference work Design Specification Tools.- CASE and Automated Fields of interest Techniques.- Object Oriented Techniques.- Inter- Due August 2008 Database Management; Information Storage and net/Intranet and Web Analysis.- Acceptance Test- Retrieval; Information Systems; Computer Science, ing.- Business Process Re-Engineering.- Security general; Software Engineering/Programming and and Change Control.- Creating a Detailed Require- 2008. Approx. 295 p. (Computer Supported Cooperative Work) ments Document.- Transactional Processing Systems Geb. Operating Systems Design.- Case Study: the Rainforest Book Compa- 74,85 € Target groups ny Problem.- Case Study: The CGT Rental Service ISBN 978-1-84800-097-1 Researchers, students, and practitioners in the field Problem.- [..] of Information Systems Development. Fields of interest Type of publication Software Engineering; Information Systems Applica- Contributed volume tions (incl.Internet) Target groups Due January 2008 Graduate students, practitioners

2008. Approx. 600 p. Geb. Type of publication Graduate/advanced undergraduate textbook ISBN 978-0-387-30403-8 Due December 2007

2008. Approx. 400 p. 249 illus. Geb.

64,15 € ISBN 978-1-84628-654-4 106 Computer springer.com/booksellers

U. Langer, University of Linz, Austria; M. Discacciati, Ecole J. Lee, Evanston, IL, USA; R. Dice J.A. Lee, Université Catholique de Louvain, Belgium; M. Verley- Polytechnique Fédérale de Lausanne, Switzerland; D. Keyes, sen, Université Catholique de Louvain, Belgium Columbia University, NY, USA; O. Widlund, New York University, New York, NY, USA; W. Zulehner, University of Linz, Austria (Eds.) Beginning Perl 6 Nonlinear Dimensionality From Novice to Professional Domain Decomposition Methods in Reduction Science and Engineering XVII Perl 6, the long-awaited next release of one of the world's most popular programming languages, is Methods of dimensionality reduction provide a way coming to fruition after more than seven years. A to understand and visualize the structure of complex This volume contains a selection of papers present- complete redesign of its predecessor, Perl 6 repre- data sets. Traditional methods like principal compo- ed at the 17th International Conference on Domain sents a massive rethinking of both language internals nent analysis and classical metric multidimension- Decomposition Methods in Science and Engineering and features, and will grant both the language devel- al scaling suffer from being based on linear models. held at St. Wolfgang / Strobl, Austria, July 3 - 7, 2006. opers and users a level of unheralded flexibility and Until recently, very few methods were able to reduce Domain decomposition is an active, interdisciplinary power. However, taking advantage of these new fea- the data dimensionality in a nonlinear way. Howev- research field concerned with the development, anal- tures comes at the cost of a steep learning curve, par- er, since the late nineties, many new methods have ysis, and implementation of coupling and decou- ticularly for those developers who have grown accus- been developed and nonlinear dimensionality re- pling strategies in mathematical and computation- tomed to programming using the longstanding Perl duction, also called manifold learning, has become a al models. Domain decomposition methods provide concepts of previous versions. Beginning Perl 6 is the hot topic. New advances that account for this rapid efficient tools for treating problems in all computa- first book to offer both newcomers to the language growth are, e.g. the use of graphs to represent the tional sciences. The reader will become familiar with and seasoned developers alike the definitive resource manifold topology, and the use of new metrics like the newest domain decomposition techniques and to Perl, with special emphasis on the version 6 re- the geodesic distance. In addition, new optimiza- their use in the modelling and simulation of complex lease. tion schemes, based on kernel techniques and spec- problems from different fields of application. tral decomposition, have lead to spectral embedding, Features which encompasses many of the recently developed Fields of interest Perl 6 is one of the open source industry's most methods. This book describes existing and advanced Computational Mathematics and Numerical Anal- awaited updates in years, having been under devel- methods to reduce the dimensionality of numerical ysis; Computational Science and Engineering; Nu- opment for almost seven years. Readers will be clam- databases. For each method, the description [..] merical and Computational Methods; Numerical and oring for material upon the final release, presently Computational Methods in Engineering scheduled for early Q2 of 2007 Beginning Perl 6 is Features Covers a wide range of methods to reduce the di- Target groups the first book to cover the Perl 6 release Technical mensionality of data and presents a unifying point of Computational scientists reviewed by prominent Perl community member Richard Dice, who was among other things the con- view Type of publication ference [..] Contents Proceedings Contents High-dimensional data.- Characteristics of an analy- 1 Introducing Perl 6.- 2 First Steps in Perl.- 3 sis method.- Estimation of the intrinsic dimension.- Due December 2007 Scalars.- 4 Control Flow Constructs.- 5 Lists and Ar- Distance preservation.- Topology preservation.- rays.- 6 Hashes.- 7 Subroutines/ Functions.- 8 Reg- Method comparisons.- Conclusions. 2008. Approx. 650 (Lecture Notes in Computational Science and ular Expressions.- 9 Files and Data.- 10 String Pro- Fields of interest Engineering, Band 60) Softcover cessing.- 11 Interfacing to the Operating System.- 12 Probability and Statistics in Computer Science; Da- References.- 13 Modules.- 14 Object-Oriented Perl.- 106,95 € ta Mining and Knowledge Discovery; Visualization; 15 Introductions to CGI.- 16 Perl and DBI.- 17 In- ISBN 978-3-540-75198-4 Image Processing and Computer Vision; Pattern troducing Parrot.- Appendix A: Exercise Solutions. Recognition; Statistical Theory and Methods Fields of interest Target groups Programming Languages, Compilers, Interpreters Researchers, grad students Target groups Type of publication Beginning to intermediate perl developers Monograph Type of publication Professional book Due December 2007

Due February 2008 2007. Approx. 300 p. (Information Science and Statistics) Geb.

69,50 € Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest ISBN 978-0-387-39350-6 Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center

2008. Approx. 500 p. Softcover

ISBN 978-1-59059-833-7 springer.com/booksellers Computer 107

W. Lee, Georgia Institute of Technology, Atlanta, GA, USA; C. J.d. Leeuw, University of California, Los Angeles, California, USA; Z. Les, The Queen Jadwiga Research Institue of Understanding Wang, US Army Research Office, Research Triangle Park, NC, E. Meijer, RAND Corporation, Santa Monica, CA, USA (Eds.) Technology, Toorak, VIC, Australia; M. Les, The Queen Jadwiga USA; D. Dagon, Georgia Institute of Technology, Atlanta, GA, USA Research Institue of Understanding Technology, Toorak, VIC, (Eds.) Australia Handbook of Multilevel Analysis Botnet Detection Shape Understanding System

Countering the Largest Security Threat Multilevel analysis is the statistical analysis of hier- The First Steps toward the Visual Thinking Machines archically and non-hierarchically nested data. The simplest example is clustered data, such as a sample Botnets have become the platform of choice for of students clustered within schools. Multilevel data This book presents the results of the research in one launching attacks and committing fraud on the In- are especially prevalent in the social and behavioral of the most complex and difficult areas of research, ternet. A better understanding of Botnets will help to sciences and in the bio-medical sciences. The mod- such as research in the areas of thinking and under- coordinate and develop new technologies to counter els used for this type of data are linear and nonlin- standing. This research that is carried out in the new- this serious security threat. Botnet Detection: Coun- ear regression models that account for observed and ly founded Queen Jadwiga Research Institute of Un- tering the Largest Security Threat, a contributed vol- unobserved heterogeneity at the various levels in the derstanding is focused on research on the problem ume by world-class leaders in this field, is based on data. This book presents the state of the art in multi- of visual understanding and visual thinking. Accord- the June 2006 ARO workshop on Botnets. This edit- level analysis, with an emphasis on more advanced ing to our knowledge, this book is the first attempt ed volume represents the state-of-the-art in research topics. These topics are discussed conceptually, an- to investigate the complexity of the visual thinking on Botnets. It provides botnet detection techniques alyzed mathematically, and illustrated by empirical problems in the context of building the thinking ma- and response strategies, as well as the latest results examples. The authors of the chapters are the leading chine. We are aware how complex this problem is, from leading academic, industry and government re- experts in the field. Given the omnipresence of mul- however, we believe that the results of our research searchers. Botnet Detection: Countering the Largest tilevel data in the social, behavioral, and biomedical will pave the way into the new way of thinking about Security Threat is intended for researchers and prac- sciences, this book is useful for empirical researchers designing the thinking machines and, especially, will titioners in industry. This book is also appropriate as in these fields. Prior knowledge of multilevel analysis supply the new scientific arguments about our hu- a secondary text or reference book for advanced-level is not required, but a basic knowledge of regression man nature. Researchers in area of artificial intel- students in computer science.   [..] ligence do not pay sufficient attention into under- standing/thinking problems. It was probably for that Features Features reason that there was no proper representation to Discusses complex data structures with a hierarchical -First book on Botnets — the #1 security threat -In- capture visual aspects of the [..] cludes Botnet detection techniques and response structure, e.g., pupils nested within schools Distin- strategies -Latest results from leading academic, in- guished collection of contributors Features dustry and government experts in security Recent reports of shape understanding Contents Contents Introduction to multilevel analysis, Jan de Leeuw, Contents Preface.- Botnet Detection Based on Network Behav- Erik Meijer.- Bayesian multilevel analysis and Thinking, Visual Thinking and Shape Understand- ior.- Honeynet-based Botnet Scan Traffic Analysis.- MCMC, David Draper.- Diagnostic checks for multi- ing.- Shape Classes.- Digital Objects, Image Trans- Characterizing Bots’ Remote Control Behavior.- Au- level models, Tom A.B. Snijders, Johannes Berkhof.- formations and Reasoning Process.- Categories.- Vi- tomatically Identifying Trigger-based Behavior in Optimal designs for multilevel studies, Mirjam Mo- sual Thinking - Understanding. Malware.- Towards Sound Detection of Virtual Ma- erbeek, Gerard J.P. Van Breukelen, Martijn P.F. chines.- Botnets and Proactive System Defense.- De- Berger.- Many small groups, Stephen W. Rauden- Fields of interest tecting Botnet Membership with DNSBL Counter- bush.- Multilevel models for ordinal and nominal Appl.Mathematics/Computational Methods of Engi- intelligence.- A Taxonomy of Botnet Structures.- In- variables, Donald Hedeker.- Multilevel and relat- neering; Artificial Intelligence (incl. Robotics) dex.   ed models for longitudinal data, Anders Skrondal, Sophia Rabe-Hesketh.- Non-hierarchical multilevel Target groups Fields of interest models, Jon Rasbash, William J. Browne.- Multilevel Engineers, researchers, and graduate students in Systems and Data Security; Computer Communica- [..] computational intelligence tion Networks; Data Encryption; Information Sys- tems Applications (incl.Internet); Data Structures, Fields of interest Type of publication Cryptology and Information Theory; Computer Sys- Statistical Theory and Methods; Methodology of the Monograph tems Organization and Communication Networks Social Sciences; Psychometrics; Econometrics; Epi- demiology Due January 2008 Target groups Researchers, practitioners and advanced-level Target groups Practitioners and researchers 2008. Approx. 390 p. (Studies in Computational Intelligence, students in computer science Band 86) Geb. Type of publication Type of publication 139,05 € Monograph Contributed volume ISBN 978-3-540-75768-9

Due December 2007 Due December 2007

2008. Approx. p. 20 illus. (Advances in Information Security, Band 2008. Approx. 500 p. Geb. 36) Geb. 171,15 € 82,34 € ISBN 978-0-387-73183-4 ISBN 978-0-387-68766-7 108 Computer springer.com/booksellers

M. Lew, N. Sebe, Th.S. Huang, E.M. Bakker (Eds.) N. León-Rovira, ITESM, Mexico (Ed.) M. Li, University of Waterloo, ON, Canada; P.M.B. Vitányi, CWI, Amsterdam, The Netherlands IEEE Workshop on Human Trends in Computer Aided Computer Interaction Innovation An Introduction to Kolmogorov Complexity and Its Applications International Workshop, HCI 2007 Rio de Janeiro, Brazil, Octo- 2nd IFIP Working Conference on Computer Aided Innovation ber 20, 2007 Proceedings

"The book is outstanding and admirable in many re- spects. ... is necessary reading for all kinds of readers This book constitutes the refereed proceedings of the Features from undergraduate students to top authorities in International Workshop on Human Computer In- Most up-to-date research on Computer Aided Inno- the field." Journal of Symbolic Logic Written by two teraction, HCI 2007, held in Rio de Janeiro, Brazil, vation experts in the field, this is the only comprehensive October 20, 2007. The 16 revised full papers present- and unified treatment of the central ideas and their ed were carefully reviewed and selected from 113 Contents applications of Kolmogorov complexity. The book submissions. The topics include Affective detection Creative Tower Generated bu Computational Intel- presents a thorough treatment of the subject with a and recognition, Smart interfaces, Human motion ligence.- Research and Implementation of Product wide range of illustrative applications. Such applica- tracking, Gesture recognition, Multimedia data mod- Functional Design Based on Effect.- Computer Aid- tions include the randomness of finite objects or in- eling and visualization, Multimodal event detection ed Patent Analysis.- Measuring Innovation in Mul- finite sequences, Martin-Loef tests for randomness, and recognition, Human motion and gesture recog- ti-Component Engineering Systems.- information theory, computational learning theo- nition, HCI issues in image/video retrieval, Learning ry, the complexity of algorithms, and the thermody- in HCI, Input and interaction techniques, Perceptual Fields of interest namics of computing. It will be ideal for advanced user interfaces, Wearable and pervasive technologies Computer Science, general undergraduate students, graduate students, and re- in HCI and Intelligent Virtual Environments. Target groups searchers in computer science, mathematics, cogni- Fields of interest Researchers and practitioners in computer aided in- tive sciences, philosophy, artificial intelligence, statis- User Interfaces and Human Computer Interaction; novation tics, and physics. The book is self-contained in that Computer Imaging, Vision, Pattern Recognition and it contains the basic requirements from mathematics Type of publication Graphics; Information Systems and Communication and computer science. Included [..] Proceedings Service; Multimedia Information Systems Features Target groups Due October 2007 Develops Kolmogorov theory in detail and outlines Researchers and professionals the wide range of illustrative applications Presents recent, major results in the field; topics include, 2007. XII, 254 p. (IFIP International Federation for Information Omega numbers, Kolmogorov-Loveland random- Type of publication Processing, Band 250) Geb. Proceedings ness, universal learning, communication complexity, 115,56 € Kolmogorov's random graphs, time-limited univer- sal distribution, Shannon information Introduces re- Due October 2007 ISBN 978-0-387-75455-0 sults from prominent researchers in the field, such as those found [..] 2007. X, 157 p. (Lecture Notes in Computer Science, Band 4796) Softcover Contents Preliminaries.- Algorithmic Complexity.- Algo- 44,94 € rithmic Prefix Complexity.- Algorithmic Probabil- ISBN 978-3-540-75772-6 ity.- Inductive Reasoning.- The Incompressibility Method.- Resource-Bounded Complexity.- Physics, Information, and Computation.- Shannon Informa- tion and Kolmogorov Complexity.- Information Dis- tance

Fields of interest Coding and Information Theory; Algorithms; Theo- ry of Computation; Pattern Recognition; Statistical Theory and Methods

Target groups Advanced undergraduate and graduate students, re- searchers in computer science, math, information theory, cognitive sciences, psychology, biology, lin- guistics, economy, learning theory

Type of publication Graduate/advanced undergraduate textbook

Due August 2008

Originally published in the series: Texts and Monographs in Com- puter Science

2008. Approx. 800 p. 41 illus. (Texts in Computer Science) Geb.

71,64 € ISBN 978-0-387-33998-6 springer.com/booksellers Computer 109

S.Z. Li, Chinese Academy of Sciences, Beijing, China (Ed.) S.Z. Li, Chinese Academy of Sciences, Beijing, China (Ed.) Y. Li, Georgia State University, Atlanta, GA, USA; M.T. Thai, Uni- versity of Florida, Gainesville, FL; W. Wu, University of Texas at Dallas, Richardson, TX, USA (Eds.) Encyclopedia of Biometric Encyclopedia of Biometric Recognition Recognition Wireless Sensor Networks and Applications

Biometrics is automated methods of rec- Biometrics are automated methods of recogniz- ognizing a person based on physiological or be- ing a person based on physiological or behavioral havioral characteristics. Among the features mea- characteristics. Among the features measured Wireless sensor networks are currently being em- sured are face, fingerprints, hand geometry, are face, fingerprints, hand geometry, hand- ployed in a variety of applications ranging from handwriting, iris, retina, vein, and voice. With an writing, iris, retina, vein, and voice. With an A–Z medical to military, and from home to industry. A–Z format, the comprehensive Encyclopedia of format, the comprehensive Encyclopedia of Biomet- Wireless Sensor Networks and Applications aims to Biometrics provides easy access to relevant infor- rics will provide easy access to relevant information provide a reference tool for the increasing number of mation on all aspects of biometrics for those seek- on all aspects of Biometrics for those seeking entry scientists who depend upon sensor networks in some ing entry into the broad field of biometrics. This into the broad field of Biometrics. The Encyclopedia way. The topics covered include network design and Encyclopedia is composed of approximately will be composed of about 250 entries, covering bio- modeling, network management, data management, 250 entries, covering biometrics modalities, systems metrics modalities, systems and applications. Each security and applications. The topic covered in each and applications. Each entry includes a definition, entry will include a definition, key words, list of syn- chapter is given expository but also scholarly treat- key words, list of synonyms, list of related entries, onyms, list of related entries, illustration(s), applica- ment, covering the history of the topic, reviewing illustration(s), applications, and a bibliography. Most tions, and a bibliography. Most entries will include state-of-the-art thinking relative to the topic, and entries include useful literature references providing useful literature references providing the reader with discussing currently unsolved problems of special in- the reader with a portal to more detailed informa- a portal to more detailed information. The style of terest. tion. The style of the entries is expository and tutori- the entries is expository and tutorial, making the en- Features al, making the encyclopedia a practical resource for cyclopedia a practical resource for experts in the field Contains the most current techniques and advances experts in the field as well as professionals in other as well as professionals in other fields. in sensor networks fields.   Features Contents Features Although many books on biometrics-related Contributing Authors.- Preface.- I. Network De- Only comprehensive reference work on biometrics topics--none exist as a comprehensive refer- sign and Network Modelling.- 1. A Taxonomy-based that is currently available A-Z coverage of this com- ence work on Biometrics A-Z coverage of this com- Approach to Design Large-scale Sensor Networks.- plex subject area; easily accessible to professionals plex subject area makes this volume easily ac- 2. Algorithms for Robotic Deployment of WSN and researchers in all fields who are interested in a cessible to professionals and researchers in all fields in Adaptive Sampling Applications.- 3. A Scalable particular aspect of biometrics Targeted literature who are interested in a particular aspect of Biomet- Graph Model and Coordination Algorithms for Mo- references provide additional value for researchers rics Targeted literature references provide additional bile Sensor Networks.- II. Network Management.- studying a topic in more depth Bibliographic entries value for researchers looking to study a topic in more 4. Medium Access Control Protocols for Wireless provide reader with portal to more detailed [..] [..] Sensor Networks.- 5. Topology Control for Wireless Contents Contents Sensor Networks.- 6. Boundary Detection for Sen- Editorial Board.- List of Contributors.- Preface.- A- Editorial Board.- List of Contributors.- Preface.- A-Z sor Networks.- 7. TPSS: A Time-based Positioning Z entries with references.- General Issues.- Biomet- entries with references.- Index. Scheme for Sensor Networks with Short Range Bea- rics.- Sensors and Devices.- Pattern Recognition.- cons.- 8. Wakeup [..] Data Fusion.- Performance Evaluation.- Modalities.- Fields of interest Fields of interest Face.- Fingerprint.- Iris.- Hand.- Vein.- Signature.- Biometrics; Pattern Recognition; Data Encryption; Computer Communication Networks; Models Speaker.- Gait.- Ear.- Other Modalities.- Keystroke, Computational Biology/Bioinformatics; Systems and and Principles; Information Systems Applications Lip Movement, EEG, Odor, Skull, Teeth, DNA.- Data Security; Computer Imaging, Vision, Pattern (incl.Internet); Computer Appl. in Administrative Sample Synthesis.- Systems and Applications.- Sys- Recognition and Graphics Data Processing tem Design.- Security.- Applications.- Forensic Sci- ence.- Standardization.- Index. Target groups Research scientists and industry practitioners in a Target groups Researchers and students in computer science, com- Fields of interest wide variety of fields for a broad array of applications puter engineering, and applied mathematics Biometrics; Pattern Recognition; Data Encryption; Computer scientists and academics in other areas such as engineering, math, statistics, political science, Systems and Data Security; Computer Imaging, Vi- Type of publication management science, psychology, biomedicine Ad- sion, Pattern Recognition and Graphics Contributed volume vanced-level students interested in entering the field Target groups of biometrics or working in related areas Research scientists and industry practitioners in a Due March 2008 wide variety of fields for a broad array of applications Type of publication Computer scientists and academics in other areas Encyclop(a)edia 2008. XX, 444 p. 171 illus. (Signals and Communication Technol- such as engineering, math, statistics, political science, ogy) Geb. management science, psychology, biomedicine Ad- Due July 2009 vanced-level students interested in entering the field 90,90 € of biometrics or working in related areas ISBN 978-0-387-49591-0 2009. eReference.

Type of publication 415,31 € Encyclop(a)edia ISBN 978-0-387-73003-5

Due June 2009

2009. Approx. 1000 p. Geb.

373,43 € ISBN 978-0-387-73002-8 springer.com/booksellers Computer 110

F. Liese, Universität Rostock, Germany; K.-J. Miescke, University of L. Linsen, Jacobs University Bremen, Germany; H. Hagen, TU J.S. Liu, Harvard University, Cambridge, MA, USA Illinois at Chicago, IL, USA Kaiserslautern, Germany; B. Hamann, University of California, Davis, USA (Eds.) Monte Carlo Strategies in Scientific Statistical Decision Theory Visualization in Medicine and Life Computing Estimation, Testing, and Selection Sciences

This paperback edition is a reprint of the 2001 This monograph is written for advanced graduate Springer edition. This book provides a self-con- students, Ph.D. students, and researchers in mathe- Visualization technology is becoming increasingly tained and up-to-date treatment of the Monte Carlo matical statistics and decision theory. All major top- important for medical and biomedical data process- method and develops a common framework under ics are introduced on a fairly elementary level and ing and analysis. This technology complements tra- which various Monte Carlo techniques can be "stan- then developed gradually to higher levels. The book ditional image processing methods as it allows sci- dardized" and compared. Given the interdisciplinary is self-contained as it provides full proofs, worked- entists to visually interact with large, high- resolu- nature of the topics and a moderate prerequisite for out examples, and problems. It can be used as a basis tion three-dimensional image data, for example. Fur- the reader, this book should be of interest to a broad for graduate courses, seminars, Ph.D. programs, self- ther, an ever increasing number of new data acquisi- audience of quantitative researchers such as com- studies, and as a reference book. The authors present tion methods are being used in medicine and the life putational biologists, computer scientists, econome- a rigorous account of the concepts and a broad treat- sciences, in particular in genomics and proteomics. tricians, engineers, probabilists, and statisticians. It ment of the major results of classical finite sample This book discusses some of the latest visualization can also be used as the textbook for a graduate-lev- size decision theory and modern asymptotic decision techniques and systems for effective analysis of such el course on Monte Carlo methods. Many problems theory. Highlights are systematic applications to the diverse, large, complex, and multi-source data. Ex- discussed in the alter chapters can be potential thesis fields of parameter estimation, testing hypotheses, perts from all over the world had been invited to par- topics for masters’ or Ph.D. students in statistics or and selection of populations. With its broad coverage ticipate in a workshop held in July 2006 on the island computer science departments. of decision theory that includes results from other Rügen in Germany. About 40 participants presented more specialized books as well as new material, this state-of-the-art research on the topic. Research and Features book is one of a kind and fills the gap between stan- survey papers have been solicited and carefully refer- The author is a leading researcher in a very active dard graduate texts in mathematical statistics and eed, resulting in this collection. The topics covered area of research Emphasis is on making these meth- advanced monographs [..] include Segmentation and Feature Detection, Surface ods accessible to scientists who want to apply them Extraction, Volume [..] Includes examples from artificial intelligence, com- Features putational biology, computer vision and chemistry Presents the main ideas of decision theory in an or- Features ganized, balanced, and mathematically rigorous The interaction between visualization and medicine Contents manner, while observing statistical relevance is one of the fastest expanding fields, both scientifi- Introduction and Examples.- Basic Principles: Re- cally and commercially. jection, Weighting, and Others.- Theory of Se- Contents quential Monte Carlo.- Sequential Monte Carlo Statistical models.- Tests in models with monotonic- Contents in Action.- Metropolis Algorithm and Be- ity properties.- Statistical decision theory.- Compar- Part I Surface Extraction Methods from Medical yond.- The Gibbs Sampler.- Cluster Algo- ison of models, reduction by sufficiency.- Invariant Imaging Data Towards Automatic Generation of rithms for the Ising Model.- General Conditional statistical decision models.- Large sample approxi- 3D Models of Biological Objects Based on Serial Sampling.- Molecular Dynamics and Hybrid Monte mations of models and decisions.- Estimation.- Test- Sections.- Vincent Jasper Dercksen, Cornelia Brüß, Carlo.- Multilevel Sampling and Optimization Meth- ing.- Selection. Detlev Stalling, Sabine Gubatz, Udo Seiffert, Hans- ods.- Population-Based Monte Carlo Methods.- Christian Hege.A Topological Approach to Quanti- Markov Chains and Their Convergence.- Fields of interest tation of Rheumatoid Arthritis. - Hamish Carr, John Selected Theoretical Topics.- Basics in Probability Statistical Theory and Methods Ryan, Maria Joyce, Oliver Fitzgerald, Douglas Veale, and Statistics.- References.- Author Index.- Subject Robin Gibney, Patrick Brennan.3D Visualization of Index.  Target groups Vasculature: An Overview. - Bernhard Preim, Steffen Graduate students, researchers Oeltze.3D Surface Reconstruction from Endoscopic Fields of interest Videos. - Arie Kaufman, Jianning Wang. Part [..] Statistical Theory and Methods; Computational Type of publication Mathematics and Numerical Analysis; Statistics for Monograph Fields of interest Business/Economics/Mathematical Finance/Insur- Visualization; Computer Graphics; Computer Appl. ance; Probability Theory and Stochastic Processes; Due December 2007 in Life Sciences; Mathematical Modeling and Indus- Mathematical Methods in Physics; Numerical and trial Mathematics; Image Processing and Computer Computational Methods Vision; Computational Science and Engineering 2008. Approx. 694 p. (Springer Series in Statistics) Geb. Target groups Target groups 74,85 € Researchers, graduate students Researchers, graduate students, and profession- ISBN 978-0-387-73193-3 als dealing with visualization and its application in Type of publication medicine and life sciences Monograph

Type of publication Due February 2008 Proceedings

Due October 2007 2008. Approx. 360 p. (Springer Series in Statistics) Softcover 41,20 € 2008. IX, 345 p. 162 illus., 35 in color in color appendix. (Mathe- ISBN 978-0-387-76369-9 matics and Visualization) Geb.

85,55 € ISBN 978-3-540-72629-6 springer.com/booksellers Computer 111

N.T. Longford, De Montford University, Leicester, UK R. Lover R. Lowen, University of Antwerp, Belgium; A. Verschoren, Univer- sity of Antwerp, Belgium (Eds.) Studying Human Populations Elementary Logic Foundations of Generic An Advanced Course in Statistics For Software Developers Optimization, Volume 2: Applications of Fuzzy Control, Studying Human Populations is a textbook for grad- The ability to reason correctly is critical to most as- Genetic Algorithms and Neural uate students and research workers in social statistics pects of computer science and to software develop- Networks and related subject areas. It follows a novel curricu- ment in particular. Since logic is the discipline con- lum developed around the basic statistical activities cerned with the general rules and criteria of correct of sampling, measurement and inference. Statistics is reasoning anyone involved with computer science defined broadly as making decisions in the presence and software development will benefit from studying This is a comprehensive overview of the basics of of uncertainty that arises as a consequence of limited logic and its applications to computing. Features: • fuzzy control, which also brings together some re- resources available for collecting information. A con- Covers elementary logic and its application to most cent research results in soft computing, in particular necting link of the presented methods is the perspec- stages of software development • Discusses the appli- fuzzy logic using genetic algorithms and neural net- tive of missing information, catering for a diverse cation of logic to the English language, as software works. This book offers researchers not only a solid class of problems that include nonresponse, imper- development begins usually with problems described background but also a snapshot of the current state fect measurement and causal inference. In principle, by end users in ordinary English • Emphasizes truth of the art in this field. any problem too complex for our limited analytical functional logic as well as quantificational logic • In- toolkit could be converted to a tractable problem if cludes various examples and exercises to enable in- Features some additional information were available. Ingenu- dependent self-study This book provides a reader Timeliness of the comprehensive overview of fuzzy ity is called for in declaring such (missing) informa- friendly foundation and offers valuable insight in- control Large body of authors, specialists in the field tion constructively, but the universe of problems that to the topic, serving as a helpful reference for prac- Articles with varied range of applications Specialist we can address is wide open, not limited by a discrete titioners and advanced students involved with soft- up-to-date research articles + comprehensive intro- set of procedures. The monograph aims to prepare ware development. duction to the field in one and the same work the reader for [..] Features Fields of interest Features Reveals usefulness of logic in software development Genetics and Population Dynamics; Mathematics of Text for competent practitioners of statistics, not fu- through its applications The reader’s knowledge and Computing; Discrete Mathematics in Computer Sci- ture statisticians Suitable as reference understanding can be assessed through numerous ence; Combinatorics; Optimization examples and exercises Derived from teaching ma- Contents terial that has been proved to be clearly understand- Target groups Anova and Ordinary Regression.- Maximum Likeli- able Researchers and professionals in soft computing, hood Estimation.- Sampling Methods.- The Bayesian in particular in development of theory and applica- Paradigm.- Incomplete Data.- Imperfect Measure- Contents tions of fuzzy logic, genetic algorithms and neural ment.- Experiments and Observational Studies.- Part I: Language and Logical Form.- Atomic State- networks Clinical Trials.- Random Coefficients.- Generalised ments.- Compound Statements.- Quantified State- Linear Models.- Longitudinal and Time-Series Anal- ments.- Expressing Arguments.- Defining Data Type of publication ysis.- Meta-Analysis and Estimating Many Quanti- Structures.- Expressing Problem Specifications.- Ex- Contributed volume ties. pressing Program Designs.- Part II: Material Truth.- Truth for Statements with At Most One Connective.- Due October 2007 Fields of interest Truth for Statements with Multiple Connectives.- Statistical Theory and Methods; Epidemiology; Psy- Tracing Program Execution.-Part III: Truth 2008. X, 355 p. (Mathematical Modelling: Theory and Applica- chometrics; Biometrics; Simulation and Modeling; Functional Forms.- Truth Functional Properties tions, Band 24) Geb. Numeric Computing of Program Designs.- Quantified Forms.- Logical Equivalence.- Logical Implication and Validity.- 74,85 € Target groups Rules of Inference.- Proof.- Algorithmic Unsolvabil- ISBN 978-1-4020-6667-2 Graduate students, researchers ity [..]

Type of publication Fields of interest Graduate/advanced undergraduate textbook Logics and Meanings of Programs

Due January 2008 Target groups Practitioners, Graduates, Advanced Undergraduates

2008. XVI, 472 p. (Springer Texts in Statistics) Geb. Type of publication 67,36 € Professional book ISBN 978-0-387-98735-4 Due April 2008

2008. Approx. 305 p. Softcover

32,05 € ISBN 978-1-84800-081-0 112 Computer springer.com/booksellers

J. Löffler, Fraunhofer Institut, Sankt Augustin, Germany; M. Klann, O. Maimon, Tel-Aviv University, Ramat-Aviv, Israel; L. Rokach, D. Makinson, London School of Economics, UK Fraunhofer Institut, Sankt Augustin, Germany (Eds.) Ben-Gurion University, Beer-Sheva, Israel (Eds.) Sets, Logic and Maths for Mobile Response Soft Computing for Knowledge Computing First International Workshop on Mobile Information Technol- Discovery and Data Mining ogy, for Emergency Response, MobileResponse 2007, Sankt Augustin, Germany, February 22-23, 2007 Revised Selected Papers This book equips the student with essential intellec- Data mining is the science and technology of explor- tual tools that are needed from the very beginning ing large and complex bodies of data in order to dis- of university studies in computing. These consist cover useful patterns. It is extremely important be- of abilities and skills - to pass from a concrete prob- This book constitutes the thoroughly refereed post- cause it enables modeling and knowledge extraction lem to an abstract representation, reason with the proceedings of the First International Workshop from abundant data availability. Soft Computing abstract structure coherently and usefully, and re- on Mobile Information Technology for Emergency for Knowledge Discovery and Data Mining intro- turn with booty to the specific situation. The most Response, MobileResponse 2007 held in Sankt Au- duces soft computing methods extending the enve- basic and useful concepts needed come from the gustin, Germany in February 2007. The 16 revised lope of problems that data mining can solve efficient- worlds of sets (with also their employment as rela- papers presented together with 1 kenote lecture were ly. It presents practical soft-computing approach- tions & functions), structures (notably trees carefully reviewed and selected from 30 submissions. es in data mining. This edited volume by highly re- & graphs), & combinatorics (alias princi- The papers are organized in topical sections on med- garded authors, includes several contributors of ples of counting, with their application in the world ical services, team support, geospatial information, the 2005, Data Mining and Knowledge Discovery of probability). Recurring in all these are 2 kinds of wearable computing, and communication technolo- Handbook.  This book was writ- instrument of proof – logical (notably inference by gy. ten to provide investigators in the fields of informa- suppositions, reductio ad absurdum, & proof by tion systems, engineering, computer science, statis- Fields of interest cases), & mathematical (notably induction on tics and management with a profound source for the Information Systems Applications (incl.Internet); In- the positive integers & on well-founded struc- role of soft computing in data mining. Not only does formation Storage and Retrieval; Multimedia Infor- tures). From this book the student can assimilate the this book feature illustrations of various applications mation Systems; Database Management; Computer basics of these worlds & set out on the paths of including manufacturing, medical, banking, insur- Communication Networks; User Interfaces and Hu- computing with understanding & a [..] ance and others, but also includes various real-world man Computer Interaction case [..] Features Target groups Only minimal background in mathematics necessary Features Researchers and professionals Careful selection of material that is really needed Illustrations of various applications including man- by students in the first two years of their university Type of publication ufacturing, medical, banking, insurance and oth- life in Computer Science and Information Sciences Proceedings ers Includes various real-world case studies with de- Brings out the interplay between qualitative thinking tailed results Edited by the highly-regarded editors of and calculation Teaches the material as a language the "Data Mining and Knowledge Discovery Hand- for thinking in, as much as knowledge to be gained Due November 2007 book" (2005, Springer) Contents 2008. Approx. 190 p. (Lecture Notes in Computer Science, Band Contents Before the Beginning.- Do I really need to know 4458) Softcover -Foundation and Capabilities.- Introduction to Data about this?.- Proving and disproving: Logical tech- Mining.- Classification Methods.- Clustering Meth- niques.- Proving and disproving: Mathematical tech- 44,94 € ods.- Association Rules.- Feature Selection.- Soft niques.- First Steps.- Flat set theory.- Families of ISBN 978-3-540-75667-5 Computing Methods.- Fuzzy Set and Fuzzy Logic.- sets.- Relations.- Functions.- Structures.- Order.- Neural Networks.- Rough Set Theory.- Bayesian Net- Trees.- Graphs.- Logic.- Truth-functional connec- works.- Evolutionary Algorithms.- Swarm Intelli- tives.- Quantifiers.- Counting.- The pigeonhole prin- gence.- Support Vector Machines.- Wavelets Meth- ciples.- The addition and multiplication rules.- Selec- ods.- Neuro-fuzzy.- Applications.- Target Marketing tion rules.- Probability.- The Kolmogorov axioms for Applications.- Medicine Applications.- Manufactur- finitely additive probability.- Combining combina- ing Applications.   torics and probability

Fields of interest Fields of interest Database Management; Information Storage and Re- Discrete Mathematics in Computer Science; Mathe- trieval; Pattern Recognition; Computer Communi- matical Logic and Formal Languages; Symbolic and cation Networks; Information Systems Applications Algebraic Manipulation; Probability and Statistics in (incl.Internet) Computer Science; Computational Mathematics and Numerical Analysis Target groups Practitioners and researchers in the fields of infor- Target groups mation systems, engineering, computer science, Undergraduate students statistics and management Type of publication Type of publication Undergraduate textbook Contributed volume Due May 2008 Due November 2007

2008. Approx. 200 p. Also available online. (Undergraduate Top- 2008. Approx. 447 p. Geb. ics in Computer Science) Softcover

82,34 € 28,84 € ISBN 978-0-387-69934-9 ISBN 978-1-84628-844-9 springer.com/booksellers Computer 113

E. Malinowski, Universidad de Costa Rica, San Pedro, San José, I. Manolescu, INRIA Futurs, Orsay Cedex, France; Y. Papakon- P. Maragos, National Technical University of Athens, Greece; A. Costa Rica; E. Zimanyi, Université Libre de Bruxelles, Brussels, Bel- stantinou, University of California, San Diego, CA, USA Potamianos, Technical University of Crete, Greece; P. Gros, IN- gium RIA / IRISA, Rennes, France (Eds.) Querying XML with XQuery Advanced Data Warehouse Design Multimodal Processing and

From Conventional to Spatial and Temporal Applications Interaction Querying XML with XQuery introduces the new Audio, Video, Text standard, W3C XQuery Recommendation. XQuery emerges as the de-facto XML query language that A data warehouse stores large volumes of historical will deliver the promise of XML in the application data required for analytical purposes. This data is ex- integration and data integration fields. Simple com- Multimodal Processing and Interaction: Audio, tracted from operational databases; transformed in- plete examples introduce the essentials of XQuery to Video and Text presents high quality, state-of-the-art to a coherent whole using a multidimensional mod- enable the reader to grasp its essence. The authors research ideas and results from theoretic, algorith- el that includes measures, dimensions, and hierar- present complete cases with the use of XQuery in ap- mic and application viewpoints. This edited volume chies; and loaded into a data warehouse during the plication integration and information integration de- contains contributions by leading experts in the ob- extraction-transformation-loading (ETL) process. ployments. This book also provides a crucial discus- sequious scientific and technological field of multi- Malinowski and Zimányi explain in detail conven- sion of advanced topics of the language. Querying media. This volume was developed from a four-year tional data warehouse design, covering in particular XML with XQuery is designed for XML, database collaboration among research groups participating complex hierarchy modeling. Additionally, they ad- and Java developers, as well as advanced-level stu- in the European network of Excellence on Multime- dress two innovative domains recently introduced dents in computer science. dia Understanding, Semantics, Computation and to extend the capabilities of data warehouse systems, learning (MUSCLE). Multimodal Processing and In- namely the management of spatial and temporal in- Features teraction: Audio, Video and Text specifically focus- formation. Their presentation covers different phas- Quick introduction to the powerful XQuery lan- es on interaction with multimedia content with spe- es of the design process, such as requirements spec- guage: enables reader to write data filtering, transfor- cial emphasis on multimodal interfaces for accessing ification, conceptual, logical, and physical design. mation and integration queries Thorough case-driv- multimedia information. Multimodal Processing and They include three different approaches for require- en guidance into syntax and semantics of the lan- Interaction: Audio, Video and Text is designed for a ments specification depending on whether users, op- guage of this relatively new standard professional audience composed of practitioners and erational data sources, or both are the driving force researchers in industry. This book is also suitable for in the requirements gathering process, and they [..] Contents advanced-level students in computer science. Preface.- Introduction.- The Essential Language Features Structures.- Typical Queries.- XQuery in Applica- Features Explains conventional data warehouse design in de- tion Integration Systems.- XQuery in Data Integra- Emphasis on multimodal information processing as- tail Additionally addresses the management of spa- tion Systems.- XQuery in XML Databases.- XQuery pects of multimedia and cross-interaction of multi- tial and temporal information, needed for geographi- on Unstructured Documents.- Advanced XQuery.- ple modalities Broad spectrum of novel perspectives, cal applications or for supply chain management All XQuery and Java.- Index. analytic tools, algorithms, design practices and appli- design steps are illustrated using many real-world ex- cations in multimedia science and engineering amples Completed by sample implementations for Fields of interest Microsoft's Analysis Services 2005 and Oracle 10g Database Management; Programming Languages, Contents with the OLAP and the Spatial extensions Compilers, Interpreters; Information Storage and Preface.- Tutorial Review of State of the Art.- Cross- Retrieval; Programming Techniques; Operating Sys- Modal Integration/Interaction for Performance Im- Contents tems; Software Engineering/Programming and Op- proving in Multimedia: State-of-the-Art Review.- Introduction.- Introduction to databases and data erating Systems Human-Computer Interfaces for Multimedia Re- warehouses.- Conventional data warehouses.- Spa- trieval: State of the Art.- New Research Directions: tial data warehouses.- Temporal data warehouses.- Target groups Integrated Multimedia Analysis And Recognition.- Designing conventional data warehouses.- Design- XML, database and Java developers Stochastic Models for Multimodal Video Analysis.- ing spatial and temporal data warehouses.- Conclu- Adaptive Multimodal Fusion by Uncertainty Com- sions and future work.- Formalization of the Mul- Type of publication pensation with Application to Audio-Visual Speech tiDim Model.- Graphical notations.- References.- Monograph Recognition.- Action Recognition in Multimedia Glossary.- Index. Streams.- Surveillance Using Both Video and Au- Due December 2007 Fields of interest dio.- Movie Analysis with Emphasis to Dialogue De- Database Management; Geoinformation/Cartogra- tections.- [..] phy; Information Systems; Environmental Comput- 2007. Approx. 128 p. 30 illus. Geb. Fields of interest ing/Environmental Modelling; Computer Applica- Multimedia Information Systems; Information Stor- tions in Geosciences; Information Systems Applica- 58,80 € age and Retrieval; Biometrics; Computer Graphics; tions (incl.Internet) ISBN 978-0-387-26933-7 Artificial Intelligence (incl. Robotics); Computer Target groups Communication Networks Students, lecturers, (advanced) professionals Target groups Type of publication Graduate-level students and researchers in computer Monograph science Type of publication Due January 2008 Contributed volume

2008. Approx. 430 p. (Data-Centric Systems and Applications) Due February 2008 Geb.

64,15 € 2008. Approx. 350 p. 20 illus. (Multimedia Systems and Applica- ISBN 978-3-540-74404-7 tions, Band 43) Geb. 102,99 € ISBN 978-0-387-76315-6 114 Computer springer.com/booksellers

D. Margolies (Ed.) S. Marinai, University of Florence, Italy; H. Fujisawa, University of K. Markantonakis, Royal Holloway University of London, UK; K. Florence, Italy (Eds.) Mayes, Royal Holloway University of London, UK (Eds.) The ANSI Common Lisp Reference Book Machine Learning in Document Smart Cards, Tokens, Security and Analysis and Recognition Applications

The ANSI Common Lisp Reference Book is the up- dated edition of the reference work on the Common The objective of Document Analysis and Recogni- Smart Cards, Tokens, Security and Applications pro- Lisp Language. It contains descriptions of every AN- tion (DAR) is to recognize the text and graphical vides a broad overview of the many card systems and SI Common Lisp operator, constant, variable, and components of a document and to extract informa- solutions that are in practical use today. This state- class. Other specialized topics such as arguments tion. This book is a collection of research papers and of-the art work is written by contributing authors common to many operators, format directives, and state-of-the-art reviews by leading researchers all who are active researchers and acknowledged ex- reader macros will also have their own description over the world including pointers to challenges and perts in their field. A single book cannot be found to pages. In addition, there will be a number of essays opportunities for future research directions. The match both the breadth and depth of content. This on specific topics in Common Lisp such as declara- main goals of the book are identification of good book combines a cross-discipline overview of smart tions, forms, keywords, lambda expressions, path- practices for the use of learning strategies in DAR, cards, tokens and related security and applications names, and streams as well as descriptions of stan- identification of DAR tasks more appropriate for plus a technical reference to support further research dard extensions to Common Lisp (with examples these techniques, and highlighting new learning al- and study. A step-by-step approach educates the provided by Allegro CL). Each page will have a stan- gorithms that may be successfully applied to DAR. reader in card types, production, operating systems, dard format, examples, and extensive cross-refer- commercial applications, new technologies, securi- ences to related pages. Features ty design, attacks, application development, deploy- Presents applications and learning algorithms for ment and lifecycle management. By the end of the Features Document Image Analysis and Recognition (DI- book the reader should be able to play an educated The only reference manual designed for pro- AR) Identifies good practices for the use of learning role in a smart card related project, even to program- grammers actually using the Lisp language Easy-to- strategies in DIAR ming a card application. Smart Cards, Tokens, Secu- use dictionary format Special essays on general top- rity and Applications is designed for a professional ics provide introductions to aspects of the Common Contents audience of practitioners and researchers. Lisp language that the reader may not be familiar Introduction to Document Analysis and Recogni- with Every Common Lisp operator, variable, etc. is tion.- Structure Extraction in Printed Documents Features described with usage examples Completely updated Using Neural Approaches.- Machine Learning for Broad range of cross-industry/discipline topics, for the full ANSI specifications     Reading Order Detection in Document Image Un- authored by experienced industry experts and ap- derstanding.- Decision-Based Specification and plied to real-world problems Useful as a complete Contents Comparison of Table Recognition Algorithms.- overview and as an in-depth reference; suitable for The book will be in a dictionary format, with each Machine Learning for Digital Document Process- wide range of readers at different levels page labeled either by the name of the object the ing: from Layout Analysis to Metadata Extraction.- page describes or by 'About XXX'. The 'About' pages Classification and Learning Methods for Character Contents are short essays on various topics associated with Recognition: Advances and Remaining Problems.- Preface.- Introduction to Smart Cards.- Smart Common Lisp. As a result, the book will not be di- Combining Classifiers with Informational Confi- Cards.- Trusted Production Environment.- Oper- vided into chapters; although it is possible groups of dence.- Self-Organizing Maps for Clustering in Doc- ating systems, Interoperability and Security.- SIM/ pages will be separated from others. ument Image Analysis.- [..] USIM Cards-Security for Mobile Telephony.- Smart Cards for Secure Banking and Finance.- Smart Cards Fields of interest Fields of interest in Satellite TV.- Advances in Smart Chips and To- Programming Languages, Compilers, Interpreters Appl.Mathematics/Computational Methods of Engi- kens for Platform and Application Security.- Com- neering; Artificial Intelligence (incl. Robotics) mon Criteria and Smart Cards.- Security Attacks, Target groups Countermeasures and Testing for Smart Cards.- Ap- Intermediate to advanced Lisp programmers, Com- Target groups plication Development Environments for JAVA and puter Science students Researchers, engineers, graduate students in compu- SIM Toolkit.- OTA and Secure SIM Lifecycle Man- tational intelligence and computer science agement.- Index. Type of publication Professional book Type of publication Fields of interest Monograph Data Encryption; Systems and Data Security; Da- Due March 2008 ta Structures, Cryptology and Information Theo- Due January 2008 ry; Computer Communication Networks; Comput- er Systems Organization and Communication Net- Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest 2008. Approx. 430 p. (Studies in Computational Intelligence, works; Coding and Information Theory Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Band 90) Geb. Oman, Qatar, Palestine: Jordan Book Center Target groups 139,05 € Practitioners, researchers and advanced-level stu- ISBN 978-3-540-76279-9 dents in computer science 2008. Approx. 1000 p. Geb. Type of publication 85,55 € Contributed volume ISBN 978-1-59059-220-5

Due January 2008

2008. Approx. 300 p. Geb.

73,35 € ISBN 978-0-387-72197-2 springer.com/booksellers Computer 115

E.S.J. Martens, KU Leuven, Belgium; G. Gielen, KU Leuven, Bel- F.P. Martins, Delaware; A. Kobylinska, Delaware Th. Maschke, Reckendorf gium Adobe Acrobat 8 Standard, RAW - Das digitale Negativ High-Level Modeling and Synthesis Professional, Connect and 3D In höchster Qualität fotografieren, perfekt konvertieren und of Analog Integrated Systems bearbeiten, dauerhaft archivieren

Unleash the power of Adobe Acrobat 8 and Acro- Various approaches for finding optimal values for bat Connect 8 to communicate and collaborate with Das RAW-Format der Kamera - das bedeutet un- the parameters of analog cells, like op amps, have confidence. Whether you are a newbie in the PDF bearbeitete Rohdaten in höchster Qualität, die been investigated since the mid-1980s, and they have universe or an advanced Acrobat user, this book will allerdings gekonnt konvertiert sein wollen, damit made their entrance in commercial applications. guide you through all the useful features of Acrobat sie ansehnlich werden. Dieser Band beschreibt die However, a larger impact on the performance is ex- 8 and Acrobat 8 Connect. You will learn to: - com- Möglichkeiten, die RAW innewohnen, schildert die pected if tools are developed which operate on a bine files into PDF documents or PDF packages, - optimale Konvertierung, stellt verschiedene RAW- higher abstraction level and consider multiple archi- create and optimize PDF documents for office use, Konverter vor, und entwickelt einen RAW-Work- tectural choices to realize a particular functionality. print production and interactive digital media, - col- flow von der Aufnahme über die Konvertierung “High-Level Modeling and Synthesis of Analog In- lect information for research and forms processing; und Bearbeitung bis hin zum perfekt gedruckten tegrated Systems” examines the opportunities, con- archive your work in future-savvy PDF/A files, - con- Foto. Ein besonderes Augenmerk wird dabei auf ditions, problems, solutions and systematic method- trol access to information, - edit and redact docu- Plattform- und Programmunabhängigkeit gelegt: ologies for this new generation of analog CAD tools. ments, - connect into live sessions side-by-side with Die geschilderten Techniken, Verfahren und Ar- A new design paradigm is defined for high-level syn- colleagues in remote geographic locations, - collab- beitsweisen lassen sich unter Windows, Mac OS und thesis of AMS systems: the high-level design flow orate in online reviews, - preflight documents and Linux gleichermaßen in einen funktionierenden based on generic behavior. This design approach in- validate standards conformance, - ready documents und gekonnten Arbeitsablauf umsetzen, der beste volves a modeling strategy using generic behavioral for compliance with Section 508 of the Rehabilitation Ergebnisse garantiert. Abschließend geht der Autor models and a synthesis strategy leading to the explo- Act. Office users will find step-by-step instructions ausführlich auf die Langzeitarchivierung der digital- ration of a heterogeneous design space containing along with tips and tricks written in a clear and con- en Fotografien ein. different architectures. In “High-Level Modeling and cise language particularly useful for [..] Synthesis of Analog Integrated Systems”, two [..] Features Features Verständliche Präsentation der technischen Grund- Features Create and optimize PDF documents for office use, lagen Programmunabhängige Darstellung Zahlreiche One of the first books with systematic study of ana- print production and interactive digital media Com- direkt umsetzbare Tipps und Tricks aus der Praxis log CAD tools for high-level synthesis Describes one plete help in handling PDF files and Acrobat Ad- Experten Know-how und kreative Anregungen aus of the most time-efficient high-level simulation mod- dresses Windows and Mac users, especially Mac OS einer Hand els for Delta-Sigma modulators Describes a unique X 10.5 and Windows Vista framework for modeling RF systems Describes one Contents of the first synthesis algorithms to convert a func- Fields of interest Aus dem Inhalt: Die Vorzüge und Nachteile tional description into different architectures de- Media Design; Information Systems and Commu- von RAW.- RAW im Vergleich zu JPEG und pending on the required performance nication Service; Information Systems Applications TIFF.- RAW-Formate (inklusive der Problematik (incl.Internet) proprietärer RAW-Formate).- Adobe DNG als Contents Standard.- Aufnahme RAW (Einstellungen an From the contents Preface. List of Figures. List of Ta- Type of publication der Kamera, Belichtungsspielraum etc.).- Ein- bles. 1. Introduction. Part I Analog Design Method- Professional book testen der bestmöglichen RAW-Aufnahmequalität.- ologies. 2. Foundations of Design Flows for AMS Programme zur RAW-Konvertierung und - Systems. 3. Analog and Mixed-Signal Design Strate- Due April 2008 Bearbeitung.- Bildbearbeitung RAW (perfek- gies. Part II General Behavioral Modeling. 4. Time- te Farben, perfekte Bildzeichnung, SW-Kon- Domain Generic Behavioral Models. 5. Frequen- vertierung).- Eintesten der bestmöglichen RAW- 2008. Approx. 1000 p. With DVD (X.media.publishing) Softcover cy-Domain Generic Behavioral Models. Part III Top- Bearbeitungsqualität.- Bildausgabe (Drucken, Down Heterogeneous Synthesis. 6. Top-Down Het- 42,75 € Printservice, Druckvorstufe).- Eintesten der erogeneous Optimization. 7. Conclusions. Symbols ISBN 978-3-540-49501-7 bestmöglichen RAW-Ausgabequalität.- [..] and Abbreviations. Index. Fields of interest Fields of interest Information Systems Applications (incl.Internet); Circuits and Systems; Processor Architectures; Elec- Media Design; Multimedia Information Systems; tronics and Microelectronics, Instrumentation Document Preparation and Text Processing; Image Processing and Computer Vision Target groups Graduate level students, professionals and re- Target groups searchers in the areas of analog circuit design and Engagierte Fotoamateure, Fotografen, Berufsfo- electronic design automation and developers of ana- tografen log CAD tools Type of publication Type of publication Professional book Monograph Due August 2008 Due January 2008

2008. Etwa 250 S. 175 Abb. (X.media.press) Geb. 2008. Approx. 280 p. (Analog Circuits and Signal Processing) Geb. 39,95 € 106,95 € ISBN 978-3-540-28709-4 ISBN 978-1-4020-6801-0 116 Computer springer.com/booksellers

T. Masuzawa, S. Tixeuil (Eds.) N. Maudet, S. Parsons, I. Rahwan (Eds.) R.V. Mayorga, University of Regina, Saskatchewan, Canada; L. Perlovsky, Air Force Research Laboratory, Hanscom, MA, USA (Eds.) Stabilization, Safety, and Security Argumentation in Multi-Agent of Distributed Systems Systems Toward Artificial Sapience

9th International Symposium, SSS 2007 Paris, France, Novem- Third International Workshop, ArgMAS 2006 Hakodate, Japan, Principles and Methods for Wise Systems ber 14-16, 2007 Proceedings May 8, 2006 Revised Selected and Invited Papers

Edited volume discusses artificial/computational This book constitutes the refereed proceedings of the Argumentation provides tools for designing, imple- sapience and sapient systems from a diverse set of 9th International Symposium on Stabilization, Safe- menting and analyzing sophisticated forms of inter- contributors Organised into seven sections so that ty, and Security of Distributed Systems, SSS 2007, action among rational agents. It has made a the reader is guided through the subject in a struc- held in Paris, France, November 14-16, 2007. The 27 solid contribution to the practice of multiagent dia- tured and comprehensive manner Concepts are for- regular papers presented together with the extended logues. Application domains include: legal disputes, malized and extended, as well as compared and dif- abstracts of 3 invited lectures were carefully reviewed business negotiation, labor disputes, team formation, ferentiated from their counterparts in the artificial and selected from 64 submissions. The papers ad- scientific inquiry, deliberative democracy, ontology intelligent and intelligence systems disciplines Ap- dress all aspects of self-stabilization, safety and se- reconciliation, risk analysis, scheduling, and logistics. plicability of developed concepts are illustrated thor- curity, recovery oriented systems and programing, This book constitutes the thoroughly refereed post- oughly This novel state-of-the-art research volume is from theoretical contributions, to reports of the actu- proceedings of the Third International Workshop the first to explore computational sapience and sapi- al experience of applying the principles of self-stabi- on Argumentation in Multi-Agent Systems held in ent (wise) systems Of utmost importance to all re- lization to static and dynamic systems. Hakodate, Japan, in May 2006 as an associated event searchers and graduate students in the field of AAMAS 2006, the main international conference Fields of interest on autonomous agents and multi-agent systems. The Features Computer Communication Networks; Special Pur- volume opens with an original state-of-the-art sur- First scientific literature to focus on computational pose and Application-Based Systems; Computation vey paper presenting the current research and offer- sapience and sapient (wise) systems by Abstract Devices; Algorithm Analysis and Prob- ing a comprehensive and up-to-date overview of this lem Complexity; Management of Computing and In- rapidly evolving area. The 11 revised articles that fol- Contents formation Systems low were carefully reviewed and selected from the Part 1: Intelligence and Sapience.- Can Creativity most significant workshop [..] Be Formalized? Peircean Reflections on the Role of Target groups Abduction in Human Intelligence.- On Plasticity, Researchers and professionals Fields of interest Complexity and Sapient Systems.- Sapience, Con- Artificial Intelligence (incl. Robotics); Computer sciousness and the Knowledge Instinct (Prolegome- Type of publication Communication Networks; User Interfaces and Hu- Proceedings na to a Physical Theory).- A Real-time Agent System man Computer Interaction; Language Translation Perspective of Meaning and Sapience.- Part2: Sapi- and Linguistics ent Agents.- Towards BDI Sapient Agents: Learn- Due November 2007 ing Intentionally.- Toward Wisdom in Procedural Target groups Reasoning: DBI not BDI.- Sapients Agents in a Sand- Researchers and professionals 2007. XIII, 409 p. (Lecture Notes in Computer Science, Band 4838) box.- Sapient Agents: Seven Approaches.- Part 3: Softcover Type of publication Paradigms for Sapient Systems/Agents.- A [..] Proceedings 59,92 € Fields of interest ISBN 978-3-540-76626-1 Artificial Intelligence (incl. Robotics); Computing Due October 2007 Methodologies

2007. XII, 211 p. Also available online. (Lecture Notes in Comput- Target groups er Science, Band 4766) Softcover Researchers, graduates

44,94 € Type of publication ISBN 978-3-540-75525-8 Contributed volume

Due December 2007

2008. Approx. 235 p. Geb.

82,34 € ISBN 978-1-84628-998-9 springer.com/booksellers Computer 117

K. McArthur, StormTide Digital Studios, Edmonton, AB, Canada D. Medhi, J.M. Nogueira, T. Pfeifer, S.F. Wu (Eds.) A. Meisels, Ben-Gurion University, Beer-Sheva, Israel

Pro PHP IP Operations and Management Distributed Search by Constrained

Patterns, Frameworks, Testing and More 7th IEEE International Workshop, IPOM 2007 San José, USA, Agents October 31 - November 2, 2007 Proceedings Algorithms, Performance, Communication

Installed on more than 19 million domains (http:// www.php.net/usage.php), PHP is by far the world's This book constitutes the refereed proceedings of This book presents a comprehensive discussion on most popular Web scripting language. Its popular- the 7th IEEE International Workshop on IP Oper- the field of distributed constraints, its algorithms and ity is such that it's practically a default offering on ations and Management, IPOM 2007, held in San its active research areas. The well defined model of shared host Web hosting providers around the globe. José, USA, October 31 - November 2, 2007 in the distributed constraints satisfaction and optimization And with the forthcoming PHP 6 release, populari- course of the 3rd International Week on Manage- (DisCSPs/DisCOPs) can serve as the basis for the ty is sure to increase even further as the language's ment of Networks and Services, Manweek 2007. The design and investigation of distributed search algo- advanced features continue to catch the eye of en- 16 revised full papers and 5 revised short papers pre- rithms, of protocols and of negotiations and search. terprise developers. Pro PHP presents experienced sented were carefully reviewed and selected from 40 The book introduces distributed constraint satisfac- developers with a thorough guide to the language's submissions. The papers are organized in topical sec- tion and optimization problems and describes the key advanced features, focusing on both recent and tions on p2p and future internet, internet secutiry underlying model. Presenting a complete state of the emerging features and development trends. Among management, service management and provisioning, art in DisCSP and DisCOP research, the following the topics covered in the book are software develop- QoS management and multimedia as well as man- topics are explored: - Families of search algorithms ment patterns, the Standard PHP Library, the MVC agement for wireless networks. on DisCSPs and DisCOPs; - Distributed constraint software architecture as applied to PHP with spe- optimization; - Ordering Heuristics for DisCSP al- cial emphasis on the Zend Framework, and Ajax and Fields of interest gorithms; - Performance measures; - Impact of com- Web services. Computer Communication Networks; Information Systems Applications (incl.Internet); Management of munication quality on distributed search; - Privacy Features Computing and Information Systems; Multimedia issues; - Non exhaustive search algorithms on DisC- Thus far, Pro PHP is the only book to cover emerg- Information Systems; Information Storage and Re- SPs; - Applications of DisCSPs. This thorough expo- ing topics such as MVC as applied to PHP, the Zend trieval; Communications Engineering, Networks sition of the many elements of distributed search al- Framework, and Ajax With pattern-driven devel- gorithms for DisCSPs and DisCOPs will be [..] opment a common source of discussion in develop- Target groups Features er circles, Pro PHP devotes considerable time to in- Researchers and professionals Comprehensive treatment of the topic Presentation troducing PHP's advanced object-oriented features, Type of publication assumes no prior knowledge of constraints and/or with special emphasis on patterns Authored by noted Proceedings distributed constraints Current books in this area are PHP expert and Zend Framework contributor Kevin outdated McArthur Due October 2007 Contents Contents Introduction. Constraints Satisfaction Problems: Part I: OOP and Patterns: Interfaces and Abstract 2007. XII, 201 p. (Lecture Notes in Computer Science, Band 4786) CSPs.- Constraints Optimization Problems: COPs.- Classes; The Static Keyword; Patterns: Singleton and Softcover Distributed CSPs.- Asynchronous Backtracking Factory; Exceptions; OOP PHP6 [covering the top 8 (ABT).- Asynchronous Forward – Checking.- Con- or so changes]; Reflection.- Part II: Testing and Doc- 44,94 € current Dynamic Backtracking.- Distributed Order- umentation: PHPUnit2, .phpt, and XDebug; Doc- ISBN 978-3-540-75852-5 ing Heuristics.- Asynchronous Ordering Heuristics.- umentation.- Part IV: SPL [ The Standard PHP Li- Performance Measures for Distributed Search.- Ex- brary ]; An introduction to SPL; Understanding and perimental Evaluation of DisCSP Algorithms.- The Implementing Iterators; SPL File and Directory Han- Impact of Communication: Message Delays.- Mes- dling; Array Overloading [Indexers]; SPL Built-In sage Delays and DisCSP Search Algorithms.- Dis- Exception Base Classes.- Part V: Introducing MVC: tributed Constraint Optimization Problems (Dis- Model - View - Controller; Introducing the Zend COPs).- Asynchronous Search in DisCOPs.- Asyn- Framework; Advanced Framework Issues.- Part VI: chronous [..] [..] Fields of interest Fields of interest Information Storage and Retrieval; Artificial Intelli- Programming Languages, Compilers, Interpreters gence (incl. Robotics); Algorithm Analysis and Prob- Target groups lem Complexity Intermediate/expert web developers Target groups Type of publication Researchers, practitioners, graduates Professional book Type of publication Monograph Due April 2008 Due December 2007 Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, 2008. Approx. 230 p. (Advanced Information and Knowledge Oman, Qatar, Palestine: Jordan Book Center Processing) Geb. 67,36 € 2008. Approx. 300 p. Softcover ISBN 978-1-84800-039-1 ISBN 978-1-59059-819-1 118 Computer springer.com/booksellers

A.J. Mendes, University of Coimbra, Portugal; I. Pereira, Polytech- T. Mens, University of Mons-Hainaut, Belgium; S. Demeyer, Uni- U. Meyer-Baese, Florida State University, Tallahassee, FL, USA nic Institute of Leiria, Portugal; R. Costa, Polytechnic Institute of versity of Antwerp, Belgium (Eds.) Leiria, Portugal (Eds.) Digital Signal Processing with Field Software Evolution Computers and Education: Towards Programmable Gate Arrays Educational Change and Innovation Software has become omnipresent and vital in our Field-Programmable Gate Arrays (FPGAs) are revo- information-based society, so all software produc- lutionizing digital signal processing as novel FPGA ers should assume responsibility for its reliability. This volume contains a selection of papers covering families are replacing ASICs and PDSPs for front- While "reliable" originally assumed implementations the latest research and experiences on the application end digital signal processing algorithms. So the effi- that were effective and mainly error-free, addition- of Information and Communication Technologies cient implementation of these algorithms is critical al issues like adaptability and maintainability have in the field of Education. Areas covered include: De- and is the main goal of this book. It starts with an gained equal importance recently. For example, the sign, development and evaluation of innovative ed- overview of today's FPGA technology, devices, and 2004 ACM/IEEE Software Engineering Curriculum ucational environments - Web based courses, tools tools for designing state-of-the-art DSP systems. A Guidelines list software evolution as one of ten key and resources - ICT in special education - Collab- case study in the first chapter is the basis for more areas of software engineering education. Mens and orative learning - Distance learning supported by than 40 design examples throughout. The following Demeyer, both international authorities in the field ICTechnologies - E-Learning in Higher Education chapters deal with computer arithmetic concepts, of software evolution, together with the invited con- - Innovative experiments using ICT in educational theory and the implementation of FIR and IIR fil- tributors, focus on novel trends in software evolu- context - Methodologies for ICT use in educational ters, multirate digital signal processing systems, DFT tion research and its relations with other emerging context - Social aspects of the utilization of ICT in and FFT algorithms, advanced algorithms with high disciplines such as model-driven software engineer- education - Educational applications of ubiquitous future potential, and adaptive filters. Each chapter ing, service-oriented software development, and as- computing. An important book for researchers and contains exercises. The VERILOG source code and pect-oriented software development. They do not re- practitioners in e-learning, computer-based educa- a glossary are given in the appendices, while the ac- strict themselves to the evolution of source code but tion, educational software, distributed learning, life- companying CD-ROM contains the examples in also address the evolution of other, equally impor- long learning and open and distance learning; as well VHDL and Verilog code as well as the newest Altera tant software artifacts such as databases [..] as developers and users of educational software and "Quartus II web edition" software. This edition has computer-mediated educational tools. Contents [..] 1) Introduction and Roadmap: History and Chal- Contents Contents lenges of Software Evolution (Tom Mens)   Applications of Adaptive Hypermedia in Education.- Computer Arithmetic.- Finite Impulse Response Part I: Understanding and Analysing Software Evo- Protocols of Coordination and Structured Com- (FIR) Digital Filtres.- Infinite Impulse Response lution 2) Identifying and Removing Software Clones munication in Synchronous CSCL Environments.- (IIR) Digital Filtres.- Multirate Signal Processing.- (Rainer Koschke) - 3) Analyzing Software Repos- Components of an EML Proposal for Collabora- Fourier Transforms.- Advanced Topics.- Adaptive itories to understand Software Evolution (Marco tive Learning Modeling.- Analysis of Engaged On- Filtres.- Microprocessor Design. line Collaborative Discourse: A Methodological Ap- D'Ambros et.al.) - 4) Predicting Bugs from Histo- proach.- Adding Constraints to a Virtual Course Us- ry (Thomas Zimmermann et.al.)   Part II: Fields of interest ing a Formal Approach to the Interactions in Collab- Reengineering of Legacy Systems 5) Object-Ori- Signal,Image and Speech Processing; Computer orative Learning.- An experiment in collaborative ented Reengineering (Serge Demeyer) - 6) Migra- Hardware; Input/Output and Data Communica- writing.- The ‘contract’ as a pedagogical tool in e- tion of Legacy Information Systems (Jean-Luc Hain- tions; Electronics and Microelectronics, Instrumen- Learning.- Development of a personalized e-learning aut et.al.) - 7) Architectural Transformations: From tation experience based on IMS standard technologies.- e- Legacy to Three-Tier [..] QUAL: [..] Target groups Fields of interest R&D engineers, students, researchers in digital Fields of interest Software Engineering; Management of Computing signal processing and circuitry Computers and Education; User Interfaces and Hu- and Information Systems; Information Systems Ap- man Computer Interaction plications (incl.Internet) Type of publication Graduate/advanced undergraduate textbook Target groups Target groups Researchers, Libraries, Graduate Students Researchers; practitioners; lecturers; teachers; Due October 2007 Type of publication Type of publication Contributed volume Monograph Originally published as a monograph

Due December 2007 Due January 2008 2008. XX, 774 p. 359 illus. (Signals and Communication Technol- ogy) Geb. 2008. Approx. 340 p. Geb. 2008. Approx. 294 p. Geb. 85,55 € ISBN 978-3-540-72612-8 106,95 € 69,50 € ISBN 978-1-84628-928-6 ISBN 978-3-540-76439-7 springer.com/booksellers Computer 119

S. Meyers, Carmel, IN, USA A.A. Minai, University of Cincinnati, OH, USA; Y. Bar-Yam, New S.K. Mishra, G.B. Pant University of Agriculture & Technology, England Complex Systems Institute, Cambridge; USA (Eds.) Pantnagar, India; S. Wang, Chinese Academy of Sciences, Beijing, China; K.K. Lai, City University of Hong Kong, Hong Kong SAR MAC OS X Leopard Unifying Themes in Complex Beyond the Manual Systems V-Invex Functions and Vector Optimization Vol IV: Proceedings of the Fourth International Conference on While this book does not assume a background on Complex Systems the Mac, it assumes computer experience and is V-INVEX FUNCTIONS AND VECTOR OPTI- written to keep the reader on the edge of their seat. MIZATION summarizes and synthesizes an aspect Learning as much as you can as fast as you can is the In June of 2002, over 500 professors, students and of research work that has been done in the area of goal of the book. Emphasis is given to topics that are researchers met in Boston, Massachusetts for the Generalized Convexity over the past several decades. not treated well in online forums; that need deep but Fourth International Conference on Complex Sys- Specifically, the book focuses on V-invex functions clear explanations. So topics like scripting, web cre- tems. The attendees represented a remarkably di- in vector optimization that have grown out of the ation, networking and programming are tackled ag- verse collection of fields: biology, ecology, physics, work of Jeyakumar and Mond in the 1990’s. V-invex gressively. engineering, computer science, economics, psychol- functions are areas in which there has been much in- ogy and sociology, The goal of the conference was to terest because it allows researchers and practitioners Features encourage cross-fertilization between the many dis- to address and provide better solutions to problems The fastest overview of basics you will find anywhere ciplines represented and to deepen understanding of that are nonlinear, multi-objective, fractional, and The focus is on giving detail on the topics people will the properties common to all complex systems. This continuous in nature. Hence, v-invex functions have really want to know about An excellent section on volume contains 43 papers selected from the more permitted work on a whole new class of vector opti- scripting, so that you can go to work on your Mac than 200 presented at the conference. Topics include: mization applications. There has been considerable Interoperability issues and networking are a major cellular automata, neurology, evolution, comput- related work on vector optimization by some high- part of the book Creating and managing web sites er science, network dynamics, and urban planning. ly distinguished researchers including Kuhn, Tuck- is another major topic A basic introduction to pro- About NECSI: For over 10 years, The New England er, Geoffrion, Mangasarian, Von Neuman, Schaiible, gramming for beginners is also included Complex Systems Institute (NECSI) has been instru- Ziemba, etc. The authors will integrate this related mental in the development of complex systems sci- Contents research into the book and demonstrate the wide ence and its applications. NECSI conducts research, Introduction.- Getting to Know Leopard.- What’s context from which the area has grown and contin- education, knowledge dissemination, and communi- New in Leopard.- Interface Basics.- Menu Bar.- The ues to grow. ty development around the world for the promotion Dock.- The Desktop.- The Finder.- The File Sys- of the study [..] tem.- Users and "Home" Folders.- System Folder.- Features The book is a well-synthesized, accessible, and us- Library Folders.- Applications Folder.- Hidden Fold- Contents able treatment of the area for students, researchers ers.- Nifty Leopard Features.- Finding Anything Introduction.- Part I: Methods.- Part II: Models.- and practitioners in OR, optimization, applied math- with Spotlight.- Dashboard Widgets.- Customizing Part III Applications. and Administering Leopard.- Configuring System ematics, and engineering, and their work related to Preferences.-Personal Preferences.- Hardware Pref- Fields of interest a wide range of problems which including financial erences.- Networking Preferences.- System Prefer- Nonlinear Dynamics, Complex Systems, Chaos, institutions, logistics, transportation, traffic manage- ences.- Security.- Utilities and Maintenance.- Back- Neural Networks; Artificial Intelligence (incl. ment, etc. Throughout the optimization community, up and Recovery.- Time Machine.- Communications Robotics); Operation Research/Decision Theory; there is considerable interest in V-invex methods [..] and [..] Game Theory, Economics, Social and Behav. Sci- Contents ences Fields of interest Preface.- General Introduction.- V-Invexity In Non- Operating Systems Target groups linear Multiobjective Programming.- Multiobjec- researchers. tive Fractional Programming.- Multiobjective Non- Target groups smooth Programming.- Composite Multiobjective Intermediate Users of the Mac with possible Type of publication Nonsmooth Programming.- Continuous-Time Pro- PC experience. This book will push the user but the Monograph gramming.- References.- Index. basics are there. People that want to get into depth Fields of interest without the usual dwelling on simple procedures. Due October 2007 Admins and PC users with a good background in Optimization; Calculus of Variations and Optimal computers that have an interest in the Mac for per- Control; Optimization; Operation Research/Decision haps inter-op reasons or who are simply bailing out Jointly published with NECSI Theory; Operations Research, Mathematical Pro- of the PC market. gramming; Technology Management; Mathematical 2007. Approx. 400 p. Geb. Modeling and Industrial Mathematics Type of publication Professional book 139,05 € Target groups ISBN 978-3-540-73848-0 Graduate students and researchers in applied math- ematics, optimization, OR and statistics - also prac- Due December 2007 titioners in financial institutes, logistics, transporta- tion and traffic management Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Type of publication Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Monograph Oman, Qatar, Palestine: Jordan Book Center Due November 2007 2008. Approx. 600p. Softcover

ISBN 978-1-59059-837-5 2008. Approx. 200 p. (Springer Optimization and Its Applications, Band 14) Geb.

74,85 € ISBN 978-0-387-75445-1 springer.com/booksellers Computer 120

A. Miyaji, Japan Advanced Institute of Science and Technology, U. Monatanari, University of Pisa, Italy; D. Sannella, University of B. Moon, University of Arizona, AZ, USA; P.R. Rao, University of Ishikawa, Japan; H. Kikuchi, Tokai University, Kanagawa, Japan; K. Edinburgh, UK; R. Bruni, University of Pisa, Italy (Eds.) Missouri-Kansas City, Missouri, USA Rannenberg, Goethe University Frankfurt, Germany (Eds.) Trustworthy Global Computing XML Indexing and Pattern Matching Advances in Information and Second Symposium, TGC 2006, Lucca, Italy, November 7-9, Computer Security 2006, Revised Selected Papers Second International Workshop on Security, IWSEC 2007, XML Indexing and Pattern Matching introduces is- Nara, Japan, October 29-31, 2007, Proceedings sues and challenges in XML indexing and pattern matching. Since extensible markup language XML This book constitutes the thoroughly refereed post- emerged as a new standard for information repre- proceedings of the Second Symposium on Trustwor- sentation and exchange on the Internet, the prob- thy Global Computing, TGC 2006, held in Lucca, This book constitutes the refereed proceedings of the lem of storing, indexing and querying XML docu- Italy, in November 2006. The 14 revised papers pre- Second International Workshop on Security, IWSEC ments has been among the major issues of database sented together with 2 keynote lectures were careful- 2007, held in Nara, Japan, October 29-31, 2007. The research. As the relationships between elements in ly reviewed and selected from 32 submissions. The 30 revised full papers presented were carefully re- an XML document are defined by nested structures, papers are organized in topical sections on types to viewed and selected from 112 submissions. The pa- XML documents are often modeled as trees whose discipline interactions, calculi for distributed sys- pers are organized in topical sections on Software nodes are labeled with tags. Queries are typically for- tems, flexible modeling, algorithms and systems for and Multimedia security, Public-key cryptography, mulated to retrieve documents by specifying both global computing, as well as security, anonymity and Network security, E-commerce and Voting, Operat- their structures and values in the XPath and XQuery type safety. The book starts off with activity reviews ing systems, Security and Information management, languages. This book also describes state-of-the-art of four FP6 programmes of the European Union: Ae- Anonymity and Privacy and Digital signatures, Hash techniques and provides solutions to the problems olus, Mobius, Sensoria, and Catnets. function and Protocol. that are raised in real-world applications. XML In- dexing and Pattern Matching is structured for re- Fields of interest Fields of interest search scientists and practitioners in industry. The Systems and Data Security; Operating Systems; Man- Software Engineering; Computer Communication book is also suitable for advanced-level students in agement of Computing and Information Systems; Networks; Programming Techniques; Systems and computer science. Computers and Society; Computer Communication Data Security; Programming Languages, Compilers, Interpreters; Logics and Meanings of Programs Networks; Algorithm Analysis and Problem Com- Features plexity Target groups Solves problems encountered in real-world applica- tions Includes fundamental topics and the latest re- Target groups Researchers and professionals search developments in XML and pattern matching Researchers and professionals Type of publication Contents Type of publication Proceedings Preface.- Introduction.- Data and Storage Mod- Proceedings els.- Indexing by Structural Summary.- Labeling Due October 2007 Schemes.- Twig Join Processing.- Sequencing the Due October 2007 Twigs.- XML Filtering.- Index. 2007. X, 339 p. (Lecture Notes in Computer Science, Band 4661) Softcover 2007. XIII, 460 p. (Lecture Notes in Computer Science, Band 4752) Fields of interest Softcover Database Management; Pattern Recognition; Infor- 55,64 € mation Storage and Retrieval; Information Systems 64,20 € ISBN 978-3-540-75333-9 Applications (incl.Internet); Programming Tech- ISBN 978-3-540-75650-7 niques; Computer Communication Networks

Target groups Research scientists, research libraries, advanced-level students in computer science

Type of publication Monograph

Due April 2008

2008. Approx. 150 p. 20 illus. (Advances in Database Systems, Band 40) Geb.

82,34 € ISBN 978-0-387-30938-5 springer.com/booksellers Computer 121

A. Moreno, J. Pavón, Universidad Complutense, Madrid, Spain R. Moreno Díaz, Universidad de Las Palmas de Gran Canaria, L. Moroney, Microsoft; R. Pars, J. Grieb, Long Island, NY, USA (Eds.) Spain; F. Pichler, Johannes Kepler University Linz, Austria; A. Quesada Arencibia, Universidad de Las Palmas de Gran Canaria, Spain (Eds.) Foundations of ASP.NET AJAX Issues in Multi-Agent Systems

The AgentCities.ES Experience Computer Aided Systems Theory - EUROCAST 2007 ASP.NET AJAX (formerly code-named ‘Atlas’) will provide a unified set of development tools within Vi- sual Studio for rapid AJAX application development. The agent paradigm has been a subject of research 11th International Conference on Computer Aided Systems Theory, Las Palmas de Gran Canaria, Spain, February 12-16, For the first time AJAX applications can be devel- for the last years, and the purpose of this book is to 2007, Revised Selected Papers oped seamlessly in conjunction with their support- present current status of this technology by looking ing technologies of ASP.NET, SQL Server and Vi- at its application in different domains, such as elec- sual Studio. This is a break-through that is going to tronic markets, e-tourism, ambience intelligence, have enormous impact on the development world and complex system analysis. It starts by discussing This book constitutes the thoroughly refereed post- – as the success of the first edition of this book has software engineering issues for the development of proceedings of the 11th International Conference on shown. Written by the author and technical review- multi-agent systems, how much it costs to build a Computer Aided Systems Theory, EUROCAST 2007, er of ’ successful Foundations of Atlas and multi-agent system, and which methods and tools held in Las Palmas de Gran Canaria, Spain in Febru- Foundations of WPF titles, this book gives readers a are currently available. Next chapters present some ary 2007. The 144 revised full papers presented were deep and detailed grounding in how ASP.NET AJAX of the most relevant aspects that are considered for carefully reviewed and selected for inclusion in the works. It takes readers swiftly through the first prin- the development of multi-agent systems: ubiquitous book. The papers are organized in topical sections cipals of AJAX, and deep into the heart of the tech- computing, learning and planning, trust and secu- on formal approaches, Computation and Simulation nology. By the end of the book readers will know ev- rity, electronic institutions and swarm intelligence. in Modelling Biological Systems, Intelligent Infor- erything that they need to confidently produce cut- Last chapters focus on concrete applications of phys- mation Processing, Computers in Education, Grid ting-edge ASP.NET AJAX applications swiftly and ical agents and e-tourism applications, to illustrate Computing, Applied Formal Verification, Cellular professionally. This book will be based on the final how to integrate the previously discussed aspects. Automata, Computer Vision, Heuristic Problem full release candidate of ASP.NET AJAX as it is [..] The book is written by researchers with experience Solving, Signal Processing Architectures, Robotics and Robotic Soccer, Cybercars and Intelligent Vehi- in technology transfer, and therefore it is oriented to Features cles and Artificial Intelligence Components. practice. One of the first books to cover the final release and Visual Studio integration of this exiting and wide- Features Fields of interest ly-anticipated new web development technology Presents current status of research and application in Simulation and Modeling; Pattern Recognition; from Microsoft Covers the topic from the ground different domains Software engineering issues for the Computer-Aided Engineering (CAD, CAE) and De- up and in great detail. Readers will find everything development of multi-agent systems Gives some of sign; Artificial Intelligence (incl. Robotics); Logics that they need to know within these pages Written the most relevant aspects that are considered for the and Meanings of Programs; Processor Architectures by Laurence Moroney, an ASP.NET AJAX insider, development of multi-agent systems Target groups Microsoft employee, and author of our successful Contents Researchers and professionals Foundations of [..] Introduction.- Agent Oriented Software Engineer- Contents ing.- Ubiquitous computing, mobile environments.- Type of publication Introducing Ajax.- Part #1: The ASP.NET AJAX Cognitive abilities in agents.- Trust and security.- Proceedings 1.0 Release.- ASP.NET AJAX: Taking Ajax to the Physical agents.- Artificial social intelligence in MAS: next level.- ASP.NET AJAX: Making Client- from swarms to electronic institutions.- Agent appli- Due November 2007 side JavaScript easier.- Introducing Client-side con- cations in Tourism. trols.- Using Client-side controls.- Introducing Serv- 2007. Approx. 1220 p. (Lecture Notes in Computer Science, Band er Controls.- Using Server Controls.- Part 2: Integra- Fields of interest 4739) Softcover Computer Systems Organization and Communica- tion with Visual Studio 'Orcas'.- Data-binding with- tion Networks; Artificial Intelligence (incl. Robotics); 107,00 € in ASP.NET AJAX.- Using the ASP.NET Toolkit.- Software Engineering/Programming and Operating ISBN 978-3-540-75866-2 Mapping with ASP.NET AJAX.- Building a Sample Systems Application.

Target groups Fields of interest Researchers, computer scientists, IT managers, and Programming Techniques students Target groups Type of publication Intermediate to Advanced ASP.NET Develop- Monograph ers and Migrating web developers from elsewhere. Type of publication Due December 2007 Professional book

2008. Approx. 236 p. (Whitestein Series in Software Agent Tech- Due November 2007 nologies and Autonomic Computing) Softcover

42,69 € Distribution rights for Hongkong, Taiwan, RepKor, Singapore, ISBN 978-3-7643-8542-2 Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center

2007. Approx. 300p. Softcover

ISBN 978-1-59059-828-3 122 Computer springer.com/booksellers

C.N. Morris, Harvard University, Cambridge, MA, USA; R. Tibshi- H. Mortveit, Virginia Polytechnic Institute and State University, T. Munakata, Cleveland State University, Cleveland, OH, USA rani, Stanford University, Stanford, CA, USA (Eds.) Blacksburg, VA, USA; C. Reidys, Nankai University, Tianjin, China Fundamentals of the New Artificial Selected Papers of Bradley Efron An Introduction to Sequential Intelligence Dynamical Systems Neural, Evolutionary, Fuzzy and More A collection of journal articles by reknowned statisti- cian Bradley Efron. Sequential Dynamical Systems (SDS) are a class of discrete dynamical systems which significantly gen- This significantly updated 2nd edition thoroughly Features covers the most essential & widely employed Collects the most important papers of Bradley Efron eralize many aspects of systems such as cellular au- tomata, and provide a framework for studying dy- material pertaining to neural networks, genetic al- in one place Adds comments by Efron and other im- gorithms, fuzzy systems, rough sets, & chaos. portant statisticians namical processes over graphs. This text is the first to provide a comprehensive introduction to SDS. Driv- The exposition reveals the core principles, concepts, & technologies in a concise & accessible, Fields of interest en by numerous examples and thought-provoking easy-to-understand manner, & as a result, pre- Statistical Theory and Methods problems, the presentation offers good foundational material on finite discrete dynamical systems which requisites are minimal. Topics & features: Re- Target groups leads systematically to an introduction of SDS. Tech- tains the well-received features of the first edition, Statisticians niques from combinatorics, algebra and graph theo- yet clarifies & expands on the topic Features ry are used to study a broad range of topics, includ- completely new material on simulated annealing, Type of publication ing reversibility, the structure of fixed points and pe- Boltzmann machines, & extended fuzzy if-then Monograph riodic orbits, equivalence, morphisms and reduction. rules tables [NEW] Emphasizes the real-world appli- Unlike other books that concentrate on determining cations derived from this important area of comput- er science Provides easy-to-comprehend descriptions Due June 2008 the structure of various networks, this book investi- gates the dynamics over these networks by focusing & algorithms Integrates all material, yet allows on how the underlying graph structure influences the each chapter to be used or studied independently 2008. Approx. 500 p. (Perspectives in Statistics) Geb. properties of the associated dynamical system. This This invaluable text & reference is ideal for up- book is aimed at graduate students [..] per-level undergraduates & graduates studying 81,59 € artificial intelligence, soft computing, [..] ISBN 978-0-387-75691-2 Features First graduate textbook on Sequential Dynamical Features Systems Details seminal SDS research toward a gen- No other books emphasize technical fundamentals of eral theory of discrete computer simulations, with newer AI areas New sections, such as that on Boltz- applications developed in government labs Versatile mann Machines, contain easy-to-understand de- interdisciplinary textbook relevant to applied mathe- scriptions and algorithms, following the features on maticians and computer scientists alike the original edition

Contents Contents Preface.- What is a Sequential Dynamical System?- A Introduction.- Neural Networks: Fundamentals and Comparative Study.- Graphs, Groups, and Dynam- the Backpropagation Model.- Neural Networks: Oth- ical Systems.- Sequential Dynamical Systems over er Models.- Genetic Algorithms and Evolutionary Permutations.- Phase-Space Structure of SDS and Computing.- Fuzzy Systems.- Rough Sets.- Chaos Special Systems.- Graphs, Groups, and SDS.- Com- Fields of interest binatorics of Sequential Dynamical Systems over Artificial Intelligence (incl. Robotics); Data Mining Words.- Outlook.- References.- Index. and Knowledge Discovery; Pattern Recognition Fields of interest Target groups Dynamical Systems and Ergodic Theory; Simulation Advanced undergraduates, Graduates and Modeling; Applications of Mathematics; Dis- crete Mathematics in Computer Science Type of publication Undergraduate textbook Target groups Graduate students and researchers in discrete math- ematics, dynamical systems theory, theoretical com- Due December 2007 puter science, specifically computer simulation and network theory and phenomena 2007. Approx. 250 p. (Texts in Computer Science) Geb.

Type of publication 58,80 € Graduate/advanced undergraduate textbook ISBN 978-1-84628-838-8

Due November 2007

2008. XVI, 248 p. 20 illus. (Universitext) Softcover

50,24 € ISBN 978-0-387-30654-4 springer.com/booksellers Computer 123

W. Mödinger, FH Stuttgart, Hochschule der Medien; M. T. Möller, Simon Fraser University, Burnaby, BC, Canada; B. Th. Müller, Seedorf Broßmann, DaimlerChrysler Global Training Hamann, University of California, Davis, USA; R. Russell, Simon Fraser University, Burnaby, BC, Canada (Eds.) Trusted Computing Systeme Praxisguide Wissensmanagement Mathematical Foundations of Konzepte und Anforderungen Qualifizieren in Gegenwart und Zukunft. Planung, Umsetzung und Controlling in Unternehmen Scientific Visualization, Computer Graphics, and Massive Data Der Begriff Trusted Computing umschreibt eine Rei- Exploration he neuer Ansätze zur Verbesserung der Computer- Wissen zu managen steht auf Grund des enormen sicherheit durch den Aufbau von Computersyste- Wissenszuwachses und der stetig sinkenden Wis- men aus vertrauenswürdigen Hardware- und Soft- senshalbwertzeit in der Fort- und Weiterbildung warekomponenten. Das Buch liefert erstmals einen Scientific Visualization is one of the most active and unverändert vor schwierigen Anforderungen. Ziel umfassenden Überblick über die unterschiedlichen exciting areas of Mathematics and Computing Sci- dieses Buches ist es, einen Überblick über die Meth- Konzepte des Trusted Computing und ermöglicht ence, and indeed one which is only beginning to ma- oden und Prozesse des Wissensmanagements zu dadurch einen einfachen Einstieg in das komplexe ture. Current visualization algorithms break down geben und gleichzeitig einen Blick auf die Qual- Thema. Verfügbare Umsetzungen verschiedener for very large data sets. While present approaches ifizierungswelt von morgen zu wagen. Anwen- Trusted-Computing-Konzepte sowie deren Prob- use multi-resolution ideas, future data sizes will not dungsszenarien aus der Sicht von Bildungsnach- leme und Grenzen werden aufbauend auf die Grund- be handled that way. New algorithms based on so- fragern und -anbietern sollen zur Veranschaulichung lagen dargestellt. Über die Beschreibung des Trust- phisticated mathematical modeling techniques must der heutigen und der zukünftigen Lernwelt dienen. ed Platform Modules (TPM) hinaus erläutert das be devised which will permit the extraction of high- Ein weiteres wichtiges Ziel ist es, aufzuzeigen, dass Buch erweiterte Schutzfunktionen zukünftiger Hard- level topological structures that can be visualized. Lernen und Qualifizieren und damit Wissensman- warekomponenten von Intel und AMD. Eine Unter- For these reasons a workshop was organized at the agement sich immer mehr zum Business entwickeln. suchung der neuen Sicherheitsfunktionen in Win- Banff International Research Station, focused specifi- In der Fort- und Weiterbildung ist es deshalb mehr dows Vista zeigt den Einfluss von Trusted Com- cally on mathematical issues. A primary objective of denn je notwendig, Qualifizierung nach betrieb- puting auf die Entwicklung von Betriebssystemen the workshop was to gather together a diverse set of swirtschaftlichen Grundsätzen zu planen, umzuset- und liefert die Grundlage zur Bewertung der Wirk- researchers in the mathematical areas relevant to the zen und zu steuern. Dabei sollen sich Ansprüche aus samkeit dieser neuen Funktionen. der Profession der Fort- und Weiterbildung und der recent advances in order to discuss the research chal- Pädagogik nicht widersprechen, sondern neue Chan- lenges facing this field in the next several years. The Features cen und Vorteile für Bildungswillige eröffnen. workshop was organized into five different thrusts: Aktuelle Lösungsansätze im Bereich Trusted Com- > - Topology and Discrete Methods > - Signal puting. Schutzfunktionen von Intel- und AMD- Features and Geometry Processing > [..] Hardwarekomponenten werden dargestellt. Sicher- Praxisorientierter Überblick über den Medieneinsatz heitsfunktionen von Windows Vista werden behan- Fields of interest zur Wissensvermittlung Speziell ausgerichtet auf die delt. Bedürfnisse in Unternehmen Computational Mathematics and Numerical Analy- sis; Mathematics of Computing; Computational Sci- Contents Contents ence and Engineering Grundlagen.- Trusted Computing.- Die TCP der Einführung. Teil A: Elektronische Medien und ihre Trusted Computing Group.- Erweiterungen und Al- Target groups Möglichkeiten der Wissensvermittlung.- Referenz- ternativen zur TCG.- Anforderungen an Trusted Researchers, lecturers, and graduate students in sci- modell für Wissensvermittlung.- E-Business, e-Com- Operating Systems.- Integrity Management.- Integri- entific visualization. merce, e-Learning. Abgrenzung und Positionierung.- ty Protection.- Integrity Validation.- Trusted Soft- Voraussetzungen für den Einsatz von elektronischen Type of publication ware Stack.- Protected Execution.- Trusted GUI und Medien.- Qualifizieren und Lernen – Instrumente, Proceedings Trusted Input/Output.- Trusted Computing Infras- Methoden, Applikationen – state of the art.- En- truktur.- Public Key Infrastruktur (PKI).- Certificate twicklung professionalisierter Qualifizierung in der Management Protokoll.- Theoretische und praktis- Due October 2008 Zukunft – Quo vadis Training.- Qualifizieren und che Lösungsansätze.- Trusted Computing Projek- Lernen: Thesen, Ansätze und Aktivitäten – future te.- Exkurs: Windows Vista als Trusted OS.- Stich- oriented.- Zusammenfassung und Ausblick.- Teil B: 2008. Approx. 400 p. (Mathematics and Visualization) Geb. wortverzeichnis.- Literaturverzeichnis. Die Wissenswirtschaft – betriebswirtschaftliche [..] 96,25 € Fields of interest Fields of interest ISBN 978-3-540-25076-0 Information Systems Applications (incl.Internet); Media Design; Multimedia Information Systems; In- Systems and Data Security; Information Systems and formation Systems Applications (incl.Internet); User Communication Service; Management of Comput- Interfaces and Human Computer Interaction; Com- ing and Information Systems puters and Education Target groups Target groups Entwickler, Sicherheitsexperten Personalentwickler, Praktiker in Aus- und Weiterbil- dung, E-Learning-Entwickler, Controller Type of publication Professional book Type of publication Professional book Due April 2008

Due March 2008 2008. Etwa 200 S. 55 Abb. (Xpert.press) Geb.

2008. Etwa 250 S. (X.media.press) Geb. 39,95 € ISBN 978-3-540-76409-0 49,95 € ISBN 978-3-540-46224-8 124 Computer springer.com/booksellers

W.E. Nagel, Dresden University of Technology, Germany; W. S. Nair, Southern Methodist University, Dallas, TX, USA; M. K. Namjoshi, T. Yoneda, T. Higashino, Y. Okamura (Eds.) Jäger, University of Heidelberg, Germany; M. Resch, University of Marchetti, Southern Methodist University, Dallas, TX, USA; J. Stuttgart, Germany (Eds.) Hopkinson, Information and Infrastructure Technologies, Hern- don, VA, USA Automated Technology for High Performance Computing in Verification and Analysis Enterprise Security Science and Engineering ' 07 5th International Symposium, ATVA 2007 Tokyo, Japan, Octo- Compliance v. Competence ber 22-25, 2007 Proceedings Transactions of the High Performance Computing Center, Stuttgart (HLRS) 2007

This book examines dual perspectives of enterprise This book constitutes the refereed proceedings of the security, compliance and business continuity, and 5th International Symposium on Automated Tech- This book presents the state-of-the-art in simulation offers a pathway to their convergence. Irrespec- nology for Verification and Analysis, ATVA 2007, on supercomputers. Leading researchers present re- tive of their sizes, companies are forced to be com- held in Tokyo, Japan, October 22-25, 2007. The 29 sults achieved on systems of the Stuttgart High Per- plaint to various security standards, to maintain their revised full papers presented together with 7 short formance Computing Center (HLRS) for the year good standings with government agencies as well as papers were carefully reviewed and selected from 88 2007. The reports cover all fields of computation- clients. There is enormous overlap and contradic- submissions. The papers address theoretical methods al science and engineering, ranging from CFD and tions across the standards and one size does not fit to achieve correct software or hardware systems, in- computational physics and chemistry to computer all. The book will provide a comparative discussion cluding both functional and non functional aspects; science, with a special emphasis on industrially rel- on popular standards and suggest the suitability and as well as applications of theory in engineering meth- evant applications. Presenting results for both vec- requirements for various segments in industry and ods and particular domains and handling of practical tor-based and microprocessor-based systems, the government. Further, the book will highlight widely problems occurring in tools. book makes it possible to compare the performance existent "compliance paralysis" and analyze its etiolo- levels and usability of various architectures. As the Fields of interest gy. While compliance is necessary, the big question is HLRS operates the largest NEC SX-8 vector system Logics and Meanings of Programs; Information Sys- whether it is sufficient to ensure business continuity, in the world, this book gives an excellent insight into tems and Communication Service; Computer Com- often the answer is no. Finally, the book will delin- the potential of such systems. The book further cov- munication Networks; Special Purpose and Applica- eate a 7 step process to achieve both compliance and ers the main methods in high performance comput- tion-Based Systems; Software Engineering; Program- business continuity as repeatable enterprise charac- ing. Its outstanding results in achieving the highest ming Languages, Compilers, Interpreters teristics. performance for production codes are of particular Target groups interest for both scientists and engineers. The book Features Researchers and professionals comes with a wealth of coloured illustrations and ta- Examines enterprise security, compliance and busi- bles. ness continuity, and offers a pathway to their conver- Type of publication gence. Provides a comparative discussion on popu- Fields of interest Proceedings lar standards and suggest the suitability and require- Computational Mathematics and Numerical Anal- ments for various segments in industry and govern- ysis; Theoretical and Computational Chemistry; ment. Highlights widely existent "compliance paraly- Due October 2007 Mathematics of Computing; Mathematical and sis" and analyze its etiology. Delineates a 7-step pro- Computational Physics cess to achieve both compliance and business conti- 2007. XIV, 566 p. (Lecture Notes in Computer Science, Band 4762) Target groups nuity [..] Softcover Computational scientists Contents 72,76 € ISBN 978-3-540-75595-1 Type of publication Introduction.- Regulatory Environment.- Standards Proceedings Associated with Security Processes.- Five Steps to Se- curity.

Due November 2007 Fields of interest Communications Engineering, Networks; Manage- 2008. Approx. 700 p. Geb. ment of Computing and Information Systems; Com- puter Communication Networks; Performance and 106,95 € Reliability; Electronic and Computer Engineering; ISBN 978-3-540-74738-3 Computer Systems Organization and Communica- tion Networks

Target groups Professionals responsible for corporate operations or corporate security Senior executives who want guid- ance establishing, measuring, and monitoring the se- curity profile of external organizations on which they depend, such as suppliers, service providers, or man- ufacturers and developers. Security consultants and Auditors as well as students in an introductory grad- uate course in security process or enterprise security. Researchers engaged in development and revamping of security standards [..]

Type of publication Professional book

Due May 2008

2008. Approx. 250 p. Geb.

32,96 € ISBN 978-0-387-74434-6 springer.com/booksellers Computer 125

C. Nehaniv, University of Hertfordshire, Hatfield, UK; K. Dauten- K. Newton, Magenic Technologies, Lynwood, IL, USA H.M. Niegemann, Universität Erfurt; S. Domagk, Universität Er- hahn, University of Hertfordshire, Hatfield, UK furt; S. Hessel, Universität Erfurt; A. Hein, Universität Erfurt; M. Hupfer, A. Zobel The Definitive Guide to the Artificial Life Fundamentals Microsoft Enterprise Library Kompendium Multimediales Lernen The Simulation and Synthesis of Living Systems

The Definitive Guide to the Microsoft Enterprise Multimediales Lernen ist aus der modernen This book is written to be used as a textbook by uni- Library introduces one of the most exciting and Lehr- und Lernlandschaft nicht mehr wegzu- versity students for courses in Artificial Intelligence, popular .NET-oriented initiatives; the Enterprise denken. Neue Technologien schaffen ständig neue Artificial Life, Evolutionary Computation, Cogni- Application Library, which offers nine classes of Einsatzmöglichkeiten wie z.B. mobiles Lernen. Wie tive Science, Biology, and other courses which ad- reusable code used to solve a variety of common aber lässt sich die Qualität neuer multimedialer dress issues of modelling and synthesising life-like problem spaces. These problems cover a number Lehr- und Lernangebote sichern, welche Standards agents. The book gives a comprehensive overview of of topics, including configuration, data access, ex- gibt es? Welche didaktischen Ansätze sind Grund- the research field in terms of theory and techniques, ception management, caching, application up- lagen effektiven multimedialen Lernens? Welche so that students can acquire skills necessary to apply dates, UI separation, asynchronous invocation, log- aktuellen lehr- und lernpsychologischen Theo- techniques of AL. The field Artificial Life is strongly ging, security, and XML-based information aggre- rien und Befunde sind hilfreich bei der Konzep- interdisciplinary. Although the book is focused on gation. Author Keenan Newton, a senior consul- tion? Welche technologischen Fragestellungen sind realisations of Artificial Life in Computer Science tant for noted Microsoft Partner Magenic (http:// zu berücksichtigen? In 47 Kapiteln werden alle and Artificial Intelligence and Adaptive Systems, www.magenic.com/), begins with an introduction to wesentlichen Aspekte multimedialen Lehrens und when necessary, background from relevant fields like the challenges faced by today’s developers, explain- Lernens dargestellt: Von der Planung und Konzep- biology and robotics will be provided. ing the conditions which brought about the creation tion auf der Grundlage didaktischer Entwurfs- of this initiative. Following an overview of the Enter- muster (design patterns) über Interaktivitätsformen, Fields of interest prise Application Library, subsequent chapters are CSCL und Evaluation bis hin zu Softwaresystemen, Artificial Intelligence (incl. Robotics); Computing devoted to detailed introductions to each block, con- Werkzeugen wie Authoring Tools und E-Learn- Methodologies cluding with an overview of the framework available ing-Standards. Das Buch wendet sich an Praktiker for creating custom application blocks. Type of publication in der Aus- und Weiterbildung und E-Learning-En- twickler. Außerdem ist es für den Einsatz in der Graduate/advanced undergraduate textbook Features Lehre geeignet, [..] The first book to introduce all ten of the enterprise Due January 2008 application blocks, which have been recently updated Features for .NET 2.0 Build .NET applications faster and more Fundierte Anleitung für die konzeptionelle Arbeit an efficiently by taking advantage of readily available 2008. Approx. 400 p. Geb. multimedialen Lernprojekten Realistische Entschei- code developed and released by Microsoft's Patterns dungsgrundlage für die Einführung multimedi- 49,17 € and Practices group (http://msdn.microsoft.com/ alen Lernens Erläuterung der mediendidaktischen ISBN 978-3-540-00119-5 practices/) Basing all examples on a theme project Grundlagen Ausführliche Einführung in technologis- involving the development of a point-of-sale [..] che Grundlagen

Contents Contents Enterprise Application Architectures.- Introduc- Einführung.- Geschichte und Grundlagen.- Planung ing the Enterprise Library.- Design of Enterprise Li- und Analyse.- Formate multimedialen Lernens.- brary.- Configuration Application Block.- Data Ac- Kontent - Struktur - Design.- Multimedia Design.- cess Application Block.- Caching Application Block.- Interaktivitätsdesign.- Motivationsdesign - Dran- Exception Handling Application Block.- Logging and bleiben und Weiterlernen: Nun motiviert mich mal!- Instrumentation Application Block.- Cryptography Storyboard.- Qualität für den Kunden.- Technische Application Block.- Security Application Block.- Of- Umsetzung. fline Application Block.- Composite UI Application Block.- Creating a Custom Application Block. Fields of interest Media Design; Multimedia Information Systems; In- Fields of interest formation Systems Applications (incl.Internet); User Software Engineering Interfaces and Human Computer Interaction; Com- puters and Education Target groups Intermediate Microsoft .NET developers Target groups Praktiker in Aus- und Weiterbildung, E-Learn- Type of publication ing-Entwickler, Dozenten, Studenten der Medien- Professional book wissenschaft, Erziehungswissenschaft, Psychologie, Informatik Due December 2007 Type of publication Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Professional book Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Due April 2008 Oman, Qatar, Palestine: Jordan Book Center

2008. Etwa 600 S. 100 Abb. (X.media.press) Geb. 2008. Approx. 460 p. Geb. 59,95 € ISBN 978-1-59059-655-5 ISBN 978-3-540-37225-7 126 Computer springer.com/booksellers

M. Nikravesh, University of California, Berkeley, CA, USA; J. M. Nikravesh, University of California, Berkeley, CA, USA; J. E.M. Noam, Columbia Institute for Tele-Information, New York, Kacprzyk, Polish Academy of Sciences, Warsaw, Poland; L.A. Kacprzyk, Polish Academy of Sciences, Warsaw, Poland; L.A. New York, USA; L.M. Pupillo, Telecom Italia, Roma, Italy (Eds.) Zadeh, University of California, Berkeley, CA, USA (Eds.) Zadeh, University of California, Berkeley, CA, USA (Eds.) Peer-to-Peer Video Forging New Frontiers: Fuzzy Forging New Frontiers: Fuzzy The Economics, Policy, and Culture of Today's New Mass Medi- Pioneers I Pioneers II um

The 2005 BISC International Special Event- The 2005 BISC International Special Event- Peer-to-Peer (P2P) networks are comprised of equal BISCSE’05 “Forging the frontiers” was held in the BISCSE’05 “Forging the frontiers” was held in the “nodes” that function as both clients and servers, as University of California, Berkeley, “Where fuzzy log- University of California, Berkeley, “Where fuzzy log- opposed to systems in which data and information ic began”, from November 3-6, 2005. The successful ic began”, from November 3-6, 2005. The successful are managed through centralized servers. The impli- applications of fuzzy logic and it’s rapid growth sug- applications of fuzzy logic and it’s rapid growth sug- cations of this architecture go far beyond the techno- gest that the impact of fuzzy logic will be felt increas- gest that the impact of fuzzy logic will be felt increas- logical realm; the ability of individuals to share dig- ingly in coming years. Fuzzy logic is likely to play an ingly in coming years. Fuzzy logic is likely to play an ital content files, including audio and video mate- especially important role in science and engineering, especially important role in science and engineering, rial, in real time, facilitates communication and, at but eventually its influence may extend much far- but eventually its influence may extend much far- a deeper cultural level, promotes community with- ther. In many ways, fuzzy logic represents a signifi- ther. In many ways, fuzzy logic represents a signifi- out hierarchy or strict control. As Eli Noam, Loren- cant paradigm shift in the aims of computing - a shift cant paradigm shift in the aims of computing - a shift zo Pupillo, and their colleagues demonstrate in this which reflects the fact that the human mind, unlike which reflects the fact that the human mind, unlike timely and incisive volume, P2P has permeated all present day computers, possesses a remarkable abil- present day computers, possesses a remarkable abil- facets of society, from YouTube and music down- ity to store and process information which is perva- ity to store and process information which is perva- loading experiments on college campuses to interna- sively imprecise, uncertain and lacking in categoric- sively imprecise, uncertain and lacking in categoric- tional policy debates over intellectual property rights. ity. The chapters of the book are evolved from pre- ity. The chapters of the book are evolved from pre- Peer-to-Peer Video is the first book to apply eco- sentations made by selected participants at the meet- sentations made by selected participants at the meet- nomic principles to analyze and understand the P2P ing and organized in two books. The papers include ing and organized in two books. The papers include phenomenon, considering such topics as “consumer reports from the different front of soft computing in reports from the different front of soft computing in demand and the commons” and “file sharing and the various industries and address [..] various industries and address [..] copyright crisis.” Moreover, the authors, [..]

Features Features Features Wraps up the state of the art of fuzziness Includes Wraps up the state of the art of fuzziness Includes Hot topic: P2P video is at the nexus of technology, contributions by all the leading scientists in fuzziness contributions by all the leading scientists in fuzziness media, culture, politics, economics, law, and busi- ness today First comprehensive treatment of the top- Contents Contents ic: coverage from multiple points of view, with nu- From the contents Web Intelligence, World Knowl- From the contents Morphic Computing: Quantum merous contemporary examples Combines incisive edge and Fuzzy Logic.- Summarization of Time Se- and Fields.- Decision-Based Query and Question- analysis with discussion of practical implications for ries via Computing with Words and Perceptions.- naire Systems.- Qualitative Possibility Theory in In- business, media/communications management, and Evolution of Fuzzy Logic: From Intelligent Systems formation Processing.- Fuzzy Modeling of Nonlin- intellectual property law Expert contributors on the and Computation to Human Mind.- Pioneers of ear Stochastic Systems by Learning from Examples.- front [..] Vagueness, Haziness, and Fuzziness in the 20th Cen- Conceptual Soft-Computing Based Web Search: FIS- tury.- Selected Results of the Global Survey on Re- CRM, FISS Metasearcher and GUMSe Architecture.- Contents search, Instruction and Development Work with Mediative Fuzzy Logic: A New Approach for Contra- The Economics of User Generated Content and P2P: Fuzzy Systems.- Fuzzy Models and Interpolation.- dictory Knowledge Management.- Fuzzy Cognitive The Commons as the Enabler of Commerce.- Peer- Computing with Antonyms.- Morphic Computing: Maps Structure for Medical Decision Support Sys- to-Peer Media File Sharing: From Copyright Cri- Concept and Foundation.- A Nonlinear Functional tems.- Fuzzy-Neuro Systems for Local and Person- sis to Market?.- The Economics of Peer-to-Peer.- Analytic Framework for Modeling and Processing alized Modeling.- Dynamic Simulation of a Supply The Implications of Video P2P on Network Us- Fuzzy Sets.- [..] Chain with and [..] age.- Peer-to-Peer Video File Sharing: What Can We Learn From Consumer Behavior?.-  Col- Fields of interest Fields of interest lege Students: The Rationale for P2P Video File Shar- Appl.Mathematics/Computational Methods of Engi- Appl.Mathematics/Computational Methods of Engi- ing.- Peer-to-Peer and User-Generated Content: neering; Artificial Intelligence (incl. Robotics) neering; Artificial Intelligence (incl. Robotics) Flash in the Pan or the Arrival of a New Storytelling Paradigm?.- A Survival Analysis of Albums on Rank- Target groups Target groups ing Charts.- Compulsory Licensing vs. Private Nego- Engineers, researchers, and students in fuzziness Engineers, researchers, and students in fuzziness tiations in [..] Type of publication Type of publication Fields of interest Monograph Monograph Media Management; Media Law; Economic Policy; Technology Management Due October 2007 Due October 2007 Target groups 2007. XV, 475 p., 200 illus. (Studies in Fuzziness and Soft Comput- 2007. XVI, 433p.with 177 illus. (Studies in Fuzziness and Soft Professors, researchers, and students of media/com- ing, Band 217) Geb. Computing, Band 218) Geb. munications management, technology, policy, pop- ular culture/current events, intellectual proper- 139,05 € 139,05 € ty/copyright, and economics; professionals ISBN 978-3-540-73181-8 ISBN 978-3-540-73184-9 and consultants in media/communications and relat- ed industries; policymakers and economists special- izing in media, communications, and technology is- sues

Type of publication Collected works

Due March 2008 springer.com/booksellers Computer 127

B. Noche, SimulationsDienstleistungsZentrum GmbH, Dortmund S. O'Neill, University of Dundee, UK 2008. 40 illus. Geb.

41,20 € Missionsorientierte Interactive Media: The Semiotics of ISBN 978-0-387-76449-8 Distributionslogistik Embodied Interaction

Unternehmenspraxis und Simulation

The author discusses the existing theoretical ap- proaches of semiotically informed research in HCI, Die Simulationstechnik in Produktion, Logistik what is useful and the limitations. He proposes a rad- und Verkehr wird immer dann benötigt, wenn ical rethink to this approach through a re-evaluation einfache Überlegungen bei der Planung und of important semiotic concepts and applied semiotic Betriebsführung der Systeme nicht mehr ausre- methods. Using a semiotic model of interaction he ichen. Die Bedeutung der Simulationstechnik nimmt explores this concept through several studies that zu, weil Entscheidungen in Unternehmen unter help to develop his argument. He concludes that this ganzheitlichen Gesichtspunkten stattfinden müssen, semiotics of interaction is more appropriate than die Kundenorientierung (und damit die Reaktion other versions because it focuses on the characteris- auf Kundenwünsche) eine hohe Flexibilität auf tics of interactive media as they are experienced and allen Unternehmensebenen erfordert und alle Un- the way in which users make sense of them rather ternehmensbereiche eng miteinander vernetzt sind than thinking about interface design or usability is- - und der Unternehmenserfolg wesentlich von der sues. Beherrschung dieser Anforderungen abhängt. An- dererseits gibt es nur wenig Hilfestellung bei der An- Features wendung der Simulationstechnologie. Denn an den Offers a different view of interaction from that of Kern der Simulation, also an die Machbarkeit der most HCI experts. Anwendungen, sowie an Kriterien, die die Spreu vom Weizen trennen, führte bisher niemand heran. Contents Section 1.- Introduction.- Medium, Mediation and Features Interactive Media.- Approaching Interaction.- Af- Umfassende Darstellung der Simulationsstechnik fordance: A Case of Confusion.- Section 2.- Semi- aus einem Guss Eine Kombination aus Grundlagen- otic Theory.- Semiotics and Screen Based Interac- buch und Leitfaden Mit zahlreichen Praxisbeispielen tion.- Study 1: Comparing Interactions with Old aus Produktion und Logistik and New Media.- Semiotics and Interactive Environ- ments.- Study 2: Comparing Real and Virtual Envi- Contents ronments.- Section 3.- Being-with-Media.- Embod- Einführung in die Simulationstechnik.- Über den ied Semiotics.- Interactive Media Design.- Conclu- Nutzen der Simulation.- Methodische Vorge- sion.- References hensweise bei Simulationsstudien.- Einsatzschwer- punkt der Simulation.- Anwendungsbeispiele aus der Fields of interest Praxis.- Grundlegende Simulationskonzepte.- Statis- Multimedia Information Systems; User Interfaces tik für die Simulationstechnik.- Vorstellung der Sim- and Human Computer Interaction; Media Design ulationssoftware. Target groups Fields of interest Researchers in Semiotics or HCI Management; Software Engineering/Programming and Operating Systems Type of publication Monograph Target groups Planer von Logistiksystemen, Entscheider im Un- Due June 2008 ternehmen, Unternehmensberater, Anwender von Simulationstechnik 2008. Approx. 250 p. Softcover Type of publication Professional book 64,15 € ISBN 978-1-84800-035-3 Due February 2008

2008. Etwa 250 S. (VDI-Buch) Geb.

69,95 € ISBN 978-3-540-67608-9 128 Computer springer.com/booksellers

G. O'Regan, Cork, Ireland I. Oakley, S. Brewster (Eds.) M.R. Ogiela, AGH University, Krakow, Poland; R. Tadeusiewicz, AGH University, Krakow, Poland A Brief History of Computing Haptic and Audio Interaction Design Modern Computational Intelligence Methods for the Interpretation of Second International Workshop, HAID 2007 Seoul, South Ko- This book provides an introduction into the key top- rea, November 29-30, 2007 Proceedings Medical Images ics in the history of computing in an easy-to-fol- low and concise manner. It covers significant areas and events in the field from the beginnings of com- putation 3000B.C. through to the present day. Fea- This book constitutes the refereed proceedings of the A detailed description of up-to-date methods used tures Offers detailed information on major figures Second International Workshop on Haptic and Au- for computer processing and interpretation of med- in computing, such as Boole, Babbage, Shannon , dio Interaction Design, HAID 2007 held in Seoul, ical images is given. The scope of the book include Turing & Von Neumann Includes a history of South Korea, in November 2007. The 12 revised full images acquisition, storing with compression, pro- programming languages, including syntax & se- papers presented together with 2 invited talks were cessing, analysis, recognition and also its automatic mantics Presents a history of software engineering carefully reviewed and selected for inclusion in the understanding In introduction general overview of Discusses the progress of artificial intelligence, with book. The papers are organized in topical sections on the computer vision methods designed for medical extension to some of the key disciplines in this field, tactile displays, communication and games, accessi- images is presented. Next sources of medical images such as philosophy, psychology, linguistics, neural bility and navigation, as well as design. are presented with their general characteristics. Both networks & cybernetic Examines the history of traditional (like X-ray) and very modern (like PET) the Internet revolution, World Wide Web & Fields of interest sources of medical images are presented. The main Dot Com Bubble Shows the evolution of a number of User Interfaces and Human Computer Interaction; emphasis is placed on such properties of medical im- technology companies such as IBM, Motorola & Information Storage and Retrieval; Information Sys- ages given by particular medical imaging methods Microsoft Focusing on the fundamental areas in the tems Applications (incl.Internet); Computers and which are important form the point of view of its computing field, this clearly written & broad- Society; Computers and Education computer processing, analysis and recognition. The ranging text will catch the attention [..] consecutive parts of the book describe compression Target groups and processing methods, including many methods Features Researchers and professionals developed by authors especially for medical images. Offers a comprehensive account of the history of After parts describing analysis and recognition of Type of publication computing Traces the beginnings of computation medical images come most important part, in which Proceedings 3000 B.C. through to modern times Includes helpful [..] pedagogical elements such as exercises and chapter summaries Does not require studies in computer sci- Due November 2007 Features ence in order to be understood and appreciated Examines the processing, analyzing, classifying, rec- ognizing and automatically interpreting medical im- 2007. XIV, 145 p. Also available online. (Lecture Notes in Comput- Contents er Science, Band 4813) Softcover ages From the Contents: Early Civilisations.- The Babylo- nians.- The Egyptians.- The Greeks.- The Romans.- 44,94 € Contents Foundations.- Boole.- Babbage.- Formalism.- Tur- ISBN 978-3-540-76701-5 Sources of medical images and their general char- ing.- Shannon.- Von Neumann.- Hermann Zuse.- acteristics.- Compressing medical images and stor- Computer Programming Languages.- Object-ori- ing them in medical databases.- Preprocessing med- ented Languages.- Functional Programming Lan- ical images and their overall enhancement.- Algo- guages.- Logic Programming Languages.- Syntax and rithms and methods for the goal-oriented process- Semantics.- Software Engineering.- What is Software ing of medical images.- Pattern recognition, cluster- Engineering?.- Early Software Engineering.- Soft- ing and classification applied to selected medical im- ware Engineering Mathematics.- Formal Methods.- ages.- Automatic understanding of medical images Software Inspections and Testing.- Artificial Intelli- as a new paradigm for advanced computer aiding of gence and Expert Systems.- Descartes.- Philosophy medical investigations.- Image understanding meth- and AI.- [..] ods applied to medical diagnostics.

Fields of interest Fields of interest History of Computing; Popular Science in Mathe- Appl.Mathematics/Computational Methods of Engi- matics/Natural Science/Technology; History of Sci- neering; Artificial Intelligence (incl. Robotics) ence Target groups Target groups Engineers, researchers, and students in computation- Undergraduates, Graduates, General readers al intelligence and medical technology

Type of publication Type of publication Undergraduate textbook Monograph

Due April 2008 Due January 2008

2008. Approx. 250 p. Geb. 2008. Approx. 210 p. (Studies in Computational Intelligence, Band 84) Geb. 24,56 € 106,95 € ISBN 978-1-84800-083-4 ISBN 978-3-540-75399-5 springer.com/booksellers Computer 129

J.A. Onieva, University of Malaga, Spain; J. Lopez, University of L. Orozco-Barbosa, Universidad de Castilla-La Mancha, Spain; T. M. Orshansky, University of Texas at Austin, Austin, TX, USA; S. Malaga, Spain; J. Zhou, Institute for Infocomm Research , Singa- Olivares, Universidad de Castilla-La Mancha, Spain; R. Casado, Nassif, IBM, Austin, TX, USA; D. Boning, MIT, Cambridge, MA, USA pore Universidad de Castilla-La Mancha, Spain; A. Bermúdez, Universi- dad de Castilla-La Mancha, Spain (Eds.) Design for Manufacturability and Secure Multi-Party Non- Statistical Design Repudiation Protocols and Wireless Sensor and Actor Networks Applications IFIP WG 6.8 First International Conference on Wireless Sensor A Constructive Approach and Actor Networks, WSAN'07, Albacete, Spain, September 24-26, 2007 Design for Manufacturability and Statistical Design: Research oriented non-repudiation protocols have A Constructive Approach provides a thorough treat- been active since the beginning of this millennium. ment of the causes of variability, methods for statisti- It is time to take a step forward and realize Features cal data characterization, and techniques for model- that in many applications there are more than two "Most up-to-date research on wireless communica- ing, analysis, and optimization of integrated circuits entities. Secure Multi-Party Non-Repudiation Pro- tions" to improve yield. The objective of the constructive tocols and Applications supports this statement. approach developed in this book is to formulate a This volume provides state of the art Contents consistent set of methods and principles necessary in non-repudiation protocols and gives insight of its Localized Movement Control for Fault Tolerance of for rigorous statistical design and design for manu- applicability to e-commerce applications. This pro- Mobile Robot Network.- An Action Activated and facturability from device physics to large-scale circuit fessional book organizes the existing scant literature Self Powered Wireless Forest Fire Detector.- Mod- optimization. The segments of the book are devoted, regarding non-repudiation protocols with multiple el Checking Wirelss Sensor Network Security Pro- respectively, to understanding the causes of variabil- entities participation. It provides the reader with suf- tocols: TinySec + LEAP.- Eva;luating Energy Con- ity; design of test structures for variability characteri- ficient grounds to understand the non-repudiation sumption of Proactive and Reacitve Routing Proto- zation; statistically rigorous data analysis; techniques property and its applicability to real applications. Se- cols in a MANET.- Wireless Sensor Network Local- of design for manufacturability in lithography and in cure Multi-Party Non-Repudiation Protocols and ization using Hexagonal Intersection.- A Hardware chemical mechanical polishing; statistical simulation, Applications is essential for professional audiences Accelerated Implementation of the IEEE 802.15.3 analysis, and optimization techniques for improving with in-depth knowledge of information security MAC Protocol.- parametric yield. Design for Manufacturability and and a basic knowledge of applied cryptography. This Statistical Design: A Constructive Approach [..] book is also suitable as an advanced-level text or ref- Fields of interest erence book for students in computer science. Computer Systems Organization and Communica- Features tion Networks Unified Treatment of Data Collection, Modeling, Features and Statistical CAD Covers From Fabrication to De- Target groups Security professionals will find this book very useful sign to CAD Deals With the Extraction of Fab Infor- Researchers and practitioners of wireless communi- in the design of secure applications with multiple en- mation into distrubutions for analysis Circuit Struc- cations. tities, helping them to envisage the basics of multi- tures and Techniques to Reduce On-Chip Variabili- party non-repudiation. Useful as an advanced lev- Type of publication ty Using CAD for the Analysis and Optimization of el text book for students or researchers, who wish to Timing and Power understand the non-repudiation service and mech- Proceedings anisms in the presence of an undefined number of Contents players.   Due October 2007 Introduction.- Part I: Sources of Variability.- Front End Variability.- Back End Variability.- Environ- Contents 2007. XIV, 240 p. (IFIP International Federation for Information mental Variability.- Part II: Variability Characteriza- -Preface.- Introduction.- Introduction to E-com- Processing, Band 248) Geb. tion and Analysis.- Test Structures for Variability.- merce.- Multi-party Non-Repudiation Protocols: Statistical Foundations of Data Analysis and Mod- Analysis.- New Design Approaches for MNR.- Mul- 115,56 € eling.- Part III: Design Techniques for Systematic ti-Party Non-Repudiation and Its Applications.- Sce- ISBN 978-0-387-74898-6 Manufacturability Problems.- Lithography Enhance- narios Supported by MNR Services.- Index. ment Techniques.- Ensuring Interconnect Planarity.- Part IV: Statistical Circuit Design.- Statistical Circuit Fields of interest Analysis.- Statistical Static Timing Analysis.- Leakage Systems and Data Security; Computer Communica- Variability and Joint Parametric Yield.- Parametric tion Networks; Data Encryption; Information Sys- Yield [..] tems Applications (incl.Internet); Computer Systems Organization and Communication Networks; Data Fields of interest Structures, Cryptology and Information Theory Circuits and Systems; Computer-Aided Engineering (CAD, CAE) and Design; Electronic and Computer Target groups Engineering Professional; secondary:  textbook Target groups Type of publication Circuit Designers, CAD engineers, researchers, grad- Monograph uate students

Due May 2008 Type of publication Monograph 2008. Approx. 200 p. (Advances in Information Security, Band 38) Geb. Due November 2007

98,87 € ISBN 978-0-387-75629-5 2008. Approx. 336 p. (Series on Integrated Circuits and Systems) Geb.

106,95 € ISBN 978-0-387-30928-6 130 Computer springer.com/booksellers

P. Pandya, California State University, Fullerton, CA, USA

TCP/IP: Vulnerabilities and Solutions

“TCP/IP Vulnerabilities and Solutions” is writ- ten as a practical guide for networking engineers that demonstrates the vulnerabilities in the TCP/ IP protocols and offers hands-on solutions and workarounds for these vulnerabilities. The book be- gins with a discussion of the principles and design of TCP/IP Protocols from the data networks perspec- tive and continues with a detailed look at the vulner- abilities thus introduced in the network design pro- cess and concludes with advanced level experiments that show how these vulnerabilities can be easily ex- ploited and offers practical hands-on solutions.

Features Demonstrates the vulnerabilities of a network using hands-on practical examples Introduces the reader to hacking techniques that are used and how these techniques can be used to exploit the network. Shows how to perform a network penetration and vulnera- bility assessment and repair critical security holes in the network

Contents Introduction: IDS and IPS.- NOS.- Protocols.- IDS Tools- Network Monitoring.- Host and Network IDS.- Network Penetration and Vulnerability Assess- ment.- Signatures.- Honeypots.- Report Logging.- Report Generation and Preparation.- Audit.

Fields of interest Computer Communication Networks; Communica- tions Engineering, Networks; Input/Output and Data Communications

Target groups Libraries, computer engineers, network engineers, computer scientists

Type of publication Professional book

Due August 2008

2008. Approx. 500 p. Geb.

81,59 € ISBN 978-0-387-47328-4 springer.com/booksellers Computer 131

M. Papadopouli, University of North Carolina, Chapel Hill, NC, P.J. Papajorgji, University of Florida, Gainesville, FL, USA; P.M. P.M. Pardalos, University of Florida, Gainesville, FL, USA; V. Yat- USA; H. Schulzrinne, Columbia University, NY, USA Pardalos, University of Florida, Gainesville, FL, USA (Eds.) senko, NASU, Kyiv, Ukraine

Peer-to-Peer Computing for Mobile Advances in Modeling Agricultural Optimization and Control of Networks Systems Bilinear Systems

Information Discovery and Dissemination Theory, Algorithms, and Applications

This book presents an up-to-date review of advances in the mathematical modeling of agricultural sys- Wireless devices are becoming smaller, more us- The purpose of this book is to acquaint the read- tems. It covers a broad spectrum of problems and er-friendly and more pervasive. Peer-to-Peer Com- er with the developments in bilinear systems the- applications based on internet and communications puting for Mobile Networks: Information Discov- ory and its applications. Bilinear systems technology, as well as methodological approaches ery and Dissemination discusses research results on can be used to represent a wide range of physical, based on the integration of different simulation and data dissemination in mobile networks and peer- chemical, biological, and social systems, as well data management tools. Using real-world cases, each to-peer systems for mobile devices. An important as manufacturing processes, which cannot be ef- chapter presents a detailed solution of a problem in a research challenge within this book is to accelerate fectively modeled under the assumption of lin- particular field. This book demonstrates that regard- the data availability and enhance the dissemination earity. This book provides a unified approach for less of the nature of the problem and the application and discovery of information when mobile hosts face the identification and control of nonlinear com- domain, modeling is a central and important activity changes in the availability of bandwidth and loss of plex objects that can be transformed into bi- in the process of developing agricultural systems. Re- connectivity to the Internet. The main focus of this linear systems, with a focus on the control searchers and graduate students in the fields of agri- book is a novel resource-sharing mechanism for mo- of open physical processes functioning in a non- culture and environmental studies will benefit from bile devices, which introduces a new paradigm of in- equilibrium mode.  A wide class of this book. It will also serve as an excellent reference formation-sharing cooperation among mobile de- non-linear control systems can be approximat- for managers, team leaders, developers and model- vices not necessarily connected to the internet. Peer- ed using novel algorithms motivated by bilinear ers of agricultural and environmental systems and to-Peer Computing for Mobile Networks: Informa- models. The goal of this book is to describe researchers in the applied computation field. tion Discovery and Dissemination is designed for re- new methods, heuristics, and optimality criteria searchers and practitioners in industry. The book is Features with less demanding computational also suitable for advanced-level students in computer Presents an up-to-date review of advances in the complexity than exact criteria that re- science and electrical engineering. mathematical modeling of agricultural systems Cov- sult in robust adaptive algorithms. Emphasis is ers a broad spectrum of problems and applications placed on three primary disciplines [..] Features based on internet and communications technology Introduces a resource sharing mechanism, includ- Features Uses methodological approaches based on the inte- ing architecture, set of protocols and implementation Covers developments in bilinear systems the- gration of different simulation and data management that enables mobile devices to share resources to en- ory Focuses on the control of open physical tools Provides detailed solutions of real-world prob- hance data availability and access Presents exciting processes functioning in a non-equilibrium mode lems research challenges on peer-to-peer systems, loca- Emphasis is on three primary disciplines: tion-dependent applications, and mobile computing Contents modern differential geometry, control of dynamical Introduction.- Business Modelling of Networked systems, and optimization theory Includes applica- Contents Supply Chain Systems in Agriculture.- Modelling tions to the fields of quantum and molecular Preface.- Introduction.- System Architecture for In- External Information Needs of Agri-Food Business computing, control of physical processes, biophysics, formation Sharing.- Performance Evaluation of In- Networks.- Rural Development Through Input-Out- [..] formation Dissemination.- Analysis of Data Dissem- put Modelling.- Web Services, a Renewal of Deci- ination.- Evaluating the Spatial Locality in Wireless Contents sion Support Systems in Agricultural?- Modelling Networks.- Network Connection Sharing in Wireless Preface.- Acknowledgments.- Introduction.- Sys- Traceability Information and Data in the Agri-Food LANs.- Future Work.- Index. tem-Theoretical Description of Open Physical Pro- Chain.- The Model Driven Architecture (MDA) Ap- cesses.- Control of Bilinear Systems.- Bilinear Sys- proach: A Framework for Developing Complex Agri- Fields of interest tems and Nonlinear Estimation Theory.- Control of cultural Systems.- An MDA Approach to Crop Simu- Computer Communication Networks; Information Dynamical Processes and Geometrical Structures.- lation Models.- Mechanistic Virtual Modelling: Cou- Systems Applications (incl.Internet); Computer Sys- Superconducting Levitation and Bilinear Systems.- pling a Plant Simulation Model with a Three-Dimen- tems Organization and Communication Networks; Optimization and Control of Quantum-Mechanical sional Simulation [..] Communications Engineering, Networks; Multi- Processes.- Modeling and Global Optimization in media Information Systems; e-business and e-com- Fields of interest Biomolecular Systems.- Modeling and Analysis of Bi- merce Computational Science and Engineering; Simulation linear Systems.- References.- Index. and Modeling; Environmental Computing/Environ- Target groups Fields of interest mental Modelling; Computer Appl. in Life Sciences; Researchers and practitioners in industry Optimization; Systems Theory, Control; Calculus Information Systems; Software Engineering of Variations and Optimal Control; Optimization; Type of publication Vibration, Dynamical Systems, Control; Quantum Monograph Target groups Researchers and modelers of agricultural and envi- Computing, Information and Physics; Automation ronmental systems, software developers in agricul- and Robotics Due December 2007 ture, researchers in applied computation; managers Target groups and team leaders in agriculture. Graduate students, researchers, and specialists en- 2008. Approx. 160 p. 30 illus. Geb. Type of publication gaged in the fields of quantum and molecular com- 69,50 € Contributed volume puting, control of physical processes, biophysics, su- ISBN 978-0-387-24427-3 perconducting magnetism, and physical information science Due May 2008 Type of publication 2008. Approx. 310 p. (Springer Optimization and Its Applications, Monograph Vorläufiger Eintrag 160) Geb. Due March 2008 ISBN 978-0-387-75180-1

2008. XXII, 394 p. 40 illus. (Springer Optimization and Its Applica- tions, Band 11) Geb. 132 Computer springer.com/booksellers

74,15 € C. Parent, University of Lausanne, Switzerland; K.-D. Schewe, A.P. Parkes ISBN 978-0-387-73668-6 Massey University, New Zealand; V.C. Storey, Georgia State Uni- versity, GA, USA; B. Thalheim, University of Kiel, Germany (Eds.) A Concise Introduction to Conceptual Modeling - ER 2007 Languages, Machines and Logic

26th International Conference on Conceptual Modeling, Auck- land, New Zealand, November 5-9, 2007, Proceedings A Concise Introduction to Languages, Machines and Logic provides an accessible introduction to three key topics within computer science: formal lan- This book constitutes the refereed proceedings of the guages, abstract machines and formal logic. Written 26th International Conference on Conceptual Mod- in an easy-to-read, informal style, this textbook as- eling, ER 2007, held in Auckland, New Zealand, in sumes only a basic knowledge of programming on November 2007. The 37 revised full papers present- the part of the reader. The approach is deliberately ed together with 3 keynote lectures were carefully re- non-mathematical, and features: • Clear explanations viewed and selected from 167 submissions. The pa- of formal notation and jargon • Extensive use of ex- pers are organized in topical sections on data ware- amples to illustrate algorithms and proofs • Pictori- housing and data mining, design methodologies and al representations of key concepts • Chapter open- tools, information and database integration, infor- ing overviews providing an introduction and guid- mation modelling concepts and ontologies, integrity ance to each topic • End-of-chapter exercises and so- constraints, logical foundations of conceptual mod- lutions • Offers an intuitive approach to the topics elling, patterns and conceptual meta-modelling, re- This reader-friendly textbook has been written with quirements elicitation, reuse and reengineering, se- undergraduates in mind and will be suitable for use mi-structured data and XML, as well as Web infor- on course covering formal languages, formal logic, mation systems and XML. computability and automata theory. It will also make an excellent supplementary text for courses on algo- Fields of interest rithm complexity and compilers. Database Management; Information Systems Ap- plications (incl.Internet); Mathematical Logic and Features Formal Languages; Artificial Intelligence (incl. The author follows the successful formula of his first Robotics); Models and Principles; Software Engi- book on this subject, this time making the topics neering more accessible and providing an excellent founda- tion for undergraduates Uses an intuitive approach Target groups Contains many pedagogical elements, such as exer- Researchers and professionals cises, solutions and chapter summaries Type of publication Contents Proceedings From the Contents: Languages.- Elements of For- mal Languages.- Phrase Structure Grammars and the Due October 2007 Chomsky Hierarchy.- A Type 0 Grammar: Compu- tation as Symbol Manipulation.- Syntax, Semantics 2008. XVI, 616 p. (Lecture Notes in Computer Science, Band 4801) and Ambiguity.- Derivation Trees.- Parsing.- Reg- Softcover ular Languages and Finite State Recognisers.- Reg- ular Grammars.- Minimal FSRs.- Observations on 77,04 € Regular Grammars and Languages.- Context Free ISBN 978-3-540-75562-3 Languages and Pushdown Recognisers.- Changing G without Changing L(G).- Important Features of Reg- ular and Context Free Languages.- Closure Proper- ties of Languages.- Computation.- A "Computer" for Languages and [..]

Fields of interest Mathematical Logic and Formal Languages; Compu- tation by Abstract Devices; Theory of Computation; Computational Mathematics and Numerical Analy- sis

Target groups Undergraduates  

Type of publication Graduate/advanced undergraduate textbook

Due August 2008

2008. Approx. 305 p. (Undergraduate Topics in Computer Sci- ence) Softcover

28,84 € ISBN 978-1-84800-120-6 springer.com/booksellers Computer 133

A. Paschke, Technical University Dresden, Germany; Y. Biletskiy, M. Paschke, Universität Hamburg M. Pechoucek, Czech Technical University, Praha, Czech Republic; University of New Brunswick, Fredericton, NB, Canada (Eds.) S.G. Thompson, BT, Research and Venturing, Suffolk, UK; H. Voos, Hochschule Ravensburg-Weingarten, Germany (Eds.) Medienrecht Advances in Rule Interchange and Applications Defense Industry Applications of Autonomous Agents and Multi- International Symposium, RuleML 2007, Orlando, Florida, Oc- Das Lehrbuch stellt das Medienrecht umfassend tober 25-26, 2007, Proceedings dar. Medienrecht ist dasjenige Rechtsgebiet, das eine Agent Systems übergreifende Ordnung des Massenkommunka- tionsgeschehens enthält. Es findet sich nicht in einem umfassenden Kodex, sondern ist verstreut In all modern military doctrines the mission effec- This book constitutes the refereed proceedings of über eine Vielzahl von Einzelbestimmungen in ver- tiveness shall be dramatically increased by the robust the International RuleML Symposium on Rule In- schiedenen Regelungsbereichen und Gesetzen und networking of all forces, sharing of information and terchange and Applications, RuleML 2007, held in lässt sich nicht einem der hergebrachten Rechts- distributed intelligent information processing, gen- Orlando, Florida, October 25-26, 2007. The 9 re- gebiete zuordnen. Es umfasst das Presse-, Rund- erating situational awareness and providing decision vised full papers presented together with 2 invited funk- und Filmrecht ebenso wie das Telekommu- support. In addition, these principles also offer an ef- papers, 9 short papers and 3 demo papers were care- nikations- und Multimediarecht. Die zentralen fective way to improve security systems that support fully reviewed and selected from 41 submissions. Regelungen des Medienrechts enthalten sowohl the fight against terrorists and organized crime. In- The papers are organized in topical sections on Busi- behördliche Regulierungs- und Aufsichtsregeln, als telligent Agents are a key technology to realize such ness Process, Policy and IT Service Management and auch solche, bei denen der Staat im Vertrauen auf modern defence and security systems and are there- Modeling, Rule Languages and Interchange Stan- den wirtschaftlichen Wettbewerb den Mediensektor fore increasingly investigated by researchers and dards, Business Rules, Rule Engines and Applica- der Entfaltung privater Initiative mit den Mitteln des practioners in that field. Papers in this book describe tions, RuleML-2007 Challenge, Rules, Reasoning, Privatrechts überlässt. and Ontologies and Reaction Rules and Rule Appli- work in the development of command and control cations. Features systems, military communications systems, informa- Systematische Aufbereitung des Lernstoffs Darstel- tion systems, surveillance systems, autonomous ve- Fields of interest lung der Querbezüge zum Privatrecht, Öffentliches hicles, simulators and HCI. The collection provides Information Systems and Communication Service; Recht, Europarecht und Völkerrecht Fallbeispiele, an overview of the most significant work being per- Data Mining and Knowledge Discovery; Models and Fragen und Lösungen formed by the leading workers in this area. It pro- Principles; Software Engineering; Logics and Mean- vides a single reference point for the state of the art ings of Programs Contents in the field at the moment. Medienrecht als Rechtsdisziplin.- Allgemeine Target groups Grundlagen.- Grundlagen.- Regelungsziele Features Researchers and professionals und Regelungsgrundsätze.- Besonderes Me- Overview of the most significant work being per- dienrecht - dargestellt nach Regelungsbereichen.- formed by the leading workers in this area for the Type of publication Medienmärkte und -wettbewerb.- Gründung und first time Valuable decision support for planners and Proceedings Organisation von Medienunternehmen.- Herstel- strategists Broad nature of the application domain lung und Vertrieb von Medienprodukten.- Zivil- is matched by the diversity of techniques used in the Due October 2007 rechtlicher Rechtsgüterschutz bei Medienrecherchen papers und Medienberichtserstattung.- Schutz von Inter- Contents essen der Allgemeinheit im Massenkommunikation- 2007. XI, 243 p. (Lecture Notes in Computer Science, Band 4824) Nexus: Self-organising Agent-based P2P Middleware Softcover sgeschehen.- Aufsichts- und Ordnungsregeln. for Battlespace Support.- Information-Based Control 48,15 € Fields of interest of Distributed Sensor Networks.- Managing Intelli- ISBN 978-3-540-75974-4 Media Law; Civil Law; Media Design gence Resources Using Semantic Matchmaking and Argumentation.- AGENTFLY: Multi-Agent Tech- Target groups nology Deployment in Free Flight Air Traffic Con- Studenten, Redakteure und Journalisten der Tage- trol.- Controlling Teams of Uninhabited Air Vehi- spresse, Rundfunk- und Fernsehanstalten cles.- Simulating Fighter Pilots.- MAS Combat Sim- ulation.- Using Multiagent Teams to Improve the Type of publication Training of Incident. German textbook Fields of interest Due March 2008 Artificial Intelligence (incl. Robotics); Comput- ers and Society; Information Systems Applica- tions (incl.Internet); Special Purpose and Applica- 2008. Etwa 500 S. (Springer-Lehrbuch) Softcover tion-Based Systems; Computer Appl. in Social and Behavioral Sciences 27,95 € ISBN 978-3-540-49087-6 Target groups Planners, strategists and software professionals working in defence and/or security industries, orga- nizations, ministries and departments, as well as aca- demics and students of computer science

Type of publication Collected works

Due December 2007

2008. Approx. 180 p. (Whitestein Series in Software Agent Tech- nologies and Autonomic Computing) Softcover

37,34 € ISBN 978-3-7643-8570-5 134 Computer springer.com/booksellers

M. Pedridis, Stratum Management Ltd, UK; T. Allen, Nottingham J. Pejas, Szczecin University of Technology, Poland; K. Saeed, Bia- P. Perner, IBal, Leipzig, Germany; O. Salvetti, ISTI-CNR, Pisa, Italy Trent University, Nottingham, UK; M. Petridis, Greenwich Univer- lystok Technical University, Poland (Eds.) (Eds.) sity, London, UK (Eds.) Advances in Information Processing Advances in Mass Data Analysis of Applications and Innovations in and Protection Signals and Images in Medicine, Intelligent Systems XV Biotechnology and Chemistry Proceedings of AI-2007, the Twenty-seventh SGAI Internation- al Conference on Innovative Techniques and Applications of International Conference, MDA 2007, Leipzig, Germany, July This book contains a selection of the best papers giv- 18, 2007, Selected Papers Artificial Intelligence en at the Advanced Computer Systems Conference in October 2006 in Poland. The book is partitioned into four topical areas: The Artificial Intelligence sec- The papers in this volume are the refereed applica- tion includes papers on Humatronics, Fuzzy Logic, This book constitutes the refereed proceedings of the tion papers presented at AI-2007, the Twenty-sev- Robotics, Cell, Genetic and Probabilistic Algorithms, International Conference on Mass Data Analysis of enth SGAI International Conference on Innovative Incomplete Data and Similarity Relations, and Fast Signals and Images in Medicine, Biotechnology and Techniques and Applications of Artificial Intelli- Neural Networks. The Computer Security and Safe- Chemistry, MDA 2007, held in Leipzig, Germany, gence, held in Cambridge in December 2007. The ty section covers a wide range of issues, from Error July 18, 2007. The topics include techniques and de- papers present new and innovative developments in Detection in Block Ciphers to Visual Cryptography velopments of signal and image producing proce- the field, divided into sections on Synthesis and Pre- Methods. The Image Analysis, Graphics and Bio- dures, object matching and object tracking in micro- diction, Scheduling and Search, Diagnosis and Mon- metrics section deals with the extraction of meaning- scopic and video microscopic images, 1D, 2D and 3D itoring, Classification and Design, and Analysis and ful information from images as well as methods for shape analysis, description and feature extraction of Evaluation. This is the fifteenth volume in the Appli- uniquely recognizing humans based upon intrinsic texture, structure and location, image segmentation cations and Innovations series. The series serves as a physical or behavioral traits. The Computer Simula- algorithms, parallelization of image analysis and se- key reference on the use of AI Technology to enable tion and Data Analysis section concerns computer mantic tagging of images from life science applica- organisations to solve complex problems and gain programs that attempt to simulate an abstract mod- tions. significant business benefits. The Technical Stream el of a particular system and transform data with the Fields of interest papers are published as a companion volume under aim of extracting useful information and facilitating Computer Imaging, Vision, Pattern Recognition and the title Research and Development in Intelligent conclusions. Graphics; Image Processing and Computer Vision; Systems XXIV. Features Computational Biology/Bioinformatics; Data Mining Contents Combines the very latest research from both Com- and Knowledge Discovery From the Contents:Best Application Paper: On a puter Science and Industrial Management, focusing Target groups Novel ACO-Estimator and its Application to the on Biometrics and Information Technology Security Researchers and professionals Target Motion Analysis Problem.- Medical Systems: Covers wide range of topics in well-organized topical areas Clinical Practice Guidelines: a Case Study of Com- Type of publication bining OWL-S, OWL, and SWRL.- Explaining Medi- Proceedings cal Model Exceptions in ISOR.- HCI & Natural Contents Language Systems: CALMsystem A Conversational Humatronics and RT-Middleware.- The Grouping Agent for learner Modelling.-Imaging & Sens- of Valuations in Probabilistic Algorithms.- Hybrid Due November 2007 ing Systems: Automated Tool For Diagnosis of Si- Diagnosis Approaches.- Networked Robots Personal nus Analysis CT Scans.- Intensity-Based Image Reg- Tastes Acquisition and Sharing.- Reduction of Rules 2007. X, 176 p. (Lecture Notes in Computer Science, Band 4826) istration Using Multiple Distributed Agents.-Deci- of a Fuzzy Model Response for Fuzzy Inputs.- Multi- Softcover sion Support Systems: Police Forensic Science Per- ple Error Detection in Substitution Blocks for Block formance Indicators [..] Ciphers.- Automatic Parallelization Method of En- 44,94 € cryption Algorithms.- Covert Channel for Improv- ISBN 978-3-540-76299-7 Fields of interest ing VOIP Security.- Cryptanalysis of Chaotic Prod- Artificial Intelligence (incl. Robotics) uct Cipher.- Image Pre-classification for Biometrics Identification Systems.- New Experiments on Word Target groups Recognition Without Segmentation.- Reliability [..] Researchers, Practitioners, Undergraduates/Post- graduates, Academics Fields of interest Coding and Information Theory; Data Structures, Type of publication Cryptology and Information Theory; Systems and Proceedings Data Security

Due January 2008 Target groups Researchers in the fields of computer security and biometrics, as well as information processing and 2008. Approx. 360 p. Softcover operations professionals

127,33 € Type of publication ISBN 978-1-84800-085-8 Proceedings

Due November 2007

2007. XIV, 460 p. Geb.

139,05 € ISBN 978-0-387-73136-0 springer.com/booksellers Computer 135

P. Perner, Institute of Computer Vision and Applied Computer A. Perrig, Carnegie Mellon University, Pittsburgh, PA, USA; K. C. Petrie, Stanford University, Stanford, CA, USA; H. Lausen, Uni- Sciences IBaI, Leipzig, Germany (Ed.) Levitt, University of California, Davis, CA, USA; C. Wang, Army Re- versity of Innsbruck, Austria; M. Zaremba, University of Inns- search Office, Research Triangle Park, NC, USA; R. Poovendran, bruck, Austria; T. Margaria-Steffen, University of Potsdam, Ger- University of Washington, Seattle, WA, USA (Eds.) many (Eds.) Case-Based Reasoning on Images and Signals Securing Wireless Sensor Networks Semantic Web Services Challenge

Results from the First Year

This book is the first edited book that deals with the We need to provide secure sensor network protocols special topic of signals and images within Case-Based of the utmost reliability and resilience to attacks. Se- Service-Oriented Computing is one of the most Reasoning (CBR). Signal-interpreting systems are curity, robustness and accuracy are three systemic promising software engineering trends for future dis- becoming increasingly popular in medical, industri- parameters that must be achieved. Apart from these, tributed systems. Currently there are many different al, ecological, biotechnological and many other ap- due to the resource-constrained nature of the sensor approaches to semantic web service descriptions and plications. Existing statistical and knowledge-based devices, the solutions to be obtained must also be re- many frameworks built around them. Yet a common techniques lack robustness, accuracy and flexibility. source-efficient. Securing Wireless Sensor Networks understanding, evaluation scheme, and test bed to New strategies are needed that can adapt to chang- is based on the 2006 ARO-NSF-Cylab special work- compare and classify these frameworks in terms of ing environmental conditions, signal variation, user shop on WSN (Wireless Sensor Networks) Securi- their abilities and shortcomings, is still missing. Se- needs and process requirements. Introducing CBR ty and Privacy. This edited volume presents and dis- mantic Web Services Challenge is an edited volume strategies into signal-interpreting systems can satisfy cusses fundamental problems and solutions in secur- that develops this common understanding of the var- these requirements. CBR can be used to control the ing wireless sensor networks. Designed for industry ious technologies intended to facilitate the automa- signal-processing process in all phases of a signal-in- practitioners and researchers, Securing Wireless Sen- tion of mediation, choreography and discovery for terpreting system to derive information of the high- sor Networks is also suitable for advanced-level stu- Web Services using semantic annotations. Seman- est possible quality. Beyond this CBR offers different dents in computer science and electrical engineering. learning capabilities, for all phases of a signal-inter- tic Web Services Challenge is designed for a profes- preting system, that satisfy different needs during the Features sional audience composed of practitioners and re- development process of a signal-interpreting system. Presents latest research on securing wireless sensor searchers in industry. Professionals can use this book The structure of the book is divided into a theoretical networks to evaluate SWS technology for their potential prac- part and [..] tical use. The book is also suitable for advanced-level Contents students in computer science. Features Preface.- Data Privacy in Ad hoc Networks .- Paris: First edited book that deals with the special topic of A Framework for Privacy Augmented Relaying of Features signals and images within Case-Based Reasoning Information from Sensors.- Sensor Networking, In- Explores trade-offs among existing approaches Re- (CBR) frastructure Security, and the Issue of Privacy.- WSN veals strengths and weaknesses of proposed ap- Key Management.- ShortPK: A Short-Term Public proaches, as well as which aspects of the problem are Contents Key Scheme for Broadcast Authentication in Sen- not yet covered Introduces software engineering ap- Theory.- Introduction to Case-Based Reasoning.- sor Networks.- WSN Broadcast Authentication.- A proach to evaluating semantic web services Similarity.- Learning Distance Functions for Su- Canonical Framework for Assignment Processes.- Contents pervised Similarity Assessment.- Induction of sim- WSN Architecture.- A New Adaptive Self-healing Introduction.- Service-Oriented Computing.- Se- ilarity measures for case based reasoning through Architecture for Protecting Against and Adapting mantic Web Services.- Semantic Web Challenges.- separable data transformations.- Graph Matching.- to Security Attacks in Wireless Sensor Networks.- Programming the Semantic Web.- Index. Memory Structures and Organization in Case-Based Emergent Properties in Sensor Networks: A Security Reasoning.- Learning a Statistical Model for Perfor- [..] mance Prediction in Case-Based Reasoning.- Appli- Fields of interest Information Systems Applications (incl.Internet); cations.- A CBP agent for monitoring the ocean CO2 Fields of interest Information Systems and Communication Service; exchange rate.- Classification and Identification of Data Encryption; Data Structures, Cryptology and Database Management; e-business and e-commerce; Significant Information in Sensor Signals in Medical Information Theory; Computer Communication Multimedia Information Systems; Software Engi- Applications.- Prototypes and Case-Based [..] Networks; Database Management; Computer Sys- neering tems Organization and Communication Networks Fields of interest Target groups Appl.Mathematics/Computational Methods of Engi- Target groups Industry practitioners, research scientists neering; Multimedia Information Systems; Artificial Professionals Intelligence (incl. Robotics); Computer Imaging, Vi- Type of publication sion, Pattern Recognition and Graphics Type of publication Contributed volume Contributed volume Target groups Due March 2008 Researchers, engineers, graduate students in compu- Due November 2007 tational intelligence, image processing, signal pro- cessing 2008. Approx. 300 p. (Semantic Web and Beyond, Band 8) Geb. 2008. Approx. 300 p. (Advances in Information Security, Band 41) Geb. Type of publication 81,59 € Monograph 81,59 € ISBN 978-0-387-72495-9 ISBN 978-0-387-71038-9 Due October 2007

2008. X, 436 p. 132 illus. (Studies in Computational Intelligence, Band 73) Geb.

139,05 € ISBN 978-3-540-73178-8 136 Computer springer.com/booksellers

M. Pollefeys, University of North Carolina - Chapel Hill, Chapel G. Pour, San Jose State University, CA, USA; K. Corker, San Jose B. Prasad, Florida A & M University, Tallahassee, FL, USA; S.R.M. Hill, NC, USA; D. Nister, University of Kentucky, Lexington, KY, State University, CA, USA Prasanna, Indian Institute of Technolgy, Guwahati, India (Eds.) USA Pervasive Network Speech, Audio, Image and 3-D Modeling from Images Communications Biomedical Signal Processing using

Towards a Human-Centric Communications and Computing Neural Networks World The book explains how 3-D models can be obtained from images acquired with a hand-held camera and describes the different components required to build Humans are remarkable in processing speech, audio, an automatic system for this purpose. The approach Pervasive computing (a.k.a. human-centric comput- image and some biomedical signals. Artificial neu- is based on advanced automatic techniques that ing) is emerging as the next-generation computing. ral networks are proved to be successful in perform- avoid camera calibration and a-priori scene knowl- Today’s distributed and mobile computing’s goal ing several cognitive, industrial and scientific tasks. edge. Examples are presented from architecture, ar- of anytime, anywhere connectivity will be extended This peer reviewed book presents some recent ad- chaeology, and planetary exploration. Basic knowl- to the pervasive network computing’s goal of all the vances and surveys on the applications of artificial edge of 3-D computer graphics and geometry and time, everywhere connectivity. It envisions comput- neural networks in the areas of speech, audio, image some knowledge of 3-D modeling from images are ing environments focusing on humans rather than and biomedical signal processing. It consists of 18 desirable. Topics: *automatic feature matching *in- machines. Highlights include: - Key concepts and chapters prepared by some reputed researchers and terest-point extraction and matching *projective re- fundamentals of pervasive software for human-cen- practitioners around the globe. construction, self-calibration *dense matching *3-D tric computing and its multi-disciplinary nature - modeling Application of the theoretical concepts to real-world Features situations to develop pervasive software solutions - Presents advances and surveys on the applications Contents Examples in a variety of application domains - Tech- of artificial neural networks in the areas of speech, * Introduction * Projective geometry * Camera-mod- nical and non-technical challenges, issues, standards, audio, image, and biomedical signal processing el and multiple-viewgeometry * Relating images and state-of-the-art software technologies This book * Structure and motion * Self-calibration *Dense- is suitable for self-study by software and IT profes- Contents depth estimation * Modeling * Results sionals, particularly software engineering practition- From the contents Information Theoretic Feature ers and researchers, software architects and design- Selection and Projection .- Recognition of Tones in Fields of interest er, interface designers and evaluators, and IT appli- Yoruba Speech: Experiments with Artificial Neural Computer Graphics; Image Processing and Comput- cation engineers and managers who are [..] Networks.- Emotion Recognition from Speech using er Vision; Pattern Recognition Multi-Classifier Systems and RBF-Ensembles.- Mod- Features eling Supra-segmental Features of Syllables using Target groups Comprehensive coverage of pervasive computing In- Neural Networks.- Objective Speech Quality Eval- Practitioners Researchers Professionals cludes mobile computing and software engineering uation Using an Adaptive Neuro-Fuzzy Network.- Integrates aspects of HCI into pervasive computing A Novel Approach to Language Identification Us- Type of publication ing Modified Polynomial Networks.- Speech/Non- Manual Contents speech Classification in Hearing Aids Driven by Tai- Introducing Pervasive Computing.- Multi-Disci- lored Neural Networks.- Audio Signal Processing.- Due January 2009 plinary Nature of Pervasive Computing.- Introduc- [..] ing Pervasive Software.- Context-Awareness.- Loca- Fields of interest 2009. Approx. 330 pp. 75 illus. With CD-ROM. Geb. tion-Awareness.- Seamless Mobility.- Software Agent Components.- Human Performance Interfaces.- In- Appl.Mathematics/Computational Methods of Engi- ISBN 978-0-387-95356-4 tegration Processes.- Wearable.- Pervasive Software neering; Artificial Intelligence (incl. Robotics) Design.- Pervasive Software Architecture.- Pervasive Software Technologies and Standards.- The Road Target groups Ahead.- Appendix A Glossary.- Appendix B Applica- Engineers, researchers and graduate students in tion Domains of Pervasive Computing.- Appendix C computer science, computer engineering, and signal Main Research Themes and Projects.- Appendix D processing References. Type of publication Fields of interest Monograph Software Engineering; Communications Engineer- ing, Networks; User Interfaces and Human Com- Due January 2008 puter Interaction; Information Systems Applications (incl.Internet); Computer Applications 2008. Approx. 420 p. (Studies in Computational Intelligence, Band 83) Geb. Target groups Software and IT professionals, graduate students tak- 139,05 € ing courses in software engineering for pervasive hu- ISBN 978-3-540-75397-1 man-centric computing, software architecture for pervasive computing, human-computer interaction, and human factors engineering

Type of publication Monograph

Due February 2009

2006. Approx. 400 p. Geb.

71,64 € ISBN 978-0-387-25480-7 springer.com/booksellers Computer 137

M. Prokopenko, CSIRO, Commonwealth Scientific & Industrial S. Pupolin, University of Padova, Italy (Ed.) Z. Qin, Tsinghua University, Beijing, China Research Organisation, North Ryde, NSW, Australia (Ed.) Wireless Communications Introduction to E-commerce Advances in Applied Self- organizing Systems 2007 CNIT Thyrrenian Symposium Part of the new series Tsinghua University Texts, this book gives a brief introduction to the founda- Wireless Communications: 2007 CNIT Thyrrheni- tions and key aspects of e-commerce, and Self-organization is a multi-faceted phenomenon, an Symposium compiles the papers presented at the focuses on the latest developments in the present in many fields, operating at multiple scales, 2007 Thyrrenian International Workshop on Dig- e-commerce industry. Practical case studies of- and performs diverse roles. This book focuses on the ital Communication held in Italy in September of fer a useful reference for dealing with various is- state of the practice of self-organizing systems. The 2007. The papers represent the new aspects of wire- sues in e-commerce. Content will be in- case studies described illustrate the richness of the less communication systems that approach the chal- troduced from theory to application, and topic, and also provide guidance to the intricate ar- lenge of moving towards multimedia communica- from technology to management. Dr. Zheng eas. The book begins with more established fields tions and IP technology. The various aspects covered Qin is currently Director of the of traffic management, electricity trading markets, are: Creating a secure wireless network for IP Ensur- E-Commerce Institute of Xi’an Jiao- and structural health monitoring, building up to- ing Quality of Service (QoS) for the heterogeneous tong University. He received his PhD wards robotic teams, solving challenging tasks and wireless networks Collecting data for several applica- from Northwestern Polytechnical University. deployed in tough environments. The second half tions with one network The book is organized into of the book follows with a deeper look into the mi- five sessions that cover different topics. The five ses- Features cro-level, and considers interactions between agents. sions are "4G Wireless Systems", "Ad-Hoc and Cel- Offers practical case studies for reference Deals with These interactions lead towards self-organizing di- lular Networks", "Security and Applications in Wire- technology as well as management Focuses on agnostics and visualization, reaction-diffusion com- less Networks", "QoS and Efficiency in Multimedia the latest developments in e-commerce putation, self-assembly of nano-structures, and even- Heterogeneous Wireless Networks", and "Wireless tually to artificial life. Demonstrating the practical Sensor Networks". Wireless Communications: 2007 Contents relevance and applicability of self-organization, this CNIT Thyrrhenian Symposium is an up-to-date crit- Chapter 1 Basics of E-commerce.- Chapter 2 Strate- book will be of interest to advanced students and re- ical analysis of the state-of-the-art in each of the five gies of E-commerce.- Chapter 3 Supporting Tech- searchers in a wide range of fields. areas [..] niques of E-commerce.- Chapter 4 Payment Tech- niques of E-commerce.- Chapter 5 Security Tech- Features Features niques of E-commerce.- Chapter 6 E-commerce and Focuses on the state of the practice of self-organiz- Focuses on the importance and development of wire- Laws.- Chapter 7 E-commerce and Taxation.- Chap- ing systems Considers several novel applications, less communications ter 8 On-line Enterprise Management.- Chapter 9 extending the range of applicability of self-organiz- Architecture and System Design of E-commerce.- ing systems Practical case studies examine successful Contents Chapter 10 Gateway Website Design.- Chapter 11 applications of self-organization, identify essential Session 1 - 4G Wireless Systems.- Spatial Detec- Computer System Integration and E-commerce.- causes for the successes, and propose guiding princi- tion and Multistage Decoding for LST-MLC MIMO Chapter 12 E-commerce and International Trade.- ples for future developments Systems.- Iterative (turbo) Joint Rate and Data De- Chapter 13 Network Psychology.- Chapter 14 Case tection in Coded CDMA Networks.- Hybrid ARQ Study of E-commerce.- Contents Based on Rateless Coding for UTRAN LTE Wireless Part I: Introduction.- Design versus Self-organiza- Systems.- On the Performance of Transmit Antenna Fields of interest tion.- Foundations and Formalizations of Self-Or- Selection with OSTBC in Ricean MIMO Channels.- e-business and e-commerce; Technology Manage- ganization.- Part II: Distributed Management and A Packet Detection Algorithm for the UWB Stan- ment; Information Systems Control.- Self-organizing Traffic Lights: A Realis- dard ECMA 368.- Low-Rate Predictive Feedback for tic Simulation.- A Self-organizing Sensing System the OFDM MIMO Broadcasting Channel.- Session 2 Target groups for Structural Health Monitoring of Aerospace Ve- - Ad-Hoc and Cellular Networks.- Interferer Nulling Graduate and advanced un- hicles.- Decentralized Decision Making for Mul- Based on Neighborhood Communication Patterns.- dergraduate students in ti-Agent Systems.- Learning Mutation Strategies for On the Beneficial [..] business, information technology man- Evolution and Adaptation of a Simulated Snakebot.- agement, and computer science. Self-Organization as Phase Transition in Decentral- Fields of interest ized Groups of Robots.- Distributed Control of Mi- Communications Engineering, Networks; Computer Type of publication croscopic Robots in Biomedical Applications.- Part Communication Networks; Signal,Image and Speech Monograph [..] Processing; Electronics and Microelectronics, Instru- mentation Fields of interest Due March 2008 Artificial Intelligence (incl. Robotics); Pattern Recog- Target groups nition; Simulation and Modeling; Theory of Compu- Libraries and researchers in Wireless Communica- No sales rights in Mainland China tation; Computer Systems Organization and Com- tions munication Networks; Coding and Information The- Jointly published with Tsinghua University Press ory Type of publication Proceedings Target groups 2008. Approx. 180 p. (Tsinghua University Texts) Geb. Researchers, advanced students Due December 2007 128,35 € Type of publication ISBN 978-3-540-49644-1 Contributed volume 2008. Approx. 550 p. (Signals and Communication Technology) Geb.

Due November 2007 123,00 € ISBN 978-0-387-73824-6 2008. Approx. 400 p. (Advanced Information and Knowledge Processing) Geb.

90,90 € ISBN 978-1-84628-981-1 138 Computer springer.com/booksellers

Z. Qin, Tsinghua University, Beijing, China; J.-K. Xing, Tsinghua M. Rabe, Fraunhofer IPK, Berlin; S. Spieckermann, SimPlan AG, V. Raja, University of Warwick, Coventry, UK; K.J. Fernandes, Uni- University, Beijing, China; X. Zheng, Tsinghua University, Beijing, Maintal; S. Wenzel, Universität Kassel versity of York, UK (Eds.) China Verifikation und Validierung für Reverse Engineering Software Architecture die Simulation in Produktion und An Industrial Perspective Logistik

Part of the new series, Advanced Topics in Science Vorgehensmodelle und Techniken and Technology in China, this book aims to intro- This edited collection of essays from world-leading duce the theoretical foundations, various sub-fields, academic and industrial authors yields insight into current research, and practical methods of software all aspects of reverse engineering: The methods of re- Ablaufsimulation ist eine mächtige und bedeu- architecture. Readers can acquire basic knowledge of verse engineering analysis are covered, with special tende Analysemethode, die vor dem Hinter- software architecture, including why software archi- emphasis on the investigation of surface and inter- grund zunehmender Vernetzung von Systemen tecture is necessary, how we can describe a system’s nal structures.- Frequently-used hardware and soft- und steigender Komplexität der Abläufe hohe architecture with formal language, what architecture ware are assessed and advice given on the most suit- Kosteneinsparungspotentiale bietet. Bei nicht styles are popular in practice, and how we can apply able choice of system.- Rapid prototyping is intro- fachgerechter Anwendung birgt die Methode allerd- software architecture to the development of systems. duced and its relationship with successful reverse en- ings erhebliche Risiken. Nur mit Verifikation und Case studies, data, illustrations, and other materials gineering is discussed.- Importantly, legal matters Validierung (V and V) zur Prüfung der Gültigkeit released within the past 5 years will be used to show surrounding reverse engineering are addressed as are von Simulationsmodellen lassen sich aussagekräftige the latest developments in software architecture. Dr. other barriers to the adoption of these techniques. und belastbare Ergebnisse erzielen. Die in diesem Qin Zheng is doctoral mentor of the computer sci- Applications of reverse engineering in automotive, Zusammenhang bestehenden Defizite werden mit ence and technology departments at Tsinghua and aerospace, and medical engineering are reported in dem von der ASIM-Fachgruppe "Simulation in Pro- Xi’an Jiaotong Universities. He has been Associate depth. Reverse Engineering is a "must have" title for duktion und Logistik" veröffentlichten Vorgehens- Dean of the School of Software, Tsinghua Universi- anyone working with advanced modern manufactur- modell für V and V aufgegriffen. Neben einer sys- ty, and Chair of the Institute of E-commerce, Xi’an ing technologies, either with a view to researching tematischen Aufbereitung von Methoden und Tech- Jiaotong University. He has been a visiting scholar at and improving them further or to making their com- niken bietet das Buch Handlungshilfen, die an die several universities in [..] pany leaner and more agile in a competitive manu- jeweilige Aufgabenstellung angepasst und projektbe- facturing marketplace. Features gleitend eingesetzt werden können. Das Buch wendet Comprehensively describes and discusses topics of sich an Leser in der Industrie, die Simulationsstudi- Features software architecture Introduces the latest develop- en durchführen oder durchführen lassen, sowie an Offers the manufacturing engineer expert guidance ments in software architecture using the newest sup- Lehrende und Lernende im Bereich Simulation in on how to use reverse engineering to best compet- plementary materials Concentrates on both theory Produktion und [..] itive advantage Gives the student and researcher and practice a complete review of the state of the art in reverse Features engineering Covers the important legal questions Contents Handlungsanleitung zur Durchführung und Va- raised by the process of deconstructing already-man- 1: What is software architecture.- 2: Basic software lidierung von Simulationsprojekten Simulation, ufactured objects architecture concepts.- 3: Common architectural Modell und Ergebnis werden hinsichtlich der styles.- 4: Study case: applications of architectural Modellgültigkeit überprüfbar Contents styles in J2EE.- 5: Formal description and methods.- Introduction to Reverse Engineering.- Methodolo- Contents 6: Design principles with software architecture.- 7: gies and Techniques for Reverse Engineering: The Bedeutung von Verifikation und Validierung (V and Software architecture in practice.- 8: Software archi- Potential for Automation with 3D Laser Scanners.- V) für die Simulation.- Bestehende Vorgehensmod- tectural IDE.- 9: Conclusion and expectation. Reverse Engineering: Hardware and Software.- Se- elle.- Vorgehensmodell für V and V zur Simulation lecting a Reverse Engineering System.- Introduction Fields of interest in Produktion und Logistik.- Techniken zur V and to Rapid Prototyping.- Relationship between Reverse Software Engineering V - Zusammenfassung.- Literatur.- Handlungsleit- Engineering and Rapid Prototyping.- Reverse Engi- faden. neering Applications in the Automotive Industry.- Target groups Reverse Engineering Applications in the Aerospace Students, and professionals in software engineering Fields of interest Industry.- Reverse Engineering Applications in the and software architecture Simulation and Modeling; Engineering Economics, Medical Industry.- Legal Aspects of Reverse Engi- Organization, Logistics, Marketing; Engineering De- neering.- Barriers to Adopting Reverse Engineering. Type of publication sign; Industrial and Production Engineering Monograph Fields of interest Target groups Manufacturing, Machines, Tools; Computer-Aid- Leser in der Industrie, produzierende Unternehmen Due November 2007 ed Engineering (CAD, CAE) and Design; Engineer- sowie Dienstleister im Umfeld, Fabrikplanung, Lo- ing Design; Automotive and Aerospace Engineering; gistikplanung, Simulation, Leser in Wissenschaft und Biomedical Engineering; Industrial and Production Distribution rights in China: Zhejiang University Press Forschung, Ingenieurwissenschaften, Studierende in Engineering den Ingenieurwissenschaften Jointly published with Zhejiang University Press Target groups Type of publication Researchers in manufacturing interested in reverse Professional book engineering and rapid prototyping; industry-based 2008. Approx. 400 p. (Advanced Topics in Science and Technolo- gy in China ) Geb. practitioners working in computer-aided design and Due December 2007 manufacture or in the automotive, aerospace and 139,05 € medical engineering industries ISBN 978-3-540-74342-2 2008. Etwa 200 S. (VDI-Buch) Softcover Type of publication 69,95 € Contributed volume ISBN 978-3-540-35281-5 Due December 2007

2008. Approx. 230 p. 135 illus. (Springer Series in Advanced Man- ufacturing) Geb.

106,95 € springer.com/booksellers Computer 139

ISBN 978-1-84628-855-5 A.R. Rao, Purdue University, West Lafayette, IN, USA; V.V. Srinivas, C.R. Rao, Pennsylvania State University, University Park, PA, USA; Indian Institute of Science, Bangalore, India H. Toutenburg, University of Munich, Germany; Shalabh, Univer- sity of Munich, Germany; C. Heumann Regionalization of Watersheds Linear Models and Generalizations An Approach Based on Cluster Analysis Least Squares and Alternatives

Design of water control structures; reservoir man- agement, economic evaluation of flood protection This book provides an up-to-date account of the the- projects, land use planning and management, flood ory and applications of linear models. It can be used insurance assessment, and other projects rely on as a text for courses in statistics at the graduate level knowledge of magnitude and frequency of floods. as well as an accompanying text for other courses in Often, estimation of floods is not easy because of lack which linear models play a part. The authors present of flood records at the target sites. Regional flood fre- a unified theory of inference from linear models and quency analysis (RFFA) alleviates this problem by its generalizations with minimal assumptions, not utilizing flood records pooled from other watersheds, only through least squares theory, but also using al- which are similar to the watershed of the target site ternative methods of estimation and testing based in flood characteristics. Clustering techniques are on convex loss functions and general estimating used to identify group(s) of watersheds which have equations. Some of the highlights include: sensitivity similar flood characteristics. This book is a compre- analysis and model selection, analysis of incomplete hensive reference on how to use these techniques data, analysis of categorical data based on a unified for RFFA and is the first of its kind. It provides a de- presentation of generalized linear models including tailed account of several recently developed cluster- GEE- and full likelihood methods for correlated re- ing techniques, including those based on fuzzy set sponse, an extensive appendix on matrix theory, use- theory and artificial neural networks. It also docu- ful to researchers in econometrics, engineering and ments research findings on application of clustering optimization theory. For this third edition the text techniques to RFFA that remain [..] has been extensively revised and contains the latest developments in [..] Features The only book on this topic Summarizes and illus- Features trates the research in this topic Brings out the bene- Essential text for graduate statistics courses and fits of regionalization Delineates the problems which courses where linear models play a part Presents ad- need to be addressed in this research topic vanced research results and gives an overview of gen- eralizations New edition has been extensivley revised Contents and contains the latest results in the area From the contents I. Introduction.- II. Regionaliza- tion by Hybrid Cluster Analysis.- III. Regionalization Contents by Fuzzy Cluster Analysis.- IV. Regionalization by 1. Introduction.- 2. The Simple Linear Regression Using Artificial Neural Networks (ANN).- V. Effect Model.- 3. The Multiple Linear Regression Model.- of Regionalization on Flood Frequency Analysis.- VI. 4. The Generalized Linear Regression Model.- 5. Ex- Concluding Remarks. act and Stochastic Linear Restrictions.- 6. Prediction Problems in the Generalized Regression Model.- 7. Fields of interest Sensitivity Analysis.- 8. Analysis of Incomplete Data Hydrogeology; Statistics for Engineering, Physics, Sets.- 9. Robust Regression.- 10. Models for Categor- Computer Science, Chemistry & Geosciences; Civ- ical Response Variables.- Fitting Smooth Functions.- il Engineering; Pattern Recognition; Landscape/Re- Appendix A: Matrix Algebra. gional and Municipal Planning Fields of interest Target groups Statistical Theory and Methods; Game Theo- Researchers in stochastic hydrology; practitioners in ry/Mathematical Methods; Probability Theory and hydrology; graduate students Stochastic Processes; Probability and Statistics in Computer Science; Operation Research/Decision Type of publication Theory Monograph Target groups Due April 2008 Researchers, graduate students Type of publication 2008. Approx. 235 p. 40 illus. (Water Science and Technology Li- Graduate/advanced undergraduate textbook brary, Band 58) Geb.

106,95 € Due October 2007 ISBN 978-1-4020-6851-5 2008. XIX, 570 p. 26 illus. (Springer Series in Statistics) Geb.

96,25 € ISBN 978-3-540-74226-5 140 Computer springer.com/booksellers

N.K. Ratha, IBM Thomas J. Watson Research Center, Hawthorne, Th. Rauber, Universität Bayreuth; G. Rünger, Technische A. Rausch, Universität Kaiserslautern; R. Höhn, Wien; M. Broy, TU NY, USA; V. Govindaraju, University of Buffalo, NY, USA (Eds.) Universität Chemnitz München; K. Bergner, München; S. Höppner, Berlin

Advances in Biometrics Multicore: Parallele Das V-Modell XT

Sensors, Algorithms and Systems Programmierung Grundlagen, Methodik und Anwendungen

Biometrics technology continues to stride forward Multicore-Prozessoren mit zwei oder mehreren Das V-Modell XT ist ein umfassendes Prozessmod- with its wider acceptance and its perceived need in Prozessorkernen bieten eine immense Erhöhung der ell für die Planung und Durchführung der Systemen- various new security facets of modern society. Bio- potentiellen Leistungsfähigkeit von Computern aller twicklung in IT-Projekten. Es ist seit Februar 2005 metrics is being required to meet the growing chal- Bereiche, vom PC bis hin zum Hochleistungsrechn- für alle IT-Projekte der deutschen Bundesbehörden lenges of identity management. While biometrics er. Zur Ausnutzung dieser Leistungsfähigkeit für eine verbindlich und liegt seit Juni 2006 in der wesentlich finds use in all diverse applications, the research tatsächlich schnellere Programmbearbeitung sind je- erweiterten Version 1.3 vor.Das Buch führt an die challenges continue to grow as the user community doch spezielle Programme und Programmiertech- etablierte Fachsprache anbindend in alle Konzepte expects a fully automatic system to cover the whole niken erforderlich, die mehrere Berechnungen in des V-Modell XT und deren Begrifflichkeit ein und universal population with almost no errors. Recent Form von Threads zur gleichzeitigen Abarbeitung ist Mediator zwischen der Lehre des System Engi- advances in biometrics include new developments in auf den Kernen des Prozessors bereitstellen. Dieses neering, dem V-Modell-XT-Katalog und der An- sensors, modalities and algorithms. As new sensors Buch führt in alle Aspekte der Programmierung von wendungspraxis. Es dient als Begleiter für die Kon- are designed, newer challenges emerge in the algo- Multicore-Prozessoren ein, die den Software-En- figuration von V-Modell XT-basierten Projekten rithms for accurate recognition. New modalities have twickler befähigen, parallele Programme mit Soft- wie auch als Ratgeber für die organisatorische Im- been discovered in addition to the fusion of existing ware-Threads zur schnellen Ausführung auf Mul- plementierung im Unternehmen. Mit dem V-Mod- modalities to improve accuracy and wider coverage. ticore-Prozessoren zu erstellen. Vorgestellt wer- ell XT wurden völlig neue Konzepte geschaffen und Written for researchers, advanced students and prac- den parallele Programmiermodelle, Konzepte der ein größeres Leistungspektrum einbezogen, um die titioners to use as a handbook, this volume captures Thread-Programmierung, die Programmierumge- verschiedenen IT-Projekttypen genauer und flex- the very latest state-of-the-art research contributions bungen Pthreads, Java-Threads und OpenMP sowie ibler fokussieren zu können. Das Buch ist gleich- from leading international researchers in the field. Sprachkonstrukte und neuere Programmieransätze sam als Grundlage für Vorlesungen geeignet, wie zur Programmierung von Multicore-Prozessoren. auch für die autodidaktische Erschließung durch den Features fachkundigen Leser.   Contributions from set of renowned active interna- Features tional researchers Selection of topics has been based Zum ersten Mal in einer umfassenden Übersicht: Features on the novelty and advances made in these areas, das zukunftsweisende Top-Thema des Software Erstes Buch zum V-Modell XT Basiert auf der Ver- capturing the key developments Engineering Optimale Nutzung der parallelen sion 1.2 Programmierung Alle Aspekte zur Program- Contents mierung von Multicore-Prozessoren Plus: neuere Contents From the contents Multispectral Fingerprint Image Programmieransätze Ausgangssituation.- Einführung in das V-Modell Acquisition.- Touchless fingerprinting Technology.- XT.- Komponenten und Konzepte des V-Modell Ultrasonic Sensors for Capturing Livescan of Finger- Contents XT.- Implementierung des V-Modells in eine Organ- print Biometrics.- Palm Vein Authentication.- Finger Kurzüberblick Multicore-Prozes- isation.- Multiprojektmanagement mit dem V-Mod- Vein Authentication Technology and financial Ap- soren.- Konzepte paralleler Programmierung.- ell XT.- Einsatz des V-Modells im Unternehmen.- plications.- Iris Recognition in Less Constrained En- Thread-Programmierung.- Programmierung mit Angrenzende Standards und Process Improvement.- vironments.- Ocular Biometrics: Simultaneous Cap- Pthreads.- Java-Threads.- OpenMP.- Anwendungen und weitere SE-Vorgehensmodelle.- ture and Analysis of the Retina and iris.- Voice-based  Weitere Ansätze. Toolunterstützung des V-Modell-Einsatzes.- Aus- Speaker Recognition Combining Acoustic and Stylis- blick.- Literatur.- Sachwortregister. tic Features.- Function-based On-line Signature Ver- Fields of interest ification.- Writer Identification and Verification.- Programming Techniques Fields of interest Improved Iris Recognition Using [..] Software Engineering; Programming Languages, Target groups Compilers, Interpreters Fields of interest Studierende, Wissenschaftler, Praktiker der Infor- Biometrics; Pattern Recognition; Image Processing matik Target groups and Computer Vision; Multimedia Information Sys- Studierende (BA/MA), Projektleiter und Mitarbeiter Type of publication tems im IT-Projektmanagement, IT-Servicepersonal, IT- German textbook Consulting und IT-Controlling Target groups Researchers, practitioners, advanced students Due October 2007 Type of publication German textbook Type of publication 2008. VIII, 164 S. (Informatik im Fokus) Softcover Contributed volume Due March 2008 14,95 € Due November 2007 ISBN 978-3-540-73113-9 2007. XII, 500 S. (eXamen.press) Geb.

2008. Approx. 500 p. Geb. 39,95 € ISBN 978-3-540-30249-0 67,36 € ISBN 978-1-84628-920-0 springer.com/booksellers Computer 141

F. Redmill, London, UK; T. Anderson, University of Newcastle up- U. Reimers, Technische Universität Braunschweig on Tyne, UK (Eds.) DVB - Digitale Fernsehtechnik Proceeding of the Sixteenth Safety- critical Systems Symposium, Datenkompression und Übertragung February 2008 DVB - Digitale Fernsehtechnik dokumentiert das technische Rüstzeug des Digitalen Fernsehens. This book contains the invited papers presented at Ulrich Reimers - Entwicklungsleiter des Indus- the Sixteenth annual Safety-critical Systems Sympo- trie-geführten, internationalen DVB-Projekts - und sium, held in February 2008 in the UK. This volume sein Autorenteam beschreiben die Technologien des presents a broad spectrum of major safety issues and Digitalen Fernsehens aus der Perspektive derjeni- the papers included cover a broad spectrum of issues gen, die deren Entwicklung und Standardisierung affecting safety and bring together topics that are of vorangetrieben haben. Diese 3. Auflage baut auf den the utmost importance in current safety thinking. Vorauflagen aus den 90er Jahren auf, die schon die Papers provide a combination of extensive industrial Audio- und Videoübertragungstechniken für das experience and academic research. The state-of-the- Digitale Fernsehen einschließlich der zugehörigen art contributions will appeal to practitioners and re- Kanalcodierung sowie die digitale Modulation für searchers alike, as well as to postgraduates. die einzelnen Anwendungen, JPEG- und MPEG- Standards, die Systemebene und die Multiplexbil- Features dung sowie die Messtechnik behandelten. In dieser Proceedings of SSS 2008 Auflage neu sind die Kapitel über Datenrundfunk, die Standards für Interaktive Dienste und die Mul- Fields of interest timedia Home Platform (MHP). Umfassendere Ak- Software Engineering; System Performance and tualisierungen wurden in der Einführung sowie den Evaluation Kapiteln über MPEG-2-Systeme/Multiplexing und DBV-T vorgenommen. Target groups Managers in industry, Researchers, Postgraduate stu- Features dents Fachlich fundierte Informationen Die Entwick- lungen und Ergebnisse der "Moving Pictures Ex- Type of publication perts Group" (MPEG) auf dem Gebiet der Quellen- Proceedings codierung von Audio- und Videosignalen werden beschrieben Die Kombination der von diesen beiden Due March 2008 Gruppierungen erarbeiteten technischen Lösungen führt zu den als "digitales Fernsehen" bezeichneten 2008. Approx. 270 p. Softcover Gesamtsystemen

85,55 € Contents ISBN 978-1-84800-099-5 Digitales Fernsehen - ein erster Überblick.- Digi- talisierung und Signaldarstellung von Audio- und Videosignalen.- Quellencodierung von Audiosig- nalen nach MPEG.- Quellencodierung für Videosig- nale nach JPEG und MPEG.- Systemebene und Multiplexbildung nach MPEG-2.- Verfahren der Vorwärts-Fehlerkorrektur (FEC) bei der Übertra- gung von digitalem Fernsehen.- Digitale Modula- tionsverfahren.- Conditional Access für das Digi- tale Fernsehen.- Der Satellitenstandard und seine Decodertechnik.- Der Kabelstandard und seine Decodertechnik.- Der Standard zur terrestrischen Ausstrahlung und seine [..]

Fields of interest Communications Engineering, Networks; Coding and Information Theory; Signal,Image and Speech Processing

Target groups Ingenieure in der Kommunikationstechnik, Her- steller und Anwender von Übertragungsgeräten

Type of publication Professional book

Due December 2007

2007. XII, 350 S. 200 Abb. Geb.

59,95 € ISBN 978-3-540-43490-0 springer.com/booksellers Computer 142

G. Rempala, University of Louisville, KY, USA; J. Wesolowski, Po- M. Resch, University of Stuttgart, Germany; S. Roller, Universi- B. Reuse, Bad Honnef; R. Vollmar, Universität Karlsruhe (Eds.) litechnika Warszawska, Waarszawa, Poland ty of Stuttgart, Germany; P. Lammers, University of Stuttgart, Germany; T. Furui, NEC Corporation, Tokyo, Japan; M. Galle, NEC High Performance Europe GmbH, Düsseldorf, Germany; W. Bez, Informatikforschung in Symmetric Functionals on Random NEC High Performance Europe GmbH, Düsseldorf, Germany Deutschland Matrices and Random Matching (Eds.) Problems High Performance Computing on Es wird über die Schwerpunkte der Informatik- Vector Systems 2007 forschung in Deutschland im Zeitraum vom "Er- This book presents the current state of the art of the sten DV-Programm" bis zum Förderprogramm mathematical theory of symmetric functionals on "IT-Forschung 2006" berichtet. Dabei werden vi- random matrices with emphasis on its connection The book presents the state-of-the-art in high perfor- er thematisch abgrenzbare Forschungsphasen with the statistical non-parametric estimation theory. mance computing and simulation on modern super- eingeteilt, die zeitlich in etwa den 70er-, 80er-, 9oer- The book provides a thorough, detailed description computer architectures. It covers trends in hardware Jahren und den ersten Jahren im neuen Jahrhun- of the approach of symmetric function decomposi- and software development in general and specifical- dert entsprechen. Schwerpunkt des ersten Zeitblocks tions to the asymptotic theory of symmetric func- ly the future of vector-based systems and heteroge- ist das Überregionale Forschungsprogramm Infor- tionals, including the classical theory of U-statistics. neous architectures. The application contributions matik. Im Mittelpunkt der 80er-Jahre steht der breite It also presents applications of the theory to inves- cover computational fluid dynamics, fluid-structure Aufbau der Künstlichen Intelligenz in Deutschland tigating complex biological systems like sequence interaction, physics, chemistry, astrophysics, and cli- und der Software-Produktionsumgebungen. Im drit- alignment, sequencing, SNP (single nucleotide poly- mate research. Innovative fields like coupled mul- ten Zeitblock der 90er-Jahre stehen die Sprachver- morphism) detection, and DNA microarrays, as ti-physics or multi-scale simulations are presented. arbeitung und das Software Engineering im Vorder- well as some stochastic networks models. An initial All papers were chosen from presentations given at grund, daneben neue Forschungsgebiete wie die overview of the field of symmetric random functions the fifth Teraflop Workshop held in November 2006 Neuroinformatik und die Bioinformatik. Im neuen makes this book a useful introduction for newcomers at Tohoku University, Japan, and the sixth Teraflop Jahrhundert ist die Mensch-Technik-Interaktion das to the field. Workshop held in March 2007 at the Stuttgart High Hauptthema. Performance Computing Center (HLRS), Germany. Features Features Thorough, detailed description of the approach of Fields of interest Die erste Übersicht über die Entwicklung der Infor- symmetric function decompositions to the asymp- Computational Science and Engineering; Processor matikforschung in Deutschland. Quellenhinweise totic theory of symmetric functionals, including the Architectures; Computer Applications in Chemistry; über die Ergebnisse der Forschung in 40 Jahren. classical theory of U-statistics Organized by lectures Numerical and Computational Methods Contents Hot topic Target groups Überregionales Forschungsprogramm Infor- Contents Computational scientists matik.- Aufbau der KI-Forschung in Deutschland.- Basic Concepts.- Properties of P-statistics.- Asymp- Aufbau des Deutschen Forschungszentrums für totics for Random Permanents.- Weak Convergence Type of publication Künstliche Intelligenz.- Leitprojekt Verbmobil.- of Permanent Processes.- Weak Convergence of P- Proceedings Mensch-Technik-Interaktion.- ARKIVA.- MOR- statistics.- Permanent Designs and Related Topics.- PHA.- SmartWeb.- EUREKA.- Augmented Reality. Products of Partial Sums and Wishart Determinants. Due October 2007 Fields of interest Fields of interest History of Computing; Software Engineering; User Applications of Mathematics; Statistical Theory and 2008. XIV, 267 p. Geb. Interfaces and Human Computer Interaction; Artifi- cial Intelligence (incl. Robotics) Methods; Communications Engineering, Networks 85,55 € ISBN 978-3-540-74383-5 Target groups Target groups Graduate students, researchers and practitioners Informatiker aller Fachrichtungen. working with problems revolving around statistical Type of publication testing and estimation in complex environments Monograph Type of publication Monograph Due November 2007

Due December 2007 Mit Beiträgen zahlreicher Fachwissenschaftler.

2008. Approx. 220 p. (The IMA Volumes in Mathematics and its 2008. Etwa 300 S. Geb. Applications, Band 147) Geb. 69,95 € 67,36 € ISBN 978-3-540-76549-3 ISBN 978-0-387-75145-0 springer.com/booksellers Computer 143

R. Riolo, University of Michigan, Ann Arbor, MI, USA; T. Soule, ISBN 978-0-387-76307-1 G. Roden, Freiburg University of Idaho, Moscow, ID, USA; B. Worzel, Genetics Squared, Ann Arbor, MI, USA (Eds.) C#

Genetic Programming Theory and Einführung und Referenz Practice V

'C#' stellt ein ausführliches und verständliches Tu- torial und Referenzwerk dar, mit dem Sie einen le- Genetic Programming Theory and Practice V was ichten Einstieg in die Programmiersprache C# find- developed from the fifth workshop at the Universi- en. Dabei wird nicht nur auf das .NET Framework ty of Michigan’s Center for the Study of Complex von Microsoft eingegangen, alle Beispiele liegen auch Systems to facilitate the exchange of ideas and infor- in für Mono angepassten Versionen vor, so dass mation related to the rapidly advancing field of Ge- Sie auch unter Linux problemlos für .NET entwick- netic Programming (GP). Contributions from the eln können. Zudem deckt dieser "guide to C#" auch foremost international researchers and practitioners bereits die Erweiterungen von C# 2.0 wie beispiel- in the GP arena examine the similarities and differ- sweise Generics ab, so dass Sie auch für die Zukunft ences between theoretical and empirical results on gut gerüstet sind. Weiterführende Themen rund um real-world problems. The text explores the synergy das .NET-Framework - wie Datenbankanbindung, between theory and practice, producing a compre- XML und Netzwerkzugriff -, die Architektur von hensive view of the state of the art in GP application. Anwendungen und Richlinien für guten Program- The work covers applications of GP to a wide vari- mierstil in Form eines Styleguides machen 'C#' zu ety of domains, including bioinformatics, symbolic einem unentbehrlichen Nachschlagewerk für Ihre regression for system modeling, financial modeling, weitere Programmierpraxis. circuit design and robot controllers. This volume is a unique and indispensable tool for academics, re- Features searchers and industry professionals involved in GP, Alles, was der Einsteiger/Umsteiger in C# wissen evolutionary computation, machine learning and ar- muss Aus dem Blickwinkel des Einsteigers/Um- tificial intelligence. steigers entwickelt Zum Selbstlernen geeignet Bi- etet Lösungen zu praktischen Problemstellungen Features Langfristig praktischer Nutzen als Styleguide und Discusses hurdles in solving large-scale applica- Referenz Das erfolgreiche Online-Tutorial "Guide to tions Describes techniques including fitness and age C#" völlig neu bearbeitet Endlich in Buchform Deckt layered populations, code reuse through caching, auch die Erweiterungen in C# 2.0 ab archives and libraries, Pareto optimization, pre- and post-processing, the use of expert knowledge and Contents information-theoretic fitness measures Address- Teil I. Einführung in die Sprache C#:.- Was es practical methods for choosing between tech- ist .NET?.- Einführung in C#.- Erste Schritte.- niques for improving GP performance and to evolve Ein- und Ausgabe.- Datentypen.- Strings.- Opera- trustable solutions toren.- Entscheidungen.- Schleifen.- Methoden.- Strukturen.- Klassen.- Vererbung.- Schnittstellen.- Contents Namensräume.- Arrays.- Collections.- Generics.- Contributing Authors.- Preface.- Foreword.- Genet- Fehlerbehandlung.- Ereignisse.- Threads.- Unman- ic Programming: Theory and Practice.- Better So- aged Code.- COM und P/Invoke.- XML-Dokumen- lutions Faster: Soft Evolution of Robust Regression tation.- Mono und Werkzeuge.- Coding Styleguide.- Models in Pareto Genetic Programming.- Manip- Architektur.- Teil II. Weiterführende Themen ulation of Convergence in Evolutionary Systems.- aus .NET: (Datenbankanbindung, XML, Netzw- Large-Scale, Time-Constrained Symbolic Regres- erkzugriff etc.):- Teil III. Referenz zu der Sprache C#. sion-Classification.- Solving Complex Problems in Human Genetics Using Genetic Programming.- To- Fields of interest wards an Information Theoretic Framework for Ge- Software Engineering/Programming and Operating netic Programming.- Investigating Problem Hard- Systems ness in Real Life Applications.- Improving the Scala- bility of Generative Representations for Open-Ended Target groups Design.- [..] Softwareentwickler, Systemprogrammierer, Dozen- ten, Studenten Fields of interest Computing Methodologies; Artificial Intelligence Type of publication (incl. Robotics); Theory of Computation; Algorithm Professional book Analysis and Problem Complexity; Programming Techniques Due April 2008 Target groups Researchers, practitioners and students of Genetic 2008. Etwa 250 S. (Xpert.press) Geb. Programming, including industry technical staffs, technical consultants and business entrepreneurs 39,95 € ISBN 978-3-540-27888-7 Type of publication Contributed volume

Due February 2008

2008. Approx. 300 p. (Genetic and Evolutionary Computation) Geb.

90,90 € 144 Computer springer.com/booksellers

J.J. Romero, University of La Coruña, Spain; P. Machado, Universi- A.M. Ronchi, Politechnico di Milano, Italia J.A. Rose, The University of Tokyo, Japan; M.G. Negoita, Welling- ty of Coimbra, Portugal (Eds.) ton Institute of Technology, Wellington, New Zealand eCulture The Art of Artificial Evolution Advances in Computational Cultural Content in the Digital Age A Handbook on Evolutionary Art and Music Intelligence and Bioinformatics

Do virtual museums really provide added value to While improvements in computer performance end-users, or do they just contribute to the abun- Features are dramatically changing the computer-generated dance of images? Does the World Wide Web save presents novel insights and applications of computa- art industry, scientists in natural computing have endangered cultural heritage, or does it foster a soci- tional intelligence to multimedia processing, cellular teamed up with artists to examine how bioinspired ety with less variety? How can information technol- nonlinear networks and hardware implementation systems can influence art, technology and even aes- ogy help to preserve the diversity of cultures in our thetic appreciation. This comprehensive book gives fast-changing world? These are the questions that Fields of interest an up-to-date survey of the relevant bioinspired are raised and answered in this book, the result of a Appl.Mathematics/Computational Methods of En- computing research fields – such as evolutionary long path across the digital heritage landscape. Alfre- gineering; Artificial Intelligence (incl. Robotics); Ap- computation, artificial life, swarm intelligence and do M. Ronchi, Secretary of the EC MEDICI Coop- plications of Mathematics; Computer Imaging, Vi- ant colony algorithms – and examines applications eration Framework, gives a broad overview of eCul- sion, Pattern Recognition and Graphics; Multimedia in art, music and design. The editors and contribu- ture and digital heritage. His presentation is divid- Information Systems tors are researchers and artists with deep experience ed into three main sections: the first one devoted to of the related science, tools and applications, and the the main issues and general guidelines, the second to Target groups book includes overviews of historical developments technological fundamentals and the main solutions, Researchers, Engineers, Graduate Students in Com- and future perspectives. The book will be of inter- and the third to applications and services, including putational Intelligence, IT, Computer Science, Elec- est to computer scientists and artists engaged with a wide range of case studies. Starting from the basics tronics and Information Engineering natural computing techniques applied to art, music the reader will be introduced to virtual museums is- and design. The accompanying DVD contains image, sues and achievements, cataloguing, digitizing, pub- Type of publication video and music samples, as well as source code and lishing, and sustainable [..] Monograph demonstrations, providing a good starting point for [..] Contents Due May 2008 Chapter 1: The role of content and the general back- Features round.- Chapter 2: General Technological Frame- Apart from conference proceedings, there is no up- work.- Chapter 3: Exploitation, applications and ser- 2008. Approx. 200 p. (Studies in Computational Intelligence, to-date title dealing with the full range of bioin- vices. Vorläufiger Eintrag 103) Geb. spired techniques in art and music, and these editors are uniquely well qualified to assemble the best au- Fields of interest 96,25 € thor team for this subject, having chaired the EVO- Cultural Heritage; Information Systems Applications ISBN 978-3-540-29392-7 MUSART workshop at the largest European natural (incl.Internet); Library Science; Computer Applica- computing event for the last 3 years (EuroGP 2004, tions; Computers and Society EuroGP 2005 and EuroGP 2006; [..] Target groups Contents Researchers and professionals in "memory institu- Part I - Fundamentals.- Introduction.- Evolutionary ions", digital libraries, digital preservation, e-content Music.- Evolutionary Art.- Historical Perspective.- management; librarians Part II - Evolutionary Music.- Interactive Evolution- ary Music.- Cellular Automata, Artificial Life and Type of publication Music.- Self-organised Music.- Part III - Evolution- Monograph ary Art, Video and Design.- Interactive Evolutionary Art.- Electric Sheep.- Creative Evolutionary Design Due December 2007 Tools.- Part IV - Artistic Perspectives.- Artists and Artificial Music.- Action Painting and Evolution.- 2008. Approx. 410 p. Geb. Evolving Virtual Ecosystems.- Part V - Future Per- spectives.- Coevolutionary Art.- Evolutionary Art 96,25 € and Hybrid Societies.- [..] ISBN 978-3-540-75273-8 Fields of interest Computer Appl. in Arts and Humanities; ARTS; Ar- tificial Intelligence (incl. Robotics); Theory of Com- putation; Computer-Aided Engineering (CAD, CAE) and Design

Target groups Researchers, lecturers, students

Type of publication Monograph

Due November 2007

2008. Approx. 450 p. (Natural Computing Series) Geb.

90,90 € ISBN 978-3-540-72876-4 springer.com/booksellers Computer 145

B. Rosenhahn, Max-Planck Institute, Saarbrücken, Germany; R. G. Rossi, Universidad Nacional de La Plata, Argentina; O. Pastor, F. Rothlauf, University of Mainz, Germany Klette, The University of Auckland, New Zealand; D. Metaxas, Rut- University of Technology, Valencia, Spain; D. Schwabe, PUC-Rio, gers University, NJ, USA (Eds.) Brazil; L. Olsina, National University of La Pampa, Argentina (Eds.) Application and Adaptation of Human Motion Web Engineering: Modelling and Heuristic Optimization Methods

Understanding, Modelling, Capture and Animation Implementing Web Applications Many books describe the application of heuristic optimization methods to a wide variety of The study of human motion dates back more than “Web Engineering: Modelling and Implementing optimization problems. However, the process of de- 2000 years. With the event of information technolo- Web Applications” presents the state of the art ap- veloping an efficient optimization method for the gy, new areas have been added to this field. Research proaches for obtaining a correct and complete Web specific problem at hand seems to be considered a using computer vision and computer graphics con- software product from conceptual schemas, repre- "black art", the domain of optimization specialists. tributes to a transformation of biomechanics into a sented via well-known design notations. Describing This book focuses on the practitioner and demon- discipline that now applies computing technology mature and consolidated approaches to developing strates how to apply heuristic optimization methods. throughout; on the other hand, computer vision and complex applications, this edited volume is divided It breaks down the art of designing efficient opti- computer graphics also benefit from defining goals into three parts and covers the challenges web appli- mization methods into engineering tasks, and exam- aimed at solving problems in biomechanics. Besides cation developers face; design issues for web applica- ines how to build successful applications of heuristic interactions, all three areas also developed their own tions; and how to measure and evaluate web applica- optimization methods. In so doing the reader learns inherent research dynamics towards studying hu- tions in a consistent way. With contributions from how to properly model the problem, choose the op- man motion. Researchers from all three of these ar- leading researchers in the field this book will appeal timization method, adapt that method to the proper- eas have contributed to this book to promote the to researchers and students as well as to software en- ties of the specific problem, and, finally, implement establishment of human motion research as a mul- gineers, software architects and business analysts. the method. This book will benefit practitioners in ti-facetted discipline and to improve the exchange of the field of planning and optimization; researchers Features ideas and concepts between these three areas. Some who deal with heuristic optimization in information Explains how to obtain a complete and correct soft- chapters review the state of the art whilst others re- systems, operations research, and computer science; ware product from an object-oriented conceptual port on leading edge research results, with applica- and students in related fields. The reader should [..] tions in medicine, sport science, cinematography and schema robotics. Features Contents First book to offer a systematic theory of how to ap- Part 1: Introduction.- Web Application Develop- Features ply and adapt heuristic optimization methods. First book which informs about recent progress in ment: Challenges and the Role of Web Engineer- biomechanics, computer vision and computer graph- ing.- The Web as an Application Platform.- Part 2: Contents ics – all in one volume Carefully written reviews Overview of Design Issue for Web Applications De- Introduction.- Optimization Problems.- Optimiza- as well as detailed reports on recent progress in re- velopment.- Applying the OOWS Model Driven Ap- tion Methods.- Design of Modern Heuristics.- Mod- search Interesting demonstrations of recent applica- proach for Developing Web Applications.- Modeling ern Heuristics for the Optimal Communication tions of human motion studies Web Applications with OOHDM.- UML-Based Web Spanning Tree Problem.- Modern Heuristics for Engineering: An Approach Based on Standards.- Automated Programming.- Summary and Conclu- Contents Designing MultiChannel Web Applications as Di- sions.- References.- Nomenclature.- Glossary.- Index From the contents 1 Understanding Human Mo- alogue Systems: The IDM Approach.- Designing tion: A Historic Review, R. Klette, C. Tee.- Part I 2D Web Applications with WebML and WebRATIO.- Fields of interest tracking. 2 The Role of Manifold Learning in Hu- HERA.- WSDM: Web Semantics Design Method.- Artificial Intelligence (incl. Robotics); Optimization; man Motion Analysis, A. Elgammal, Chan-Su Lee. An Overview of Model-Driven Web [..] Operation Research/Decision Theory; Theory of 3 Recognition of Action as a Bayesian Parameter Computation Estimation Problem over Time, V. Kruger. 4 The Fields of interest William Harvey Code: Mathematical Analysis of User Interfaces and Human Computer Interaction Target groups Optical Flow Computation for Cardiac Motion, Y. Researchers, practitioners, students Target groups Kameda, A. Imiya. 5 Detection and Tracking of Hu- Software engineers and software architects mans in Single View Sequences Using 2D Articu- Type of publication Monograph lated Model, F. Kort, V. Hlavd!.- Part II Learning. 6 Type of publication Combining Discrete and Continuous 3D Trackers, Monograph C. Tsechpenakis, D. [..] Due February 2008

Fields of interest Due November 2007 2008. Approx. 290 p. (Natural Computing Series) Geb. Computer Imaging, Vision, Pattern Recognition and Graphics; Image Processing and Computer Vision; 2007. Approx. 460 p. 169 illus. (Human-Computer Interaction 64,15 € Human Physiology; Sports Medicine Series) Geb. ISBN 978-3-540-72961-7 Target groups 99,46 € Researchers or students in biomechanics, computer ISBN 978-1-84628-922-4 vision or computer graphics (in a general sense, not only those working immediately on human motion), people applying results of human motion research in their disciplines, and a general audience interested in progress in science

Type of publication Contributed volume

Due October 2007

2008. X, 636 pp (Computational Imaging and Vision, Band 36) Geb.

80,20 € ISBN 978-1-4020-6692-4 146 Computer springer.com/booksellers

L. Rueda, Universidad de Concepcion Chile, Chile; D. Mery, Ponti- M. Ruminer, Magenic Technologies, Marshfield, MA, USA L. Rutkowski, Technical University of Czestochowa, Poland ficia Universidad Catolica, Chile; J. Kittler, Surrey University, UK (Eds.) Team Foundation Server Recipes Computational Intelligence

Progress in Pattern Recognition, A Problem-Solution Approach Methods and Techniques Image Analysis and Applications

12th Iberoamerican Congress on Pattern Recognition, CIARP Team Foundation Server is a Microsoft product that This book focuses on various techniques of com- 2007,Valpariso, Chile, November 13-16, 2007, Proceedings integrates the most critical aspects of software de- putational intelligence, both single ones and those velopment - version control, item tracking, and re- which form hybrid methods. Those techniques are porting – together into a single, secure collaboration today commonly applied issues of artificial intelli- platform. This means that teams only have one place gence, e.g. to process speech and natural language, Fields of interest to look when working on software products, rather build expert systems and robots. The first part of the Pattern Recognition; Image Processing and Com- than a collection of disparate systems and sources of book presents methods of knowledge representation puter Vision; Artificial Intelligence (incl. Robotics); data. The single most important feature and unique using different techniques, namely the rough sets, Computer Imaging, Vision, Pattern Recognition and aspect of this book will be its approach of providing type-1 fuzzy sets and type-2 fuzzy sets. Next various Graphics recipes for quick customization and installation of neural network architectures are presented and their TFS. Many very smart people can become very baf- learning algorithms are derived. Moreover, the fam- Target groups fled or completely unable to install the product suc- ily of evolutionary algorithms is discussed, in par- Researchers and professionals cessfully within their environment. ticular the classical genetic algorithm, evolutionary strategies and genetic programming, including con- Type of publication Features nections between these techniques and neural net- Proceedings Other books provide only a cursory discussion on works and fuzzy systems. In the last part of the book, the implementation of software processes using TFS various methods of data partitioning and algorithms Due October 2007 A pragmatic and practical book on how to actually of automatic data clustering are given and new neu- use the tool The recipes are a unique approach to the ro-fuzzy architectures are studied and compared. 2007. XXI, 969 p. (Lecture Notes in Computer Science, Band 4756) subject Softcover Features Contents Self-contained, easy accessible and comprehensive 96,30 € Installation.- Recipes For Broken Installs.- Set- textbook for graduate students and researchers in ISBN 978-3-540-76724-4 up Recipes.- Build Team Project.- Subscription computational intelligence Well-organized mod- Recipes.- Recipes For Customizing A Team Process ern approach to methods and techniques of intelli- Template.- Work Item Tracking Recipes.- Check-in gent calculations including examples and exercises Policy Recipes.- Build Recipes.- Project Management in each chapter Includes a preface by Jacek Zurada, Recipes.- Recipes for the Data Tier.- Recipes for the president of IEEE Computational Intelligence Soci- Proxy Server Setup. ety Rich and well structured compendium of infor- mation about [..] Fields of interest Programming Techniques; Programming Languages, Contents Compilers, Interpreters Introduction.- Selected issues of artificial intelli- gence.- Methods of knowledge representation using Target groups rough sets.- Methods of knowledge representation Intermediate-Advanced project managers, develop- using type-1 fuzzy sets.- Methods of knowledge rep- ment managers, lead developers, and consultants resentation using type-2 fuzzy sets.- Neural networks and their learning algorithms.- Evolutionary algo- Type of publication rithms.- Data clustering methods.- Neuro-fuzzy sys- Professional book tems of Mamdani, logical and Takagi-Sugeno type.- Flexible neuro-fuzzy systems. Due April 2008 Fields of interest Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Appl.Mathematics/Computational Methods of En- Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest gineering; Artificial Intelligence (incl. Robotics); Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Applications of Mathematics; Automation and Oman, Qatar, Palestine: Jordan Book Center Robotics; Operation Research/Decision Theory

2008. Approx. 605 p. Softcover Target groups Graduate students and researchers in computational ISBN 978-1-59059-742-2 intelligence, electrical engineering, computer science, automation and robotics, mechatronics, or telecom- munication

Type of publication Graduate/advanced undergraduate textbook

Due February 2008

Published by arrangement with Polish Scientific Publishers PWN Translated from the Polish: Metody I techniki sztucznej in- teligencji, 2005, PWN publishers., ISBN 83-01-14529-3

2008. Approx. 525 p. Geb.

74,85 € ISBN 978-3-540-76287-4 springer.com/booksellers Computer 147

V. Saligrama, Boston University, Boston, MA, USA (Ed.) D. Salomon, California State University, Northridge, CA, USA D. Salomon, California State University, Northridge, CA, USA

Networked Sensing Information A Concise Introduction to Data Variable-length Codes for Data and Control Compression Compression

Recent advances in sensor and computing technolo- Compression is an option naturally selected when Most data compression methods that are based gies provide the impetus for deploying distributed faced with problems of high costs or restricted on variable-length codes employ the Huffman or sensing systems. Distributed networks are envisioned space. This book offers readers a succinct and read- Golomb codes. However, there are a large number of to provide real-time information in such diverse ap- er-friendly foundation to the most important topics less-known codes that have useful properties - such plications as building safety, environmental monitor- in the field of data compression. Divided into two as those containing certain bit patterns, or which are ing, power systems, manufacturing as well as military parts, Part I presents the basic approaches to data robust - and these can be useful. This book brings and space applications. While significant research compression and describes a few popular techniques this large set of codes to the attention of workers in and development effort over the last decade in sen- and methods that are commonly used to compress the field and of students of computer science. David sor development, physical layer transmission and data. The reader discovers essential concepts, such Salomon’s crystal clear style of writing and presen- networking infrastructure has laid the initial ground- as variable-length and prefix codes, statistical distri- tation, which has been familiar to readers for many work for practical deployment, realization of such bution and run-length codes. Part II concentrates on years now allows easy access to the topic. Readers are distributed sensing systems is still in its infancy. The advanced techniques, such as arithmetic coding, or- only required to have a general familiarity with com- principle challenges from a systems-level perspective thogonal transforms, subband transforms and Bur- puter methods and essentially an understanding of arise due to the difficulty in realizing the objectives rows-Wheeler transform. Complete and clear, this the representation of data in bits and files. Comput- of inferencing and control tasks for a distributed dy- book will be the perfect reference for advanced un- er scientists, electrical engineers and students major- namical environment through an underlying pow- dergraduates in computer science and requires a ing in computer science or electrical engineering will er/bandwidth constrained ad-hoc networked infras- minimum of mathematics. An author-maintained find this volume an invaluable resource, as will those tructure. The main challenge can be summarized as website provides readers with errata and auxiliary readers in various physical sciences and mathemat- follows: How to make decisions under uncertainty, material. ics. which arises from spatially [..] Features Features Features The author is experienced and has authored the very Comprehensively discusses the codes, not the com- Presents research on informational and mathemati- successful Data Compression: The Complete Guide, pression algorithms (the latter are available in many cal aspects of networked sensing systems Facilitates Fourth Edition Clear, reader-friendly style The re- books, but the codes themselves are normally men- collaboration between the different research areas quired level of mathematics is minimal Specifical- tioned in the literature just in passing) Requires a and interdisciplinary research on distributed sens- ly written for undergraduates, to cover foundations minimum of mathematics, this book is geared to- ing systems Brings together internationally reputed of Data Compression An author-maintained web- ward the general educated reader, not toward spe- researchers from different communities, focused on site, containing errata and auxiliary material comple- cialists Readers can find errata and auxiliary materi- the common theme of distributed sensing, inferenc- ments the book al on the author’s website regularly maintained and ing, and control over networks updated Contents Contents Preface.- Part I: Basic Concepts.- Introduc- Contents Introduction.- Blind Localization: Blind Calibration tion.- Approaches to Compression.- Huffman cod- From the contents.- Codes, Fixed- and Vari- of Networks of Sensors.- Sparse Multidimensional ing.- Dictionary methods.- Part II: Advanced Tech- able-Length.- Prefix Codes.- VLCs, Entropy, and Re- Scaling for Blind Tracking in Sensor Networks.- Dis- niques.- Arithmetic Coding.- Image Compression.- dundancy.- Universal Codes.- The Kraft-MacMil- tributed Computation with Communication Con- Audio Compression.- Other Methods.- Bibliogra- lan Inequality.- Tunstall Code.- Schalkwijk’s Cod- straints: Error Exponents for Decentralized Detec- phy.- Glossary.- Solutions to Puzzles.- Answers to ing.- Tjalkens-Willems V-to-B Coding.- Phased-In tion in Tree Networks.- Function Computation in Exercises.- Index. Codes.- Redundancy Feedback (RF) Coding.- Re- Wireless Sensor Networks.- Network Coding for cursive Phased-In codes.- Self-Delimiting Codes.- Distributed Storage in Wireless Networks.- Rate Fields of interest Huffman Coding.- VLCs for Integers.- Start-Step- Constrained Field Reconstruction: Distributed Field Data Structures, Cryptology and Information Theory Stop Codes.- Start/Stop Codes.- Elias Codes.- Lev- Estimation with One-bit Sensors.- On the Number enstein Code.- Even Rodeh Code.- Punctured Elias of Bits to Encode the Outputs of Densely Deployed Target groups Codes.- Other Prefix Codes.- Ternary Comma Sensors.- Separation Theorems And Partial Order- Undergraduates Code.- Location Based Encoding (LBE).- Stout ings for [..] Codes.- Yamamoto’s Recursive [..] Type of publication Fields of interest Undergraduate textbook Fields of interest Communications Engineering, Networks; Computer Coding and Information Theory; Data Storage Rep- Communication Networks; Computer Systems Or- Due February 2008 resentation; Data Encryption; Image Processing and ganization and Communication Networks; Informa- Computer Vision; Signal,Image and Speech Process- tion Systems Applications (incl.Internet); Circuits 2008. Approx. 328 p. Also available online. (Undergraduate Top- ing and Systems; Signal,Image and Speech Processing ics in Computer Science) Softcover Target groups Target groups 32,05 € Researchers, advanced undergraduates, graduates Researchers, graduate students, professionals ISBN 978-1-84800-071-1 Type of publication Type of publication Monograph Monograph Due November 2007 Due November 2007 2008. XII, 196 p. 42 illus. Softcover 2008. Approx. 300 p. Geb. 48,10 € 106,95 € ISBN 978-1-84628-958-3 ISBN 978-0-387-68843-5 148 Computer springer.com/booksellers

F.J. Samaniego, University of California at Davis, CA, USA J.T. Sample, Stennis Space Center, MS, USA; K. Shaw, Stennis M. Sarfraz, King Fahad University of Petroleum and Minerals, Space Center, MS, USA; S. Tu, University of New Orleans, LA, USA; Dhahran, Saudi Arabia M. Abdelguerfi, University of New Orleans, LA, USA (Eds.) System Signatures and their Interactive Curve Modeling Applications in Engineering Geospatial Services and Reliability with Applications to Computer Graphics, Vision and Image Applications for the Internet Processing

Since the introduction of system signatures in Fran- The use of geospatial technologies has become ubiq- This book covers Curve Modeling with solutions to cisco Samaniego’s 1985 paper, the properties of this uitous since the leading Internet vendors delivered a real life problems relating to Computer Graphics, technical concept have been examined, tested and number of popular map websites. Today, businesses Vision, Image Processing, Geometric Modeling and proven in a wide variety of systems applications. are either migrating location-specific capabilities in- CAD/CAM. Chapters deal with basic concepts, curve Based on the practical and research success in build- to their information systems, or expanding existing design techniques and their use to various applica- ing reliability into systems with system signatures, Geospatial Information Systems (GIS) implemen- tions and a wide range of problems with their auto- this is the first book treatment of the approach. It is, tation into enterprise-wide solutions. As enterprise mated solutions through computers. The book aims therefore, the purpose of this book to provide guid- information systems evolve toward service-orient- to stimulate views and provide a source where the ance on how reliability problems might be struc- ed architecture (SOA), geospatial technologies also reader can find the latest developments in the field tured, modeled and solved. Over the past ten years evolve along the same lines. Geospatial Services and including a variety of techniques, applications, and the broad applicability of system signatures has be- Applications for the Internet covers a wide spectrum systems necessary for solving real life problems. "In- come apparent and the tool’s utility in coherent of techniques, model methodologies and theories on teractive Curve Modeling with Application to Com- systems and communications networks firmly es- development and applications of GIS relative to the puter Graphics, Vision and Image Processing" pro- tablished. The book compared actual system life- internet. The world's experts in this emerging field vides an invaluable resource, which focuses on in- times where the tool has been and has not been used. present examples and case studies for location-based terdisciplinary methods and affiliates up-to-date These comparisons - which have been done over the services, coastal restoration, urban planning, battle- methodologies - An extremely useful book for un- years - demonstrate the practical, feasible and fruitful field planning, rehearsal environmental analysis and dergraduate senior students as well as graduate stu- use of the tool in building reliable systems. Finally, assessment. dents, practitioners and researchers in the areas of new results and future directions for system signa- Computer Science, Engineering, and other computa- tures are also explored. Features tional sciences. Includes business process services, and integration of Features GIS into global enterprise information systems and Features Based on both practical and research success in service architectures Includes information on Global No such other up-to-date book exists Provides a building reliability into systems with system signa- Earth Observation System of Systems (GEOSS), and class of practical solutions to real life and multidisci- tures Provides guidance on how reliability problems the Federal Earth Observation Missions (FedEo) Pi- plinary problems can be structured, modeled and solved Compares ac- lot program, essential for the workflow and decision tual system lifetimes using or omitting the tool support system of Homeland Security program Contents Introduction.- Weighted Nu Splines.- Rational Cu- Contents Contents bic Spline with Shape Control.- Rational Sigma Introduction.- Background on coherent systems.- Preface.- Introduction.- Design and implementation Splines.- Linear, Conic and Rational Cubic Splines.- System signatures.- Application of signatures to clo- of geographical search engines and Web services.- Shape Preserving Rational Interpolation for Planar sure and preservation results on system lifetimes.- Design and implementation of the semantic geospa- Curves.- Visualization of Shaped Data by Rational Further signature-based analyses of system life- tial Web.- Design of and experiments on distributed Cubic Spline.- Visualization of Shaped Data by Cu- times.- Applications of signatures in network relia- spatial/spatiotemporal databases.- Experiences with bic Spline Interpolation.- Approximation with B- bility.- Applications of signatures in reliability eco- and performance evaluation of large-scale GIS Web Splines Curves.- Spiral Curves.- Corner Detection nomics.- Summary and discussion. servers.- Experiences with Web registry services for for Curve Segmentation.- Linear Capture of Dig- GIS.- Lessons of interoperability and standards for Fields of interest ital Curves.- Digital Outline Capture with Cubic GIS Web services.- Index. Quality Control, Reliability, Safety and Risk; Statis- Curves.- Computer-Aided Reverse Engineering us- tics for Engineering, Physics, Computer Science, ing Evolutionary Heuristics on NURBS.- Multireso- Fields of interest lution [..] Chemistry & Geosciences; Probability Theory and Computer Applications in Geosciences; Database Stochastic Processes; Operation Research/Decision Management; Data Mining and Knowledge Fields of interest Theory; Systems Theory, Control Discovery; Information Systems Applications Computer Graphics; Image Processing and Comput- (incl.Internet); Computer Graphics Target groups er Vision; Pattern Recognition; Computer-Aided En- gineering (CAD, CAE) and Design Professors and graduate students, practitioners Target groups Professional and advanced-level textbook Type of publication Target groups Advanced undergraduates, graduates, professionals Monograph Type of publication Contributed volume Type of publication Due October 2007 Graduate/advanced undergraduate textbook Due February 2008 2007. Approx. 200 p. (International Series in Operations Research Due November 2007 & Management Science, Band 110) Geb. 2008. Approx. 250 p. Geb. 80,20 € 2007. Approx. 325 p. Geb. 82,34 € ISBN 978-0-387-71796-8 ISBN 978-0-387-74673-9 80,20 € ISBN 978-1-84628-870-8 springer.com/booksellers Computer 149

Y. Sawano, University of the Sacred Heart, Tokyo, Japan; T. M. Schellekens, University College Cork, Ireland O. Scherzer, University of Innsbruck, Innsbruck, Austria; M. Gras- Ohsako, Former Senior Programme/Research Specialist at UN- mair, University of Innsbruck, Innsbruck, Austria; H. Grossauer, ESCO (Eds.) University of Innsbruck, Innsbruck, Austria; M. Haltmeier, Univer- A Modular Calculus for the Average sity of Innsbruck, Innsbruck, Austria; F. Lenzen, University of Inns- bruck, Innsbruck, Austria Media Literacy as a Tool for Lifelong Cost of Data Structuring Learning Efficiency-Oriented Programming in MOQA Variational Methods in Imaging A Comparative Study

The main time measure currently used for re- Several mathematical methods find wide applications al-time languages (worst-case time) is well-known in imagining science. This book focuses on variation- In learning societies, citizens are increasingly re- not to be modular in general, which makes aver- al methods in imaging. Key topics: Introduces varia- quired to develop the competence to acquire the nec- age-case analysis notoriously difficult, involving a tional methods with motivation from deterministic, essary knowledge, skills and qualifications in order variety of techniques which typically do not allow geometric and stochastic point of view Presents case to adapt to increasingly knowledge-based economies for automation.  This book introduces the examples in imaging to illustrate the use of variation- and societies. One of the major aims of governments first programming language for which average-case al methods e.g. denoising, thermoacoustics, comput- is the improvement of media literacy among citizens time analysis of its programs is guaranteed to be erized tomography Link between noncovex calcu- of all ages. People are encouraged to evaluate and an- modular.  The book includes sample programs lus of variations, morphological analysis and level alyze information supplied by different types of me- and sample derivations of the average-case time of set methods is discussed Analyses variational meth- dia in order not to become passive receivers of in- these programs to illustrate this radically different ods containing classical analysis of variational meth- formation. Educators must respond to this need for approach to average-case timing. The book ods, modern analysis such as G-norm properties and media literacy and develop programs for lifelong ed- presets a single foundation for Average-Case Analy- nonconvex calculus of variations Many numerical ucation and learning. Media education constitutes sis, based on the notion of Random Structure Preser- examples accompany the theory throughout the text. an important part of lifelong education and learning vation, and solves several well-known open problems This book is geared towards graduate students and for active citizenship at all levels. The effectiveness discussed by Knuth. of media education is determined by several factors: researchers in applied mathematics. It could serve as equal accessibility to media and information for dif- Features a main text for graduate courses in image processing ferent socio-economic and cultural groups, the in- A novel foundation is provided for this classical area or as a supplemental text for courses  on regu- corporation and satisfaction of the diversified needs of computing.  As opposed to a series of meth- larization and inverse problems. Researchers in the and motivations of these groups in using and apply- ods which need to match the algorithm under con- area of imaging science will also [..] ing the technologies, and a [..] sideration, a new uniform foundation is provided Features which is semi-automatable and which provides a sin- Includes an insert with color images  Features gle approach to analyze all algorithms from a wide Numerical examples accompany the theory Ad- Views media literacy and media education from class.  No practical average-case timing tools ditional material and images available on the the perspective of lifelong learning Compar- are currently available — the author's research website  Systematic presentation ative studies of nine countries Covers both policies [..] and practices Contents Contents Introduction and history of variational methods for Contents Bridging Semantics and Complexity.- The MO- imaging.- Case examples of imaging.- Motivation Preface,- Acknowledgements,- Contents,- Part 1: In- QA Programming Language.- Implications for Re- of regularization techniques.- Quadratic regulariza- troduction: 1.The methodology and Challenges of al-Time Languages and Automated Average-Case tion for linear imaging.- Quadratic regularization for the study: Yukiko Sawano,- 2. International Agenda Analysis.- Basic sorting Algorithms.- Composition- nonlinear imaging.- Nonquadratic regularization: on Lifelong Learning in the Information Age: Toshio ality as a Key to Software Timing.- Random Struc- Rudin Osher Fatemi model and others.- Mod- Ohsako,- Part 2: Media Literacy and A Media Edu- tures.- Series-Parallel MOQA Data Structures.- Ex- ern analysis of regularization techniques.- Noncon- cation in Japan: 3. Media Literacy for the Lifelong amples of MOQA Programs.- Compositional De- vex regularization: Analysis of calculus of variations.- Learning Society in Japan: Yukiko Sawano et al,- 4 termination of Average Time.- Examples of Aver- Regularization for functionals involving discontinu- Development and Directions of Media Literacy Ini- age-Case Analysis in MOQA tiatives in Japan: Midori Suzuki,- 5: Educational Ser- ous operators.- Relation between nonconvex regular- vices for Children in the Digital Age: from the Stand- Fields of interest ization and level methods.- Summary and compari- point of a Public Service Broadcaster: Sachiko Ko- Programming Languages, Compilers, Interpreters; son of the techniques. daira,- Part 3: Country Case Studies [..] Algorithm Analysis and Problem Complexity; Per- Fields of interest formance and Reliability Fields of interest Calculus of Variations and Optimal Control; Opti- Education & Society; Computers and Education; Ed- Target groups mization; Image Processing and Computer Vision; ucational Policy; Comparative Education; Learning Researchers and students interested in real-time pro- Mathematical Modeling and Industrial Mathematics; & Instruction gramming, programming language semantics and al- Imaging / Radiology gorithm analysis. Target groups Target groups Graduate students and academics specializing in Type of publication Graduate students, researchers comparative education and media education, as well Monograph Type of publication as policy makers in charge of IT and media policy. Monograph Due March 2008 Type of publication Contributed volume Due May 2008 2008. Approx. 250 p. Geb. Due January 2008 81,59 € 2008. Approx. 255 p. Geb. ISBN 978-0-387-73383-8 ISBN 978-0-387-30931-6 2008. Approx 200 p. Geb.

123,05 € ISBN 978-1-4020-6555-2 150 Computer springer.com/booksellers

B. Schiele, TU Darmstadt, Germany; A.K. Dey, Carnegie Mellon F. Schilder, Thomson Corp., Eagan, MN, USA; G. Katz, Universi- U. Schlömer, Hamburg; J. Dittrich, Hamburg University, Pittsburgh, PA, USA; H. Gellersen, Lancaster Univer- ty of Osnabrück, Germany; J. Pustejovsky, Brandeis University, sity, UK; B. De Ruyter, Philips Research Europe, Eindhoven, The Waltham, MA, USA (Eds.) Netherlands; M. Tscheligi, University of Salzburg, Austria; R. eBay & Recht Wichert, Fraunhofer-IGD, Darmstadt, Germany; E. Aerts, Phlips Research Europe, Eindhoven, The Netherlands; A. Buchmann, TU Annotating, Extracting and Ratgeber für Käufer und Verkäufer Darmstadt, Germany (Eds.) Reasoning about Time and Events

Ambient Intelligence International Seminar, Dagstuhl Castle, Germany, April 20-15, Vom eBay-Anfänger bis zum Powerseller oder 2005, Revised Papers Verkaufsagenten: Hier finden Sie auf alle rechtlichen First European Conference, AmI 2007, Darmstadt, Germany, Fragen, die sich rund um das Handeln auf der eBay- November 7-10, 2007, Proceedings Plattform stellen, die richtigen - und vor allem This state-of-the-art survey comprises a selection of verständlichen - Antworten. Sie erhalten jede Menge the material presented at the International Dagstuhl wertvolle Tipps und Tricks für das erfolgreiche This book constitutes the refereed proceedings of Seminar on Annotating, Extracting and Reason- Handeln auf dem weltweiten Online-Marktplatz. the First European Conference on Ambient Intelli- ing about Time and Events, held in Dagstuhl Cas- Die Neuauflage enthält insbesondere die Änderun- gence, AmI 2007, held in Darmstadt, Germany, in tle, Germany, in April 2005. The seminar centered gen des Fernabsatzrechts, ein zusätzliches Kapitel November 2007. The 17 revised full papers present- around an emerging de facto standard for time and zum "Bewertungssystem", Tipps für einen sicheren ed together with 5 research reports were carefully re- event annotation: TimeML. The 9 papers included Online-Handel sowie ausführliche Informationen viewed and selected from 48 submissions. The pa- in the book constitute the thoroughly cross-reviewed zum gewerblichen Rechtsschutz, Wettbewerbs- und pers are organized in topical sections on mobility and revised versions of selected summaries and find- Urheberrecht. Rechtsanwalt Dr. Uwe Schlömer ist and sensing, applications of AmI, activity and loca- ings presented and discussed at the seminar. The pa- im Auftrag von eBay bereits seit zwei Jahren als tion sensing, AmI and artificial intelligence, AmI pers feature current research and discuss open prob- Dozent auf den eBay-Workshops und eBay-Univer- middleware and infrastructure, and interaction with lems concerning annotation, temporal reasoning, sities tätig. Jörg Dittrich gilt als besonders heraus- the environment. The book is rounded off by a sec- and event identification. The main concern is with ragender Spezialist in rechtlichen Fragen rund um tion on case studies and lessons learned, presenting the determination of the effectivity of the TimeML eBay. a high level selection of current research reports and language for consistent annotation, the determina- papers that reflect the most important activities of tion of the usefulness of such annotations for further Features current ambient intelligence research. processing, and the question as to which modifica- Allgemein verständliche und praxisnahe Vermit- tions should be applied to the standard to improve tlung der rechtlichen Grundlagen für das Verkaufen Fields of interest its convenience in applications such as question-an- und Kaufen bei eBay Ergänzendes Information- Information Systems Applications (incl.Internet); swering and information retrieval. sportal im Internet mit ständigen Aktualisierun- Computer Communication Networks; Operating gen, Formulierungsbeispielen und wertvollen Tipps Systems; User Interfaces and Human Computer Fields of interest (www.mein-recht-im-netz.de) Checklisten zu den Interaction; Artificial Intelligence (incl. Robotics); Artificial Intelligence (incl. Robotics); Data Mining häufigsten Rechtsfragen Computers and Society and Knowledge Discovery; Information Storage and Retrieval; Document Preparation and Text Process- Contents Target groups ing; Mathematical Logic and Formal Languages Die eigene eBay-Mitgliedschaft.- Die AGB und Researchers and professionals Grundsätze von eBay.- Die Datenschutzerklärung Target groups von eBay.- Das Zustandekommen von Verträgen auf Type of publication Researchers and professionals dem eBay-Marktplatz.- Artikel über eBay anbieten Proceedings und verkaufen.- Artikel über eBay kaufen.- Irrtümer, Type of publication Betrug und Käuferschutz.- Das eBay-Bewertungssys- Due October 2007 Proceedings tem.- Internationale Transaktionen.- Gewerblicher Rechtsschutz, Wettbewerbsrecht und Urheberrecht.- eBay Spezialseiten.- Verkaufsagent bei eBay.- Gewer- 2007. XV, 375 p. (Lecture Notes in Computer Science, Band 4794) Due October 2007 Softcover berechtliche und steuerrechtliche Grundlagen.- Wer haftet für Rechtsverletzungen? 2007. VII, 141 p. Also available online. (Lecture Notes in Comput- 55,64 € er Science, Band 4795) Softcover ISBN 978-3-540-76651-3 Fields of interest 40,66 € Civil Law; Information Systems Applications ISBN 978-3-540-75988-1 (incl.Internet); Legal Aspects of Computing; Media Law; Information Systems

Target groups Verkäufer und Käufer bei eBay, eBay-Verkaufsagen- ten, Justiz, Anwaltschaft, Rechtsreferendare, Jurastu- denten

Type of publication Popular science

Due January 2008

2008. Etwa 300 S. Softcover

19,95 € ISBN 978-3-540-32545-1 springer.com/booksellers Computer 151

K. Schmidt, Frankfurt, Germany K. Schmidt, IT University of Copenhagen W. Schröder-Preikschat, Universität Erlangen-Nürnberg

High Performance Computing Cooperative Work and Coordinative Betriebssysteme

History, Concepts, and Implementation Practices Grundlagen, Entwurf, Implementierung Contributions to the Conceptual Foundations of Computer Supported Cooperative Work High Performance Computing (HPC) is the area of Das vorliegende Lehrbuch gibt eine fundierte supercomputers, the fastest and best systems of their Einführung in die Konzepte und Funktionen mod- time. Most supercomputers are used to solve scien- Information technology has been used in organisa- erner Betriebssysteme; dabei wird die Architektur tific problems, be it weather forecasting, simulation tional settings and for organisational purposes such von Betriebssystemen anhand eines Schichtenmod- of car crashes or wind tunnels, modeling of proteins as accounting, for a half century, but IT is now in- ells vorgestellt. Damit ergibt sich ein vollständiger in bio-chemical research, or for simulation of atom- creasingly being used for the purposes of mediating logischer Entwurf eines Betriebssystems als Soft- bomb tests. The book deals with systems that are in and regulating complex activities in which multi- waresystem, dessen verschiedene Ausprägungen als practical use for such application areas. In the first ple professional users are involved, such as in facto- eingebettetes oder als herkömmliches Betriebssystem part, the history of supercomputers is described, and ries, hospitals, architectural offices, and so on.  (UNIX, Linux, etc.) in besonderer Weise transparent it is shown which properties and trends will remain The economic importance of such coordination sys- werden. Der Text ist für das Grundstudium ab dem in the future. The second part describes all aspects tems is enormous but their design often inadequate. zweiten oder dritten Semester geeignet und enthält of High Performance Computing, from chip tech- The problem is that our understanding of the co- zahlreiche Übungsaufgaben mit Lösungen. nology over computer and cluster architecture, up ordinative practices for which these systems Features to software, algorithms, and applications. The third are developed is deficient, leaving systems develop- Fundierte Einführung in die Konzepte und Funktio- part explores the practice of HPC planning: system ers and software engineers to base their designs on nen moderner Betriebssysteme. Geeignet für Studen- selection, benchmarks, acceptance tests, and imple- commonsensical requirements analyses.  The ten der Informatik und Ingenieurwissenschaften ab mentation of HPC environments. Finally, the book research reflected in this book addresses these very dem Grundstudium. Enthält zahlreiche Übungen closes with an outlook on current trends and visions problems.  It is a collection of articles which mit Lösungen. like Grid Computing. establish a conceptual foundation for the research area of Computer-Supported Cooperative Work. Features Contents Betriebssysteme.- Physikalischer Adressraum.- Lo- Introduction and overview to the field of High Per- Features gischer Adressraum.- Virtueller Adressraum.- UNIX formance Computing (HPC) Generic HPC architec- Brings together both classic and less well known Systemaufrufe.- Speicher.- Prozesse.- Datei.- Koor- ture is explained and introduced in detail For practi- articles on the phenomena of cooperative dination.- Kommunikation.- Schichtenstrukturen.- tioners who want to build and use HPC systems work and coordinative practices - providing critical Semantische Lücke.- Virtuelle Maschinen.- Hard- elements of the conceptual foundation of CSCW. Contents ware/Software-Hierarchie.- Funktionale Hierarchie.- 1. History.- History of Computing.- Development Contents Modulhierarchie.- Benutzerhierarchie.- Betriebssys- of Supercomputers and Clusters.- Seymor Cray, Am- Cooperative work and coordinative practices: a temmaschine.- Prozessverwaltung.- Prozessinkar- dahl and others.- 2. Architecture, Chips, Clusters and progress report.- The texts: genealogical data and nation.- Koroutine.- Faden.- Prozesseinplanung.- Nodes.- HPC Application Stack.- Chip Development credits.- Riding a tiger, or Computer-Supported Co- Einplanungsverfahren.- FCFS.- RR.- SPN.- SRTF.- Past and Future.- Cluster Systems.- Operating Sys- operative Work.- Taking CSCW seriously: Support- HRRN.- FB.- MLFB.- Echtzeitfähige Einplanung.- tems.- 3. Software Aspects.- Introduction into High ing articulation work.- Modes and mechanisms of FPP.- RMS.- EDF.- LLF.- MUF.- GP.- Semaphor.- Performance Programming.-Optimization.- Paral- interaction in cooperative work.- The organisation Monitor.- [..] lelization Concepts.- Fortran and c as Programming of cooperative work.- Coordination mechanisms.- Fields of interest Languages.-OpenMP and MPI for Parallelization.- Of maps and scripts.- Taking the distributed na- Software Engineering/Programming and Operating Amdahl's Law.- 4. Practise (how to configure and ture of cooperative work seriously.- The critical role Systems; Operating Systems; Computer System Im- purchase).- Benchmarks.- System Configuration.- of workplace studies in CSCW.- The problem with plementation; Input/Output and Data Communica- Purchasing. 'awareness'.- Remarks on the complexity of coopera- tions; Electronic and Computer Engineering tive work.- Ordering systems.- Working within a [..] Fields of interest Target groups Software Engineering/Programming and Operating Fields of interest Dozenten und Studenten an Universitäten und Fach- Systems; Programming Techniques; System Perfor- Information Systems and Communication Service; hochschulen mance and Evaluation; Computer Systems Organiza- Models and Principles; Database Management; In- tion and Communication Networks; Operating Sys- formation Storage and Retrieval; User Interfaces and tems Type of publication Human Computer Interaction; Computer Applica- German textbook tions Target groups IT-planners, IT-managers, system architects, system Target groups Due September 2008 administrators, system developers Rsearchers; Lecturers; Graduates 2008. Etwa 300 S. 150 Abb. (eXamen.press) Softcover Type of publication Type of publication Professional book Reference work 29,95 € ISBN 978-3-540-22303-0 Due July 2008 Due May 2008

2008. Approx. 350 p. 80 illus. Geb. 2008. Approx. 470 p. (Computer Supported Cooperative Work) Geb. 53,45 € ISBN 978-3-540-45121-1 85,55 € ISBN 978-1-84800-067-4 152 Computer springer.com/booksellers

M. Schumacher, Av. du Grammont, Lausanne, Switzerland; H. He- lin, TeliaSonera, Finland; H. Schuldt, Universität Basel, Switzer- land (Eds.)

CASCOM: Intelligent Service Coordination in the Semantic Web

This book presents the design, implementation and validation of a value-added supportive infrastructure for Semantic Web based business application ser- vices across mobile and fixed networks, applied to an emergency healthcare application. This infrastruc- ture has been realized by the CASCOM European re- search project. For end users, the CASCOM frame- work provides seamless access to semantic Web ser- vices anytime, anywhere, by using any mobile com- puting device. For service providers, CASCOM offers an innovative development platform for intelligent and mobile business application services in the Se- mantic Web.

Features Inter-disciplinary combination of technologies is presented Innovative research results and techniques Design and implementation of context-aware agents

Contents From the contents Innovative research results and techniques for context-aware, agent-based business application service coordination and secure provi- sion in open P2P service environments.- Design and implementation of context-aware agents using these techniques, and basic co-ordination infrastructure services.- Service coordination architecture and spec- ifications, and guidelines for using and developing various context-aware business application services in nomadic computing environments.- A prototypi- cally implemented service coordination demonstra- tor for an emergency healthcare use [..]

Fields of interest Information Systems and Communication Service

Target groups Academics, researchers and practitioners

Type of publication Proceedings

Due March 2008

2008. Approx. 250 p. (Whitestein Series in Software Agent Tech- nologies and Autonomic Computing) Softcover

42,69 € ISBN 978-3-7643-8574-3 springer.com/booksellers Computer 153

J. Scott, UK; S. Spendolini, UK A. Seffah, Concordia University, Montreal, Canada; E. Metzker, E. Setton, -Packard Laboratories, Palo Alto, CA, USA; B. Girod, Software Technology Reserach Centre, Daimler Chrysler, Ger- Stanford University, Stanford, CA, USA many Pro Oracle Application Express Peer-to-Peer Video Streaming Adoption-centric Usability Engineering Application Express, or APEX as it is called, is one of the most innovative products to come out of Oracle Systematic Deployment, Assessment and Improvement of Us- Peer-to-Peer Video Streaming describes novel solu- in years. APEX is an application development frame- ability Methods Measurement in Software Engineering tions to enhance video quality, increase robustness work for developing database-backed applications. to errors, and reduce end-to-end latency in video It’s easy enough to get started in that power users streaming systems. This book will be of use to both can quit storing data in random spreadsheets and academics and professionals as it presents thorough Where should usability techniques & HCD instead centralize their data in the powerful, Oracle coverage and solutions for current issues with Video knowledge be considered in the existing software Database. Developers using APEX can go further by Streaming and Peer-to-Peer architectures. Key Fea- development lifecycle to maximize benefits gained leveraging the full power and flexibility of Oracle’s tures: Provides overview of today’s state-of-the art from SE & HCD approaches? This book pro- database engine. APEX’s power, ease-of-use, and in- video streaming technology; Presents adaptive video vides an integrative answer while proposing a sys- tegration with the database have led to a phenomenal coding and streaming techniques for performance tematic approach for the adoption, assessment take-up of the product. Many people use APEX, and enhancement of conventional client-server systems & deployment of usability engineering methods there is strong demand for advanced information on and P2P multicast; Focus on throughput-limited en- within software development teams. The proposed using it. Pro Oracle APEX assumes that readers al- vironments where congestion often hampers interac- approach, called adoption-centric usability engineer- ready know the rudiments of using APEX. The book tivity and fast response times; Results derived from ing (ACUE), provides a process to capture usability tackles the harder problem of showing readers how experiments carried out over large-scale simulated engineering methods together with a context profile. to take full advantage of the APEX framework. As peer networks; Detailed appendix incorporates vari- The context profile encodes human factors that con- with any framework, there are right and wrong ways ous additional experiments. tributed to acceptance or rejection of usability meth- to do things, and there are "blind-alleys" that are best ods in past projects. This context-sensitive descrip- avoided. Pro Oracle APEX gives [..] Features tion of usability engineering is called a USEPack (Us- Novel solutions which enhance video quality, in- Features ability Engineering Experience Package). Written crease robustness to errors and reduce end-to-end la- Coauthored by one of APEX’s original creators Pro- for software developers, managers, educators & tency in video streaming systems   vides deep coverage of enterprise-level development graduates from Academia & Industry, this book topics that other books ignore or gloss over Cov- provides a complete, step-by-step approach for cost- Contents ers advanced topics essential for building large sys- effective integration of usability engineering meth- Video Compression.- Video Streaming.- Multicast tems Concentrates directly on Application Express ods in the [..] Architectures.- Peer-to-Peer Systems.- Video Encod- development, without wasting the reader’s time on ing for Throughput-Limited Paths.- Congestion-Dis- Features side-topics that they already know, or that are best tortion Optimized Scheduling.- Protocol Descrip- Proposes a proven approach for integrating usabili- learned from other books tion.- Experimental Protocol Evaluation.- Video ty methods within software engineering, with an ex- Streaming Protocol.- Peer-to-Peer CoDiO Schedul- Contents plicit methodology. Borne out of a collaboration be- ing.- Experimental Results. Development best practices.- Migration.- Authen- tween Colombia University and Daimler-Chrysler tication.- Conditions and Authorisations.- Data se- Competition touches on need for integration, but Fields of interest curity.- Layout and Navigation.- Reports and Chart- does not have same explicit method. Computer Communication Networks; Computer ing.- Ajax and Web services.- File Storage (Uploads Systems Organization and Communication Net- Contents and Downloads).- Printing and Exporting.- Cus- works Section 1: About Usability and it’s Place in Soft- tomizing Themes and Templates.- Localisation Is- ware Engineering Practices.- Usability in Software Target groups sues.- Integration with LDAP and SSO.- Perfor- Engineering: Obstacles and Pitfalls in the Adop- Academics and engineers in the field of streaming mance and Scalability.- Production Issues.- Ap- tion Path.- Usability Engineering Methods Pletho- media and.or P2P – for example, professionals in pendix A - Sample code.- Appendix B - Online re- ra: An Overview.- Usability Engineering Methods high tech companies such as HP, IBM, Apple, Yahoo, sources.- Appendix C - References. as an Adoption Problem.- Section 2: The Adop- Google, etc. Fields of interest tion-Centric Usability Engineering.- ACUE Funda- Type of publication Software Engineering/Programming and Operating mentals and Principles.- ACUE Architecture and Monograph Systems Components.- How Efective is ACUE? An Evalu- ation Benchmark.- Section 3: Operationalization Target groups and Tools Support.- Put it into Practice: The ProUse Due November 2007 Beginner - intermediate developers and power users Tool.- How ProUse Works? Overall Validation.- Sec- tion IV: ACUE in [..] who are already familiar with the basic concepts of 2008. Approx. 150 p. Geb. Oracle Application Express and want to use it to accomplish real world business requirements and Fields of interest 82,34 € database administrators who want to use APEX to Software Engineering; User Interfaces and Human ISBN 978-0-387-74114-7 manage their environments, or who otherwise wish Computer Interaction to develop small, ad hoc applications Target groups Type of publication Software engineers and managers, HCI and usability Professional book professionals, Researchers, lecturers, graduates Type of publication Due January 2008 Professional book

Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Due March 2008 Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center 2008. Approx. 450 p. Geb.

101,65 € 2008. Approx. 500 p. Softcover ISBN 978-1-84800-018-6 ISBN 978-1-59059-827-6 154 Computer springer.com/booksellers

J.C. Setubal, VA. Bioinformatics Institute, Blacksburg, VA; N. Fran- Z. Shao, Yale University, New Haven, CT, USA (Ed.) Y. Shapira, Technion—Israel Institute of Technology, Haifa, Israel co de Almeida, Jr., UFMS, Campo Grande, Brazil Programming Languages and Matrix-Based Multigrid Introduction to Bioinformatics Systems Using Bacterial Genomics Theory and Applications 5th Asian Symposium, APLAS 2007, Singapore, November 28- December 1, 2007, Proceedings This book introduces and analyzes the multigrid ap- Introduction to Bioinformatics for Bacterial Ge- proach for the numerical solution of large sparse lin- nomics introduces bioinformatics techniques and This book constitutes the refereed proceedings of ear systems arising from the discretization of elliptic programming using bacterial genomics as the main the 5th Asian Symposium on Programming Lan- partial differential equations. Special attention is giv- application area. This advanced-level text book in- guages and Systems, APLAS 2007, held in Singapore, en to the powerful matrix-based-multigrid approach, troduces the student to both bioinformatics and bac- in November/December 2007. The 25 revised full which is particularly useful for problems with vari- terial genomics, with one topic motivating the oth- papers presented together with 3 invited talks were able coefficients and nonsymmetric and indefinite er and vice versa. The strategy of this text is carefully reviewed and selected from 84 submissions. problems. This approach applies not only to model to lead the reader to a series of progressive- The symposium addresses all issues in programming problems on rectangular grids but also to more re- ly more complex steps in the analysis of a bacterial languages and systems - ranging from foundational alistic applications with complicated grids and do- genome, introducing new bioinformatics techniques to practical issues. The papers focus on topics such mains and discontinuous coefficients. Matrix-Based at each step. Introduction to Bioinformatics for Bac- as semantics, logics, foundational theory, type sys- Multigrid can be used as a textbook in courses in nu- terial Genomics includes three classes of exercises: 1) tems, language design, program analysis, optimiza- merical analysis, numerical linear algebra, and nu- theoretical exercises; 2) tool-development program- tion, transformation, software security, safety, veri- merical PDEs at the advanced undergraduate and ming exercises; 3) genome analysis exercises. This fication, compiler systems, interpreters, abstract ma- graduate levels in computer science, math, and ap- book helps the student be as technology-indepen- chines, domain-specific languages and systems, as plied math departments. The theory is written in dent as possible, concentrating on basic concepts, well as programming tools and environments. simple algebraic terms and therefore requires prelim- ideas, biological and mathematical problems, and inary knowledge in basic linear algebra and calculus techniques to solve them. After reading this text, the Fields of interest only. Because it is self contained and includes useful student will develop an essential "toolkit" for genome Programming Languages, Compilers, Interpreters; exercises, the book is also suitable [..] analysis. The results of applying this [..] Software Engineering; Logics and Meanings of Pro- grams; Operating Systems; Programming Tech- Features Features niques; Mathematical Logic and Formal Languages Second edition is a much improved version of the -First text book to present hands-on approach to book, with more explanation included for the non- teach bioinformatics using bacterial genomics as the Target groups expert platform -Includes algorithm design, algorithm im- Researchers and professionals plementation, and application on real data -Will help Contents improve programming skills of life science students Type of publication List of Figures.- List of Tables.- Preface.- Part I. Con- and introduce mathematical sciences students to ge- Proceedings cepts and Preliminaries.- 1. The Multilevel–Multi- nomics   scale Approach.- 2. Preliminaries.- Part II. PDEs and Due November 2007 Their Discretization.- 3. Finite Differences and Vol- Contents umes.- 4. Finite Elements.- Part III. Numerical Solu- -Preface.- Introduction.- Step 1: Genome Bioin- tion of Linear Systems.- 5. Iterative Linear-System formatics Basics.- Step 2: Finding Protein-Coding 2007. XI, 431 p. (Lecture Notes in Computer Science, Band 4807) Solvers.- 6. The Multigrid Iteration.- Part IV. Multi- Genes.- Step 3: Finding RNA Genes.- Step 4: Phy- Softcover grid for Structured Grids.- 7. Automatic Multigrid.- logeny.- Step 5: Gene Annotation.- Step 6: Compara- 8. Applications in Image Processing.- 9. Black-Box tive Genomics.- Odds and Ends.- Complete Genome 59,92 € ISBN 978-3-540-76636-0 Multigrid.- 10. The Indefinite Helmholtz Equation.- Analysis.- Final Topics.- Bibliography/References.- 11. Matrix-Based Semicoarsening.- Part V. Multigrid Index.     for [..]

Fields of interest Fields of interest Computational Biology/Bioinformatics; Pattern Computational Mathematics and Numerical Analy- Recognition; Computer Applications in Chemistry; sis; Numeric Computing; Applications of Mathemat- Bioinformatics; Biomedicine general ics; Numerical and Computational Methods in Engi- neering; Mathematics of Computing; Numerical and Target groups Computational Methods Text Book Primarily: Advanced-Level Students Sec- ondary: Professionals/Practitioners and Researchers Target groups   Advanced undergraduate and graduate students in computer science, math, and applied math depart- Type of publication ments; researchers, engineers, and others interested Professional book in the numerical solution of partial differential equa- tions Due December 2009 Type of publication 2010. Approx. 400 p. 20 illus. Geb. Graduate/advanced undergraduate textbook

56,87 € Due February 2008 ISBN 978-0-387-76708-6

2008. XXII, 320 p. (Numerical Methods and Algorithms, Band 2) Geb.

58,80 € ISBN 978-0-387-49764-8 springer.com/booksellers Computer 155

S. Shekhar, University of Minnesota, Minneapolis, MN, USA; H. S. Shekhar, University of Minnesota, Minneapolis, MN, USA; H. C.A. Shoniregun, University of East London, UK; S. Crosier, Uni- Xiong, Rutgers University, Newark, NJ, USA (Eds.) Xiong, Rutgers University, Newark, NJ, USA (Eds.) versity of East London, UK

Encyclopedia of GIS Encyclopedia of GIS Securing Biometrics Applications

The Encyclopedia of GIS features a comprehensive, The Encyclopedia of GIS features an alphabetical- Biometrics is becoming increasingly common in es- authoritative treatment of this subject matter, with a ly arranged comprehensive and authoritative treat- tablishments that require high security such as state simple A-Z format providing easy access to the field. ment of this subject matter. Authored by world ex- security and financial sectors. The increased threat Authored and peer-reviewed by world experts, the perts and peer-reviewed for accuracy and currency, to national security by terrorists has led to the explo- entries explain the key software, data sets, and pro- the entries explain the key software, data sets, and sive popularity of biometrics. A number of biometric cesses used by geographers and computational sci- processes used by geographers and computational devices are now available to capture biometric mea- entists. Nearly 200 topics include major overviews scientists. Nearly 200 topics include major overviews, surements such as fingerprints, palm, retinal scans, such as Geoinformatics, Spatial Cognition, and Loca- such as Geoinformatics, Spatial Cognition, and Lo- keystroke, voice recognition and facial scanning. tion-Based Services. Short entries, cross-referenced cation-Based Services. Short entries define specific However, the accuracy of these measurements varies, to related larger entries, define specif- terms and concepts, such as the Global Positioning which has a direct relevance on the levels of securi- ic terms and concepts such as the Global Position- System, Digital Elevation/Terrain Model, and Re- ty they offer. With the need to combat the problems ing System, Digital Elevation/Terrain Model, and Re- mote Sensing. Larger entries include key citations related to identify theft and other security issues, so- mote Sensing. Larger entries include key citations to to the literature, and (online) internal hyperlinks to ciety will have to compromise between security and the literature, and (online) internal hyperlinks to def- definitional entries and current standards. The refer- personal freedoms. Securing Biometrics Applications initional entries and current standards. Published as ence will be published as a print volume with abun- investigates and identifies key impacts of biometric a print volume with abundant black and white art, dant black and white art, and simultaneously as an security applications, while discovering opportuni- the Encyclopedia of GIS will be available simultane- XML online reference with hyperlinked citations, ties and challenges presented by the biometric tech- ously as an XML online reference with hyperlinked cross-references, four-color art, links to web-based nologies available. citations, cross-references, four-color art, links to maps, and other interactive features. web-based maps, and other [..] Features Features -Includes new biometric applications to help secure Features First available Encyclopedia on GIS available to the security features in computer systems, passports, Editor-in-Chief is leader in field, with name recog- public in print or electronically Includes standards identity cards, credit cards and entry to government nition as EiC of top journal (Geoinformatica) Top- not yet published departments -Proposes the first biometric measures quality editorial board, both scientifically and geo- regarding information based on a national ID card graphically diverse – ensures balanced coverage A- Contents or centralized passport database system   Z organization allows easy, intuitive access for new- From the contents Preface.- Active Database Tech- comers to field Includes coverage of GIS standards in nology.- Computational Geometry.- Critical Evalu- Contents development by ISO ation of Standards Proposals.- Data Semantics and Preface.- Introduction and overview.- Biometric Models.- Geoinformatics.- Geoprivacy.- Geosecu- Measurements.- Applications of Biometrics.- Meth- Contents rity.-Geospatial Data Versioning.- Graphical As- ods and methodology.- Results and SCSBA Model.- From the contents Preface.- Active Database pects.- Human Spatial Reasoning.- Image Databas- Discussion.- Conclusions and recommendations.- Technology.- Computational Geometry.- Crit- es.- Interoperability and Standards.- Languages for Glossary.- Endnotes.- References.- Bibliography.- In- ical Evaluation of Standards Proposals.- Data Metadata Management.- Management of Raster and dex. Semantics and Models.- Geoinformatics.- Vector Data.- Middleware Architectures.- Practical Geoprivacy.- Geosecurity.-Geospatial Data Version- Approaches from Computational Geometry.- Re- Fields of interest ing.- Graphical Aspects.- Human Spatial Reasoning.- al-Time Spatio-Temporal Databases.- Spatial Aspects Biometrics; Image Processing and Computer Vision; Image Databases.- Interoperability and Standards.- of Bioinformatics.- Spatial Aspects of Mobile Com- Data Encryption; Data Structures, Cryptology and Languages for Metadata Management.- Management puting.- [..] Information Theory; User Interfaces and Human of Raster and Vector Data.- Middleware Architec- Computer Interaction; Multimedia Information Sys- tures.- Practical Approaches from Computational Fields of interest tems Geometry.- Real-Time Spatio-Temporal Databases.- Database Management; Information Storage and Spatial Aspects of Bioinformatics.- Spatial Aspects of Retrieval; Computer Applications in Geosciences; Target groups Mobile Computing.- [..] Geoinformation/Cartography; Statistics for Social Practitioners and researchers in industry Science, Education, Public Policy, and Law; Math. Fields of interest Appl. in Environmental Science Type of publication Database Management; Information Storage and Monograph Retrieval; Computer Applications in Geosciences; Target groups Geoinformation/Cartography; Statistics for Social Research scientists and graduate-level students in Due December 2007 Science, Education, Public Policy, and Law; Math. computer science and geography Appl. in Environmental Science Type of publication 2008. Approx. 203 p. Geb. Target groups Encyclop(a)edia 82,34 € Research scientists and advanced-level students in ISBN 978-0-387-69932-5 computer science and geography Due January 2008

Type of publication Encyclop(a)edia 2008. Online version 367,71 € Due January 2008 ISBN 978-0-387-35973-1

2008. Approx. 1200 p. Geb.

330,63 € ISBN 978-0-387-30858-6 156 Computer springer.com/booksellers

F. Shull, Fraunhofer Center for Experimental Software Engineer- P. Siarry, Université de Paris, France; Z. Michalewicz, University of B. Siciliano, Naples, Italy; O. Khatib, Stanford, CA, USA (Eds.) ing, College Park, MD, USA; J. Singer, National Research Council Adelaide, SA, Australia (Eds.) Institute for Information Technology, Ottawa, ON, Canada; D.I.K. Sjøberg (Eds.) Springer Handbook of Robotics Advances in Metaheuristics for Hard Guide to Advanced Empirical Optimization

Software Engineering Features Research and Application-oriented handbook on one Many advances have been made recently in meta- of the hottest topics in science and technology. The heuristic methods, from theory to applications. The right book at the right time edited by two interna- This book gathers chapters from some of the top editors, both leading experts in this field, have as- tionally renowned experts. Includes all the relevant international empirical software engineering re- sembled a team of researchers to contribute 21 chap- developments and applications of robotics. Ideal re- searchers focusing on the practical knowledge nec- ters organized into parts on simulated annealing, source not only for experts but also for people new to essary for conducting, reporting and using empiri- tabu search, ant colony algorithms, general-purpose this growing field such as computer scientists, medi- cal methods in software engineering. Topics and fea- studies of evolutionary algorithms, applications of cal doctors, engineers, etc. tures include: - Guidance on how to design, conduct evolutionary algorithms, and various metaheuris- and report empirical studies; - Information across tics. The book gathers contributions related to the Contents a range of techniques, methods and qualitative and following topics: theoretical developments in meta- quantitative issues, to help build a toolkit that can be Introduction to Robotics (Bruno Siciliano, Ous- heuristics; adaptation of discrete metaheuristics to sama Khatib)Part A: Robotics Foundations (David applicable to the diversity of software development continuous optimization; performance comparisons contexts that exist; - Material with concrete software Orin)Kinematics.- Dynamics.- Mechanisms and of metaheuristics; cooperative methods combining Actuation.- Sensing and Estimation.- Motion Plan- engineering examples. Organised into 4 parts; the different approaches; parallel and distributed meta- first 2 parts describe techniques usable for data col- ning.- Motion Control.- Force Control.- Robotic heuristics for multiobjective optimization; software Systems Architectures and Programming.- AI Rea- lection and analysis. The third provides techniques implementations; and real-world applications. This for constructing a "body of knowledge" out of indi- soning Methods for RoboticsPart B: Robot Struc- book is suitable for practitioners, researchers and tures (Frank Park)Performance Evaluation and De- vidual studies, and a final section tackles topics relat- graduate students in disciplines such as optimiza- ed to empirical study. Written for graduates as well sign Criteria.- Redundant Manipulators.- Parallel tion, heuristics, operations research, and natural Mechanisms and Robots.- Robots with Flexible Ele- as researchers and practising software engineers in- computing. terested in empirical methods, this book will prove ments.- Model Identification.- Robot Hand.- Legged Robots.- Wheeled Robots.- Micro/Nano RobotsPart an invaluable reference. Fields of interest C: Sensing and [..] Artificial Intelligence (incl. Robotics); Optimization; Features Operations Research, Mathematical Programming; Fields of interest To-date there has been no advanced material geared Engineering Design; Theory of Computation towards new researchers and graduates – this book Automation and Robotics; Artificial Intelligence (in- cl. Robotics); Computer Applications; Numerical fills this gap Offers an extensive toolkit of techniques, Target groups and Computational Methods in Engineering; Elec- methods and qualitative and quantitative issues for Researchers and graduate students in computer sci- tronic and Computer Engineering tackling a diversity of software development con- ence and fields related to optimization (operations texts Offers guidance on the common difficulties and research, mathematics) Target groups challenges encountered in the field, presenting con- Researchers and Students at Universities crete software engineering examples Type of publication and Mechanical and Electrical Engineers in Monograph Contents Industry and Goverment Labs. Editors Introduction.- Section 1: Research Meth- Due November 2007 Type of publication ods and Techniques.- Software engineering da- Handbook ta collection techniques in the field.- Qualitative Methods.- Personal Opinion Surveys.- The Focus 2007. Approx. 510 p. (Natural Computing Series) Geb. Group Method as an Empirical Tool in Software En- Due May 2008 80,20 € gineering.- Simulation Methods.- Section 2: Prac- ISBN 978-3-540-72959-4 tical Foundations.- Statistical Methods and Mea- 2008. eReference. surement.- Missing data in software engineering.- Reporting Experiments in Software Engineering.- 296,31 € A practical guide to ethical research involving hu- ISBN 978-3-540-30301-5 mans.- The Management of University-Industry Collaborations Involving Empirical Studies of Soft- ware [..]

Fields of interest Software Engineering; Software Engineering/Pro- gramming and Operating Systems; System Perfor- mance and Evaluation; User Interfaces and Human Computer Interaction; Management of Computing and Information Systems

Target groups Graduates, researchers, practitioners

Type of publication Contributed volume

Due December 2007

2008. Approx. 350 p. Geb.

82,34 € ISBN 978-1-84800-043-8 springer.com/booksellers Computer 157

B. Siciliano, Università degli Studi di Napoli Federico II, Naples, J. Simmons, Monarch Network Architects, Holmdel, NJ, USA A. Simon, University of Kent, UK Italy; O. Khatib, Stanford University, Stanford, CA, USA (Eds.) Introduction to Optical Network Value-Range Analysis of C Programs Springer Handbook of Robotics Design and Planning

Value-Range Analysis of C Programs describes a Robotics is undergoing a major transformation in static analysis for detecting buffer overflows. A buffer Telecommunications carriers have begun to upgrade scope and dimension. Starting from a predominantly overflow in a C program occurs when input is read their networks with state-of-the-art optical equip- industrial focus, robotics has been rapidly expanding into a memory buffer whose length exceeds that of ment, referred to as optical-bypass technology. The into the challenges of unstructured environments. the buffer. Overflows usually lead to crashes and may ramifications of this technology are manifold, affect- The "Springer Handbook of Robotics" incorporates even enable a malicious person to gain control over a ing the architecture, operation, and economics of these new developments and therefore basically dif- computer system. They are recognised as one of the the network, all of which are covered in this book. fers from other handbooks of robotics focusing on most widespread forms of computer vulnerability. The book is oriented towards practical implementa- industrial applications. It presents a widespread and Based on the analysis of a standard mail-forwarding tion in metro and backbone networks, taking advan- well-structured coverage from the foundations of program, necessary refinements of the basic analysis tage of the author’s extensive experience with actu- robotics, through the consolidated methodologies are examined, thereby paving the way for an analysis al commercial equipment and carrier networks. The and technologies, up to the new emerging applica- that is precise enough to prove the absence of buffer book starts with an overview of optical networking, tion areas of robotics. The handbook is an ideal re- overflows in legacy C code. including an introduction to state-of-the-art optical source for robotics experts but also for people new to networks. The second chapter covers legacy optical this expanding field such as engineers, medical doc- Features equipment and the new optical-bypass technology, tors, computer scientists, designers; edited by two in- Complete formal specification of a static analysis of with an emphasis on the architectural impact of the ternationally renowned experts. Bruno Siciliano is a real-world programming language New techniques equipment. For example, the discussion covers how Professor of Control and Robotics at University of to soundly handle the wrapping of integers, overlap- the various types of equipment affect the economics Naples, President-Elect and Distinguished Lecturer ping memory accesses and pointer arithmetic, and flexibility of the network. One of the challenges of the IEEE Robotics and Automation Society, and thereby providing an analysis of C that is faithful to of optical-bypass technology is that it requires so- he is on the board of the European Robotics [..] the bit-level phisticated algorithms in order to operate [..] Features Contents Features Research and Application-oriented handbook on one From the Contents: Value Range Analysis.- Addresses the need for a very pragmatic approach to of the hottest topics in science and technology. The Analysing C.- A Semantics for C.- Core C.- Related deploying stateof-the-art optical networking equip- right book at the right time edited by two interna- Work.- Abstracting Soundly.- Abstract State Space.- ment in metro and backbone networks through an tionally renowned experts. Includes all the relevant Points-To Analysis.- Numeric Domains.- Taming architectural, algorithmic, and economic approach to developments and applications of robotics. Ideal re- Casting and Wrapping.- A Language Featuring Fi- optical networking. Focuses on real-world networks source not only for experts but also for people new to nite Integer Arithmetic.- Implicit Wrapping of Poly- because it is written from the perspective of someone this growing field such as computer scientists, medi- hedral Variables.- Explicit Wrapping of Polyhedral who has extensive experience with commercial state- cal doctors, engineers, etc. Variables.- An Abstract Semantics for SubC.- Dis- of-the-art networking technology.  Provides cussion.- Overlapping Memory Accesses and Point- Contents [..] ers.- Memory as a Set of Fields.- Mixing Values and Part A Robotics Foundations.- Part B Robot Struc- Pointers.- Abstraction Relation.- Abstract Seman- Contents tures.- Part C Sensing and Perception.- Part D Ma- tics.- Ensuring Efficiency.- Planar Polyhedra.- Oper- Introduction to Optical Networks.- Optical Network nipulation and Interfaces.- Part E Mobile and Dis- ations [..] Elements.- Routing Algorithms.- Regeneration.- tributed Robotics.- Part F Field, Service and Inter- Wavelength Assignment.- Grooming.- Optical Pro- vention Robotics.- Part G Human-Centered and Fields of interest tection.- Economic Studies. Life-Like Robotics Logics and Meanings of Programs; Software Engi- neering; Numeric Computing Fields of interest Fields of interest Communications Engineering, Networks; Computer Automation and Robotics; Artificial Intelligence (in- Target groups Communication Networks; Microwaves, RF and Op- cl. Robotics); Computer Applications; Numerical Researchers and PhD Students tical Engineering; Signal,Image and Speech Process- and Computational Methods in Engineering; Elec- ing tronic and Computer Engineering Type of publication Monograph Target groups Target groups Professionals in the telecommunications in- Researchers and students at universities and me- dustry, as well as graduate students or senior-level Due April 2008 chanical and electrical engineers in industry and gov- undergraduate students. ermental laboratories 2008. Approx. 250 p. Geb. Type of publication Type of publication Monograph 85,55 € Handbook ISBN 978-1-84800-016-2 Due May 2008 Due May 2008

2008. Approx. 300 p. (Optical Networks) Geb. 2008. Approx. 1500 p. 800 illus. in color. Geb. 81,59 € 266,43 € ISBN 978-0-387-76475-7 ISBN 978-3-540-23957-4 158 Computer springer.com/booksellers

A. Singh, SafeNet Infotech Pvt. Ltd., Noida, India (Ed.) S.N. Sivanandam, PSG College of Technology, Coimbatore, India; S.S. Skiena, State University of New York, Stony Brook, NY, USA S.N. Deepa, PSG College of Technology, Coimbatore, India Vulnerability Analysis and Defense The Algorithm Design Manual for the Internet Introduction to Genetic Algorithms

The mathematical analysis of algorithms uses a va- The book contains basic concepts, several appli- riety of topics from discrete math--combinatorial Vulnerability analysis, also known as vulnerability cations of Genetic Algorithms and solved Genetic analysis, congruences, generating functions, graph assessment, is a process that defines, identifies, and Problems using MATLAB software and C/C++. The theory, and other tools. They are essential for anyone classifies the security holes (vulnerabilities) in a com- salient features of the book include - detailed expla- to learn and programatically use and analyze com- puter, network, or an application. In addition, vul- nation of Genetic Algorithm concepts, - numerous putational structures (i.e., algorithms). This new ad- nerability analysis can forecast the effectiveness of Genetic Algorithm Optimization Problems, - study vanced text/reference presents a general computa- proposed countermeasures and evaluate their actu- on various types of Genetic Algorithms, - implemen- tional approach to discrete math. It will also serve as al effectiveness after they are put into use. Vulnera- tation of Optimization problem using C and C++, - a brief manual to the accompanying combinatorial bility Analysis and Defense for the Internet provides simulated solutions for Genetic Algorithm problems program, 'combinatorics.' [proposal attached] packet captures, flow charts and psuedo code, which using MATLAB 7.0, - brief description on the basics enable a user to identify if an application/protocol of Genetic Programming, - application case studies Contents is vulnerable. If an application is vulnerable, then a on Genetic Algorithm on emerging fields. 1.Preliminaries; 2.Sums; 3.Integer Functions; 4.Num- user will be able to understand the complexity, and ber Theory; 5.Binomial Coefficients; 6.Special Num- the theory behind the vulnerability. This edited vol- Features bers; 7.Generating Functions; 8.Discrete Probability; ume also includes case studies where latest exploits Basic introduction to Genetic Algorithms contains 9.Graphy Theory are discussed. basic concepts, several applications of Genetic Al- gorithms and solved Genetic Problems using MAT- Fields of interest Features LAB software and C/C++ Written for a wide range Discrete Mathematics in Computer Science; Mathe- Includes detail vulnerabilities in an application and of readers, who wishes to learn the basic concepts of matics of Computing; Combinatorics how the vulnerability affects the software Provides Genetic Algorithms Starters can understand the con- a source code for effective signatures to prevent vul- cepts with a minimal effort Target groups nerabilities Advanced undergraduates Practitioners Beginning Contents grads n/a Contents Evolutionary Computation.- Genetic Algorithms.- HTTP Protocol Vulnerability Analysis.- SMTP / Terminologies and Operators of Genetic Algorithm.- Type of publication POP/IMAP Vulnerability Analysis.- LDAP Vulnera- Advanced Operators and Techniques in Genetic Al- Graduate/advanced undergraduate textbook bility Analysis.- SNMP Vulnerability Analysis.- DNS gorithm.- Classification of Genetic Algorithm.- Ge- Protocol.- FTP Protocol.- TFTP Protocol.- Wireless netic Programming.- Genetic Algorithm Optimiza- Due September 2008 Security.- Malware Analysis.- Spyware. tion Problems.- Genetic Algorithm Implementation using Matlab.- Genetic Algorithm Optimization in Fields of interest 2008. Approx. 735 p. 75 illus. Geb. Systems and Data Security; Computer Communica- C/C++.- Applications of Genetic Algorithms. tion Networks; Data Encryption; Information Sys- 55,64 € Fields of interest tems Applications (incl.Internet); Computer Systems ISBN 978-1-84800-069-8 Appl.Mathematics/Computational Methods of Engi- Organization and Communication Networks; Data neering; Artificial Intelligence (incl. Robotics) Structures, Cryptology and Information Theory Target groups Target groups Graduate students, researchers in evolutionary com- Practitioners, researchers, advanced-level students putation, and genetic algorithms; readers, who wish Type of publication to learn the basic concepts of genetic algorithms Contributed volume Type of publication Monograph Due January 2008 Due October 2007 2008. Approx. 250 p. (Advances in Information Security, Band 40) Geb. 2008. XIX,442 p.193 illus Geb. 81,59 € 74,85 € ISBN 978-0-387-74389-9 ISBN 978-3-540-73189-4 springer.com/booksellers Computer 159

A. Soares, Instituto Superior Técnico, Lisbon, Portugal; M.J. W. Sollbach, G. Thome A. Spink, Brisbane, QLD, Australia; M. Zimmer, New York Universi- Pereira, Instituto Superior Técnico, Lisbon, Portugal; R. Dimi- ty, NY, USA (Eds.) trakopoulos, McGill University, Montreal, Canada (Eds.) Information Lifecycle Management Web Search geoENV VI – Geostatistics for Prozessimplementierung Environmental Applications Multidisciplinary Perspectives

Im Zusammenhang mit IT-Governance, Sar- banes-Oxley Act und Basel II ist Information Life- Web search engines have emerged as one of the This volume contains ca. 40 selected full-text con- cycle Management, kurz ILM, ein Thema, das jed- dominant technologies of modern life, leaving few tributions from the Sixth European Conference er CIO beherrschen muss. Die Autoren fassen In- aspects of our everyday activities untouched. Search on Geostatistics for Environmental Applications, formation als ein Produkt auf, das einem Leben- engines are not just indispensable tools for finding geoENV IV, held in Rhodes, Greece. October 25-26, szyklus unterliegt. Jede Phase dieses Produktleben- and accessing information online, but have become 2006. The objective of the editors was to compile szyklus erfordert andere IT-Methoden, um Infor- a defining component of the human condition and a set of papers from which the reader could per- mation kostenbewusst zu speichern sowie zu be- can be conceptualized as a complex behavior embed- ceive how geostatistics is applied within the environ- und verarbeiten. Das Buch beschreibt, wie ein Pro- ded within an individual's everyday social, cultur- mental sciences. A few selected theoretical contri- jekt zur Implementierung eines ILM aufgesetzt und al, political, and information-seeking activities. This butions are also included. Audience: After six edi- durchgeführt wird. Ein Überblick über die technis- book investigates Web search from the non-techni- tions the geoENV Congress Series has established chen Realisierungsansätze der gängigen Hersteller cal perspective, bringing together chapters that rep- itself as a 'must' to all scientists working in the field bildet den letzten Teil des Buches. Der Leser erhält resent a range of multidisciplinary theories, mod- of geostatistics for environmental applications. Each durchgängig Entscheidungshilfen zur Implemen- els, and ideas about Web searching. They examine geoENV congress covers the developments which tierung und Technikauswahl eines erfolgreichen In- the various roles and impacts of Web searching on have occurred during the preceding two years, but formation Lifecycle Managements. the social, cultural, political, legal, and informational always with a highly applied focus. It is precisely this spheres of our lives, such as the impact on individu- focus on the applications to environmental sciences Features als, social groups, modern and postmodern ways of which makes the geoENV volumes unique and of Erstes deutschsprachiges Buch zum Thema Informa- knowing, and public and private life. By critically ex- great interest and practical value to geostatisticians tion Lifecycle Management Umfassende Information amining the issues, theories, and formations arising working both in academia and in industry. für Entscheider from, and surrounding, Web searching, Web [..]

Fields of interest Fields of interest Contents Math. Applications in Geosciences; Environmental Management of Computing and Information Sys- 1) Introduction (Spink, Zimmer).- Part I: Social, Cul- Computing/Environmental Modelling; Statistics for tems; Information Systems and Communication Ser- tural, and Philosophical Perspectives - 2) Through Engineering, Physics, Computer Science, Chemistry vice; Database Management; Information Systems the Google Goggles: Sociopolitical Bias in Search & Geosciences; Math. Appl. in Environmental Sci- Applications (incl.Internet); Management; Technol- Engine Design (Diaz) - 3) Reconsidering the Rhi- ence ogy Management zome: A Textual Analysis of Web Search Engines as Gatekeepers of the Internet (Hess) - 4) Exploring Target groups Target groups Gendered Notions: Gender, Job Hunting, and Web Researchers, scientists, professionals, institutes, li- CIOs, IT-Manager, Storage Unternehmen, Systemar- Searches (Martey) - 5) Searching Ethics: The Role braries, graduate students of Geosciences, Geostatis- chitekten of Search Engines in the Construction and Distribu- tics, Spatial Statistics, Environmental Science and tion of Knowledge (Hinman) - 6) The Gaze of the Engineering, Ecology, Oceanography, Climatology, Type of publication Perfect Search Engine: Google as an Infrastructure of Hydrology, Soil and Forestry Science Professional book Dataveillance (Zimmer).- Part II: [..] Type of publication Due November 2007 Fields of interest Monograph Information Systems Applications (incl.Internet); Social Sciences; Library Science; Computers and So- 2007. Etwa 400 S. 100 Abb. (Xpert.press) Geb. Due January 2008 ciety 59,95 € 2008. XX, 506 p. 200 illus. (Quantitative Geology and Geostatis- ISBN 978-3-540-35838-1 Target groups tics, Band 15) Geb. Information scientists, computer scientists, librari- ans, library science researchers 160,45 € ISBN 978-1-4020-6447-0 Type of publication Monograph

Due January 2008

2008. Approx. 440 p. (Information Science and Knowledge Man- agement, Band 14) Geb.

96,25 € ISBN 978-3-540-75828-0 160 Computer springer.com/booksellers

E. Stefanakis, Harokopio University, Athens, Greece C. Stych, Fachhochschule Dortmund; K. Zeppenfeld, Fach- S. Sumathi, PSG College of Technology, Coimbatore, India; T. hochschule Dortmund Hamsapriya, PSG College of Technology, Coimbatore, India; P. Surekha, PSG College of Technology, Coimbatore, India Geographic Databases and GIS ITIL Evolutionary Intelligence

 The author highlights the technological as- An Introduction to Theory and Applications with Matlab pects of GIS. Specifically, it focuses on its database Dieses Buch geht auf die Standards, Normen und and database management system. The method- Frameworks des IT-Managements, mit dem Schw- erpunkt ITIL, ein. Im Bezug zur Theorie und Prax- ologies for modeling and handling geographic da- This book gives a good introduction to evolution- is werden die Wichtigkeit und der Vorteil von ITIL ta are described while commercial packages are ary computation for those who are first entering the für ein Unternehmen oder eine Behörde diskutiert, presented.  field and are looking for insight into the underlying sowie der Einsatz von Opensource-Lösungen. Nach mechanisms behind them. Emphasizing the scientif- Contents einer ausgiebigen Erläuterung der neuen 3. ITIL- ic and machine learning applications of genetic algo-   1) Geographic Data and Geographic Version hat der Leser die Möglichkeit, das erwor- rithms instead of applications to optimization and Information Systems  The nature of geo- bene Wissen mit Checklisten zu festigen und mit engineering, the book could serve well in an actual graphic data; Information system; Geographic Aufgaben zu prüfen. Dieses Werk dient zum Nach- course on adaptive algorithms. The authors include Informatioan Systems;   2) Database Sys- schlagen für IT-Manager, IT-Verantwortliche und excellent problem sets, these being divided up into tems Technology Database systems; Database sys- IT-Berater, sowie zum Selbststudium der Studenten "thought exercises" and "computer exercises" in ge- tems design; Advanced database systems mit Schwerpunkt IT und Management. netic algorithm. Practical use of genetic algorithms design; Data structure and algorithms   demands an understanding of how to implement 3) Geographic Database Systems Technology Contents them, and the authors do so in the last two chap- Representation of geographic data; Geographic data Vorwort.- Einleitung.- Was ist ITIL®?.- Zertifizierun- ters of the book by giving the applications in various models; Geographic data analysis operations; Com- gen, Qualifikationen und Trainings.- Die fünf ITIL- fields. This book also outlines some ideas on when putational geometry; Spatial data structure; Execut- Kernbücher.- Überblick der ITIL-Management- genetic algorithms and genetic programming should ing geographic operations; Commercial geographic bereiche.- Weitere Frameworks.- ITIL in der Prax- be used, and this is useful since a newcomer to the database systems; Current [..] is.- ITIL-Software, -Projekte und Dienstleistungsfir- men.- Fallbeispiel mittels Opensource-Produkten.- field may be tempted to view a genetic algorithm as Fields of interest Anhang. Wichtige (ergänzende) Quellen im Internet. merely a fancy Monte Carlo simulation. The most Geoinformation/Cartography; Environmental Com- Glossar. Checklisten. Aufgaben. Lösungen. difficult part of using a genetic algorithm is [..] puting/Environmental Modelling; Math. Applica- Features tions in Geosciences; Information Systems Applica- Fields of interest Basic Introduction to Evolutionary Computation tions (incl.Internet); Computer Appl. in Life Sciences Computer Science, general Contains basic concepts, several applications of Evo- Target groups Type of publication lutionary Computation and solved Problems using  Researchers, scientists, libraries, advanced German textbook MATLAB software and C/C++ Written for a wide students, (Geosciences, Geoinformation/Geo- range of readers, who wishes to learn the basic con- cepts of Evolutionary and Genetic Algorithms A matics, Information Systems, Cartography, Geogra- Due February 2008 phy, Environmental Sciences) starter can understand the concepts with a minimal effort Type of publication 2008. eBook. (Informatik im Fokus) Softcover Monograph Contents 14,95 € Introduction to Evolutionary Computation.- Evolu- ISBN 978-3-540-73118-4 tionary Algorithms.- Genetic Algorithms with Mat- Due December 2008 lab.- Genetic Programming Concepts.- Parallel Ge- netic Algorithms.- Applications of Evolutionary Al- 2008. Approx. 400 p. Geb. gorithms.- Applications of Genetic Algorithms.- Ge- netic Programming Applications.- Applications of 128,35 € Parallel Genetic Algorithm.- Assembling DNA Frag- ISBN 978-3-540-22491-4 ments with a Distributed Genetic Algorithm.

Fields of interest Appl.Mathematics/Computational Methods of Engi- neering; Artificial Intelligence (incl. Robotics)

Target groups Graduate students, researchers in evolutionary com- putation, genetic algorithms, wide range of readers, who wishes to learn the basic concepts and state of the art of EC

Type of publication Monograph

Due January 2008

2008. Approx. 660 p. Geb.

106,95 € ISBN 978-3-540-75158-8 springer.com/booksellers Computer 161

C. Sun, CSIRO, North Ryde, NSW, Australia W. Susilo, Engineering University of Wollongong, Australia; J.K. E. Swartzlander, University of Texas at Austin, TX, USA; C. Liu, Institute for Infocomm Research; Y. Mu, Engineering Univer- Lemonds, AMD (Eds.) sity of Wollongong, Australia (Eds.) Fast Algorithms for Stereo Matching Computer Arithmetic: A Complete Provable Security Reference First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 Proceedings An ongoing effort is being made in the field of com- puter vision to refine algorithms for optimal/bet- This is a collection of the key papers in floating-point ter performance, which can mean reliability and in- arithmetic. The focus is on hardware implementa- creased computational speed. This is highly impor- This book constitutes the refereed proceedings of tion using VLSI circuits. Although some of the pa- tant given that vision problems are much larger than the First International Conference on Provable Secu- pers are written by academics, many are by people ever before. One way to satisfy part of the demand rity, ProvSec 2007, held in Wollongong, Australia, from industry describing real chips. This compre- is to design more efficient and clever algorithms October 31 - November 2, 2007. The 10 revised full hensive book will combine collected papers from that optimize computations in an existing proces- papers presented together with 7 short papers were two previously published volumes into one accessi- sor, rather than require expanded processor perfor- carefully reviewed and selected from 51 submissions. ble reference. Key Features: Book is a thorough com- mance. Such fast algorithms are becoming increas- The papers are organized in topical sections on Au- pellation of the most influential papers in Computer ingly important for tele-reality, interactive media thentication, Asymmetric Encryption, Signature, Arithmetic; Combines obscure yet important papers and visual servoing applications. This book presents Protocol and Proving Technique, Authentication into one easily accessible volume; Newest edition in some fast and reliable algorithms for dense stereo and Symmetric Encryption, Signature and Asymmet- established series from Earl Swartzlander, a top ex- matching and optical-flow estimations using a gen- ric Encryption. pert in the field of Computer Arithmetic. eral language, such as C, rather than dedicated hard- Fields of interest ware implementation. "Dense" in this instance means Features Systems and Data Security; Data Structures, Cryp- performing stereo matching for every point on the Book is a thorough compellation of the most influ- tology and Information Theory; Data Encryption; e- image rather than just matching features such as ential papers in Computer Arithmetic Combines business and e-commerce; Legal Aspects of Comput- points, lines or regions. Techniques described are: obscure yet important papers into one easily acces- ing fast algorithms for similarity measure, use of [..] sible volume Newest edition in established series from Earl Swartzlander, a top expert in the field of Target groups Contents Computer Arithmetic Thorough treatment of Float- Researchers and professionals Introduction.- Stereo vision.- Fast calculation of sim- ing-Point Arithmetic ilarity measures.- Rectangular subregioning.- Mul- Type of publication Contents ti-resolution Scheme.- Fast stereo matching.- Stereo Proceedings matching using 3-D surface.- Stereo matching using N/A warping.- Panoramic stereo matching.- Fast optical Fields of interest flow.- Discussions on reliability and speed.- Applica- Due October 2007 Processor Architectures; Circuits and Systems; Ap- tions. plications of Mathematics 2007. X, 237 p. (Lecture Notes in Computer Science, Band 4784) Fields of interest Softcover Target groups Pattern Recognition; Image Processing and Comput- Engineers that design processors in industry and er Vision; Simulation and Modeling 44,94 € ISBN 978-3-540-75669-9 graduate students in computer engineering or com- Target groups puter science Professionals, Researchers Type of publication Type of publication Collection of essays Manual Due February 2008 Due March 2008 2008. Approx. 1100 p. Geb. 2007. Approx. 290 pp. 70 illus. Geb. 205,98 € 48,10 € ISBN 978-0-387-74883-2 ISBN 978-0-387-95424-0 162 Computer springer.com/booksellers

A. Syropoulos, Democritus University of Thrace, Xanthi, Greece I. Teich, Dr. Irene Teich GmbH, Postbauer-Heng; W. Kolbenschlag, D. Thalmann, EPFL VRlab, Lausanne, Switzerland; S.R. Musse, UBK GmbH, Lauf; W. Reiners, PRW Rechtsanwälte, München Pontifícia Universidade Católica do Rio Grande do Sul, Brazil Hypercomputation Der richtige Weg zur Crowd Simulation Computing Beyond the Church-Turing Barrier Softwareauswahl

Pflichtenheft, Compliance, Erfolgskontrolle There has been a growing interest in crowd simula- Hypercomputation is a relatively new theory of com- tion particularly in the commercial sector where it putation that is about computing methods and de- is used in security, defence, entertainment and the vices that transcend the so-called Church-Turing Sie treffen täglich Entscheidungen. Doch selten movie industry. This field is now reaching maturity thesis. This book will provide a thorough descrip- ist eine so komplex wie die Auswahl einer Un- and there is a need for a book that focuses entirely tion of the field of hypercomputation covering all at- ternehmens-Software. Daher ist hier die gute Vor- on methods and techniques for crowd simulation, tempts at devising conceptual hypermachines and bereitung umso wichtiger. Sie wollen die notwendi- this book fills that gap. The topics covered include: all new promising computational paradigms that ge Qualität des Lasten- bzw. Pflichtenheftes sicher- Modelling of populations, Virtual Human Anima- may eventually lead to the construction of a hyper- stellen und dabei wollen Sie wenig Zeit für die Mark- tion, Behavioural Animation of Crowds, Crowd Ren- machine. Readers of this book will get a deeper un- tanalyse und Ausschreibung investieren. Die Au- dering, Populated Environments. derstanding of what computability is and why the toren zeigen mehrere aktuell verfügbare Verfahren Church-Turing thesis poses an arbitrary limit to für die Softwareauswahl auf. Ein Verfahren, bei dem Features what can be actually computed. Hypercomputing Aufwand und Ergebnis im richtigen Verhältnis ste- First book to focus entirely on methods and tech- is in and of itself quite a novel idea and as such the hen, wird detailliert beschrieben. Sie können gle- niques for crowd simulation Crowd simulation is in book will be interesting in its own right. The most ichzeitig Compliance und andere gesetzliche An- demand in many applications including, security, de- important features of the book, however, will be the forderungen mit berücksichtigen. Das notwendi- fence, entertainment and the movie industry thorough description of the various attempts of hy- ge umfangreiche Vertragswerk wird transparent percomputation: from trial-and-error machines to gemacht. Sie kontrollieren also Ihr Gesamtpro- Contents the exploration of the human mind, if we treat it as a jekt. Die Ergebnisse fallen im Interesse Ihres Un- Introduction.- State of the Art.- Modeling of Popula- computing device. ternehmens aus. Drei Experten liefern Ihnen das tions.- Virtual Human Animations.- Behavioral An- Wichtigste aus Praxis, Theorie und Recht. Konzen- imation of Crowds.- Relating Real Crowds with Vir- Features trieren Sie sich auf das Wesentliche: Ihr Geschäft. tual Crowds.- Crowd Rendering.- Populated envi- Deals exclusively with the topic and presents the ronments.- Applications: Case Studies.- References. whole field Provides a deeper understanding of what Features computability is and why the Church-Turing thesis Standardisiertes und erprobtes Verfahren mit einem Fields of interest poses an arbitrary limit to what can be actually com- Bündel an Methoden, das bei der Auswahl der richti- Computer Graphics; Image Processing and Comput- puted Describes the various attempts at hypercom- gen Software für das Unternehmen hilft Mit einem er Vision; Simulation and Modeling; Pattern Recog- putation: from trial-and-error machines to the ex- Executive Summary speziell für Entscheider nition ploration of the human mind, if treated as a comput- ing device Contents Target groups Softwareauswahl in neuem Licht.- Was den PhD candidates, undergraduate/postgraduate stu- Contents Entscheider angeht.- Maßnahmen im Vorfeld.- dents interested in crowd simulation Preface.- Introduction.- On the Church-Turing The- Der Weg zum Pflichtenheft.- Softwareauswahl Type of publication sis.- Early Hypercomputers.- Infinite Time Turing nach ePAVOS.- Vertragsgestaltung.- Das Monograph Machines.- Interactive Computing.- Hyperminds.- Einführungsprojekt.- Erfolgskontrolle beim Softwa- Computing Real Numbers.- Relativistic and reeinsatz.- Trends im IT-Einsatz. Quantum Hypercomputation.- Natural Com- Due November 2007 putation and Hypercomputation.- Appendix A. In- Fields of interest teractability and Hypercomputation.- Appendix B.- Management; Information Systems; Information 2007. Approx. 270 p. Geb. Socio-Economical Implications.- Appendix C. A Systems Applications (incl.Internet) Précis of Topology and Differential Geometry.- Bib- 80,20 € liography.- People Index.- Subject Index. Target groups ISBN 978-1-84628-824-1 Praktiker, insbesondere im Bereich IT, Fields of interest Geschäftsführer, Berater Theory of Computation; Algorithm Analysis and Problem Complexity; Computation by Abstract De- Type of publication vices; Coding and Information Theory Professional book

Target groups Due November 2007 Researchers, engineers, and professionals in Com- puter Science, Mathematics and Physics 2007. XXIV, 241 S. 99 Abb. Geb. Type of publication Monograph 49,95 € ISBN 978-3-540-71261-9 Due May 2008

2008. XVI, 216 p. 14 illus. Geb.

64,15 € ISBN 978-0-387-30886-9 springer.com/booksellers Computer 163

R.F. Tichy, Technical University Vienna, Graz, Austria; H.P. Schlick- H. Toriya, Lattice Technology, Co. Ltd., Tokyo, Japan P. Traynor, Penn State University, University Park, PA, USA; P. Mc- ewei, Phillipps-University, Marburg, Germany; K. Schmidt, Uni- Daniel, Penn State University, University Park, PA, USA; Th. La versity of Vienna, Austria (Eds.) Porta, Penn State University, University Park, PA, USA 3D Manufacturing Innovation

Diophantine Approximation Revolutionary Change in Japanese Manufacturing with Digital Security and Telecommunications Data Festschrift for Wolfgang Schmidt Networks

3D design is now a key technology for effective col- This volume contains 21 research and survey papers laboration between manufacturing companies. Since Telecommunications networks are a critical compo- on recent developments in the field of diophantine the introduction of light-weight 3D data technolo- nent of the economic and social infrastructures in approximation. This includes contributions to Wolf- gy, “post-3D CAD/CAM/CAE data” is now compat- which we live. Each day, more than two billion peo- gang Schmidt's subspace theorem and its applica- ible for use across manufacturing, sales and market- ple across the globe rely upon these systems, as their tions to diophantine equations and to the study of ing processes. The successful use of 3D data through- primary means of connecting to the world around linear recurring sequences. The articles are either in out such processes has become indispensable for them Given the significant focus on securing critical the spirit of more classical diophantine analysis or the competitive strength of companies in the man- infrastructure in recent years, Security and Telecom- of geometric or combinatorial flavour. Several arti- ufacturing industry. For a company to survive and munications Networks creates a starting place for cles deal with estimates for the number of solutions win in the manufacturing industry, it must not on- new researchers in the field of secure telecommuni- of diophantine equations as well as with congruences ly accumulate light-weight 3D data, but also share cations networks. This volume not only discusses and polynomials. Furthermore, the volume contains this information within the company and with re- emerging threats, along with system vulnerability, transcendence results for special functions and con- lated companies, and train key personnel in the use but also presents the open questions posited by net- tributions to metric diophantine approximation and of this data. 3D Manufacturing Innovation intro- work evolution and defense mechanisms. Security discrepancy theory. The articles are based on lectures duces the best practices developed by Toyota, Sony, and Telecommunications Networks is designed for a given at a conference at the Erwin Schrödinger-Insti- Nikon, Casio and other pioneers in the global engi- professional audience composed of practitioners and tute (Vienna, 2003), where many leading experts in neering scene, providing the reader with invaluable researchers in industry. This book is also suitable as the field of diophantine approxiamtion participated. tips for manufacturing innovation. 3D Manufactur- a secondary text for graduate-level students in com- ing Innovation is a valuable guide for corporate IT puter science and electrical engineering. Features managers, consultants and professionals involved in Features Current information on important branches of dio- CAD/CAM/CAE, as [..] phantine approximation from leading experts in the First book to discuss securing current and next gen- field Diverse methods are presented The influence of Features eration telecommunications networks by the secu- diophantine approximation in other fields, e.g. com- Introduces the best practises of global companies for rity community Telecommunications networks are binatorial geometry, game theory the use of light-weight 3D CAD/CAM/CAE data part of national critical infrastructure – one of the few systems not previously subject to external securi- Fields of interest Contents ty scrutiny and review Algebra; Computational Mathematics and Numeri- Adoption of IT by Manufacturing Industry to En- cal Analysis; Number Theory hance Competitive Strength.- The Trend Towards Contents the Use of Lightweight 3D Data.- SONY: Ideas on Preface.- Introduction .- Network Architecture and Target groups Expanding Lightweight 3D Data to Company-wide Security Overview.- Taxonomy of Telecommuni- Researchers and graduate students Use.- Surfacing Effects of the Use of Lightweight cations Vulnerabilities.- SMS Attacks.- SMS Attack 3D Data.- TOYOTA: Design Review in Body De- Mitigation Techniques.- Attacks on Cellular Data Type of publication sign.- NIKON: The Use of 3D Data as a Commu- Systems.- Open Problems and Future Directions.- Proceedings nication Pipe.- YAMAGATA CASIO: Digital Engi- Index. neering Practiced at Die and Mold Plant and Trans- Fields of interest Due February 2008 fer of Technological Information.- ALPINE PRECI- Systems and Data Security; Computer Communi- SION: Report-less and Drawing-less in Mold-Mak- cation Networks; Data Encryption; Data Structures, ing.- TOKAI RIKA: Visualization of Product Infor- 2008. Approx. 430 p. (Developments in Mathematics, Band 16) Cryptology and Information Theory; Computer Sys- Geb. mation; Mold-making Using 3D Work [..] tems Organization and Communication Networks 106,95 € Fields of interest Target groups ISBN 978-3-211-74279-2 Manufacturing, Machines, Tools; Computer-Aided Professionals Engineering (CAD, CAE) and Design; Engineering Design; Industrial Design (Industriedesign); Produc- Type of publication tion/Logistics Professional book Target groups Corporate IT managers responsible for relating man- Due December 2007 ufacturing process by employing different digital en- gineering tools like CAD, CAE, CAT, and PDM; all 2008. Approx. 350 p. (Advances in Information Security, Band 54) professionals involved in the manufacturing of prod- Geb. ucts; IT consultants; vendors of digital engineering software 81,59 € ISBN 978-0-387-72441-6 Type of publication Monograph

Due March 2008

Originally published in Japanese by Nikkei Business Publications, 2006

2008. Approx. 300 p. Geb.

99,46 € ISBN 978-1-84800-037-7 164 Computer springer.com/booksellers

A. Troelsen, Minneapolis, MN, USA B. Trops, C. Schröder, M. Herr, C. Utschig W. Truszkowski, NASA Goddard Space Flight Center, USA; L. Hal- lock, NASA Goddard Space Flight Center, USA; C. Rouff, Science Applications International Corporation; J. Karlin, Viable Systems, Pro VB 2008 and the .NET 3.5 Enterprise Architektur mit SOA Inc. USA; J. Rash, University of Maryland, Baltimore County, USA; M. Hinchey, NASA Goddard Space Flight Center, USA; R. Sterritt, Platform Konzepte einer SOA-Basierten Systemintegrationslösung University of Ulster, UK (Eds.)

Autonomous and Autonomic .NET 3.5 is Microsoft’s largest development soft- "Service Oriented Architecture" (SOA) dient der Systems ware launch since .NET 2.0 and (unlike .NET 3.0) Integration heterogener Systemlandschaften. completely replaces all previous .NET versions. A Basierend auf einer umfangreichen Anzahl von With Applications to NASA Intelligent Spacecraft Operations new version of Visual Studio – Visual Studio ‘Or- Standards ermöglichen SOAs die Kopplung der and Exploration Systems cas’ is being created for the new Framework togeth- unterschiedlichen IT-Systeme und Applikationen er with new versions of both the Visual Basic and eines Unternehmens, ohne dabei deren notwendi- C# languages. This book deals with this new Visu- ge Autonomie zu gefährden. Sowohl Business- und This book provides an in-depth discussion of au- al Basic language. The book provides developers technische Architekten als auch Projekt-Manag- tonomous and autonomic systems, their interdepen- with a complete treatise on the new technology- er müssen den Überblick darüber behalten, welche dencies, differences and similarities. Current and explaining the importance of all the new features Teilkonzepte und Technologien der SOA reif für pending issues in these evermore increasingly im- (lambda expressions, LINQ, ASP.NET AJAX, WPF die Anwendung sind. Welche Konzepte sind neu? portant subjects are highlighted and discussed. Con- everywhere).and how they integrate into the frame- Welche sind bereits überholt, und welche werden cepts, ideas and experiences are explored in relation work of the previous .NET versions. It is a compre- sich voraussichtlich in Zukunft etablieren? In diesem to real-life NASA systems in spacecraft control and hensively revised and updated version of author’s Buch wird der Leser mit dem SOA-Paradigma ver- in the exploration domain. award winning previous titles. traut gemacht. Anhand eines durchgängigen Integra- tionsbeispiels erhält er einen fundierten Einblick in Features Features die Aspekte einer Enterprise Architecture auf SOA- The first book to deal with his important new tech- Unique combination of spacecraft, autonomous and Basis. Diese Architektur muss weit mehr bieten als autonomic systems nology in detail Written by a proven and award die Implementierung von Systemschnittstellen und winning .NET author that has been following the die Applikationsintegration über Web-Services. Contents technology release cycle since it’s inception Covers From the Contents: Part I Background.- Introduc- not just the details of VB 9.0 with .NET 3.5 but also Features tion.- Direction of New Space Mission.- Overview of the technology’s integration with previous versions SOA an einem durchgängigen Integrationsbeispiel Flight and Ground Software.- Flight vs. Ground Im- of .NET and ancillary technologies erläutert Praxisorientierte Darstellung plementation.- Flight Autonomy Evolution.- Current Levels of Flight Automation/Autonomy.-Ground Contents Fields of interest Autonomy Evolution.- Agents for Ground Auton- Introducing VB and the .NET Platform.- The Phi- Software Engineering/Programming and Operating omy.- Part II Technology.- Core Technologies for losophy of .NET.- Building VB Applications.- VB Systems; Input/Output and Data Communications; Developing Autonomous and Autonomic Systems.- Programming Fundamentals.- VB Programming Computer Communication Networks; Multimedia Reasoning with Partial Information.- Agent-based Constructs, Part I.- VB Programming Constructs, Information Systems; Programming Techniques; Spacecraft Autonomy Design Concepts.- Flight Soft- Part II.- Defining Encapsulated Class Types.- In- Programming Languages, Compilers, Interpreters heritance and Polymorphism.- Structured Excep- ware Backbone Concept.- Cooperative Autonomy.- tion Handling.- Understanding Object Lifetime.- Target groups Need for Cooperative Autonomy in Space Missions.- Advanced Object Oriented Constructs.- Working Projektmanager, IT-Architekten, Systemadministra- Expectations of [..] with Interfaces.- Delegates and Events.- Advanced toren Fields of interest VB Programming Constructs.- Collections, Gener- Artificial Intelligence (incl. Robotics); Simulation ics and Nullable Data Types.- Functional Program- Type of publication and Modeling; Extraterrestrial Physics, Space Sci- ming Constructs.- Introducing LINQ.- Program- Professional book ences ming with .NET Assemblies.- [..] Due July 2008 Target groups Fields of interest NASA employees and Contractors / Researchers Programming Techniques 2008. Etwa 400 S. (Xpert.press) Geb. Type of publication Target groups 49,95 € Monograph New .NET developers , intermediate ISBN 978-3-540-36818-2 to advanced starting their careers with the most current version of the technology. and .NET 2.0 Due April 2008 developers trading up to .NET 3.5 2008. Approx. 316 p. (NASA Monographs in Systems and Soft- Type of publication ware Engineering) Geb. Professional book 82,34 € Due January 2008 ISBN 978-1-84628-232-4

Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center

2008. Approx. 1000 p. Geb.

ISBN 978-1-59059-822-1 springer.com/booksellers Computer 165

M.-H. Tsou, San Diego University, California, USA H. Tsubaki, University of Tsukuba, Japan; K. Nishina, Nagoya In- P. Tuyls, Philips Research, Eindhoven, The Netherlands; B. Sko- sutitute of Technology, Nagoya, Japan; S. Yamada, University of ric, Philips Research, Eindhoven, The Netherlands; T. Kevenaar, Tsukuba, Japan (Eds.) Philips Research, Eindhoven, The Netherlands (Eds.) Designing Web Map Services and Network-based Cybercartography The Grammar of Technology Security with Noisy Data

Development Private Biometrics, Secure Key Storage and Anti-Counterfeit- ing This book provides a comprehensive intro- duction of web map services including online map design principles, theories of cybercartography, var- This book includes one keynote lecture and four- ious real-world mapping applications, and the relat- teen selected papers that describe a general guideline Noisy data appear very naturally in applications ed Web GIS technologies. The goal of this book is and supporting concepts/tools of technology devel- where the authentication is based on physical identi- to provide a practical learning guide to cartograph- opment as a grammar. Recent advances of scientif- fiers. This book provides a self-contained overview ic graduate students and GIS/Cartography ic and engineering environments require new disci- of the techniques and applications of security based professionals who are interested in developing web plines, tools and concepts. For example, advances of on noisy data. It covers both the theory of authenti- mapping applications. Recent developments of net- computer simulation require new approaches of sta- cation based on noisy data and shows it in practice as work-based cybercartography has created a strong tistical techniques to utilize computer simulation ef- a key tool for prevention of counterfeiting. Biomet- interest and academic research emphasis in the area ficiently for technology development. The included rics and physical unclonable functions are discussed of web mapping. This book provides a systematic papers in this book are focusing on new approach- extensively. Key new technologies discussed include: overview and step-by-step training modules for GIS/ es based on these practical requirements.The editors -Algorithms to derive secure keys form noisy data Cartography professionals. are sure that these selected papers contribute acceler- in particular from Physical Unclonable Functions ating the technology development by an application and Biometrics, - also the theory which proves that Features of the grammar of technology shown in this book. those algorithms are secure is made accessible; Prac- The first comprehensive and coherent learning guide tical Implementations of the above mentioned algo- that provides a systematic overview and step-by-step Fields of interest rithms; - Techniques that give insight in the securi- training modules for professionals and students in Appl.Mathematics/Computational Methods of Engi- ty of those systems in practice; An overview and de- web map services. Balanced view between the tech- neering; Statistics for Engineering, Physics, Comput- tailed description of new applications that become nology-oriented and skill trainings and the theory - er Science, Chemistry & Geosciences possible by using these new algorithms. This book oruented map design emphasis.  Suitable for can serve as a starting point for PhD students enter- Type of publication course use (senior undergraduate/graduate) for GIS/ ing the field and will also benefit [..] Proceedings Cartography Features Contents Due December 2007 A state-of-the-art survey into the theory and practice 1. Introduction to Web Mapping Design.- 2. The De- of new technologies in the field of security based on noisy data Provides a comprehensive overview of the velopment of Network-based Cybercartography.- 3. 2008. Approx. 250 p. 100 illus. Geb. Getting Started with Web Mapping Tools.- 4. The theory of extracting cryptographic keys from noisy Design Principles of Web Mapping.- 5. The Tech- ISBN 978-4-431-75231-8 data Describes applications in the field of biometrics, nologies of Web Mapping.- 6. Evaluation and Main- secure key storage, and anti-counterfeiting tenance of Web Map Services.- 7. On-line Mapping Case Study.- 8. Mobile Mapping.- 9. Future Direc- Contents tions and Conclusion Preface (Bart Preneel).- Introduction.- Part I: Theo- ry of Security with Noisy Data.- Unbreakable Keys Fields of interest from Random Noise.- Fuzzy Commitment.- A Com- Geoinformation/Cartography; Media Design; Mul- munication-Theretical View on Secret Extraction.- timedia Information Systems; Information Systems Fuzzy Extractors.- Robust and Reuseable Fuzzy Ex- Applications (incl.Internet); Computer Applications tractors.- Fuzzy Identities and Attribute-Based En- in Geosciences; Landscape/Regional and Municipal cryption.- Unconditionally Secure Multi-Party Com- Planning putation from Noisy Resources.- Computationally Secure Authentication with Noisy Data.- Part II: Ap- Target groups plications of Security with Noisy Data.- Privacy en- Professional cartographers; senior hancements for Inexact Biometric Templates.- Pro- undergraduate and graduate students in Ge- tection of Biometric Information.- On the Amount ography and GIS fields; researchers and lecturers in of [..] these fields Fields of interest Type of publication Biometrics; Data Structures, Cryptology and Infor- Monograph mation Theory; Data Encryption; Algorithm Analy- sis and Problem Complexity Due November 2007 Target groups PhD students, professionals 2008. Approx. 300 p. (Advances in Geographic Information Sci- ence , Band 3) Geb. Type of publication Contributed volume 139,05 € ISBN 978-3-540-74856-4 Due November 2007

2007. Approx. 355 p. Geb.

82,34 € ISBN 978-1-84628-983-5 166 Computer springer.com/booksellers

S.P. Vadhan, Harvard University, Cambridge, MA, USA S. Vajna, Universität Magdeburg; H. Bley, Universität S. Vassiliadis, Delft University of Technology, The Netherlands; D. Saarbrücken; C. Weber, Universität Saarbrücken; K. Zeman, Soudris, Democritus University of Thrace, Greece (Eds.) Universität Linz; P. Hehenberger, Universität Linz A Study of Statistical Zero- Knowledge Proofs Fine- and Coarse-Grain CAD/CAM für Ingenieure Reconfigurable Computing Eine praxisbezogene Einführung Zero-knowledge interactive proofs play a central role in the design and study of cryptographic pro- Fine- and Coarse-Grain Reconfigurable Comput- tocols and are rich objects for complexity-theoret- Dieses gut eingeführte Buch vermittelt die Grund- ing gives the basic concepts and building blocks for ic study. Statistical zero-knowledge (SZK) proofs lagen von CAX-Systemen und bietet einem breit- the design of Fine- (or FPGA) and Coarse-Grain Re- achieve strong information-theoretic "security", and en Leserkreis in knapper und übersichtlicher Form configurable Architectures. Recently-developed in- can provide a clean test bed for the study of more das Rüstzeug für eine erfolgreiche Anwendung von tegrated architecture design and software-support- general notions that incorporate computational se- CAD/CAM-Systemen. Die beschriebenen Vorge- ed design flow of FPGA and coarse-grain reconfig- curity. This monograph is a revised and extended hensweisen und Beispiele basieren auf Erfahrun- urable architecture are also described. The book is version of the author's PhD thesis, the winning the- gen in Industrie und Hochschulpraxis und haben accompanied by an interactive CD which include sis of the 2000 ACM Doctoral Dissertation Compe- dort ihre Effizienz bewiesen. Das Buch eignet sich case studies and lab projects for the design of FPGA tition. It is a comprehensive investigation of statisti- für Studenten im Grund- und Hauptstudium sowie and Coarse-grain architectures based on the Euro- cal zero-knowledge (SZK) proofs. It begins by show- für Führungskräfte, die über einen Einsatz oder Aus- pean funded projects AMDREL and MOLEN, re- ing that SZK has two natural complete problems, and bau von CAD/CAM-Anwendungen entscheiden. spectively. Part I consists of two extensive surveys of then uses these complete problems to address a wide Die 2. Auflage wurde neu bearbeitet und erweitert. FPGA and Coarse-Grain Reconfigurable Architec- variety of fundamental questions about SZK. It also Es flossen u.a. die neu erarbeiteten Inhalte der VDI- tures. In Part II, case studies, innovative research re- includes a chapter that surveys recent developments Richtlinie zur Produktmodellierung ein. sults about reconfigurable architectures and design in the area, in particular how the results and tech- frameworks from three projects AMDREL, MOLEN niques of this thesis have been extended to compu- Features and ADRES and DRESC, and, a new classification tational zero-knowledge proofs and arguments. The Kompakte, praxisnahe und gut verständliche according to microcoded architectural criteria are presentation offers clarity and intuition, assuming Einführung in die Anwendung von CAX-Syste- described. Fine- and Coarse-Grain Reconfigurable [..] men Produktneutrale Darstellung mit zahlreichen Computing is an essential reference for researchers Beispielen and professionals and can be [..] Features The author won the ACM Doctoral Dissertation Contents Features Award (2000) for the best Ph.D. thesis in Electri- CAx-Systeme - warum und wozu?- Methodische With Reconfigurable Computing becoming increas- cal Engineering & Computer Science, and this und organisatorische Grundlagen.- Hardware.- Soft- ingly important to Design Engineers as well as Com- book is based on that Ph.D. ware.- Modellierung.- CAP- und CAM-Anwendun- puter Scientists, this book discusses all aspects of the gen.- System-Integration in der Prozesskette En- topic and contains industrial and academic contribu- Contents twicklung - Produktion.- Einführung und Migration tions Includes modeling software Introduction.- Definitions.- Complete Problems.- von CAx-Systemen.- Fragen der Wirtschaftlichkeit.- Applications of the Complete Problems.- Private Anhänge. Contents Coins vs. Public Coins.- Coping with Cheating Ver- Introduction. Part I. 1: A Survey of Fine-Grain Re- ifiers.- Noninteractive SZK.- Subsequent Work and Fields of interest configurable Architectures and CAD tools. 2: A Sur- Conclusions.- App. A, Chernoff Bounds.- App. B, Numerical and Computational Methods in Engi- vey of Coarse-Grain Reconfigurable Architectures Hashing Lemmas.- References neering; Computer-Aided Engineering (CAD, CAE) and CAD tools.- Part II: Case Studies. 3: AMDREL: and Design; Engineering Design; Appl.Mathematics/ A Novel Low-Energy FPGA Architecture and Sup- Fields of interest Computational Methods of Engineering porting CAD Tool Design Flow. 4: A coarse-grain Data Structures, Cryptology and Information Theo- dynamically reconfigurable system and compilation ry; Coding and Information Theory; Theory of Com- Target groups framework. 5: Polymorphic Instruction Set Comput- putation; Computation by Abstract Devices; Algo- Studenten der Ingenieurwissenschaften und In- ers. 6: ADRES and DRESC: Architecture And Com- rithm Analysis and Problem Complexity; Mathemat- formatik (Uni, FH, BA), die sich mit dem The- piler For Coarse-Grain Reconfigurable Processors. 7: ics of Computing ma der rechnerunterstützten Konstruktion bzw. A Taxonomy of Field-Programmable Custom Com- generellen CAx-Themen beschäftigen; Ingenieure puting Machines: An architectural approach. Target groups und Führungskräfte Academic researchers, graduate students Fields of interest Type of publication Circuits and Systems; Software Engineering/Pro- Type of publication Graduate/advanced undergraduate textbook gramming and Operating Systems; Electronics and Monograph Microelectronics, Instrumentation; Computer Sys- Due November 2007 tems Organization and Communication Networks; Due April 2008 Computer Hardware Erste Auflage erschienen bei Vieweg unter: Vajna, Weber, Schlottmann, Schlingensiepen: CAD/CAM für Ingenieure. Target groups 2008. Approx. 200 p. (Information Security and Cryptography) Undergraduate graduate students in electrical and/ Geb. or computer engineering, physics (with electron- 2008. Etwa 350 S. Softcover 53,45 € ics/VLSI design activities), graduate students: MSc programmes in electrical and computer eng., or digi- ISBN 978-3-540-71373-9 39,95 € tal/VLSI design, embedded systems design, PhD stu- ISBN 978-3-540-36038-4 dents in VLSI design, low power design, digital de- sign, embedded hardware design, system-on-chip design, IP components design, logic design/synthe- sis, transistor-level design, processor design, high- speed arithmetic processors, and [..]

Type of publication Monograph

Due October 2007 springer.com/booksellers Computer 167

D.P. Vidyarthi, Jawaharlal Nehru University, New Delhi, India; B.K. J.A. Vince, Bournemouth University, UK 2008. Approx. 400 p. Geb. Sarker, University of New Brunswick, Fredericton, Canada; A.K. Tripathi, Banaras Hindu University, Varanasi, India; L.T. Yang, St. 96,25 € Francis Xavier University, Antigonish, Canada Geometric Algebra for Computer ISBN 978-1-4020-6504-0 Graphics Scheduling in Distributed Computing Systems Geometric algebra (a Clifford Algebra) has been ap- Analysis, Design & Models plied to different branches of physics for a long time but is now being adopted by the computer graphics community and is providing exciting new ways of Scheduling in Distributed Computing Systems: solving 3D geometric problems. John Vince (author Analysis, Design and Models intends to inculcate of numerous books including ‘Geometry for Com- the innovative ideas for the scheduling aspect. Al- puter Graphics’ and ‘Vector Analysis for Comput- though the models in this book have been designed er Graphics’) has tackled this complex subject in his for distributed systems, the same information is ap- usual inimitable style, and provided an accessible plicable for any type of system (i.e., where distribut- and very readable introduction. As well as putting ed processing is required). Scheduling in Distribut- geometric algebra into its historical context, John ed Computing Systems: Analysis, Design and Mod- tackles complex numbers and quaternions; the na- els will dramatically improve the design and man- ture of wedge product and geometric product; reflec- agement of the processes for industry profession- tions and rotations (showing how geometric algebra als. This book deals exclusively with the scheduling can offer a powerful way of describing orientations aspect, which finds little space in other distributed of objects and virtual cameras); and how to imple- operating system books. Scheduling in Distributed ment lines, planes, volumes and intersections. Intro- Computing Systems: Analysis, Design and Models is ductory chapters also look at algebraic axioms, vec- structured for a professional audience composed of tor algebra and geometric conventions and the book researchers and practitioners in industry. This book closes with a chapter on how the algebra is applied to is also suitable as a reference for graduate-level stu- [..] dents in management sciences, and computer science for distributed computing system classes. Features Filled with lots of clear examples and very well illus- Features trated, this compact book provides an excellent in- Includes the scheduling aspect of distributed com- troduction to geometric algebra for computer graph- puting systems, which is a necessary activity for job ics. planning and processing First book that exclusively deals with the scheduling aspect of distributing com- Contents puting systems Introduction.- Elementary Algebra.- Complex Al- gebra.- Vector Algebra.- Quaternion Algebra.- Geo- Contents metric Conventions.- History of Geometric Algebra.- Preface.- Introduction.- An Overview of a Distribut- The Geometric Product.- Reflections and Rotations.- ed Computing System.- Scheduling Problem.- Load Representing Lines and Surfaces.- Geometric Alge- Balancing in Dcs.- Earlier Task Allocation Mod- bra in Computer Graphics.-Programming Implica- els.- Load Balancing Task Allocation (Lbta).- GA tions.- Conclusion Based Task Allocation Models.- Allocation of Multi- ple Tasks in Dcs.- Other Approaches for Task Allo- Fields of interest cation.- Scheduling in Computational Grids.- Con- Computer Graphics cluding Remarks. Type of publication Fields of interest Graduate/advanced undergraduate textbook Computer Communication Networks; Operating Systems; Computer Systems Organization and Com- Due March 2008 munication Networks; Input/Output and Data Com- munications; System Performance and Evaluation; 2008. Approx. 250 p. Geb. Information Systems and Communication Service 74,85 € Target groups ISBN 978-1-84628-996-5 Professionals and researchers and graduate-level stu- dents

Type of publication Monograph

Due November 2007

2008. Approx. 300 p. Geb.

102,99 € ISBN 978-0-387-74480-3 168 Computer springer.com/booksellers

F. Vonta, University of Cyprus, Nicosia, Cyprus; M. Nikulin, Uni- A. Voss, University of Manchester, UK; M. Hartswood, University C. Voudouris, BT Group plc, UK; G. Owusu, BT Group plc, UK; R. versité Victor Segalen Bordeaux 2, Bordeaux, France; N. Limnios, of Edinburgh, UK; K. Ho, University of Edinburgh, UK; R. Procter, Dorne, BT Group plc, UK; D. Lesaint, BT Group plc, UK Université de Technologie de Compiègne, Compiègne, France; C. University of Manchester, UK; M. Rouncefield, University of Lan- Huber-Carol, Université Paris V, Paris, France (Eds.) caster, UK; R. Slack, University of Bangor, UK; M. Buscher, Univer- sity of Lancaster, UK (Eds.) Service Chain Management

Statistical Models and Methods for Technology Innovation for the Service Business Biomedical and Technical Systems Configuring User-Designer Relations Service chain management enables service organisa- Interdisciplinary Perspectives tions to improve customer satisfaction and reduce An outgrowth of the "International Confer- operational costs through intelligent and optimised ence on Statistical Models for Biomedical and Tech- forecasting, planning and scheduling of the service nical Systems," this book is comprised of contribu- ‘User-designer relations’ concerns the sorts of work- chain, and its associated resources such as people, tions from renowned experts, demonstrating the ing relationships that arise between developers and networks and other assets. The area is quite broad, significance of current research on theory, meth- end users of IT products - the different ways design- covering field force and workforce automation, net- ods, and applications of the field. The contributions, ers of IT products seek to engage with users, and work and asset planning and also aspects of , cus- which deal with the mathematical aspects of survival the ways users seek to influence product design. It is tomer relationship management, human resources analysis and reliability as well as other topics, are a through the shifting patterns of these relations that systems and enterprise resource planning. Further- careful selection of invited and contributed chapters, IT products are realised. Although it has general- more, it addresses the key challenge of how all these reflecting recent developments in the following ar- ly been accepted that achieving better user-design- technologies and systems are integrated into and eas: applications in epidemiology; probabilistic and er relations will improve the quality of IT products, also linkages between these elements in a cohesive statistical models and methods in reliability; models there has been little consensus on how this might be ICT blueprint which can be successfully applied to and methods in survival analysis, longevity, aging, achieved. This book aims to deepen our understand- different service businesses. In this book, Christos and degradation; accelerated life models; quality of ing of the relationships between users and designers Voudouris and his groupgroup together with experts life; new statistical challenges in genomics. The book both as they emerge in the wild and as a consequence from industry and academia present the latest inno- will be useful to a broad interdisciplinary readership of our attempts to intervene. Through a series of case vations and technologies used to manage the opera- of researchers and practitioners in applied probabil- studies the book juxtaposes in-depth explorations tions of a service company. The viewpoints present- ity and statistics, industrial statistics, biomedicine, of different perspectives and approaches to thinking ed are, based on the BT experience and on associated biostatistics, and engineering.   about - and doing - user-designer relations, consid- [..] Features ering important implications for design and comput- Features Real-world applications to epidemiology, aging, sur- er science more generally. Covers all aspects from strategic strategic and tactical vival analysis, and modeling in the biosciences and Contents planning to day-to-day operational scheduling and medicine Chapters deal primarily with the mathe- Introduction.- Participatory Design: Issues and ap- resource management Describes both technologies matical aspects of survival analysis and reliability proaches in dynamic constellations of use, design and systems for automating and optimising service Features a careful selection of invited and contribut- and research.- Design as and for Collaboration: mak- operations Based on latest research as well as practi- ed papers Demonstrates the significance of current ing sense of and supporting practical action.- Us- cal experience from BT, one of the largest European research on the theory, methods, and applications of er-Designer Relations in Techology Production.- A service providers Offers best practice advice s and the field Accessible to a broad interdisciplinary [..] Break From Novelty: Persistence and effects of struc- describes hands-on techniques and methods [..] Contents tural tensions in designer-user relations.- Lessons Contents Preface.- Cox Models, Analyses, and Extensions.- Learnt in Providing Product Designers with Us- 1) Defining and Understanding Service Chain Man- Reliability Theory: Degradation Models.- Inferen- er-Participatory Interaction Design Tools.- Practical- agement - 2) Customer Service: Emerging Require- tial Analysis.- Analysis of Censored Data.- Quality of ities of Participation.- Participant Intervention ments and Trends.- Part 1: Resource Planning.- 3) Life.- Inference for Processes.- Designs.- Measures of and Tangible Mediating Tools.- Global Software and Strategic Resource Planning - 4) Forecasting and De- Divergence, Model Selection, and Survival Models.- its Provenance.- Bottom-Up, [..] mand Planning - 5) Tactical Resource Planning and New Statistical Challenges.- Index. Fields of interest Deployment - 6) Network Planning for Telecom and Fields of interest User Interfaces and Human Computer Interaction Utilities.- Part 2: Reservation Management and Re- Statistics for Life Sciences, Medicine, Health Sci- source Scheduling.- 7) Reservation Management and Target groups ences; Statistical Theory and Methods; Mathemati- Resource CRM - 8) Demand Pricing and Revenue Researchers; Advanced students in human-computer cal Modeling and Industrial Mathematics; Probabili- Management - 9) Personnel Shift and Scheduling interaction, computer supported co-operative work, ty Theory and Stochastic Processes; Applications of Rostering - 10) Work Allocation and Scheduling - social studies of work, organisations and technology, Mathematics 11) People and Attendance Management.- Part 3: computer system developers. Process, [..] Target groups Type of publication researchers and practitioners in applied probability Fields of interest Reference work and statistics, industrial statistics, biomedicine, bio- Information Systems; Organization/Planning; Infor- statistics, and engineering mation Systems Applications (incl.Internet); Man- Due April 2008 agement of Computing and Information Systems; Type of publication Management; Computer Appl. in Administrative Data Processing Contributed volume 2008. Approx. 200 p. (Computer Supported Cooperative Work) Geb. Target groups Due March 2008 52,43 € Professionals, students of business information sys- ISBN 978-1-84628-924-8 tems and business administration 2008. Approx. 600 p. 55 illus. (Statistics for Industry and Technol- ogy) Geb. Type of publication Professional book 116,63 € ISBN 978-0-8176-4464-2 Due December 2007

2008. Approx. 340 p. Geb.

53,45 € ISBN 978-3-540-75503-6 springer.com/booksellers Computer 169

Z. Wadia, White Plains, NY, USA; M. Marinschek, Irian, White S. Wagon, Macalester College, St. Paul, MN, USA M. Wallace, University of Indianapolis, Athens, Greece; M. An- Plains, NY, USA; Th. Spiegl, Irian, White Plains, NY, USA gelides, Brunel University, Uxbridge, UK; P. Mylonas, University of Indianapolis, Athens, Greece (Eds.) Mathematica in Action The Definitive Guide to Apache MyFaces and Facelets Advances in Semantic Media Adaptation and Personalization With the third edition of his popular Mathemati- ca in Action, award-winning author Stan Wagon The Definitive Guide to Apache MyFaces and Ajax guides readers through the important changes that covers the open source agile lightweight Apache My- have been made to Mathematica 6.0. To uti- Faces project, expected to be the most popular open lize the more sophisticated graphics capabilities of Contents source implementation of JavaServer Faces (JSF), a 6.0, Wagon has significantly expanded the chapters Dynamic Linking of Web Resources -- Customisa- standard Java Web framework specification and im- on surfaces and the parametric plotting of surfaces. tion and Personalisation.- A Multi-Purpose Ontol- plementation originally put forth by Sun. This book The chapter on differential equations now includes ogy-Based Approach for Personalised Content Fil- also covers and includes the use of Ajax using the material from VisualDSolve, built into Mathematica tering and Retrieval.- Analysing the Behaviour of popular Dojo framework. This is an ideal reference 6.0. Like previous editions, this is not only an intro- Students in Learning Management Systems with Re- for professional Java and Web developers looking to duction to Mathematica 6.0, but also a tour of mod- spect to Learning Styles.- Improving Image Retrieval develop real world Java-based Web applications as it ern mathematics by one of the field’s most gifted ex- Using Semantic Resources.- Implementing an In- focuses less on theory and more on aspects such as positors. Wagon explores some of the most impor- ternet image search service based on the AJAX web scalability, design, optimization and configurability. tant areas of modern mathematics with new chapters programming techniques.- A Rule-based Adaption on optimization, including algebraic and numerical Model for Ontology-based Personalization.- Man- Features optimization, and linear and integer programming. agement and Processing of Personalized \\Annota- First and only book on the open source lightweight Connections are also made to computer science with tions in Image Retrieval Systems.- An Incremental Apache MyFaces project written by a MyFaces co- new material on graphs and networks.   All Framework for [..] founder and its users. It will be the definitive, au- Mathematica code is included on a CD, saving stu- thoritative book on MyFaces This is an untapped dents hours of typing.   Wagon is the author of Fields of interest market, for what likely will be most popular open nine [..] Appl.Mathematics/Computational Methods of Engi- source JSF implementation in the world right now! neering; Artificial Intelligence (incl. Robotics) Covers the popular Dojo Ajax framework) Features - Utilizes  the enhanced graphics capabili- Target groups Contents ties of Mathematica 6.0, with expanded chapters on Engineers, researchers, and graduate students in MyFaces and JSF.- MyFaces Underlying Architec- surfaces and the parametric plotting of surfaces - Computational Intelligence and Computer Science ture.- Your First MyFaces Components.- Apache New chapters on optimization, graphs, and Type of publication MyFaces is JSF++.- Migrating from Struts to My- networks introduces material of current interest with Monograph Faces.- AJAX and Web 2.0 Integration (using Dojo).- connections to programming and computer science MyFaces and SOA (using Backing Bean).- MyFaces - CD containing all Mathematica code saves stu- and Persistence (using Hibernate and EJB 3).- My- dents hours of typing - 16 pages of color illustrations Due December 2007 Faces Component Design and Performance Consid- - Clearly [..] erations. 2008. Approx. 360 p. (Studies in Computational Intelligence, Contents Band 93) Geb. Fields of interest Preface.- A Brief Introduction.- Plotting.- Prime Programming Techniques; Programming Languages, Numbers.- Rolling Wheels.- Surfaces.- The Cantor 139,05 € Compilers, Interpreters Set, Real and Complex.- The Quadratic Map.- The ISBN 978-3-540-76359-8 Recursive Turtle.- Parametric Plotting of Surfaces.- Target groups Penrose Tiles.- Fractals, Ferns, and Julia Sets.- Cus- Intermediate to advanced Java programmers and tom Curves.- Solving Equations.- Differential Equa- web developers tions.- Public-Key Encryption.- Egyptian Fractions.- The Ancient and Modern Euclidean Algorithm.- Type of publication Imaginary Primes and Prime Imaginaries.- Certify- Professional book ing Primality.- Check Digits and the Pentagon.- New Directions for pi.- Rearrangement of Series.- Com- Due March 2008 putational Geometry.- Coloring Planar Maps [..]

Fields of interest Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Computational Mathematics and Numerical Analy- Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, sis; Mathematical Software; Visualization; Applica- Oman, Qatar, Palestine: Jordan Book Center tions of Mathematics

Target groups 2008. Approx. 350 p. Softcover Undergraduate and graduate students in mathemat- ics, the physical and biological sciences, and engi- 37,40 € neering. ISBN 978-1-59059-737-8 Type of publication Graduate/advanced undergraduate textbook

Due March 2009

2009. Approx. 680 p. Softcover

49,43 € ISBN 978-0-387-75366-9 170 Computer springer.com/booksellers

W. Wang, HuaZhong Normal University, China; Y. Li, HuaZhong W. Wang, HuaZhong Normal University, China; Y. Li, HuaZhong W. Weber, Hochschule der Medien, Stuttgart (Ed.) Normal University, China; Z. Duan, HuaZhong Normal University, Normal University, China; Z. Duan, HuaZhong Normal University, China; L. Yan, HuaZhong Normal University, China; H. Li, Turku China; L. Yan, HuaZhong Normal University, China; H. Li, Turku School of Economics, Finland; X. Yang, HuaZhong Normal Uni- School of Economics, Finland; X. Yang, HuaZhong Normal Uni- Kompendium Informationsdesign versity, China (Eds.) versity, China (Eds.)

Integration and Innovation Orient Integration and Innovation Orient Was ist Informationsdesign? Welche Designdiszi- to E-Society Volume 1 to E-Society Volume 2 plinen spielen dabei eine Rolle? Und wo liegen Schnittstellen zu anderen Disziplinen wie Usabili- 7th IFIP International Conference on e-Business, e-Services, 7th IFIP International Conference on e-Business, e-Services, ty-Engineering und Informationsarchitektur? Das and e-Society (I3E2007), October 10-12, Wuhan, China and e-Society (I3E2007), October 10-12, Wuhan, China Kompendium bietet eine umfassende Einführung in theoretische und gestalterische Grundlagen, in Geschichte und Praxis des Informationsdesigns. International Federation for Information Process- International Federation for Information Process- Verständlich und anschaulich beschreiben die Au- ing The IFIP series publishes state-of-the-art results ing The IFIP series publishes state-of-the-art results toren Teildisziplinen und Aufgabenfelder des Infor- in the sciences and technologies of information and in the sciences and technologies of information and mationsdesigns: von Interaktionsdesign, Ausstel- communication. The scope of the series includes: communication. The scope of the series includes: lungsdesign und Signaletik über Corporate Design, foundations of computer science; software theory foundations of computer science; software theory Textdesign und Sounddesign bis hin zu Informa- and practice; education; computer applications in and practice; education; computer applications in tionsdidaktik und Informationspsychologie. Begriffs- technology; communication systems; systems mod- technology; communication systems; systems mod- definitionen, Tipps sowie Beispiele aus der Praxis eling and optimization; information systems; com- eling and optimization; information systems; com- machen das Kompendium Informationsdesign zu puters and society; computer systems technology; puters and society; computer systems technology; einem Handbuch für Studierende, Dozenten und security and protection in information processing security and protection in information processing Praktiker. systems; artificial intelligence; and human-comput- systems; artificial intelligence; and human-comput- Features er interaction. Proceedings and post-proceedings of er interaction. Proceedings and post-proceedings of Praxisorientiert: Informationsdesign für Studium referred international conferences in computer sci- referred international conferences in computer sci- und Beruf Umfassend: Theorie und Praxis Plus: ence and interdisciplinary fields are featured. These ence and interdisciplinary fields are featured. These viele Fallbeispiele, praktische Tipps Mit nützlichen results often precede journal publication and repre- results often precede journal publication and repre- Querverweisen auf Schnittstellen sent the most current research. The principal aim of sent the most current research. The principal aim of the IFIP series is to encourage education and the dis- the IFIP series is to encourage education and the dis- Contents semination and exchange of information about all semination and exchange of information about all Vorwort.- Was ist Informationsdesign: Grundlagen.- aspects of computing. For more information about aspects of computing. For more information about Geschichte.- Berufsbild.- Erforschung.- Informa- the 300 other books in the IFIP series, please visit [..] the 300 other books in the IFIP series, please visit [..] tionsdesign und Design: Corporate Design.- Inter- aktionsdesign.- Ausstellungsdesign.- Textdesign.- Features Features Sounddesign.- Informationsdesign zwischen den “Most up-to-date book from the I3E conference se- “Most up-to-date book from the I3E conference se- Disziplinen: Informationspsychologie.- Informa- ries” ries” tionsdidaktik.- Informationsarchitektur.- Usability Fields of interest Fields of interest Engineering.- Informationsdesign für alle: Barriere- Computer Science, general Computer Science, general freies Webdesign.- Interkulturelles Informationsde- sign.- Signaletik.- Index.- Über die Autoren. Target groups Target groups Researchers and practitioners of e-business, e-ser- Researchers and practitioners of e-business, e-ser- Fields of interest vices, and the e-society vices, and the e-society Media Design; Document Preparation and Text Pro- cessing Type of publication Type of publication Proceedings Proceedings Target groups Mediengestalter, Designer, Redakteure, Journalisten

Due November 2007 Due November 2007 Type of publication Professional book 2007. Approx. 687 p. (IFIP International Federation for Informa- 2007. Approx. 625 p. (IFIP International Federation for Informa- tion Processing, Band 251) Geb. tion Processing, Band 252) Geb. Due October 2007 158,36 € 158,36 € ISBN 978-0-387-75465-9 ISBN 978-0-387-75493-2 2007. VIII, 556 S. (X.media.press) Geb.

39,95 € ISBN 978-3-540-69817-3 springer.com/booksellers Computer 171

S. Webster, London, UK; S. McSharry, Toronto, Canada; T. Yard R. Wegerif, University of Exeter, Devon, UK P. Wellin, California State University, Sonoma, CA, USA; T. Gayley

Foundation Actionscript 3.0 with Dialogic Education and Technology Computer Simulations with

Flash CS3 and Flex Expanding the Space of Learning Mathematica and Java

ActionScript 3.0 is the new version of the Flash Dialogic Education and Technology is about using The first edition of Computer Simulations with scripting language, and with it comes a lot of new new technology to draw people into the kind of di- Mathematica drew on the capabilities of Mathemat- things to learn. In addition, you can also make use of alogues which take them beyond themselves into ica to prototype algorithms & to write code in it through Flash CS3, through Flex 2 and 3, or even learning, thinking and creativity. The program of re- a variety of programming styles, choosing the ap- through open source tools. Fortunately, we've cre- search reported in this book reveals key character- propriate style for the problem at hand. Today, run- ated this book to teach this new language to both istics of learning dialogues and demonstrates ways ning very large simulations in Mathematics is quite aspiring ActionScript developers, and experienced in which computers and networks can deepen, en- feasible, within an order of magnitude of complied ActionScript developers who want to upgrade their rich and expand such dialogues. A dialogic perspec- C and Fortran code. This new edition takes advan- knowledge to the new version. It doesn't aim to be an tive is developed drawing upon recent work in com- tage of these features & includes the follow- exhaustive reference, focusing on essential real world munications theory, psychology, computer science ing significant additions: • Java has become a com- techniques to enable them to get up and running and philosophy. This perspective foregrounds the monly used tool for working with scientific applica- quicker. In addition, we cover how to use Action- creative space opened up by authentic dialogues. tions. This book fully incorporates Java programs to Script 3.0 through both Flash CS3 and Flex 2/3 (open Whereas studies of computer-supported collabora- run the simulations that are described & imple- source ActionScript developers should also be able tive learning have tended to see dialogue as a means mented in the book. • This is one of the first books to make use of the book.) As well as countless prac- to the end of knowledge construction the dialogic to describe & take advantage of Mathematica tical examples, reference sections are also included perspective taken by this book sees dialogue as an 6, which contains a fantastic array of new visualiza- at the back of the book allowing the reader to easily end in itself - in fact moving learners into the space tion functions & dynamic interactive graphics look up syntax. No previous ActionScript knowledge of dialogue is described as the core aim of education. machinery. • Several websites are maintained with is assumed, although it would be beneficial. The central argument of the book is that there is a Mathematica notebooks, C source code & com- convergence between this dialogic perspective in ed- piled C Binaries for various platforms. A minimal Features ucation [..] background [..] Teaches the essentials of ActionScript 3 development using Flash CS3 or Flex 2 No previous Action- Features Features Script knowledge is assumed Includes reference sec- Focuses on development of theory and empirical re- One of the first books to describe and take advantage tions at the back of the book for easy syntax lookup search Reports a coherent program, exploring the di- of Mathematica 6, which contains a fantastic array of alogic perspective of the use of technology in edu- new visualization functions and dynamic interactive Contents cation Encompasses a wide range of ages and uses, graphics machinery Contains visualizations of the Getting Started with ActionScript 3.0.- ActionScript including: software to promote spoken reasoning in many simulations written in Mathematica and Java, 3.0 Fundamentals.- Objects and Classes.-Working young children, studies of computer tools to support with the Java simulations appearing on a website for with the Display.- Creating Vector Graphics with induction into argumentation, and accounts of the the book Fully incorporates Java programs to run the the Drawing API.- User interaction and more with creative reflective communities of practice on line simulations The new edition takes full [..] events.- Video.- Sound.- Using Components.- Regu- lar Expressions.- XML and Web Services.- final case Contents Contents study.- Introducing Flex.- The Flex 2 Framework.- A Computers and Teaching Thinking.- Computers and Probabilistic Systems.- The Random Walk.- The complete Flex application.- Appendices. Dialogic Reason in the Classroom.- Situating Gener- Self-avoiding Walk.- Accretion.- Kinetic Growth al Thinking and Learning Skills.- Creating and Sus- Models.- Percolation Clustering.- Ising Model.- Co- Fields of interest taining an Online Community of Enquiry.- Dialec- evolution Model.- Cellular Automata Systems.- The Programming Techniques tic and Dialogic Perspectives on the Role of Technol- Game of Life.- Self-organized Critical Systems.- The ogy.- Dialogic Reason and Creativity Around and Q2R Ising Model.- Excitable Media.- Traffic.- For- Target groups Through Computers.- Tools for Induction into Ar- est Fires.- Cellular Automata and Complexity.- Ap- Beginner to Intermediate aspiring Flash developers gument.- Reflective Communities Online.- Research- pendices.- Mathematica Programming.- Java.- Java and designers who want to learn ActionScript Devel- ing Dialogue with Technology.- Technology and En- Source Code opment and experienced Flash developers and de- lightenment. signers who want to learn the new version of Action- Fields of interest Script Fields of interest Simulation and Modeling; Mathematical Methods Educational Technology; Computers and Education; in Physics; Numerical and Computational Methods; Type of publication Education & Society Computer Science, general; Algorithms Professional book Target groups Target groups Due January 2008 Academics and post-graduate researchers working Undergraduates, graduates, researchers in the area of educational technology and computer- supported collaborative learning, an area that com- Type of publication Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Graduate/advanced undergraduate textbook Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest bines the fields of education, computer science and Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, psychology Oman, Qatar, Palestine: Jordan Book Center Due July 2008 Type of publication Monograph 2008. Approx. 450p. Softcover 2008. Approx. 320 p. Geb.

ISBN 978-1-59059-815-3 Due November 2007 58,80 € ISBN 978-1-84628-287-4 2007. Approx. 350 p. (Computer-Supported Collaborative Learn- ing Series, Band 7) Geb.

106,95 € ISBN 978-0-387-71140-9 172 Computer springer.com/booksellers

S. Wenzel, Universität Kassel; M. Weiß, IKA Institut f. Konstruk- J.H.D.M. Westerink, Philips Research, Eindhoven, The Nether- T. White tionstechnik u. Anlagengestaltung Dresden; S. Collisi-Böhmer, lands; M. Ouwerkerk, Philips Research, Eindhoven, The Nether- Siemens AG; H. Pitsch, Incontrol Enterprise Dynamics GmbH, lands; T.J.M. Overbeek, Philips Research, Eindhoven, The Nether- Wiesbaden; O. Rose, Technische Universität Dresden lands; W.F. Pasveer, Philips Research, Eindhoven, The Nether- Digitale Animation lands; B. de Ruyter, Philips Research, Eindhoven, The Netherlands (Eds.) Vom Bleistift zum Pixel Qualitätskriterien für die Simulation in Produktion und Probing Experience Logistik Der mehrfach ausgezeichnete Trickzeichner Tony From academic research to commercial propositions White hat das ultimative Buch zur digitalen An- Planung und Durchführung von Simulationsstudien imation verfasst. Die Kenntnis vieler klassischer Techniken wird hier zusammengebracht mit der This book adheres to the vision that in the future Beschreibung hochmoderner Technologien. Was heutige digitale Animatoren wissen müssen, find- Der Einsatz der Simulation in Produktion und Lo- compelling user experiences will be key differen- et sich zwischen diesen Buchdeckeln – von der gistik gehört in vielen Unternehmen seit Jahren tiating benefits of products and services. Evaluat- Konzeption bis zur Ausführung und durch die vie- zum Tagesgeschäft. Ein strategisches, nach- ing the user experience plays a central role, not on- len Stadien der Produktion bis zum Vertrieb. Dieses haltiges Wirtschaften erfordert allerdings die ly during the design process, but also during regu- Buch soll als praktischer Ratgeber dienen. Anfänger Durchführung nachweisbar qualitativ hochwer- lar usage: for instance a video recorder that recom- und erfahrene Trickzeichner finden hier Grundla- tiger Simulationsstudien. Die ASIM-Fachgruppe mends TV programs that fit your current mood, a gen, bewährte Techniken und professionellen Rat, "Simulation in Produktion und Logistik" hat de- product that measures your current level of relax- die die Arbeit erleichtern und die Expertise erhöhen. shalb repräsentative, praxisnahe Qualitätskriterien ation and produces advice on how to balance your Besonders hilfreich ist das Glossar der Fachbegriffe. für Simulationsprojekte entwickelt. Die anwen- life, or a module that alerts a factory operator when U.a. werden diese Themen behandelt: Film,- TV-, dungs- und werkzeugunabhängigen Kriterien he is getting drowsy. Such systems are required to Internet- und Spieleanimation Traditionelle und dig- sind eine Handlungshilfe in der Angebotsphase, assess and interpret user experiences (almost) in re- itale Produktionstechniken Bewährte Verfahren zur bei der Durchführung der Studie sowie für die al-time, and that is exactly what this book is about. Bewegungsanimation, zur Regie und Aufnahme von Nutzung der Modelle und Ergebnisse nach Pro- How to achieve this? What are potential applications Filmen Heute gebräuchliche digitale Software, Tools jektablauf. Das Buch wendet sich in erster Lin- of psychophysiological measurements? Are real-time und Techniken Der Autor verrät Geheimnisse der ie an Leser der Industrie, die Simulationsstudien assessments based on monitoring of user behavior professionellen Trickfilmerstellung [..] durchführen oder durchführen lassen. Es stellt Kun- possible? If so, which elements are critical? Are be- havioral aspects important? Which technology can den und Dienstleistern Leitlinien und Checklisten Features be used? How important are intra-individual differ- für die Qualitätssicherung bei der Beauftragung Original-Teaser: Just add talent. This comprehensive ences? What can we learn from products already on und Durchführung von Simulationsstudien zur book gives today's digital animators all the lessons [..] Verfügung. Darüber hinaus dient es als wesentliche they never had - classical animation techniques used Grundlage zur praxisnahen Gestaltung und Ver- by the most original animators of our time. USPs des tiefung von Lehrveranstaltungen. Features the first book to combine academic and business Originals: - Chock full of tips and secrets from this award-winning animator - The glossary of anima- Features viewpoints on measuring user experiences for prod- tion-related terms is worth its weight in gold - Valu- Erstmalig wird ein standardisierter uct development able CD-ROM contains a complete animated film [..] Qualitätssicherungskatalog für Simulation vorgelegt Simulationsstudien gehören zum praktischen Allt- Contents Foreword; Introduction: Probing Experience; Expe- Fields of interest ag in der Unternehmensleitung und bedürfen stan- Graphic Design (Grafikdesign); Computer Graphics dardisierter Kriterien Repräsentative, praxisgerechte rience in Products;Part I: Probing in order to Quan- tify1: How was the experience for you just now? In- Qualitätskriterien waren bislang nicht verfügbar Target groups quiring about people’s affective product judgements. - Studierende, Dozenten und Wissenschafler der 2: Atmosphere metrics: development of a tool to Contents Web-, Medien- und Spieleanimation und der Me- quantify experienced atmosphere. 3: In Search of the Einführung.- Grundlegende Qualitätskriterien für dientechnologie - Professionelle Trickzeichner auf X-factor to develop experience measurement tools. Simulationsprojekte.- Qualitätssichernde allen Ebenen: traditionell, 2D, 3D, Internet, TV, 4: Probing Experiences: logs, traces, self-report and a Maßnahmen in der Definitions- und Ange- Spiele - Profis in der Werbebranche botsphase.- Qualitätskonformes Vorgehen in der sense of wonder. 5: Objective emotional assessment Simulationsstudie.- Nachnutzung von Simulation- of industrial products. 6: Measuring experiences in Type of publication smodellen.- Zusammenfassung.- Literatur.- Doku- gaming and TV applications: investigating the added Contributed volume mentstrukturen.- Checklisten.- Die Autoren des value of a multi-view [..] Buches. Fields of interest Due November 2007 Fields of interest User Interfaces and Human Computer Interaction; Engineering Economics, Organization, Logistics, Input/Output and Data Communications; Theory of 2008. XVIII, 504 S. 680 Abb. in Farbe. (SAV Medientechnologie) Marketing; Simulation and Modeling; Quality Con- Computation; Artificial Intelligence (incl. Robotics) Softcover trol, Reliability, Safety and Risk; Numerical and Computational Methods in Engineering; Industrial Target groups 49,95 € and Production Engineering; Information Systems Scientists and researchers in psychophysiology, psy- ISBN 978-3-8274-1867-8 chometrics, and product evaluation and design; aca- Target groups demic ad corporate libraries Ingenieure, Informatiker und Betriebswirte in der Produktionsplanung und Prozessmodellierung in Type of publication produzierenden Unternehmen sowie Dienstleister, Contributed volume in Fabrikplanung, Logistikplanung, Simulation Due October 2007 Type of publication Professional book 2007. Approx. 240 p. (Philips Research Book Series, Band 8) Geb.

Due December 2007 96,25 € ISBN 978-1-4020-6592-7 2008. Etwa 200 S. (VDI-Buch) Softcover

69,95 € ISBN 978-3-540-35272-3 springer.com/booksellers Computer 173

M. Whitehorn, University College Worcester, UK; R. Zare, M. Pazusmansky

Problem solving for MDX for SQL Server 2005

Fields of interest Database Management; Models and Principles

Type of publication Professional book

Due September 2008

2008. Approx. 350 p. With CD-ROM. Softcover

ISBN 978-1-84628-395-6 springer.com/booksellers Computer 174

M. Whitehorn, University College of Worcester, UK; B. Marklyn, R. Whitrow, London Metropolitan University, UK J. Wiele, W. Degenhardt Seattle, WA, USA OpenGL Graphics Through Präventive IT-Sicherheit und Inside Relational Databases with Applications Identitätsmanagement bei großen Examples in SQL Server Systemen

OpenGL Graphics Through Applications is a practi- The first two editions of Inside Relational Databas- cal introduction to Computer Graphics with an em- Das Buch zeigt moderne technische und organ- es have both been best sellers. These new editions phasis on understanding through practice. Through- isatorische Maßnahmen auf, mit denen Verletzun- will also cover the relational database model but will out the book, theory is followed by implementation gen der Informationssicherheit in Unternehmen use different engines to illustrate the model. In do- using C / C++ and complete programs are provided und anderen Organisationen effektiv verhindert wer- ing so, readers will be able to apply the model using on the Springer website. A procedural approach has den können. Vorsorgliche Maßnahmen wie Iden- their preferred database engine. Initially three ver- been taken to algorithmic development while taking tity Management mit Authentifizierung und Au- sions are planned starting with Access, SQL Server an object oriented approach when building artefacts torisierung, Netzwerksegmentierung und Sicher- and my SQL. The books show just how simple and from simple objects. The book covers a range of top- heitsmanagement stehen dabei im Vordergrund. useful databases can be. No prior knowledge is re- ics including: • image processing • artefact construc- Darüber hinaus wird versucht, auch praktikable quired i.e. real world examples show how to manage tion • introductory animation • texturing • curves Anleitung zur Bewältigung der "menschlichen" data efficiently. A significant amount of new material surfaces and patterns Robert Whitrow has taught Seite von IT-Sicherheit zu geben und dabei beispiel- is included in the core of the book and particular em- computing courses from first year undergraduate to sweise die Mitarbeiterführung und die Förderung phasis is given to showing how to make a database postgraduate MSc at a range of different institutions. des Sicherheitsbewusstseins einzubeziehen. Das run faster and more efficiently. Features Buch bezieht bewusst Stellung gegen Positionen, Features Concise text which includes worked examples from die Informationssicherheit primär mit Monitoring A reader-friendly explanation of the relational model theory to code implementation und Überwachung der Endanwender assoziieren, and it's importance to database designers and devel- da auf diese Weise missbräuchliche Verwendungen opers, tailored to suit SQL users. Contents schützenswerter Daten nicht unterbunden, sondern Getting Started.- Image File Formats.- Image Pro- nur verfolgt werden können. Das Zusammenwirken Fields of interest cessing.- Transformations.- Viewing and Projection.- von IT-Sicherheit und Datenschutz ist ein weiteres Database Management; Models and Principles Light and Colour.- Texture Mapping.- Objects to zentrales Thema. Artefacts.- Curves Surfaces and Patterns.- Appen- Target groups dices.- References, Index Features Undergraduate students, practitioners - database Erstes Buch zu präventiver IT-Sicherheit Mit Best- users. Fields of interest Practice-Beispielen großer Unternehmen (u. a. SAP, Computer Graphics; Computer Imaging, Vision, CISCO) Type of publication Pattern Recognition and Graphics Professional book Contents Target groups Einleitung.- Fallbeispiele.- Präventive Sicherheit ver- Due September 2008 Second/Final year undergraduates in computing, en- sus reaktive Sicherheit.- Die Rolle der Endanwender gineering or mathematics in Organisationen.- Organisatorische Maßnahmen.- Aufgabenverteilung.- Information.- Schulung.- 2006. Approx. 350 p. Softcover Type of publication Kommunikation.- Moderne PKI.- Rechtliche Undergraduate textbook Grundlagen.- Sorgfaltspflichten.- Verantwortung.- 42,75 € Datenschutz.- Technische Maßnahmen.- Netzw- ISBN 978-1-84628-393-2 Due February 2008 erk-Segmentierung und Netzwerk-Quarantäne.- Identity Management.- Hardware-Management.- Verschlüsselung.- E-Mail-Sicherheit.- Dokumenten- 2008. Approx. 365 p. 130 illus., 80 in color. Softcover sicherheit.- Perimeter-Sicherheit.- Intrusion Preven- tion.- Alternativen zum klassischen Virenschutz.- 50,24 € Disaster Recovery.- [..] ISBN 978-1-84800-022-3 Fields of interest Management of Computing and Information Sys- tems; Information Systems and Communication Ser- vice; Computer Systems Organization and Commu- nication Networks; Legal Aspects of Computing; Business/Management Science, general

Target groups IT-Manager, Consultants, Datenschutzbeauftragte, Human Resource Manager

Type of publication Professional book

Due July 2008

2008. Etwa 250 S. (Xpert.press) Geb.

44,95 € ISBN 978-3-540-24867-5 springer.com/booksellers Computer 175

Y. Wilks, The University of Sheffield, UK C.P. Williams, Pasadena, CA, USA D. Wright, Trilateral Research & Consulting, London, UK; S. Gutwirth, Vrije Universiteit Brussel, Belgium; M. Friedewald, Fraunhofer Institute for Systems and Innovation Research (ISI), Machine Translation Explorations in Quantum Karlsruhe, Germany; E. Vildjiounaite, VTT Electronics, Oulu, Fin- land; Y. Punie, Institute for Prospective Technological Studies Its Scope and Limits Computing (IPTS), European Commission, DG JRC, Seville, Spain (Eds.)

Safeguards in a World of Ambient Machine Translation (MT) is both an engineering By the year 2020, the basic memory components of Intelligence technology and a measure of all things to do with a computer will be the size of individual atoms. At languages and computers—whenever a new theo- such scales, the current theory of computation will ry of language or linguistics is offered, an important become invalid. A new field called "quantum com- criteria for its success is whether or not it will im- puting" is emerging that is reinventing the founda- This book is a warning. It aims to warn policy-mak- prove machine translation. This book presents a his- tions of computer science in a way that is consistent ers, industry, academia, civil society organisations, tory of machine translation (MT) from the point of with quantum physics. Remarkably, this new theory the media and the public about the threats and vul- view of a major writer and innovator in the subject. predicts that quantum computers can perform cer- nerabilities facing our privacy, identity, trust, secu- It describes and contrasts a range of approaches to tain tasks breathtakingly faster than classical com- rity and inclusion in the rapidly approaching world the challenges and problems of this remarkable tech- puters, and can accomplish mind-boggling feats such of ambient intelligence (AmI). In the near future, nology by means of a combination of historic pa- as teleporting information, breaking supposedly "un- every manufactured product – our clothes, money, pers along with commentaries to update their signifi- breakable" codes, generating true random numbers, appliances, the paint on our walls, the carpets on cance, both at the time of their writing and now. This and communicating with messages that betray the our floors, our cars, everything – will be embedded volume chronicles the evolution of conflicting ap- presence of eavesdropping. This book explains these with intelligence, networks of tiny sensors and ac- proaches to MT towards a somewhat skeptical con- developments in simple terms, and describes key tuators, which some have termed "smart dust". The sensus on future progress. Also included is a discus- technological hurdles that must be overcome in or- AmI world is not far off. We already have surveil- sion of the most recent developments in the field der to make quantum computers a reality. It draws lance systems, biometrics, personal communicators, and prospects for the future, which have been much upon the very latest research and uses executable machine learning and more. AmI will provide per- changed by the arrival of the World Wide Web. software simulations to help explain the material and sonalised services – and know more about us – on allow the reader to experiment with the ideas behind a scale dwarfing anything hitherto available. In the Features [..] AmI vision, ubiquitous computing, communications Comprehensive look at MT technology from the per- and interfaces converge and adapt to the user. AmI Contents spective of a participant in its history and develop- promises greater user-friendliness in an environment Includes a CD-ROM comprised of Mathematica ment Details the deep differences and struggles be- capable of recognising and responding to the [..] tween rival groups on how best to do MT Presents a notebooks for performing presentations in the book. worldwide perspective covering historical and con- Contents: 1) Computer Technology meets Quantum Features temporary systems in Europe, the US and Japan Reality; 2) The Capabilities of Computing Machin- The first attempt ever at a comprehensive analysis Considers MT as a fundamental part of Artificial In- ery; 3) The Dynamics of Quantum Computers; 4) of the threats and vulnerabilities of an Ambient In- telligence and the ultimate test-bed for all computa- Extracting Answers from Quantum Computers; 5) telligence (AmI) future Contains well-crafted, realis- tional linguistics Breaking Unbreakable Codes; 6) True Randomness; tic scenarios that vividly demonstrate the pitfalls and 7) Quantum Cryptography; 8) Quantum Teleporta- threats of an AmI-world Deals with AmI imagina- Contents tion; 9) Errors in Quantum Computers; 10) Error tively through vigorous analysis and the sketching of Introduction: the state of play in 2004.- The origins Correction; 11)The Reality of Quantum Computers different various, and makes very important recom- of MT and its relationship to artificial intelligence.- mendations that will be the subject of debate and [..] An artificial intelligence approach to MT.- It works, Fields of interest but how far can it go: Evaluating the SYSTRAN MT Programming Techniques; Software Engineering; Contents system?- MT Present: Where am I coming from: The Quantum Computing, Information and Physics Foreword by Emile Aarts Foreword by Gary Marx issue of directionality in MT.- Interlinguas for MT Preface An Executive Summary for Hasty Readers Target groups and natural languages.- Stone soup and the French Introduction The Brave New World of Ambient In- Advanced CS/physics/Engr Professionals CS/ Room: the statistical approach to MT at IBM.- The telligence Dark Scenarios Threats and Vulnerabilities physics/Engr Computer Designers role of linguistic knowledge resources in Japanese Safeguards Recommendations for Stakeholders Con- MT.- The automatic acquisition of lexicons for an Type of publication clusions References List of Contributors MT system.- MT future: Senses and texts.- Sense Graduate/advanced undergraduate textbook projection.- Lexical tuning.- [..] Fields of interest Information Systems Applications (incl.Internet); Fields of interest Due July 2008 Computers and Society; Legal Aspects of Comput- Language Translation and Linguistics; History of ing; R & D/Technology Policy; Personal Computing Computing; Artificial Intelligence (incl. Robotics); 2008. Approx. 365 p. 78 illus. (Texts in Computer Science) Geb. Information Storage and Retrieval; Probability and Target groups Statistics in Computer Science 48,15 € Scholars and researchers in the field of ambient intel- ISBN 978-1-84628-886-9 ligence (AmI) and Ubicomp; researchers, students, Target groups policy-makers and others who are involved in tech- General public, particularly computer scientists and nology studies, information science, regulatory pol- students, interested in the progress of science and icy, law, and a wide range of social-science disci- technology plines, such as sociology, economics, political science (and its branches of policy studies and governance) Type of publication Monograph Type of publication Contributed volume Due March 2008 Due December 2007 2008. Approx. 250 p. Geb. 2008. Approx. 300 p. (The International Library of Ethics, Law and 102,99 € Technology , Band 1) Geb. ISBN 978-0-387-72773-8 123,00 € ISBN 978-1-4020-6661-0 176 Computer springer.com/booksellers

L. Xu, Old Dominion University, USA; A.M. Tjoa, Vienna University L. Xu, Old Dominion University, USA; A.M. Tjoa, Vienna University H. Yadava, Sunnyvale, CA, USA of Technology, Austria; S. Chaudhry, Villanova University, USA of Technology, Austria; S. Chaudhry, Villanova University, USA (Eds.) (Eds.) The Berkeley DB Book Research and Practical Issues of Research and Practical Issues of Enterprise Information Systems II Enterprise Information Systems II The Berkeley DB Book is intended to be a practical Volume 2 Volume 1 guide to the intricacies of Berkeley DB; an in-depth analysis of the complex design issues which are of- IFIP TC 8 WG 8.9 International Conference on Research and IFIP TC 8 WG 8.9 International Conference on Research and ten covered in terse footnotes in the dense Berkeley Practical Issues of Enterprise Information Systems (CONENIS Practical Issues of Enterprise Information Systems (CONENIS 2007), October 14-16, 2007, Beijing, China 2007), October 14-16, 2007, Beijing, China DB reference manual. It explains the technology at a higher level and also covers the internals with gen- erous code and design examples. Berkeley DB is be- coming the database of choice for appliance makers Research and Practical Issues of Enterprise Informa- and for in memory cache of large scale applications Features tion Systems II, Volume 1 presents work from the like search engines and high traffic web sites. As a Newest volume in the CONFENIS conference series IFIP TC 8 WG 8.9 International Conference on the tool for developers, Berkeley DB is so flexible that it Research and Practical Issues of Enterprise Informa- is difficult to understand the implications of differ- Contents tion Systems (CONFENIS 2007).Enterprise informa- ent design choices. In this book you will get to see a SOA-Based Telecom Product Management Sys- tion systems (EIS) have become increasingly popu- developer’s perspective on various intriguing design tem Framework.- Automated Promotion Machine: lar over the last 15 years. EIS integrate and support issues in Berkeley DB based applications and you will Emerging IS for the Retail Industry in China.- Per- business processes across functional boundaries in a understand those design options and be able to de- sonalized Trip Information for E-Tourism Recom- supply chain environment. In recent years, more and cide which ones to choose under which condition. mendation System Based on Bayes Theorem.- Anal- more enterprises world-wide have adopted EIS such ysis of Mobile Commerce Value Chain.- An Inter- as Enterprise Resource Planning (ERP) for running Features est-Oriented Network Evolution Mechanism for On- their businesses. Previously, information systems It will be a complete reference for Berkeley DB Will line Communities.- An Integrated System Design such as CAD, CAM, MRPII and CRM were widely be endorsed by and include a foreword by Margo for Telecom Operators’ Investment Management.- A used for partial functional integration within a busi- Seltzer, one of the original co-creators of Berkeley Memory Based Model for Knowledge Organization ness organization. With global operation, global sup- DB It will explain through extensive code examples and Sharing in Knowledge Grid.- A Methodology for ply chain, and fierce competition in place, there is a the various design issues that the developers come Domain Ontology Construction Based on Chinese need for suitable EIS such as ERP, E-Business or E- across while using Berkeley DB It will explain how Technology Documents.- The Survey [..] Commerce systems to integrate extended enterprises Berkeley DB is different from relational database in a supply chain environment with the objective of management systems and under what circumstances Fields of interest achieving efficiency, competency, and [..] it will [..] Information Systems Applications (incl.Internet) Features Contents Target groups Newest volume in the CONFENIS conference series Introduction.- What does it take to build an appli- Researchers and practioners in enterprise informa- cation on top of Berkeley DB.- Berkeley DB Prod- tion systems Contents ucts, Compilation, and Installation.- Building A A Hybrid Approach for Business Process Verifica- Type of publication Simple Data Store using Berkeley DB.- Advanced tion.- Grid-Based Information Aggregation Archi- Proceedings Data Stores.- Advanced operations.- A Real world tecture for Supply Chain Coordination.- What is Data Store.-Replication.- Distributed Transac- Business Process Management: A Two Stage Litera- tions and Data Distribution Strategies.- Berkeley Due October 2007 ture Review of an Emerging Field.- Grid-VirtuE: A DB Utilities, Database Tuning, and Troubleshoot- Layered Architecture for Grid Virtual Enterprises.- ing.- Berkeley DB new features.- Berkeley DB in Ap- 2008. LXV, 800 p. (IFIP International Federation for Information Value Network Positioning of Expected Winners: pliances and the future.- Berkeley DB C API ref- Processing, Band 255) Geb. Analysis of the Top Software Business Start-ups.- A erence.- Berkeley DB C++ API reference.- Review on the Relationship Between New Variables Berkeley DB Java API reference. 211,86 € and Classical TAM Structure.- A Study on Self-adap- ISBN 978-0-387-76311-8 tive Heterogeneous Data Integration Systems.- De- Fields of interest sign and Implementation of Enterprise Spatial Data Data Storage Representation [..] Target groups Fields of interest Beginner and intermediate application developers. Information Systems Applications (incl.Internet) Type of publication Target groups Professional book Researchers and practioners in enterprise informa- tion systems Due November 2007 Type of publication Proceedings Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Due November 2007 Oman, Qatar, Palestine: Jordan Book Center

2008. LXV, 806 p. (IFIP International Federation for Information 2008. 464 p. Geb. Processing, Band 254) Geb. ISBN 978-1-59059-672-2 211,86 € ISBN 978-0-387-75901-2 springer.com/booksellers Computer 177

R. Yager, Iona University, New York, NY, USA; L. Liu, University of Y. Yagi, Osaka University, Japan; S.B. Kang, Microsoft Research, Y. Yagi, Osaka University, Japan; S.B. Kang, Microsoft Research, Akron, Copley, OH, USA (Eds.) USA; I.S. Kweon, KAIST, Korea; H. Zha, Peking University, China USA; I.S. Kweon, KAIST, Korea; H. Zha, Peking University, China (Eds.) (Eds.) Classic Works of the Dempster- Shafer Theory of Belief Functions Computer Vision -- ACCV 2007 Computer Vision - ACCV 2007 8th Asian Conference on Computer Vision, Tokyo, Japan, 8th Asian Conference on Computer Vision, Tokyo, Japan, November 18-22, 2007, Proceedings, Part I November 18-22, 2007, Proceedings, Part II This book brings together a collection of classic re- search papers on the Dempster-Shafer theory of be- lief functions. This book will serve as the authorita- The two volume set LNCS 4843 and LNCS 4844 con- The two volume set LNCS 4843 and LNCS 4844 con- tive reference in the field of evidential reasoning and stitutes the refereed proceedings of the 8th Asian stitutes the refereed proceedings of the 8th Asian an important archival reference in a wide range of Conference on Computer Vision, ACCV 2007, held Conference on Computer Vision, ACCV 2007, held areas including uncertainty reasoning in artificial in Tokyo, Japan, in November 2007. The 46 revised in Tokyo, Japan, in November 2007. The 46 revised intelligence and decision making in economics, en- full papers, 3 planary and invited talks, and 130 re- full papers, 3 planary and invited talks, and 130 re- gineering, and management. The carefully selected vised poster papers of the two volumes were careful- vised poster papers of the two volumes were careful- contributions are grouped into seven sections, in- ly reviewed and seleceted from 551 submissions. The ly reviewed and seleceted from 551 submissions. The cluding conceptual foundations, theoretical perspec- papers of this volume are organized in topical sec- papers of this volume are organized in topical sec- tives, theoretical extensions, alternative interpreta- tions on shape and texture, fitting, calbration, detec- tions on shape and texture, fitting, calbration, detec- tions, and applications to artificial intelligence, de- tion, image and video processing, applications, face tion, image and video processing, applications, face cision-making, and statistical inferences. The book and gesture, tracking, camera networks, face/ges- and gesture, tracking, camera networks, face/ges- also includes a foreword by Dempster and Shafer ture/action detection and recognition, learning, mo- ture/action detection and recognition, learning, mo- reflecting the development of the theory in the last tion and tracking, retrival and search, human pose tion and tracking, retrival and search, human pose forty years, and an introduction describing the ba- estimation, matching, face/gesture/action detection estimation, matching, face/gesture/action detection sic elements of the theory and how each paper con- and recognition, low level vision and phtometory, and recognition, low level vision and phtometory, tributes to the field. motion and tracking, human detection, and segmen- motion and tracking, human detection, and segmen- tation. tation. Features Collects the key original contributions that are wide- Fields of interest Fields of interest ly recognized in the field of Dempster-Shafer The- Computer Imaging, Vision, Pattern Recognition and Computer Imaging, Vision, Pattern Recognition and ory of Belief functions Authoritative reference in Graphics; Pattern Recognition; Image Processing Graphics; Pattern Recognition; Image Processing the field of evidential reasoning and an important and Computer Vision; Artificial Intelligence (incl. and Computer Vision; Artificial Intelligence (incl. archival reference in a wide range of areas includ- Robotics); Biometrics; Algorithm Analysis and Prob- Robotics); Biometrics; Algorithm Analysis and Prob- ing uncertainty reasoning in artificial intelligence lem Complexity lem Complexity and decision making in economics, engineering, and management Target groups Target groups Researchers and professionals Researchers and professionals Contents From the contents: Classic Works of the Demp- Type of publication Type of publication ster-Shafer Theory of Belief Functions: An Introduc- Proceedings Proceedings tion.- New Methods for Reasoning toward Posteri- or Distributions based on Sample Data (1966).- Up- Due October 2007 Due October 2007 per and Lower Probability Induced by a Multivalued Mapping (1967).- A Generalization of Bayesian In- 2007. XXVIII, 969 p. (Lecture Notes in Computer Science, Band 2007. XXVIII, 915 p. (Lecture Notes in Computer Science, Band ference (1968).- On Random Sets and Belief Func- 4843) Softcover 4844) Softcover tions (1978) .- Non-additive Probabilities in the Work of Bernoulli and Lambert (1978) .- Allocations 99,51 € 99,51 € of Probability (1978).- Computational Methods for a ISBN 978-3-540-76385-7 ISBN 978-3-540-76389-5 Mathematical Theory of Evidence (1981).- Construc- tive Probability (1981).- Belief Functions and [..]

Fields of interest Appl.Mathematics/Computational Methods of Engi- neering; Artificial Intelligence (incl. Robotics); Game Theory, Economics, Social and Behav. Sciences; Eco- nomic Theory

Target groups Researchers, engineers, graduate students in fuzzy logic, artificial intelligence, expert systems, computer science, statistics, economics, and management

Type of publication Monograph

Due January 2008

2007. Approx. 625 p. (Studies in Fuzziness and Soft Computing, Band 219) Geb.

181,85 € ISBN 978-3-540-25381-5 178 Computer springer.com/booksellers

S.Y. Yan, University of Bedfordshire, UK & MIT, USA A. Yang, University of New South Wales, Canberra, NSW, Aus- T. Yu, Memorial University of Newfoundland, St. Johns, Canada; tralia; Y. Shan, Australia National University, Canberra, NSW, Aus- D. Davis, NuTech Solutions, Newbury, MA, USA; C. Baydar, Com- tralia; L.T. Bui, University of New South Wales, Canberra, NSW, Score Networks Inc., Chicago, IL, USA; R. Roy, Cranfield University, Cryptanalytic Attacks on RSA Australia (Eds.) Cranfield, UK (Eds.)

Success in Evolutionary Evolutionary Computation in RSA is the first workable and practicable public-key Computation Practice cryptographic system, based on the use of large prime numbers. It is also the most popular and wide- ly-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Darwinian evolutionary theory is one of the most This book is loaded with examples in which comput- Adleman received the year 2002 Turing Award, the important theories in human history for it has er scientists and engineers have used evolutionary equivalent Nobel Prize in Computer Science. Crypt- equipped us with a valuable tool to understand the computation - programs that mimic natural evolu- analytic Attacks on RSA covers almost all major amazing world around us. There can be little sur- tion - to solve real problems. They aren’t abstract, known cryptanalytic attacks and defenses of the RSA prise, therefore, that Evolutionary Computation mathematically intensive papers, but accounts of cryptographic system and its variants. Since RSA de- (EC), inspired by natural evolution, has been so suc- solving important problems, including tips from the pends heavily on computational complexity theo- cessful in providing high quality solutions in a large authors on how to avoid common pitfalls, maximize ry and number theory, background information on number of domains as diverse as engineering and fi- the effectiveness and efficiency of the search process, complexity theory and number theory is present- nance. EC includes a number of techniques, such as and many other practical suggestions. Some of the ed first. This is followed by an account of the RSA Genetic Algorithms, Genetic Programming, Evolu- authors have already won “Humies” - Human Com- cryptographic system and its variants. Cryptanalytic tion Strategy and Evolutionary Programming, which petitive Results Awards - for the work described in Attacks on RSA is designed for a professional audi- have been used in a diverse range of highly success- this book. I highly recommend it as a highly concen- ence of practitioners and researchers in industry and ful applications. This book brings together some of trated source of good problem-solving approaches academia and as a reference or secondary text for ad- these EC applications in fields including electron- that are applicable to many real-world problems. vanced level students in computer science, applied ics, telecommunications, health, bioinformatics, sup- mathematics, electrical & communica- ply chain and other engineering domains, to give the Features tion [..] audience, including both EC researchers and prac- Everything about evolutionary computation in prac- titioners, a glimpse of this exciting rapidly-evolving tice Features field. First book available that covers cryptanalytic attacks Contents on RSA exclusively Presents useful guidelines for Features An Introduction to Evolutionary Computation in proper use of RSA in information security Reports recent research results on evolutionary com- Practice.- Design for Product Embedded Disassem- putation in practice bly.- Multi-Level Decomposition for Tractability in Contents Structural Design Optimization.- Representing the -Preface.- Notations.- Computational/Mathemati- Contents Change-Free Form Deformation for Evolutionary cal Preliminaries.- RSA Public-Key Cryptography.- Part I Theory.- Adaptation of a Success Story in GAs: Design Optimization.- Evolving Microstructured Integer Factorization Attacks.- Discrete Logarithm Estimation-of-Distribution Algorithms for Tree- Optical Fibres.- Making Interactive Evolutionary Attacks .- Quantum Computing Attacks.- Simple El- based Optimization Problems.- The Automated De- Graphic Design Practical.- Optimization of Store ementary Attacks.- Exponent Attacks.- Secret Ex- sign of Artificial Neural Networks Using Evolution- Performance using Personalized Pricing.- A Com- ponent Attacks.- Side-channel Attacks.- The Road ary Computation.- A Versatile Surrogate-Assisted putational Intelligence Approach to Railway Track Ahead.- Bibliography.- Index.   Memetic Algorithm for Optimization of Computa- Intervention Planning.- A Co-Evolutionary Fuzzy tionally.- Expensive Functions and its Engineering System for Reservoir Well Logs Interpretation.- Re- Fields of interest Applications.- Data Mining and Intelligent Multi source [..] Data Encryption; Data Structures, Cryptology and Agent Technologies in Medical Informatics.- Part II Information Theory; Systems and Data Security; Applications.- Evolving Trading Rules.- A hybrid ge- Fields of interest Coding and Information Theory; Data Structures; netic algorithm for the protein folding problem us- Appl.Mathematics/Computational Methods of Engi- Computer Communication Networks ing the 2D-HP lattice model.- Optimal Management neering; Artificial Intelligence (incl. Robotics) [..] Target groups Target groups Professionals, practitioners and researchers Fields of interest Engineers, researchers, and graduate students in Appl.Mathematics/Computational Methods of Engi- computational intelligence evolutionary computa- Type of publication neering; Artificial Intelligence (incl. Robotics) tion Monograph Target groups Type of publication Due December 2007 Engineers, researchers, and graduate students in Monograph computational intelligence, computer science and evolutionary computation 2008. Approx. 257 p. 20 illus. Geb. Due January 2008

74,15 € Type of publication Monograph 2008. Approx. 320 p. (Studies in Computational Intelligence, ISBN 978-0-387-48741-0 Band 88) Geb.

Due January 2008 139,05 € ISBN 978-3-540-75770-2 2008. Approx. 350 p. (Studies in Computational Intelligence, Band 92) Geb.

139,05 € ISBN 978-3-540-76285-0 springer.com/booksellers Computer 179

G.P. Zarri, University Paris IV-Sorbonne, France J. Zhang, University Wisconsin, Milwaukee, WI, USA A. Zhigljavsky, Cardiff University, Cardiff, UK; A. Zilinskas, Institute of Mathematics and Informatics, Vilnius, Lithuania Representation and Management Visualization for Information of Narrative Information Retrieval Stochastic Global Optimization

Theoretical Principles and Implementation This book presents the main methodological and The amount of digitized information available on the theoretical developments in stochastic global op- Internet, in digital libraries, and other forms of infor- A big amount of important, ‘economically relevant’ timization. The extensive text is divided into four mation systems grows at an exponential rate, while information, is buried within the huge mass of mul- chapters; the topics include the basic principles and becoming more complex and more dynamic. As a timedia documents that correspond to some form of methods of global random search, statistical infer- consequence, information organization, information ‘narrative’ description. Due to the ubiquity of these ence in random search, Markovian and popula- retrieval and the presentation of retrieval results have ‘narrative’ resources, being able to represent in a tion-based random search methods, methods based become more and more difficult. Information visual- general, accurate, & effective way their semantic on statistical models of multimodal functions and ization offers a unique method to reveal hidden pat- content – i.e., their key ‘meaning’ – is then both con- principles of rational decisions theory. Key features: terns and contextual information in a visual presen- ceptually relevant & economically important. In Inspires readers to explore various stochastic meth- tation and allows users to seek information in an in- this book, we present the main properties of NKRL ods of global optimization by clearly explaining the tuitive way. Jin Zhang provides a systematic expla- (‘Narrative Knowledge Representation Language’), main methodological principles and features of the nation of the latest advancements in information re- a language expressly designed for representing, in a methods; Includes a comprehensive study of proba- trieval visualization from both theoretical and prac- standardised way, the ‘meaning’ of complex multi- bilistic and statistical models underlying the stochas- tical perspectives. He reviews the main approaches media narrative documents. NKRL is a fully imple- tic optimization algorithms; Expands upon more and techniques available in the field, explains theo- mented language/environment. The software exists sophisticated techniques including random and se- retical relationships between information retrieval in two versions, an ORACLE-supported version and mi-random coverings, stratified sampling schemes, and information visualization, and presents major a file-oriented one. Written from a multidisciplinary Markovian algorithms and population based algo- information retrieval visualization algorithms and perspective, this exhaustive description of NKRL rithms; Provides a thorough description of the meth- models. He then takes a detailed look at the theory & of the associated knowledge representation ods based on statistical models of objective function; and applications of information [..] principles will be an invaluable source of reference Discusses [..] for practitioners, researchers & graduates. Features Features First book to deal with information visualization Features Provides reader with a methodological and theoret- from an information retrieval perspective Presents No other (working) system fully devoted to the ‘in- ical basis for developing and investigating optimiza- most important information retrieval visualization telligent’ representation & management of ‘nar- tion heuristics Summarizes basic ideas and presents algorithms and models Details applications of in- rative’ documents exists Relates the results of a con- recent progress and new results Includes an exten- formation retrieval visualization for Internet traf- crete work that has lasted about ten years & has sive bibliography with old Russian articles as well as fic analysis, and internet information searching and produced a fully implemented system (a complete new English papers Includes an extensive discussion browsing environment) realized in Java 2: it is not yet another on probabilistic and statistical models used in the theoretical discussion about the best way of dealing Contents global random search Expands upon more sophisti- with narratives Takes a multidisciplinary perspective 1) Information Retrieval and Visualization - 2) In- cated [..] formation Retrieval Preliminaries - 3) Visualization Contents Contents Models for Multiple Reference Points - 4) Euclidean Introduction.- The Knowledge Representation Preface.- Introduction.- Basic Concepts and Ideas.- Spatial Characteristic Based Visualization Models Principles.- The Inferential Structures of NKRL.- Global Random Search: Fundamentals and Statistical - 5) Kohonen Self-Organizing Map - An Artificial Conclusion.- Glossary.- Index.- Appendix A: De- Inference.- Global Random Search: Extensions.- Sta- Neural Network - 6) Pathfinder Associative Network scription of the NKRL ‘ontology of concepts’.- Ap- tistical Models.- References.- Index. - 7) Multidimensional Scaling - 8) Internet Informa- pendix B: Description of the NKRL ‘ontology of tion Visualization - 9) Ambiguity in Information Vi- events’ (ontology templates, HTemp).- Appendix C: Fields of interest sualization - 10) The Implication of Metaphors in In- General survey of the software solutions used to im- Optimization; Calculus of Variations and Optimal formation Visualization - 11) Benchmarks and Eval- plement the NKRL general environment Control; Optimization; Applications of Mathematics uation Criteria for Information Retrieval Visualiza- Fields of interest tion - 12) Afterthoughts - [..] Target groups Multimedia Information Systems Researchers interested in global optimization Fields of interest Target groups Information Storage and Retrieval; User Interfaces Type of publication Practitioners, Researchers, Graduates and Human Computer Interaction; Information Sys- Monograph tems Applications (incl.Internet) Type of publication Due December 2007 Monograph Target groups Researchers in academia and industry, libraries 2008. X, 272 p. (Springer Optimization and Its Applications, Band Due March 2008 Type of publication 9) Geb. Monograph 82,34 € 2008. Approx. 350 p. (Advanced Information and Knowledge ISBN 978-0-387-74022-5 Processing) Geb. Due November 2007 80,20 € ISBN 978-1-84800-077-3 2008. XVII,292 pages with 72 illus(1 fig in color) (The Information Retrieval Series, Band 23) Geb.

74,85 € ISBN 978-3-540-75147-2 180 Computer springer.com/booksellers

S.K. Zhou, W.-Y. Zhao, X. Tang, S. Gong (Eds.) Y. Zhuang, College of Computer Science, Zhejiang University, H. Zhuge, Chinese Academy of Sciences, Beijing, China Hangzhou, China; Y. Pan, Chinese Academy of Engineering, Bei- jing, China; J. Xiao, College of Computer Science, Zhejiang Uni- Analysis and Modelling of Faces and versity, Hangzhou, China The Web Resource Space Model Gestures A Modern Approach to Intelligent Third International Workshop, AMFG 2007 Rio de Janeiro, Classifying objects into categories at different gran- Brazil, October 20, 2007 Proceedings Animation: Theory and Practice ularity levels, establishing links between known ob- jects, and discovering clues between known and un- known objects are essential for new-generation se- This book constitutes the refereed proceedings of Part of the new series, Advanced Topics in Science mantic data models. This book introduces the Re- the Third International Workshop on Analysis and and Technology in China, this book discusses con- source Space Model (RSM), which effectively orga- Modelling of Faces and Gestures, AMFG 2007, held cepts, theory, and core technologies of intelligent nizes and correctly manages resources by normaliz- in Rio de Janeiro, Brazil, in October 2007 within the theory and human animation, including video based ing classification semantics. This volume presents scope of ICCV 2007, the International Conference human animation, and intelligent technology of mo- basic models of RSM and the Semantic Link Net- on Computer Vision. The 8 revised full papers pre- tion data management and reusing. It introduces sys- work (SLN), the relationship between the two, and sented together with 13 revised poster papers were tems developed to demonstrate the technologies of an approach to integrating the two models and ex- carefully reviewed and selected from 55 submissions. video based animation. Each chapter is independent. ploring their semantic-rich interconnection. Also de- The papers review the status of recognition, analysis Lively pictures and demos will be presented to make tailed is a comprehensive theory of query operations and modeling of face, gesture, activity, and behavior. the theory and technologies more understandable. on RSM and extensive coverage of the distribut- Topics addressed include feature representation, 3D For researchers, this is a reference book and an up- ed RSM in parallel with the distributed relational face, robust recognition under pose and illumination date on the current status of human animation. For database systems. This text is sure to be considered variations, video-based face recognition, learning, fa- professionals, this is a guide for application develop- a substantial contribution to the field of Knowledge cial motion analysis, body pose estimation, and sign ment using human animation technologies. Yueting Grid by researchers in the areas of web, semantic recognition. Zhuang received his PhD in Computer Science from web, and decentralized data engineering, as well as Zhejiang University (1998). From 1997 to 1998, he the emerging semantic and knowledge grid arena. Fields of interest was a visiting scholar at Beckman Institute, U. of Illi- Pattern Recognition; Image Processing and Com- nois, Urbana-Champaign. Now he is professor and Features puter Vision; Artificial Intelligence (incl. Robotics); vice dean of the College of Computer Science at Zhe- Introduces the Resource Space Model (RSM) and Computer Graphics; Algorithm Analysis and Prob- jiang University. relevant theories to efficiently manage e-resources by lem Complexity normalized classification semantics Author is lead- Features ing, well-cited figure in Knowledge Grid area Target groups Discusses human animation based on natural video, Researchers and professionals monocular video of subject in tight clothes, and mul- Contents tiple camera video Discusses motion data reusing Contents.- Preface.- Resource Space Model Method- Type of publication technology Introduces some prototype systems of ology.- A Semantic Overlay Integrating Normaliza- Proceedings video based human animation, in detail tion with Autonomy.- Expressiveness of Query Lan- guages for Resource Space Model.- Algebra and Cal- Due October 2007 Contents culus of the Resource Space Model.- Searching Com- 1. Introduction.- 2. Fundamental Issues.- 3. Ar- plexity of Resource Space Model.- Resource Space 2007. X, 305 p. (Lecture Notes in Computer Science, Band 4778) chitecture of Video based Animation System.- 4. Model Storage.- Structured Peer-to-Peer Resource Softcover Human Animation Technology based on Natural Space.- Unstructured Peer-to-Peer Resource Space.- Video.- 5. Human Animation Technology based on Probabilistic Resource Space Model.- References.- 51,36 € Monocular Video and Tighten Clothes.- 6. Human Index. ISBN 978-3-540-75689-7 Animation Technology based on Multiple Cameras.- 7. Human Motion Database.- 8. Intelligent Process- Fields of interest ing of Motion Data and Animation Production.- 9. Information Systems Applications (incl.Internet); In- Summary and Future Direction. formation Systems and Communication Service; In- formation Storage and Retrieval; Database Manage- Fields of interest ment Computer Imaging, Vision, Pattern Recognition and Graphics; Image Processing and Computer Vision Target groups Researchers in the areas of web, semantic web, and Target groups decentralized data engineering; advanced-level Software developers and researchers in computer an- students in computer science imation Type of publication Type of publication Monograph Monograph Due December 2007 Due November 2007 2008. Approx. 250 p. (Web Information Systems Engineering and Distribution rights in China: Zhejiang University Press Internet Technologies Book Series, Band 4) Geb.

90,90 € Jointly published with Zhejiang University Press ISBN 978-0-387-72771-4

2008. Approx. 300 p. 90 illus. (Advanced Topics in Science and Technology in China ) Geb.

106,95 € ISBN 978-3-540-73759-9 springer.com/booksellers Computer 181

K.-H. Zimmermann, Hamburg University of Technology, Ham- N. Ziviani, R. Baeza-Yates (Eds.) A.S. d'Avila Garcez, City University, London, UK; L.C. Lamb, Brazil; burg, Germany; Z. Ignatova, Max Planck Institute for Biochem- D.M. Gabbay istry, Martinsried, Germany; I. Martinez-Perez, Hamburg Universi- ty of Technology, Hamburg, Germany String Processing and Information Retrieval Neural-Symbolic Cognitive DNA Computing Models Reasoning 14th International Symposium, SPIRE 2007 Santiago, Chile, October 29-31, 2007 Proceedings

DNA contains the genetic instructions for the bio- Humans are often extraordinary at performing prac- tical reasoning. There are cases where the human logical development of cellular life forms or viruses. This book constitutes the refereed proceedings of the computer, slow as it is, is faster than any artificial in- DNA computing uses DNA as a substrate for stor- 14th International Symposium on String Processing telligence system. Are we faster because of the way ing information, while molecular biological opera- and Information Retrieval, SPIRE 2007, held in San- we perceive knowledge as opposed to the way we tions are used to manipulate this information. DNA tiago, Chile, October 29-31, 2007. The 27 revised full represent it? The authors address this question by Computing Models provides the reader with a com- papers presented were carefully reviewed and select- presenting neural network models that integrate the prehensive introduction to the field of DNA comput- ed from 77 submissions. The papers topics span dic- two most fundamental phenomena of cognition: our ing. This book emphasizes computational methods tionary algorithms, text searching, pattern matching, ability to learn from experience, and our ability to to tackle central problems of DNA computing, such text compression, text mining, natural language pro- reason from what has been learned. This book is the as controlling living cells, building patterns, and gen- cessing, automata based string processing, IR mod- first to offer a self-contained presentation of neural erating nanomachines. DNA Computing Models is elling, indexing, ranking and filtering, interface de- network models for a number of computer science intended for researchers and graduate-level students sign, visualization, cross-lingual IR systems, mul- logics, including modal, temporal, and epistemic in computer science, bioengineering and molecular timedia IR, digital libraries, collaborative retrieval, logics. By using a graphical presentation, it explains biology as a reference book. This volume is also ap- Web related applications, DNA sequencing and ap- neural networks through a sound neural-symbolic propriate for practitioners in industry. plications in molecular biology, evolution and phy- integration methodology, and it focuses on the ben- logenetics, recognition of genes and regulatory ele- Features efits of integrating effective robust learning with ex- ments, sequence driven protein structure prediction, Includes laboratory-scale human-operated models of pressive reasoning capabilities. It will be invaluable XML, SGML, information retrieval from semi-struc- computation; includes the first experiment of DNA reading for academic researchers, graduate students, tured data, text mining and generation of structured computation conducted by Adleman (1994), mod- and senior undergraduates in [..] data from text. els to solve complex computational problems, and Contents computationally universal models of DNA comput- Fields of interest Introduction.- Logics and Knowledge Representa- ing Addresses the design of complex genetic circuits Data Mining and Knowledge Discovery; Artificial tion.- Artificial Neural Networks.- Neural-Symbol- by using cellular logical circuits Intelligence (incl. Robotics); Database Management; ic Learning Systems.- Connectionist Modal Logic.- Data Structures; Coding and Information Theory; Contents Applications of Connectionist Non-classical Reason- Algorithm Analysis and Problem Complexity Preface.- Introduction.- X509-Infrastructure.- PGP ing.- Connectionist Modal Logics in Practice.- Con- and Paradigm.-  Trust Models.- Platform de- Target groups nectionist Temporal Logic.- Connectionist Intuition- pendencies/independencies.- Revocation.- Boom or Researchers and professionals istic Logic.- Fibring Neural Networks.- Argumenta- Bust or Alterantives. Molecular Biology.- Theoretical tion Frameworks as Neural Networks.- Probabilistic Computer Science.- Non-Autonomous DNA Mod- Type of publication Reasoning in Neural Networks.- Relational Learning els.- Autonomous DNA Models.- Cell Computing Proceedings in Neural Networks.- Conclusions Models.- Transcriptional Cell Logic.- Index. Fields of interest Due October 2007 Fields of interest Artificial Intelligence (incl. Robotics); Computation Computational Biology/Bioinformatics; Pattern by Abstract Devices; Theory of Computation; Logic; Recognition; Computer Applications in Chemistry; 2007. XII, 311 p. Also available online. (Lecture Notes in Comput- Mathematical Logic and Formal Languages; Pattern Bioinformatics; Biomedicine general er Science, Band 4726) Softcover Recognition

Target groups 51,36 € Target groups Researchers and graduate-level students in computer ISBN 978-3-540-75529-6 Researchers, lecturers, postgraduate students, senior science undergraduate students

Type of publication Type of publication Monograph Monograph

Due January 2008 Due February 2008

2008. Approx. 300 p. (Advances in Information Security, Band 42) 2008. Approx 265 p. (Cognitive Technologies) Geb. Geb. 57,78 € 102,99 € ISBN 978-3-540-73245-7 ISBN 978-0-387-73635-8 182 Computer springer.com/booksellers

F.S. de Boer, Centre for Mathematics and Computer Science, H. van Ditmarsch, University of Otago, New Zealand; W. van der CWI, The Netherlands; M.M. Bonsangue, Leiden University, The Hoek, University of Liverpool, UK; B. Kooi, University of Gronin- Netherlands; S. Graf, VERIMAG, Grenoble-Gières, France; W.-P. de gen, The Netherlands Roever, University of Kiel, Germany (Eds.) Dynamic Epistemic Logic Formal Methods for Components and Objects

5th International Symposium, FMCO 2006, Amsterdam, Dynamic Epistemic Logic is the logic of knowledge Netherlands, November 7-10,2006, Revised Lectures change. This is not about one logical system, but about a whole family of logics that allows us to spec- ify static and dynamic aspects of multi-agent sys- tems. This book provides various logics to support Formal methods have been applied successfully to such formal specifications, including proof systems. the verification of medium-sized programs in proto- Concrete examples and epistemic puzzles enliven col and hardware design. However, their application the exposition. The book also contains exercises in- to the development of large systems requires more cluding answers and is eminently suitable for grad- emphasis on specification, modelling and valida- uate courses in logic. A sweeping chapter-wise out- tion techniques supporting the concepts of reusabil- line of the content of this book is the following. The ity and modifiability, and their implementation in chapter 'Introduction' informs the reader about the new extensions of existing programming languages. history of the subject, and its relation to other dis- This book presents 12 revised lectures given by top- ciplines. 'Epistemic Logic' is an overview of mul- researchers at the 5th International Symposium ti-agent epistemic logic - the logic of knowledge - on Formal Methods for Components and Objects, including modal operators for groups, such as gen- FMCO 2006, held in Amsterdam, Netherlands, in eral and common knowledge. 'Belief Revision' is an November 2006. The book provides a unique combi- overview on how to model belief revision, both in the nation of ideas on software engineering and formal 'traditional' way and in a dynamic epistemic setting. methods that reflect the current interest in the appli- 'Public Announcements' is a detailed [..] cation or development of formal methods for large scale software systems such as component-based sys- Features tems and object systems. The papers are organized in The first accessible reference to public announce- topical sections on component and service oriented ment logic Eminently suitable textbook for a grad- computing, system design, tools, algebraic methods, uate audience Companion webpage with slides for model [..] lecturers, exams for further practice, etc. Everything you always wanted to know about the muddy chil- Fields of interest dren problem Many examples, exercises, and thor- Software Engineering; Programming Languages, ough completeness proofs and expressivity results Compilers, Interpreters; Logics and Meanings of Programs; Operating Systems Contents Preface.- 1. Introduction.- 2. Epistemic Logic.- 3. Be- Target groups lief Revision.- 4. Public Announcements.- 5. Epis- Researchers and professionals temic Actions.- 6. Action Models.- 7. Completeness.- 8. Expressivity.- A. Selected Answers to Exercises.- Type of publication References.- Index. Proceedings Fields of interest Due October 2007 Logic; Artificial Intelligence (incl. Robotics); Episte- mology; Mathematical Logic and Formal Languages 2007. VI, 497 p. Also available online. (Lecture Notes in Computer Science, Band 4709) Softcover Target groups Lecturers, researchers and graduate students in com- 68,48 € puter science, philosophy, logic, information science, ISBN 978-3-540-74791-8 artificial intelligence and cognitive science

Type of publication Monograph

Due November 2007

2007. XI, 296 p. (Synthese Library, Band 337) Softcover

32,05 € ISBN 978-1-4020-6908-6 Bestellen Sie jetzt! Springer Customized Book List

Ja, ich bestelle:

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Expl. ISBN € / sFr

Bezahlung gegen Rechnung Bezahlung mit Kreditkarte: Eurocard/Access/Mastercard Visa/Barclay AmEx

Nummer: Gültig bis:

Bitte bestellen Sie bei Ihrem Buchhändler oder bei: Name

Straße, Nr.

PLZ, Ort

Land

Email

Datum Unterschrift

Springer Distribution Center GmbH, Haberstrasse 7, 69126 Heidelberg, Germany € (D) sind gebundene Ladenpreise in Deutschland und enthalten 7% MwSt; € (A) sind gebundene Ladenpreise in Österreich und enthalten 10% MwSt. Die mit * gekennzeichneten Preise für Bücher und die mit ** gekennzeichneten Preise für elektronische Produkte sind unverbindliche 7 Call: + 49 (0) 6221-345-4301 7 Fax: +49 (0) 6221-345-4229 Preisempfehlungen und enthalten die landesübliche MwSt. Programm- und Preisänderungen (auch bei Irrtümern) vorbehalten. 7 Email: [email protected] 7 Web: springer.de Es gelten unsere Allgemeinen Liefer- und Zahlungsbedingungen. Springer-Verlag GmbH, Handelsregistersitz: Berlin-Charlottenburg, HR B 91022. Geschäftsführung: Haank, Mos, Hendriks