34 Computer Science Springer News 6/2008 springer.com/booksellers

P. Abrahamsson, VTT, Finland; . Baskerville, W. Abramowicz, Poznan University of Economics, R. Adams, Nanaimo, BC, Canada; S. Gibson, Georgia State University, Atlanta, GA, USA; Poznan, Poland; D. Fensel, STI Innsbruck, Austria University of Victoria, VIC, Canada; S. Müller Arisona, K. Conboy, Lero, NUI Galway, Ireland; B. Fitzgerald, (Eds.) University of California, Santa Barbara, CA, USA (Eds.) L. Morgan, X. Wang, Lero, University of Limerick, Ireland (Eds.) Business Information Systems Transdisciplinary Digital Art. Agile Processes in Software 11th International Conference, Sound, Vision and the New BIS 2008, Innsbruck, Austria, Screen Engineering and Extreme May 5–7, 2008, Proceedings Programming Digital Art Weeks and Interactive Futures 2006/2007, Zürich, Switzerland and Victoria, 9th International Conference, XP 2008, BC, Canada, Selected Papers Limerick, Ireland, June 11–14, 2008, This book contains the refereed proceedings of the 11th International Conference on Business Proceedings Information Systems, BIS 2008, held in Innsbruck, Austria, in May 2008. This volume collects selected papers from the The 41 revised full papers were carefully reviewed past two instances of Digital Art Weeks (Zurich, This book constitutes the refereed proceedings and selected inclusion in the book. The contri- Switzerland) and Interactive Futures (Victoria, BC, of the 8th International Conference on Agile butions cover research trends as well as current Canada), two parallel festivals of digital media art. Processes in Software Engineering and eXtreme achievements and cutting edge developments in The work represented in Transdisciplinary Digital Programming, XP 2008, held in Limerick, Ireland, the area of modern business information systems. Art is a confirmation of the vitality and breadth in June 2008. They are grouped in sections on business process of the digital arts. Collecting essays that broadly Out of 54 submitted papers, 16 were accepted as management, service discovery and composi- encompass the digital arts, Transdisciplinary full papers, 4 experience reports, 14 poster papers, tion, ontologies, information retrieval, enterprise Digital Art gives a clear overview of the on-going 9 workshop papers, and 3 contributions on panel resource planning, interoperability, mobility and strength of scientific, philosophical, aesthetic and discussions. The papers are organized in topical contexts, wikis and folksonomies, and rules and artistic research that makes digital art perhaps the sections on agile innovations, adaptation of agile, semantic queries. defining medium of the 21st Century. agile testing and assessment, history and evolution of agile, people factors in agile environments, Fields of interest Fields of interest conceptual models of agility, and experience Information Systems; Information Systems Computer Appl. in Arts and Humanities; reports. Applications (incl. ); Computer Appl. in Computer Graphics; Media Design Administrative Data Processing Fields of interest Target groups Software Engineering; Management of Computing Target groups Researchers and professionals and Information Systems; Technology Manage- Researchers in academia and industry ment Type of publication Type of publication Proceedings Target groups Proceedings Researchers and professionals

Type of publication Proceedings

Due June 2008 Available Available

2008. Approx. 285 p. (Lecture Notes in Business 2008. XIV, 484 p. (Lecture Notes in Business Information 2008. IX, 501 p. (Communications in Computer and Information Processing, Volume 9) Softcover Processing, Volume 7) Softcover Information Science, Volume 7) Softcover 7 approx. € 45,00 | £34.00 7 € 60,00 | £45.00 7 € 74,00 | £55.50 9ISBN 978-3-540-68254-7 9ISBN 978-3-540-79395-3 9ISBN 978-3-540-79485-1 springer.com/booksellers Springer News 6/2008 Computer Science 35

A. An, York University, Toronto, ON, Canada; S. Ao, University of Oxford, Hong Kong, China; J. Aycock, University of Calgary, AB, Canada S. Matwin, Ottawa, ON, Canada; Z. W. Ras, University M. Amouzegar, California State University, Long of North Carolina, Charlotte, NC, USA; D. Slezak, Beach, CA, USA; S. Chen, University of Florida, Spyware and Adware Infobright Inc. Toronto, ON, Canada (Eds.) Gainesville, FL, USA (Eds.) Foundations of Intelligent World Congress On Spyware and Adware introduces detailed, Systems Engineering And Computer organized, technical information exclusively on 17th International Symposium, ISMIS Science spyware and adware, including defensive tech- 2008 Toronto, Canada, May 20–23, 2008 San Francisco, California, 24–26 October 2007 niques. This book not only brings together current Proceedings sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware is a reference book designed All papers have been peer-reviewed. This volume for researchers and professors in computer science, This book constitutes the refereed proceedings of contains revised and extended research articles on as well as a secondary text for advanced-level the 17th International Symposium on Methodolo- the engineering and computer science written by students. This book is also suitable for practitio- gies for Intelligent Systems, ISMIS 2008, held in prominent researchers participating in the World ners in industry. Toronto, Canada, in May 2008. Congress on Engineering and Computer Science The 68 revised papers presented together with (WCECS) 2007. The WCECS 2007 is organized Features 3 plenary talks were carefully reviewed and by the International Association of Engineers 7 First technical book exclusively focused selected from over 100 submissions. The papers (IAENG), a non-profit international association on spyware/adware 7 Valuable reference in are organized in topical sections on knowledge found by the engineering and the computer science computer science, as well as a secondary text for discovery and data mining: foundations, advances, pioneers in 1968. advance level students mining changes and actional patterns; logic for artificial intelligence, autonomic and evolutionary Fields of interest From the contents computation, soft computing, databases and data Appl.Mathematics/Computational Methods of Motivation behind spyware/adware.- Definitions warehouses, digital library, intelligent informa- Engineering; Mechanical Engineering; Computer and history of spyware/adware.- Discussion of tion retrieval, text mining, intelligent information Science, general anti-virus/anti-spyware vendor criteria.- Installa- systems, knowledge representation and integra- tion.- Malware.- Voluntary installation, bundling, tion, Web service and intelligence, as well as Target groups and EULAs.- Drive-by downloads.- Technical applications. Researchers and graduate students working with vulnerabilities (e.g., buffer overflows).- Embed- engineering and computer science ding executable objects in web pages.- Code Fields of interest signing and problems.- Defenses.- Automatic Artificial Intelligence (incl. Robotics); Information Type of publication detection of bundled software.- Startup.- Startup Systems Applications (incl. Internet) Proceedings hooks.- Browser helper objects.- Defenses.- Keylogging.- Types of keylogger (hardware, Target groups in-kernel, user-space).- Hooking.- Defenses.- Researchers and professionals Virtual keyboards.- One-time passwords.- Two-factor authentication. - Attacks against Type of publication the defenses.- Persistence.- Avoiding uninstal- Proceedings lation.- Self-monitoring.- Hiding and obfus- cation.- Rootkits.- Defenses.- Transmitting information.- Methods.- Covert channels.- Steg- anography.- Defenses.- Tracking users.- Cookies.- Defenses.- Advertising.- Pop-up and pop-under ads.- Banner ads (relates to tracking users).- Defenses.- Detection.

Fields of interest Computer Communication Networks; Data Encryption

Target groups Researchers and professors, advanced-level students, industry practitioners

Type of publication Monograph Due July 2008

Due June 2008 Only available in print Due December 2008

2008. XVII, 653 p. (Lecture Notes in Computer Science, 2008. Approx. 290 p. (AIP Conference Proceedings, 2009. Approx. 200 p. 20 illus. (Advances in Information Volume 4994) Softcover Volume 1007) Hardcover Security, Volume 49) Hardcover 7 € 76,00 | £57.00 7 € 111,65 | £84.00 7 approx. € 66,95 | £50.50 9ISBN 978-3-540-68122-9 9ISBN 978-0-7354-0526-4 9ISBN 978-0-387-77740-5 36 Computer Science Springer News 6/2008 springer.com/booksellers

J. Barnes, John Barnes Informatics, Reading, UK S. Bechhofer, University of Manchester, UK; N. Boujemaa, M. Detyniecki, INRIA, Paris, M. Hauswirth, Galway, Ireland; J. Hoffmann, Rocquencourt, France; A. Nürnberger, Ada 2005 Rationale University of Innsbruck, Austria; M. Koubarakis, University of Magdeburg, Germany (Eds.) University of Athen, Greece (Eds.) The Language, The Standard Libraries Adaptive Multimedia The Semantic Web Research Retrieval: Retrieval, User, and Ada 2005 is the latest version of the Interna- and Applications Semantics tional Standard for the programming language 5th European Semantic Web Conference, 5th International Workshop, AMR 2007, Ada. Formally, it is an Amendment of ISO/IEC ESWC 2008, Tenerife, Canary Islands, Spain Paris, France, July 5–6, 2007, 8652:1995 (E) rather than a completely new stan- Revised Selected Papers dard. The primary goals for the new version were to enhance its capabilities particularly in those areas where its reliability and predictability are of This book constitutes the refereed proceedings great value. Accordingly, a number of intriguing of the 5th European Semantic Web Conference, This book constitutes the thoroughly refereed post- and attractive ideas have been included and ESWC 2008, held in Tenerife, Canary Islands, workshop proceedings of the 5th International implemented in a coherent manner as appropriate Spain, in June 2008. Workshop on Adaptive Multimedia Retrieval, to the level of perfection necessary for the diligent The 51 revised full papers presented together with AMR 2007, held in Paris, France, in July 2007. maintenance of a language standard. 3 invited talks and 25 system description papers The 18 revised full papers presented together with The Ada 2005 Rationale describes not only the were carefully reviewed and selected from a total 2 invited papers were carefully selected during two changes from Ada 95 but also the reason for the of 270 submitted papers. The papers are organized rounds of reviewing and improvement. The papers changes. It starts with an introduction providing in topical sections on agents, application ontolo- are organized in topical sections on image annota- a general overview and this is followed by seven gies, applications, formal languages, foundational tion, feedback and user modelling, music retrieval, chapters focusing on OOP; access types; structure issues, learning, ontologies and natural language, fusion, P2P and middleware, databases and and visibility; tasking and real time; excep- ontology alignment, query processing, search, summarization, as well as ontology and semantics. tions, generics, etc.; the predefined library; and semantic Web services, storage and retrieval of containers. The book concludes with an epilogue semantic Web data, as well as user interfaces and Fields of interest largely concerned with compatibility issues. personalization. Information Storage and Retrieval; Multimedia Information Systems; Information Systems Appli- Fields of interest Fields of interest cations (incl. Internet) Programming Techniques; Software Engineering; Information Systems Applications (incl. Internet); Programming Languages, Compilers, Interpreters Computer Communication Networks; Software Target groups Engineering Reseachers and professionals Target groups Researchers and professionals Target groups Type of publication Researchers and professionals Proceedings Type of publication Monograph Type of publication Proceedings

Due June 2008 Due June 2008 Due June 2008

2008. XIII, 267 p. (Lecture Notes in Computer Science, 2008. XIX, 897 p. (Lecture Notes in Computer Science, 2008. XII, 265 p. (Lecture Notes in Computer Science, Volume 5020) Softcover Volume 5021) Softcover Volume 4918) Softcover 7 € 39,95 | £30.00 7 approx. € 93,00 | £70.00 7 € 45,00 | £34.00 9ISBN 978-3-540-79700-5 9ISBN 978-3-540-68233-2 9ISBN 978-3-540-79859-0 springer.com/booksellers Springer News 6/2008 Computer Science 37

J. X. Chen, George Mason University, Fairfax, VA, USA; J. Cuellar, Siemens, Munich; T. Maibaum, McMaster E. Damiani, C. A. Ardagna, University of Milan, Italy; C. Chen, Southwest Jiaotong University, Sichuan, University, Canada (Eds.) N. Nabil El Ioini, Free University of Boizen/Bolzano, China Italy FM 2008: Formal Methods Foundations of 3D Graphics 15th International Symposium on Formal Open Source Systems Security Programming Methods, Turku, Finland, May 26–30, 2008 Certification Using JOGL and Java3D

This book presents the refereed proceedings of Open Source Systems Security Certification The second edition of this successful text includes the 15th International Symposium on Formal discusses Security Certification Standards and 3 new chapters as well as being thoroughly updated Methods, FM 2008, held in Turku, Finland in May establishes the need to certify open source tools and enhanced throughout. 2008. and applications. This includes the international Features: The 23 revised full papers presented together with standard for the certification of IT products (soft- (1) Presents a shortcut to 3D graphics theory, 4 invited contributions and extended abstracts of ware, firmware and hardware) Common Criteria and serves as a concise guide to both theory and 5 invited industrial presentations were carefully (ISO/IEC 15408) (CC 2006), a certification offi- programming, (2) Covers JOGL, a vehicle of 3D reviewed and selected from 106 submissions. cially adopted by the governments of 18 nations. graphics programming in Java, (3) The 3 new The papers are organized in topical sections on Without security certification, open source tools chapters cover Vertex and Pixel Shader, Cg in programming language analysis, verification, real- and applications are neither secure nor trust- JOGL Programming and an Introduction to 3D time and concurrency, grand chellenge problems, worthy. Open Source Systems Security Certifica- Graphics Games, (4) Provides a new appendix for fm practice, runtime monitoring and analysis, tion addresses and analyzes the urgency of security Basic Mathematics for 3D Graphics, (5) Incorpo- communication, constraint analysis, and design. certification for security-sensible markets, such as rates numerous practical examples and exercises, telecommunications, government and the military, (6) Introduces and describes Java3D, a shortcut to Fields of interest through provided case studies. high-level 3D graphics in Java, (7) Provides Software Engineering; Logics and Meanings of This volume is designed for professionals and readers with comprehensive samples in JOGL and Programs; Programming Languages, Compilers, companies trying to implement an Open Source Java3D, (8) Offers a supplementary website with Interpreters Systems (OSS) aware IT governance strategy, and updates, sample programs, figures and instruc- SMEs looking to attract new markets tradition- tions for setting up the OpenGL programming Target groups ally held by proprietary products or to reduce environment. Researchers and professionals costs. This book is also suitable for researchers and advanced-level students. Features Type of publication 7 This second edition contains 3 new chapters, Proceedings Features a new appendix and is updated and enhanced 7 One of the first books that covers security throughout 7 Supreme reference on JOGL certification standards for open source systems programming, with extensive and complete exclusively 7 The primary author, Professor examples 7 Also covers Java3D, with detailed Ernesto Damiani of the University of Milan, is example programs 7 Serves as an ideal shortcut highly respected world wide in this field to 3D graphics theory Contents From the contents Preface.- Introduction.- Software Security Certifi- Transformation and Viewing.- Color and cation Standards.- Setting Up a Virtual Certifica- Lighting.- Blending and Texture Mapping.- Curved tion Facility for OSS.- Index. Models.- Vertex Shading, Pixel Shading and Parallel Processing.- Cg Programming.- Program- Fields of interest ming in Java3D.- Advanced Topics.- Appendix A: Data Encryption; Information Systems Applica- Basic Mathematics for 3D Computer Graphics. tions (incl. Internet)

Fields of interest Target groups Computer Graphics; Computer Imaging, Graphics Professionals, students and researchers and Computer Vision; Software Engineering/ Programming and Operating Systems Type of publication Monograph Target groups Advanced students and software developers, who need 3D graphics on a Java platform

Type of publication Graduate/Advanced undergraduate textbook Due December 2008 Due August 2008 Due June 2008 2009. Approx. 250 p. 20 illus. Hardcover 2nd ed. 2008. Approx. 410 p. 141 illus., 40 in color. 2008. XIII, 436 p. (Lecture Notes in Computer Science, 7 approx. € 66,95 | £50.50 Hardcover Volume 5014) Softcover ISBN 978-0-387-77323-0 7 € 54,95 | £39.50 7 € 56,00 | £42.00 ISBN 978-1-84800-283-8 ISBN 978-3-540-68235-6 9 9 9 38 Computer Science Springer News 6/2008 springer.com/booksellers

A. Das, Nanyang Technological University, Singapore; M. Dastani, A. El Fallah Seghrouchni, A. Ricci, J. de Bruijn, Free University Bozen-Bolzano, Italy; H. K. Pung, National University of Singapore; M. Winikoff (Eds.) D. Fensel, M. Kerrigan, U. Keller, H. Lausen, F. B. Lee, Nanyang Technological University, J. Scicluna, STI Innsbruck ICT, Austria Singapore; L. W. Wong, National University of Programming Multi-Agent Singapore (Eds.) Systems Modeling Semantic Web Services NETWORKING 2008 Ad Fifth International Workshop, Hoc and Sensor Networks, ProMAS 2007 Honolulu, HI, USA, The Web Service Modeling Language May 14–18, 2007 Wireless Networks, Next Revised and Invited Papers Generation Internet Semantic Web services promise to automate 7th International IFIP-TC6 Networking This book constitutes the thoroughly refereed tasks such as discovery, mediation, selection, Conference Singapore, May 5–9, 2008, proceedings of the 5th International Workshop composition, and invocation of services, enabling Proceedings on Programming Multi-Agent Systems, ProMAS fully flexible automated e-business. Their usage, 2007, held in Honolulu, HI, USA, in May 2007 as however, still requires a significant amount of an associated event of AAMAS 2007, the 6th Inter- human intervention due to the lack of support for This book constitutes the refereed proceedings national Joint Conference on Autonomous Agents a machine-processable description. of the 7th International IFIP-TC6 Networking and Multiagent Systems. In this book, Jos de Bruijn and his coauthors lay Conference, NETWORKING 2008, held in The 11 revised full papers presented together with the foundations for understanding the require- Singapore, in May 2008. 2 invited articles address current issues in the areas ments that shape the description of the various The 82 revised full papers were carefully reviewed of agent platforms, environment and interaction, aspects related to Semantic Web services, such and selected from numerous submissions for agent programming languages, and analysis of as the static background knowledge in the form inclusion in the book. The papers are organized in MAS. of ontologies, the functional description of the topical sections on ad hoc and sensor networks: service, and the behavioral description of the design and optimization, MAC protocol, overlay Fields of interest service. They introduce the Web Service Modeling networking, and routing; next generation internet: Artificial Intelligence (incl. Robotics); Computer Language (WSML), which provides means for authentication, modeling and performance Communication Networks; Software Engineering describing the functionality and behavior of Web evaluation, multicast, network measurement and services, as well as the underlying business knowl- testbed, optical networks, peer-to-peer and overlay Target groups edge, in the form of ontologies, with a conceptual networking, peer-to-peer services, QoS, routing, Researchers and professionals grounding in the Web Service Modeling Ontology. security, traffic engineering, and transport proto- cols; wireless networks: MAC performance, mesh Type of publication Contents networks, and mixed networks. Proceedings 1 Introduction.- Part I: Basics.- 2 Semantic Web Services.- 3 The Web Service Modeling Ontology.- Fields of interest 4 The Basic WSML Language.- Part II: The WSML Computer Communication Networks; System Description Components.- 5 Description of Performance and Evaluation; Information Systems Ontologies.- 6 Functional Description of Services.- Applications (incl. Internet) 7 Behavioral Description of Services.- Part III Enabling Technologies for WSML.- 8 Reasoning Target groups with WSML.- 9 Creating and Managing WSML Researchers and professionals Descriptions.- 10 Conclusion and Outlook.- References, Index. Type of publication Proceedings Fields of interest Information Systems Applications (incl. Internet); Electronic Commerce/e-business; Information Systems

Target groups Researchers and advanced professionals

Type of publication Monograph

Available Available Due June 2008 2008. XXII, 945 p. (Lecture Notes in Computer Science, 2008. XII, 267 p. (Lecture Notes in Computer Science, Volume 4982) Softcover Volume 4908) Softcover 2008. XIII, 192 p. 28 illus. Hardcover 7 € 125,00 | £94.00 7 € 45,00 | £34.50 7 € 39,95 | £30.00 9ISBN 978-3-540-79548-3 9ISBN 978-3-540-79042-6 9ISBN 978-3-540-68169-4 springer.com/booksellers Springer News 6/2008 Computer Science 39

E. de Leeuw, Ordina N.V., Nieuwegein, The Neth- R. Eigenmann, B. R. Supinski (Eds.) J. Fisher, Research, Cambridge, UK (Ed.) erlands; S. Fischer Hübner, University of Karlstad, Sweden; J. C. Tseng, RSM Erasmus University, The OpenMP in a New Era Formal Methods in Systems Netherlands; J. Borking, Borking Consultancy, Wassenaar, The Netherlands (Eds.) of Parallelism Biology 4th International Workshop, IWOMP 2008 First International Workshop, FMSB 2008, Policies and Research in West Lafayette, IN, USA, May 12–14, 2008, Cambridge, UK, June 4–5, 2008, Proceedings Identity Management Proceedings First IFIP WG 11.6 Working Conference on Policies and Research in Identity This book constitutes the refereed proceedings Management (IDMAN‘07), RSM Erasmus This book constitutes the refereed proceedings of the First International Workshop on Formal University, Rotterdam, the Netherlands, of the 4th International Workshop on OPenMP, Methods in Systems Biology, FMSB 2008, held in October 11–12, 2007 IWOMP 2008, held in West Lafayette, IN, USA, in Cambridge, UK, in June, 2008. May 2008. The 9 revised full papers presented were carefully The 16 revised full papers presented together with reviewed and selected from the workshop lectures 1 keynote talk and 1 invited lecture were carefully that all were invited contributions. The purpose This book constitutes the refereed proceedings of reviewed and selected for inlusion in the book. of this meeting was to identify techniques for the the First IFIP WG 11.6 Working Conference on The papers are organized in topical sections on specification, development and verification of Policies and Research in Identity Management OpenMP overheads and hybrid models; OpenPM biological models. It also focused on the design of (IDMAN‘07) held in Rotterdam, the Netherlands for clusters; OpenPM tasking models and exten- tools to execute and analyze biological models that on October 11-12, 2007. sions, as well as applications, scheduling, and tools. can significantly advance our understanding of The IFIP series publishes state-of-the-art results in biological systems. the sciences and technologies of information and Fields of interest communication. The scope of the series includes: Programming Techniques; Software Engineering; Fields of interest foundations of computer science; software theory Algorithm Analysis and Problem Complexity Simulation and Modeling; Computer Appl. in Life and practice; education; computer applications Sciences in technology; communication systems; systems Target groups modeling and optimization; information systems; Researchers and professionals Target groups computers and society; computer systems tech- Researchers and professionals nology; security and protection in information Type of publication processing systems; artificial intelligence; and Proceedings Type of publication human-computer interaction. Proceedings The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Features 7 The papers were peer-reviewed and carefully selected 7 Much information in this series is published in advance of journal publication 7 The contributors in this volume are world- renowned experts in their field

Fields of interest Data Structures, Cryptology and Information Theory; Management of Computing and Informa- tion Systems

Target groups Information science researchers and practitioners

Type of publication Proceedings

Due July 2008 Available Due June 2008

2008. X, 148 p. 20 illus. (IFIP International Federation for 2008. X, 191 p. (Lecture Notes in Computer Science, 2008. VII, 139 p. (Lecture Notes in Computer Science, Information Processing, Volume 261) Hardcover Volume 5004) Softcover Volume 5054) Softcover 7 € 98,00 | £75.50 7 € 42,00 | £31.50 7 € 42,00 | £31.50 9ISBN 978-0-387-77995-9 9ISBN 978-3-540-79560-5 9ISBN 978-3-540-68410-7 40 Computer Science Springer News 6/2008 springer.com/booksellers

A. Gasteratos, Xanthi, Greece; M. Vincze, TU Wien, S. Gorlatch, University of Muenster, Germany; M. Grohe, HU Berlin, Germany; R. Niedermeier, Austria; J. Tsotsos, York University, Torronto, ON, T. Priol, INRIA, IRISA, Campus de BeaulieuFrance; University of Jena, Germany (Eds.) Canada (Eds.) P. Frangopoulou, Hellas Inst. of Computer Science, Iraklion, Greece (Eds.) Parameterized and Exact Computer Vision Systems Computation 6th International Conference on Computer Third International Workshop, IWPEC Achievements and Prospects Vision Systems, ICVS 2008 Santorini, Greece, 2008, Victoria, Canada, May 14–16, 2008, May 12–15, 2008, Proceedings Proceedings

Grid Computing: Achievements and Prospects, This book constitutes the refereed proceedings of an edited volume, includes selected papers from the 6th International Conference on Computer the CoreGRID Integration Workshop, held April This book constitutes the refereed proceedings of Vision Systems, ICVS 2008, held in Santorini, 2008 in Heraklion-Crete, Greece. This event brings the Third International Workshop on Parameter- Greece, May 12-15, 2008. together representatives of the academic and ized and Exact Computation, IWPEC 2008, held The 23 revised papers presented together with industrial communities performing Grid research in Victoria, Canada, in May 2008 - co-located 30 poster presentations and 2 invited papers in Europe. The workshop was organized in the with the 40th ACM Symposium on Theory of were carefully reviewed and selected from 128 context of the CoreGRID Network of Excellence in Computing, STOC 2008. submissions. The papers are organized in topical order to provide a forum for the presentation and The 17 revised full papers presented together with sections on cognitive vision, monitor and surveil- exchange of views on the latest developments in 3 invited lectures were carefully reviewed and lance, computer vision architectures, calibration grid technology research. selected from 32 submissions. The topics addressed and registration object recognition and tracking, Grid Computing: Achievements and Prospects is cover research in all aspects of parameterized and learning, human machine interaction as well as designed for a professional audience, composed exact computation and complexity, including but cross modal systems. of researchers and practitioners in industry. This not limited to new techniques for the design and volume is also suitable for graduate-level students analysis of parameterized and exact algorithms, Fields of interest in computer science. parameterized complexity theory, relationship Computer Imaging, Graphics and Computer between parameterized complexity and tradi- Vision; Image Processing; Computer Graphics Features tional complexity classifications, applications of 7 Covers all aspects of Grid Computing 7 Main parameterized computation, implementation and Target groups focus is on query processing over the grid: the experiments, high-performance computing and Researchers and professionals role of workflow management 7 CoreGRID fixed-parameter tractability. brings together a critical mass of well-established Type of publication researchers from forty-two institutions active in Fields of interest Proceedings the fields of distributed systems and middleware, Algorithm Analysis and Problem Complexity; programming models, algorithms, tools and Computation by Abstract Devices; Data Structures environments Target groups Fields of interest Researchers and professionals Computer Communication Networks; Database Management; Computer Systems Organization and Type of publication Communication Networks Proceedings

Target groups Professionals, researchers and practitioners in industry; graduate-level students in computer science

Type of publication Contributed volume

Due June 2008 Available Due August 2008 2008. XV, 560 p. (Lecture Notes in Computer Science, 2008. X, 227 p. (Lecture Notes in Computer Science, Volume 5008) Softcover 2008. XX, 280 p. 20 illus. Hardcover Volume 5018) Softcover 7 € 68,00 | £51.00 7 approx. € 92,95 | £70.00 7 € 42,00 | £31.50 9ISBN 978-3-540-79546-9 9ISBN 978-0-387-09456-4 9ISBN 978-3-540-79722-7 springer.com/booksellers Springer News 6/2008 Computer Science 41

M. Hepp, University of Innsbruck, Austria; E. A. Hirsch, Steklov Institute of Mathematics, J. Indulska, University of Queensland, Brisbane, J. Domingue, The Open University, Milton Keynes, St. Petersburg, Russia; A. A. Razborov, Institute for QLD, Australia; D. Patterson, University of California, UK; A. Barros, SAP Research Brisbane, Australia (Eds.) Advanced Study, Princeton, NJ, USA; A. Semenov, Irvine, CA, USA; T. Rodden, University of Nottingham, Moscow Institute of Open Education; A. Slissenko, UK; M. Ott, NICTA, Sydney, VIC, Australia (Eds.) Semantic Business Process University Paris 12, Creteil, France (Eds.) Management Pervasive Computing Computer Science – Theory 6th International Conference, PERVASIVE and Applications 2008, Sydney, Australia, May 19–22, 2008 Third International Computer Science Semantic Business Process Management serves Symposium in Russia, CSR 2008, Moscow, three main goals: (1) providing an up-to-date, Russia, June 7–12, 2008, Proceedings This book constitutes the refereed proceedings scientifically correct, concise and self-contained of the 6th International Conference on Pervasive reference on SBPM, covering relevant tasks, prac- Computing, PERVASIVE 2008, held in Sydney, tical and theoretical challenges and limitations, Australia, in May 2008. methodologies, and available tooling support; (2) This book constitutes the refereed proceedings of The 18 revised full papers presented were care- integrating the conceptual and technical challenges the Third International Computer Science Sympo- fully selected during two rounds of reviewing and of using ontologies for managing business process sium in Russia, CSR 2008, held in Moscow, Russia, improvement. The papers are organized in topical spaces, with a business view on using ontolo- June 7-12, 2008. sections on sensing and activity recognition, gies, by stressing the cost dimension of ontology The 33 revised papers presented together with 5 applications for mobile devices, location in perva- engineering and by providing guidance on how to invited papers and one opening lecture were care- sive systems, platforms for pervasive computing, derive ontologies semi-automatically from existing fully reviewed and selected from 103 submissions. lessons learned from displays, games and health standards and specifications; and (3) disseminating All major areas in computer science are addressed. applications, as well as privacy and security. experiences, lessons learned, and best practices on The theory track deals with algorithms, protocols, SBPM from a number of application domains. and data structures; complexity and cryptography; Fields of interest An edited volume by distinguished leaders in the formal languages, automata and their applications Computer Communication Networks; Special field, Semantic Business Process Management is to computer science; computational models and Purpose and Application-Based Systems designed as a reference for advanced-level students concepts; proof theory and applications of logic to and researchers in computer science. Industry computer science. The application part comprises Target groups practitioners will also find this book useful. programming and languages; computer architec- Researchers and professionals ture and hardware design; symbolic computing Features and numerical applications; application software; Type of publication 7 The first one-stop reference on the state of artificial intelligence and robotics. Proceedings the art in the field of SBPM 7 Contributions authored and edited by leading international Fields of interest experts in the field 7 Practitioners in this field, Theory of Computation; Algorithm Analysis and searching for a concise handbook on using ontolo- Problem Complexity; Computation by Abstract gies for business management in real-world appli- Devices cations, will find this book very useful 7 Includes case studies, lessons learned and best practices Target groups Researchers and professionals Fields of interest Information Systems Applications (incl. Internet); Type of publication Information Systems and Communication Service Proceedings

Target groups Graduate level-students and researchers in computer science, and industry practitioners

Type of publication Contributed volume

Due January 2009 Due June 2008 Due June 2008

2009. Approx. 300 p. 20 illus. (Semantic Web and Beyond, 2008. XIII, 411 p. (Lecture Notes in Computer Science, 2008. XIV, 315 p. (Lecture Notes in Computer Science, Volume 10) Hardcover Volume 5010) Softcover Volume 5013) Softcover 7 approx. € 84,95 | £64.00 7 € 56,00 | £42.00 7 € 48,00 | £36.00 9ISBN 978-0-387-79873-8 9ISBN 978-3-540-79708-1 9ISBN 978-3-540-79575-9 42 Computer Science Springer News 6/2008 springer.com/booksellers

P. Jalote S. Joseph, University of Hawai, USA; Z. Despotovic, P. Kacsuk, R. Lovas, Z. Nemeth, MTA SZTAKI, EPFL, Lausanne, Switzerland; M. Gianluca, University Computer and Automation Research Institute, A Concise Introduction of Bologna, Italy; S. Bergamaschi, University of Budapest, Hungary (Eds.) Modena and Reggio-Emilia, Italy (Eds.) to Software Engineering Distributed and Parallel Agents and Peer-to-Peer Advisory board: S. Abramsky, C. Hankin, Systems D. C. Kozen, A. M. Pitts, F. Nielson, S. S. Skiena, Computing Desktop Grid Computing I. Stewart, D. D. Zhang 5th International Workshop, AP2PC 2006, Hakodate, Japan, May 9, 2006, Revised and Invited Papers DAPSYS (International Conference on Distributed This book offers an easily accessible foundation to and Parallel Systems) is an international bian- the topic of software engineering. It focuses on the nual conference series dedicated to all aspects of essential elements, providing the reader with the distributed and parallel computing. DAPSYS 2008, basic skills and knowledge required to execute a This book constitutes the thoroughly refereed post- the 7th International Conference on Distributed software project successfully. workshop proceedings of the 5th International and Parallel Systems was held September 3-5 in Following the winning formula and easy-to Workshop on Agents and Peer-to-Peer Computing, Debrecen, Hungary. read style of the author’s previous An Integrated AP2PC 2006, held in Hakodate, Japan, in May Distributed and Parallel Systems: Desktop Grid Approach to Software Engineering, this reader- 2006, in the context of the 5th International Joint Computing based on DAPSYS 2008 presents friendly text is written especially for under- Conference on Autonomous Agents and Multi- original research, novel concepts and methods, graduates as an introduction to this broad-ranging Agent Systems, AAMAS 2006. and outstanding results. Contributors investigate discipline. With a strong emphasis on practice, The 10 revised full papers and 6 revised short parallel and distributed techniques, algorithms, this textbook takes a case-study approach whereby papers presented together with 1 invited paper models and applications; present innovative soft- a project is developed through the course of were carefully reviewed and selected from 23 ware tools, environments and middleware; focus the book, illustrating the different activities of submissions; they are fully revised to incorporate on various aspects of grid computing; plus intro- software development. The sequence of chapters reviewers’ comments and discussions at the work- duce novel methods for development, deployment, is essentially the same as the sequence of activities shop. The volume is organized in topical sections testing and evaluation. This edited volume features performed during a typical software project. on P2P Infrastructure, agents in P2P, P2P search, a special focus on desktop grid computing as well. Designed for undergraduates and bolstered with and applications. numerous examples and chapter summaries, Features this text imparts to the reader the fundamental Fields of interest 7 Includes recent advances of scalability, fault- knowledge, skills, practices and techniques within Artificial Intelligence (incl. Robotics); Computer tolerance and security in desktop grid systems software engineering. Communication Networks; Information Systems 7 Investigates desktop grids, volunteer computing Applications (incl. Internet) systems and large-scale computing applications Features 7 Based on the material and accessible style of the Target groups From the contents successful, An Integrated Approach to Software Researchers and professionals Featured topic: Desktop Grid Computing.- Cluster Engineering, this textbook is written specifically and Grid Systems.- Distributed and Grid Middle- for undergraduates 7 Offers a solid foundation Type of publication ware.- Parallel and Distributed Programming to this broad-ranging discipline, focusing on the Proceedings Languages and Algorithms.- Formal models for essential elements to execute a software project Parallel and .- Software successfully 7 Uses a case study approach taking Engineering and Development Tools.- Autono- the reader through the life cycle of applying the mous and Self-* Distributed Systems.- Problem concepts to practice Solving Environments.- Grid Architectures.- Grid Resource Management.- Grid Workflow.- Grid Fields of interest Application Support Tools.- Distributed Informa- Software Engineering; Programming Languages, tion Management.- Distributed Storage Systems.- Compilers, Interpreters; Software Engineering/ Advanced Cluster/Grid Applications.- Index. Programming and Operating Systems Fields of interest Target groups Operating Systems; Processor Architectures; Soft- Undergraduates ware Engineering/Programming and Operating Systems Type of publication Undergraduate textbook Target groups Professionals; secondary textbook for graduate- level students

Type of publication Contributed volume Due September 2008 Due June 2008 Due September 2008 2008. Approx. 285 p. 67 illus. (Undergraduate Topics in 2008. Approx. 205 p. (Lecture Notes in Computer Computer Science) Softcover Science, Volume 4461) Softcover 2008. XX, 280 p. 20 illus. Hardcover 7 approx. € 26,95 | £17.95 7 € 42,00 | £31.50 7 approx. € 92,95 | £70.00 9ISBN 978-1-84800-301-9 9ISBN 978-3-540-79704-3 9ISBN 978-0-387-79447-1 springer.com/booksellers Springer News 6/2008 Computer Science 43

Y. Karabulut, SAP Research, USA; J. Mitchell, H. Kleine Büning, University of Paderborn, Germany; B. Y. Kogan, UCLA, USA Stanford University, USA; P. Herrmann, Norwegian X. Zhao, Sun Yat-Sen University, China (Eds.) University of Science and Technology, Norway; Introduction to C. D. Jensen, Technical University of Denmark, Theory and Applications of Computational Cardiology Denmark (Eds.) Satisfiability Testing – Trust Management II SAT 2008 The textbook Introduction to Computational Proceedings of IFIPTM 2008: Joint iTrust 11th International Conference, SAT 2008, Guangzhou, China, May 12–15, 2008, Cardiology provides a comprehensive, in-depth and PST Conferences on Privacy, Trust treatment of the fundamental concepts and Proceedings Management and Security, June 18–20, 2008, research challenges involved in the mathematical Trondheim, Norway modeling and computer simulation of electro- physiological heart processes, under normal and This book constitutes the refereed proceedings of pathological conditions. This book is based on the This book constitutes the refereed proceedings of the 11th International Conference on Theory and author’s lecture notes from his course Introduc- IFIPTM 2008: Joint iTrust and PST Conferences Applications of Satisfiability Testing, SAT 2008, tion to Computational Cardiology, and also covers held in Trondheim, Norway on June 18-20, 2008. held in Guangzhou, P. R. China, in May 2008. results of his students’ research activity in the US The IFIP series publishes state-of-the-art results in The 17 revised full papers presented together with and USSR over the last 30-35 years. the sciences and technologies of information and 8 revised short papers and 2 invited talks were Exercises and examples are included throughout communication. The scope of the series includes: carefully selected from 70 submissions. All current this textbook, with electronic access to a solutions foundations of computer science; software theory research issues in propositional and quantified manual. and practice; education; computer applications Boolean formula satisfiability testing are covered, Introduction to Computational Cardiology serves in technology; communication systems; systems including but not limited to proof systems, as a textbook for advanced-level students in modeling and optimization; information systems; proof complexity, search algorithms, heuristics, computer science and biomedical engineering; it computers and society; computer systems tech- analysis of algorithms, hard instances, randomized is also suitable for researchers and practitioners in nology; security and protection in information formulae, problem encodings, industrial applica- industry. processing systems; artificial intelligence; and tions, solvers, simplifiers, tools, case studies and human-computer interaction. Proceedings and empirical results. Features post-proceedings of refereed international confer- 7 Includes models used in both biology and ences in computer science and interdisciplinary Fields of interest medicine to find the mechanisms of function and fields are featured. These results often precede Mathematical Logic and Formal Languages; malfunction of living organisms and its organs on journal publication and represent the most current Algorithm Analysis and Problem Complexity; different levels 7 Covers the Theory of Stationary research. The principal aim of the IFIP series is Operating Systems Spiral Wave Propagation to encourage education and the dissemination and exchange of information about all aspects of Target groups From the contents computing. Researchers and professionals Basic Concepts of Mathematical Modeling and Computer Simulation.- Electrophysiological Features Type of publication Background.- Basic Concepts of Mathematical 7 The papers in this volume were peer-reviewed Proceedings Modeling of Action Potential Generation and and carefully selected 7 Much information Propagation Based on HH Formalism.- Action in this series is published in advance of journal Potential Models of the First Generation.- Simpli- publication 7 The contributors in this volume are fied Mathematical Models of Cardiac Action world-renowned experts in their field Potential.- Action Potential Mathematical Models of Second Generation.- Computer Implementation Fields of interest of the Mathematical Models for Action Potential Computer Science, general; Data Structures, Cryp- Generation and Propagation.- Action Potential tology and Information Theory Propagation in a Mathematical Model of One- Dimensional Cardiac Tissue.- Elements of the Target groups Traveling Wave Theory. Researchers and practitioners in trust management and security Fields of interest Cardiology; Computer Imaging, Graphics and Type of publication Computer Vision Proceedings Target groups Researchers and graduate-level students; professionals

Type of publication Monograph Due July 2008 Available Due December 2008 2008. XII, 368 p. (IFIP International Federation for 2008. X, 305 p. (Lecture Notes in Computer Science, Information Processing, Volume 263) Hardcover Volume 4996) Softcover 2009. Approx. 400 p. 20 illus. Hardcover 7 € 128,00 | £86.50 7 € 48,00 | £36.00 7 approx. € 66,95 | £50.50 9ISBN 978-0-387-09427-4 9ISBN 978-3-540-79718-0 9ISBN 978-0-387-76685-0 44 Computer Science Springer News 6/2008 springer.com/booksellers

R. Kowalczyk, CSIRO Mathematical & Informa- S. Leue, University of Konstanz, Germany; P. Merino, F. Lillehagen, Active Knowledge Modeling AS, tion, Carlton, VIC, Australia; M. Huhns, M. Klusch, University of Malaga, Spain (Eds.) Lysaker, Norway; J. Krogstie, NTNU, Trondheim, Deutsches Forschungszentrum, Saarbrücken, Norway Germany; Z. Maamar, Zayed University, Abu Dubai, Formal Methods for Industrial United Arab Emirates; Q. B. Vo (Eds.) Critical Systems Active Knowledge Modeling of Enterprises Service-Oriented Computing: 12th International Workshop, FMICS 2007, Agents, Semantics, and Berlin, Germany, July 1–2, 2007, Revised Selected Papers Engineering Enterprise Modeling has been defined as the AAMAS 2008 International Workshop, art of externalizing enterprise knowledge, i.e., SOCASE 2008 Estoril, Portugal, May 12, 2008 representing the core knowledge of the enterprise. This book constitutes the thoroughly refereed Although useful in product design and systems Proceedings post-workshop proceedings of the 12th Interna- development, for modeling and model-based tional Workshop on Formal Methods for Industrial approaches to have a more profound effect, a shift Critical Systems, FMICS 2007, held in Berlin, in modeling approaches and methodologies is This book constitutes the refereed proceedings of Germany, in July 2007 - colocated with CAV 2007, necessary. Modeling should become as natural the International Workshop on Service-Oriented the 19th International Conference on Computer as drawing, sketching and scribbling, and should Computing: Agents, Semantics, and Engineering, Aided Verification. provide powerful services for capturing work- SOCASE 2008, held in Estoril, Portugal, as an The 15 revised full papers presented together with centric, work-supporting and generative knowl- associated event of AAMAS 2008, the main inter- the abstracts of 2 invited lectures were carefully edge, for preserving context and ensuring reuse. national conference on autonomous agents and selected during two rounds of reviewing and A solution is the application of Active Knowledge multi-agent systems. improvement from 31 initial submissions. The Modeling (AKM). The 11 revised full papers presented were carefully papers strive to promote research and development The AKM technology is about discovering, reviewed and selected for inclusion in the book. for the improvement of formal methods and tools externalizing, expressing, representing, sharing, The papers address a range of topics at the inter- for industrial applications and the are organized in exploring, configuring, activating, growing and section of service-oriented computing, semantic topical sections on control systems, scheduling and managing enterprise knowledge. An AKM solu- technology, and intelligent multiagent systems, time, verification, software, and testing. tion is about exploiting the Web as a knowledge such as: service description and discovery; plan- engineering medium, and developing knowledge- ning, composition and negotiation; semantic Fields of interest model-based families of platforms, model-config- processes and service agents; and applications. Software Engineering; Logics and Meanings of ured workplaces and services. Programs; Programming Languages, Compilers, Fields of interest Interpreters Features Information Systems Applications (incl. Internet); 7 Shows a completely novel approach to Active Database Management Target groups Knowledge Management (AKM) in industry Researchers and professionals 7 Supported by a real-world product and addi- Target groups tional website 7 Written by the inventors of the Researchers and professionals Type of publication AKM technology 7 Based on long-term collabo- Proceedings ration between academic research and industry Type of publication application Proceedings From the contents 1 What is Active Knowledge Modeling (AKM) Technology.- 2 Customer Challenges and Demands.- 3 Industrial Evolutions.- 4 State of the Art of Enterprise Modeling.- 5 Enterprise Knowl- edge Architecture (EKA).- 6 Approaches to Enter- prise Solutions.- 7 Introducing Active Knowledge Modeling in Industry.- 8 Families of Platforms and Arc- 9 Enterprise Design and Development.

Fields of interest Software Engineering; Information Systems; Infor- mation Systems Applications (incl. Internet)

Target groups Practitioners and professionals

Type of publication Professional book Due June 2008 Due June 2008 Due June 2008 2008. IX, 149 p. (Lecture Notes in Computer Science, 2008. X, 251 p. (Lecture Notes in Computer Science, Volume 5006) Softcover Volume 4916) Softcover 2008. Approx. 455 p. Hardcover 7 € 42,00 | £31.50 7 € 45,00 | £34.00 7 € 59,95 | £45.00 9ISBN 978-3-540-79967-2 9ISBN 978-3-540-79706-7 9ISBN 978-3-540-79415-8 springer.com/booksellers Springer News 6/2008 Computer Science 45

I. Mandoiu, University of Connecticut, Storrs, CT, H. Mei, Peking University, Beijing, China (Ed.) M. Miculan, I. Scagnetto, F. Honsell, Universitá di USA; R. Sunderraman, A. Zelikovsky, Georgia State Udine, Italia (Eds.) University, Atlanta, GA, USA (Eds.) High Confidence Software Reuse in Large Systems Types for Proofs and Programs Bioinformatics Research and International Conference, TYPES 2007, Applications 10th International Conference on Software Reuse, ICSR 2008, Bejing, China, Cividale del Friuli, Italy, May 2–5, 2007, Fourth International Symposium, ISBRA May 25–29, 2008 Revised Selected Papers 2008, Atlanta, GA, USA, May 6–9, 2008, Proceedings

This book constitutes the refered proceedings of This book constitutes the thoroughly refereed the 10th International Conference on Software post-conference proceedings of TYPES 2007, the This book constitutes the refereed proceedings of Reuse, ICSR 2008, held in Beijing, China, in May concluding conference of the Types project, held in the Fourth International Symposium on Bioinfor- 2008. Cividale del Friuli, Italy, in May 2007. matics Research and Applications, ISBRA 2008, The 40 revised full papers presented together The 13 revised full papers presented were care- held in Atlanta, GA, USA in May 2008. with 5 workshop summaries and 5 tutorials were fully reviewed and selected from 22 submissions. The 35 revised full papers presented together with carefully reviewed and selected from numerous The topic of this last annual workshop of the 6 workshop papers and 6 invited papers were submissions. The papers are organized in topical Types Working Group was formal reasoning and carefully reviewed and selected from a total of sections on architecture and reuse approaches, computer programming based on type theory. 94 submissions. The papers cover a wide range high confidence and reuse, component selec- Great importance was attached to languages and of topics, including clustering and classification, tion and reuse repository, product line, domain computerized tools for reasoning, and applications gene expression analysis, gene networks, genome models and analysis, service oriented environ- in several domains such as analysis of program- analysis, motif finding, pathways, protein structure ment, components and services, reuse approaches ming languages, certified software, formalization prediction, protein domain interactions, phyloge- and frameworks, as well as reuse approaches and of mathematics and mathematics education. netics, and software tools. methods. Fields of interest Fields of interest Fields of interest Logics and Meanings of Programs; Mathematical Computation by Abstract Devices; Pattern Recog- Programming Techniques; Software Engineering; Logic and Formal Languages; Programming nition Management of Computing and Information Languages, Compilers, Interpreters Systems Target groups Target groups Researchers and professionals Target groups Researchers and professionals Researchers and professionals Type of publication Type of publication Proceedings Type of publication Proceedings Proceedings

Available Due June 2008 Due June 2008

2008. XIX, 510 p. (Lecture Notes in Computer Science, 2008. XIII, 436 p. (Lecture Notes in Computer Science, 2008. VII, 203 p. (Lecture Notes in Computer Science, Volume 4983) Softcover Volume 5030) Softcover Volume 4941) Softcover 7 € 64,00 | £48.00 7 € 56,00 | £42.00 7 € 42,00 | £31.50 9ISBN 978-3-540-79449-3 9ISBN 978-3-540-68062-8 9ISBN 978-3-540-68084-0 46 Computer Science Springer News 6/2008 springer.com/booksellers

A. Miri, University of Ottawa, ON, Canada (Ed.) M. S. Mueller, TU Dresden, Germany; B. Chapman, T. Nanya, Tokyo, Japan; F. Maruyama, Kawasaki, University of Houston, TX, USA; B. R. Supinski, Japan; A. Pataricza, Budapest, Hungary; M. Malek, Wireless Sensor and Actor Lawrence Livermore National Laboratory, CA, USA; Berlin, Germany (Eds.) Networks II A. D. Malony, University of Oregon, Eugene, OR, USA; M. Voss, Intel Corporation, Champaign, IL, USA (Eds.) Service Availability Proceedings of the 2008 IFIP Conference 5th International Service Availability on Wireless Sensor and Actor Networks OpenMP Shared Memory Symposium, ISAS 2008 Tokyo, Japan, (WSAN 08), Ottawa, Ontario, Canada, Parallel Programming May 19–21, 2008 Proceedings July 14–15, 2008 International Workshop, IWOMP 2005 and IWOMP 2006, Eugene, OR, USA, This book constitutes the refereed proceedings June 1–4, 2005, and Reims, France, This book constitutes the refereed proceed- of the IFIP Conference on Wireless Sensors and June 12–15, 2006, Proceedings ings of the 5th International Service Availability Actor Networks held in Ottawa, Canada, July, Symposium, ISAS 2008, held in Tokyo, Japan, in 2008. May 2008. This series publishes state-of-the-art results in The 12 revised full papers presented together with the sciences and technologies of information and This book constitutes the thoroughly refereed 2 keynote papers and 2 tutorials were carefully communication. The scope of the series includes: post-workshop proceedings of the First and the reviewed and selected from 28 submissions. The foundations of computer science; software theory Second International Workshop on OpenMP, papers are organized in topical sections on enter- and practice; education; computer applications IWOMP 2005 and IWOMP 2006, held in Eugene, prise system dependability, software service avail- in technology; communication systems; systems OR, USA, and in Reims, France, in June 2005 and ability, service availability platform, and service modeling and optimization; information systems; 2006 respectively. dependability analysis. computers and society; computer systems tech- The first part of the book presents 16 revised full nology; security and protection in information papers carefully reviewed and selected from the Fields of interest processing systems; artificial intelligence; and IWOMP 2005 program and organized in topical Computer Communication Networks; Information human-computer interaction. Proceedings and sections on performance tools, compiler tech- Systems Applications (incl. Internet); Information post-proceedings of refereed international confer- nology, run-time environment, applications, as Storage and Retrieval ences in computer science and interdisciplinary well as the OpenMP language and its evaluation. fields are featured. These results often precede In the second part there are 19 papers of IWOMP Target groups journal publication and represent the most current 2006, fully revised and grouped thematically in Researchers and professionals research. The principal aim of the IFIP series is sections on advanced performance tuning aspects to encourage education and the dissemination of code development applications, and proposed Type of publication and exchange of information about all aspects of extensions to OpenMP. Proceedings computing. Fields of interest Features Programming Techniques; Software Engineering; 7 The papers in this volume were peer-reviewed Algorithm Analysis and Problem Complexity and carefully selected 7 Much information in this series is published in advance of journal Target groups publication 7 The contributors in this volume are Researchers and professionals world-renowned experts in their field Type of publication Fields of interest Proceedings Computer Science, general; Computer Systems Organization and Communication Networks; Computer Communication Networks

Target groups Information science researchers and practitioners

Type of publication Proceedings

Due July 2008 Due June 2008 Due June 2008

2008. XII, 280 p. 158 illus. (IFIP International Federation 2008. XII, 448 p. (Lecture Notes in Computer Science, 2008. XII, 225 p. (Lecture Notes in Computer Science, for Information Processing, Volume 264) Hardcover Volume 4315) Softcover Volume 5017) Softcover 7 € 128,00 | £86.50 7 € 60,00 | £45.00 7 € 42,00 | £31.50 9ISBN 978-0-387-09440-3 9ISBN 978-3-540-68554-8 9ISBN 978-3-540-68128-1 springer.com/booksellers Springer News 6/2008 Computer Science 47

H. Oinas-Kukkonen, University of Oulu, Finland; J. A. Onieva, University of Malaga, Spain; A. Pasko, V. Adzhiev, P. Comninos, Bournemouth P. Hasle, Aalborg University, Denmark; M. Harjumaa, D. Sauveron, S. Chaumette, D. Gollmann, University, Bournemouth, UK (Eds.) K. Segerståhl, University of Oulu, Finland; K. Markantonakis (Eds.) P. Øhrstrøm, Aalborg University, Denmark (Eds.) Heterogeneous Objects Information Security Theory Persuasive Technology Modelling and Applications and Practices. Smart Devices, Invited Papers on Foundations and Third International Conference, Convergence and Next Applications PERSUASIVE 2008, Oulu, Finland, June 4–6, 2008, Proceedings Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13–16, 2008 Heterogeneous object modelling is a new and This book constitutes the refereed proceedings of quickly developing research area. This book is the Third International Conference on Persuasive one of the first attempts to systematically cover Technology, PERSUASIVE 2008, held in Oulu, This volume constitutes the refereed proceed- the most relevant themes and problems of this Finland, in June 2008. ings of the Second IFIP WG 11.2 International new and challenging subject area. It is a collection The 17 revised full papers and 12 revised short Workshop on Information Security Theory and of invited papers and papers co-authored by the papers presented together with 3 keynote papers Practices: Smart Devices, Convergence and Next editors. Each chapter presents either new research were carefully reviewed and selected from 63 Generation Networks, WISTP 2008, held in Seville, results or a survey on the following topics: submissions. The papers are organized in topical Spain, in May 2008. Formal models and abstractions of heterogeneous sections on social network systems, knowledge The 10 revised full papers presented were carefully objects including geometric, topological, discrete management, applications, conceptual frameworks, reviewed and selected from numerous submissions and continuous models, operations forming special perspectives on persuasive technology, peer-to- for inclusion in the book; they examine the rapid algebras and conversions between different model peer and social networks, self-persuasion and development of information technologies and types. timing, well-being applications, and theoretical the transition to next generation networks. The Data structures and algorithms for representing, considerations. papers focus on the security of these complex and modifying and computing with heterogeneous resource-constrained systems and are organized in objects. Computational techniques for the design, Fields of interest topical sections on smart devices, network security, reconstruction, optimization, analysis and simula- User Interfaces and Human Computer Interaction; convergence, and cryptography. tion of heterogeneous objects that incorporate Special Purpose and Application-Based Systems; information on shape, material and physical Computer Communication Networks Fields of interest behavior using a common framework. Data Encryption; Computer Communication Target groups Networks Fields of interest Researchers and professionals Data Structures; Data Storage Representation Target groups Type of publication Researchers and professionals Target groups Proceedings Researchers and professionals Type of publication Proceedings Type of publication Collected works

Due June 2008 Due June 2008 Due June 2008

2008. XIV, 287 p. (Lecture Notes in Computer Science, 2008. XII, 151 p. (Lecture Notes in Computer Science, 2008. VII, 285 p. (Lecture Notes in Computer Science, Volume 5033) Softcover Volume 5019) Softcover Volume 4889) Softcover 7 € 48,00 | £36.00 7 € 58,00 | £43.50 7 € 42,00 | £31.50 9ISBN 978-3-540-68500-5 9ISBN 978-3-540-79965-8 9ISBN 978-3-540-68441-1 48 Computer Science Springer News 6/2008 springer.com/booksellers

C. Pautasso, University of Lugano, Switzerland; L. Perron, ILOG S.A., Gentilly, France; M. A. Trick, A. J. Poorten, Centre for Number Theory Research, T. Gschwind, IBM Research GmbH, Zurich, Carnegie Mellon University, Pittsburgh, PA, USA (Eds.) Killara, NSW, Australia; A. Stein, Carl von Ossietzky Switzerland (Eds.) Universität Oldenburg, Germany (Eds.) Integration of AI and OR Emerging Web Services Techniques in Constraint Algorithmic Number Theory Technology, Vol. II Programming for 8th International Symposium, ANTS-VIII WEWST 2007, Halle (Saale), Germany, Combinatorial Optimization Banff, Canada, May 17–22, 2008 Proceedings November 2007. Selected Revised Papers Problems 5th International Conference, CPAIOR 2008 This book constitutes the refereed proceedings of Web-service-oriented frameworks are ubiquitous Paris, France, May 20–23, 2008 Proceedings the 8th International Algorithmic Number Theory today. This book contains contributions to the Symposium, ANTS 2008, held in Banff, Canada, in state-of-the-art of the most recent topics, such as May 2008. grid-based computing, mobility issues for web The 28 revised full papers presented together services, dynamic web services, and model driven This book constitutes the refereed proceedings of with 2 invited papers were carefully reviewed and engineering. the 5th International Conference on Integration selected for inclusion in the book. The papers are of AI and OR Techniques in Constraint Program- organized in topical sections on elliptic curves Features ming for Combinatorial Optimization Problems, cryptology and generalizations, arithmetic of 7 Selected revised papers from the peer-reviewed CPAIOR 2008, held in Paris, France, in May 2008. elliptic curves, integer factorization, K3 surfaces, 2007 European Conference on Web Services The 18 revised long papers and 22 revised short number fields, point counting, arithmetic of (ECOWS) and the peer-reviewed 2007 Workshop papers presented together with 3 invited talks function fields, modular forms, cryptography, and on Emerging Web Services Technology (WEWST). were carefully reviewed and selected from 130 number theory. Keynote by Prof. Schahram Dustdar submissions. The papers describe current research in the fields of constraint programming, artificial Fields of interest From the contents intelligence, and operations research to explore Algorithm Analysis and Problem Complexity; 0. Emerging Web Services Technologies - Some ways of solving large-scale, practical optimization Discrete Mathematics in Computer Science; Research Challenges Ahead.- 1. Service selection problems through integration and hybridization of Data Encryption by choreography-driven matching.- 2. Enabling the fields’ different techniques. Business Experts to Discover Web Services for Target groups Business Process.- 3. Evaluation of Semantic Fields of interest Researchers and professionals Service Discovery - A Survey and Directions for Numeric Computing; Discrete Mathematics Future Research.- 4. A Framework for Dynamic in Computer Science; Algorithm Analysis and Type of publication Web Services Composition.- 5. Composite Web Problem Complexity Proceedings Services.- 6. Management Requirements of Web Service Compositions.- 7. BPEL-DT - Data-aware Target groups Extension of BPEL to Support Data-Intensive Researchers and professionals Service Applications.- 8. Towards Resource- Oriented BPEL. Type of publication Proceedings Fields of interest Information Systems Applications (incl. Internet); Computer Systems Organization and Commu- nication Networks; Computer Communication Networks

Target groups Researchers and practitioners in the field of web- service-oriented architectures, especially with respect to dynamic web services, grid computing, and engineering methodologies for web-service- oriented frameworks

Type of publication Collected works

Due September 2008 Due June 2008 Available 2008. Approx. 180 p. (Whitestein Series in Software Agent Technologies and Autonomic Computing) 2008. XII, 394 p. (Lecture Notes in Computer Science, 2008. IX, 455 p. (Lecture Notes in Computer Science, Softcover Volume 5015) Softcover Volume 5011) Softcover 7 € 34,90 | £26.50 7 € 56,00 | £42.00 7 € 60,00 | £45.00 9ISBN 978-3-7643-8863-8 9ISBN 978-3-540-68154-0 9ISBN 978-3-540-79455-4 springer.com/booksellers Springer News 6/2008 Computer Science 49

T. Priol, IRISA / INRIA Rennes, France; M. Vanneschi, Z. W. Ras, University of North Carolina, Charlotte, M. Resch, R. Keller, V. Himmler, B. Krammer, University of Pisa, Italy (Eds.) NC, USA; S. Tsumoto, Shimane Medical University, A. Schulz, University of Stuttgart, Germany (Eds.) Izumo, Japan; D. A. Zighed, Université Lumière Lyon From Grids To Service and 2, France (Eds.) Tools for High Performance Pervasive Computing Mining Complex Data Computing Proceedings of the 2nd International ECML/PKDD 2007 Third International Workshop on Parallel Tools for High Workshop, MDC 2007, Warsaw, Poland, Grids are a crucial enabling technology for scien- Performance Computing, July 2008, September 17–21, 2007, tific and industrial development. Peer-to- peer HLRS, Stuttgart computing, grid, distributed storage technologies, Revised Selected Papers emerging web service technologies, and other types of networked distributed computing have provided new paradigms exploiting distributed This book constitutes the refereed proceedings With the advent of multi-core processors, resources. Grids are revolutionizing computing as of the Third International Workshop on Mining implementing parallel programming methods in profoundly as e-mail and the Web. Complex Data, MCD 2007, held in Warsaw, application development is absolutely necessary in From Grids to Service and Pervasive Computing, Poland, in September 2007, co-located with ECML order to achieve good performance. Soon, 8-core the 10th edited volume of the CoreGRID series, and PKDD 2007. and possibly 16-core processors will be available, is based on the 2008 CoreGRID Symposium, held The 20 revised full papers presented were carefully even for desktop machines. To support application August 25-26 in the Canary Islands, Spain. The reviewed and selected; they present original results developers in the various tasks involved in this CoreGRID Symposium is organized jointly with on knowledge discovery from complex data. In process, several different tools need to be at his the Euro-Par 2008 conference. The aim of this contrast to the typical tabular data, complex data or her disposal. This workshop will give the users symposium is to strengthen and advance scientific can consist of heterogenous data types, can come an overview of the existing tools in the area of and technological excellence in the area of grid and from different sources, or live in high dimensional integrated development environments for clusters, peer-to-peer computing. spaces. All these specificities call for new data various parallel debuggers, and new-style perfor- This volume is designed for a professional audience mining strategies. mance analysis tools, as well as an update on the composed of researchers and practitioners within state of the art of long-term research tools, which the grid and peer-to-peer computing industry. This Fields of interest have advanced to an industrial level. The proceed- volume is also suitable for advanced-level students Information Storage and Retrieval; Data Structures ings should guide participants by providing a tech- in computer science. nical overview to help them decide upon which Target groups tool suits the requirements for the development Features Researchers and professionals task at hand. Additionally, through the hands-on 7 Covers all aspects of grid computing, mainly sessions, the workshop should enable the user to focusing on pervasive computing for grid informa- Type of publication immediately deploy the tools. tion services and peer-to-peer technologies Proceedings 7 CoreGRID brings together a critical mass of Fields of interest well-established researchers from forty-two institu- Software Engineering/Programming and Oper- tions active in the fields of distributed systems and ating Systems; Computer System Implementation; middleware, programming models, algorithms, Systems and Information Theory in Engineering tools and environments Target groups Contents Engineers, developers, computer scientists Preface.- Applications.- Agent-Mediated Approaches and Peer-to-Peer Technologies. Tools, Type of publication Trust and Security Validation.- and many more.- Proceedings Index.

Fields of interest Computer Communication Networks; Database Management; Computer Systems Organization and Communication Networks

Target groups Professionals, researchers, practitioners; graduate- level students in computer science

Type of publication Contributed volume

Due June 2008 Due September 2008 Due June 2008 2008. X, 265 p. (Lecture Notes in Computer Science, 2008. Approx. 300 p. 20 illus. Hardcover Volume 4944) Softcover 2008. Approx. 220 p. Hardcover 7 approx. € 92,95 | £70.00 7 € 45,00 | £34.00 7 approx. € 79,95 | £60.00 9ISBN 978-0-387-09454-0 9ISBN 978-3-540-68415-2 9ISBN 978-3-540-68561-6 50 Computer Science Springer News 6/2008 springer.com/booksellers

R. Wyrzykowski, Czestochowa University, Poland; J. Schaeffer, University of Alberta, Edmonton, AB, S. Vaudenay, Lausanne, Switzerland (Ed.) J. Dongarra, University of Tennesse, Knoxville, USA; Canada K. Karczewski, Czestochowa University, Poland; Progress in Cryptology – J. Wasniewski, Technical University of Denmark, One Jump Ahead Kongens Lyngby, Denmark (Eds.) AFRICACRYPT 2008 Computer Perfection at Checkers First International Conference on Parallel Processing and Cryptology in Africa, Casablanca, Morocco, June 11–14, 2008, Proceedings Applied Mathematics The new edition of this extraordinary book depicts 7th International Conference, PPAM 2007, the creation of the world champion checkers Gdansk, Poland, September 9-12, 2007, computer program, Chinook. In only two years, Revised Selected papers Chinook had become a worthy opponent to This book constitutes the refereed proceedings of the world champion, and within four years had the First International Conference on Cryptology defeated all the world’s top human players. Jona- hosted in Africa, held in Casablanca, Morocco, in than Schaeffer, the originator and leader of the June 2008. This book constitutes the thoroughly refereed post- Chinook team, details the mistakes and technical The 25 revised full papers presented together with conference proceedings of the 7th International problems made and the lessons learned in the 2 invited papers were carefully selected during two Conference on Parallel Processing and Applied continuous effort to improve Chinook’s perfor- rounds of reviewing and improvement from 82 Mathematics, PPAM 2007, held in Gdansk, Poland, mance, revealing the human factor behind the submissions. The papers are organized in topical in September 2007. program’s design. The development of Chinook sections on AES, analysis of RFID protocols, The 63 revised full papers of the main conference begins in 1988 as an innocent question asked cryptographic protocols, authentication, public- presented together with 85 revised workshop over lunch and is followed to the final match key cryptography, pseudorandomness, analysis of papers were carefully reviewed and selected from against then world champion, Marion Tinsley, and stream ciphers, hash functions, broadcast encryp- over 250 initial submissions. The papers are orga- ultimately to its recent triumph, solving checkers. tion, and implementation. nized in topical sections on parallel/distributed Schaeffer’s unwaveringly honest narrative features architectures and mobile computing, numerical new anecdotes, updated material and technology Fields of interest algorithms and parallel numerics, parallel and descriptions, and additional photos and figures, Data Encryption; Computer Communication distributed non-numerical algorithms, environ- providing an engrossing account of an obsessive Networks ments and tools for as well as applications of quest to achieve perfection in computer checkers. parallel/distributed/grid computing, evolutionary Target groups computing, meta-heuristics and neural networks. Features Researchers and professionals The volume proceeds with the outcome of 11 7 An account of Chinook-the computer program workshops and minisymposia dealing with novel that perfected checkers-updated and in softcover Type of publication data formats and algorithms for dense linear 7 A must-read for those interested in artificial Proceedings algebra computations, combinatorial tools for intelligence, software development and the design parallel sparse matrix computations, grid applica- of computer games 7 Author is a world- tions and middleware, large scale computations on renowned expert at the University of Alberta’s grids, models, algorithms and methodologies for GAMES Group 7 New edition features accounts grid-enabled computing environments, scheduling from key players in this unique software project, for parallel computing, language-based parallel offering varying perspectives on the events programming models, performance evaluation of parallel applications on large-scale systems, From the contents parallel computational biology, high performance I Can’t Lose.- The Opening.- This Was Going To computing for engineering applications, and the Be Easy.- Bottomless Well.- The Middlegame: minisymposium on interval analysis. Valuable Lessons.- The Illusion of Intelligence.- A Nobel Turing Trio.- Didn’t Samuel Solve That Fields of interest Game?- The Case for the Prosecution. Software Engineering/Programming and Oper- ating Systems; Algorithm Analysis and Problem Fields of interest Complexity; Mathematics of Computing Artificial Intelligence (incl. Robotics); Computing Methodologies; Probability and Statistics in Target groups Computer Science Researchers and professionals Target groups Type of publication All those interested in artificial intelligence, Proceedings software development and the design of computer games

Type of publication Popular science Due June 2008 Due June 2008 Due September 2008 2008. XXV, 1414 p. (Lecture Notes in Computer Science, 2008. XI, 415 p. (Lecture Notes in Computer Science, Volume 4967) Softcover 2nd ed. 2008. Approx. 500 p. Softcover Volume 5023) Softcover 7 € 123,00 | £92.50 7 approx. € 32,95 | £25.00 7 € 56,00 | £42.00 9ISBN 978-3-540-68105-2 9ISBN 978-0-387-76575-4 9ISBN 978-3-540-68159-5 springer.com/booksellers Springer News 6/2008 Computer Science 51

A. Voss, M. Hartswood, R. Procter, M. Rouncefield, J. Wang, University of Massachusetts, Lowell, MA, Q. Wang, D. Pfahl, D. M. Raffo (Eds.) R. S. Slack, M. Büscher (Eds.) USA Making Globally Distributed Configuring User-Designer Security Software Development a Relations Theory and Practice Success Story Interdisciplinary Perspectives International Conference on Software Process, ICSP 2008 Leipzig, Germany, “Computer Network Security: Theory and May 10–11, 2008, Proceedings ‘User-designer relations’ concerns the sorts of Practice” introduces to the reader a complete and working relationships that arise between devel- concise view of network security. It provides in- opers and end users of IT products - the different depth theoretical coverage of recent advancements ways designers of IT products seek to engage with and practical solutions to network security threats. This book constitutes the refereed proceedings of users, and the ways users seek to influence product This book can be used for a one-semester network the Second International Conference on Software design. It is through the shifting patterns of these security course for graduate and upper-level Process, held in Leipzig, Germany, in May 2008 relations that IT products are realised. Although it undergraduate students, as well as a reference for - colocated with ICSE 2008, the 30th International has generally been accepted that achieving better IT professionals. Conference on Software Engineering. user-designer relations will improve the quality Dr. Wang has been Professor of Computer Science The 33 revised full papers presented together of IT products, there has been little consensus at the University of Massachusetts Lowell since with 2 invited papers were carefully reviewed and on how this might be achieved. This book aims 2001, and Director of its Center for Network and selected from 106 submissions. The papers are to deepen our understanding of the relationships Information Security since 2004. organized in topical sections on process content, between users and designers both as they emerge process tools and metrics, process management, in the wild and as a consequence of our attempts Features process representation, analysis and modeling, to intervene. Through a series of case studies the 7 Offers a complete and concise view of network experience report, and simulation modeling. book juxtaposes in-depth explorations of different security 7 Provides in-depth theoretical coverage perspectives and approaches to thinking about of recent advancements and practical solutions Fields of interest - and doing - user-designer relations, considering to network security threats 7 Describes the Software Engineering; Management of Computing important implications for design and computer most recent topics on wireless network security and Information Systems; Computer Appl. in science more generally. 7 Introduces a hacker’s view of computer virus Administrative Data Processing research and defense 7 Includes a large number From the contents of hands-on drills and projects Target groups Configuring User-Designer Relations: Interdisci- Researchers and professionals plinary Perspectives.- Participatory Design: Issues Contents and Approaches in Dynamic Constellations of Use, Network Security Overview.- Data Encryption Type of publication Design and Research.- Design As and For Collabo- Algorithms.- Public-Key Cryptography and Key Proceedings ration: Making Sense of and Supporting Practical Management.- Data Authentications.- Practical Action.- User-Designer Relations in Techology Network Security Protocols.- Wireless Network Production: The Development and Evaluation Security Protocols.- Firewalls.- Defending against of an ‘Animator’ Tool to Facilitate User Involve- Malicious Software.- Intrusion Detections.- ment in the Development of Electronic Health References.- Index. Records.- Lessons Learnt in Providing Product Designers with User-Participatory Interaction Fields of interest Design Tools.- A Break From Novelty: Persistence Data Structures, Cryptology and Information and Effects of Structural Tensions in Designer- Theory; Computer Communication Networks User Relations.- Practicalities of Participation: Stakeholder Involvement in an Electronic Patient Target groups Records (EPR) Project. Professionals in computer science; also suited for graduate students Fields of interest User Interfaces and Human Computer Interaction Type of publication Monograph Target groups Researchers; advanced students in human- computer interaction, computer supported co- operative work, social studies of work, organisa- tions and technology, computer system developers

Type of publication Due September 2008 Reference work Distribution rights in China: Higher Education Press Due October 2008 Due June 2008 Jointly published with Higher Education Press 2009. Approx. 260 p. (Computer Supported Cooperative 2008. XIV, 422 p. (Lecture Notes in Computer Science, Work) Hardcover 2008. Approx. 400 p. 65 illus. Hardcover Volume 5007) Softcover 7 approx. € 49,00 | £35.00 7 approx. € 119,00 | £91.50 7 € 56,00 | £42.00 9ISBN 978-1-84628-924-8 9ISBN 978-3-540-79697-8 9ISBN 978-3-540-79587-2 52 Computer Science Springer News 6/2008 springer.com/booksellers

G. Wang, Chongqing University, China; T. Washio, Osaka University, Japan; E. Suzuki, Kyushu S. Wu, L. T. Yang, T. L. Xu (Eds.) T. Li, Southwest Jiaotong University, China; University, Fukuoka, Japan; K. M. Ting, Monash J. W. Grzymala-Busse, University of Kansas, University, Churchill, VIC, Australia; A. Inokuchi, Advances in Grid and Lawrence, KS, USA; D. Miao, Tongii University, Osaka University, Japan (Eds.) China; A. Skowron, University of Warsaw, Poland; Pervasive Computing Y. Y. Yao, University of Regina, SK, Canada (Eds.) Advances in Knowledge Third International Conference, Discovery and Data Mining GPC 2008, Kunming, China, May 25-28, 2008. Rough Sets and Knowledge Proceedings Technology 12th Pacific-Asia Conference, PAKDD 2008 Osaka, Japan, May 20–23, 2008 Proceedings Third International Conference, RSKT This book constitutes the refereed proceedings 2008, Chengdu, China, May 17–19, 2008, of the Third International Conference on Grid Proceedings and Pervasive Computing, GPC 2008, held in This book constitutes the refereed proceedings of Kunming, China, in May 2008. the 12th Pacific-Asia Conference on Knowledge The 45 revised full papers presented together with Discovery and Data Mining, PAKDD 2008, held in 2 keynote lectures were carefully reviewed and This book constitutes the refereed proceedings of Osaka, Japan, in May 2008. selected from 184 submissions. The papers cover the Third International Conference on Rough Sets The 37 revised long papers, 40 revised full papers, all current issues of grid and pervasive computing and Knowledge Technology, RSKT 2008, held in and 36 revised short papers presented together and focus on topics such as cluster computing, grid Chengdu, China, in May 2008. with 1 keynote talk and 4 invited lectures were computing, high performance computing, network The 91 revised full papers papers presented carefully reviewed and selected from 312 submis- storage, peer-to-peer computing, pervasive together with 3 keynote papers and 6 tutorial sions. The papers present new ideas, original computing, the Semantic Web and the Semantic papers were carefully reviewed and selected from research results, and practical development Grid, and service-oriented computing. 184 submissions. They all focus on five major experiences from all KDD-related areas including research fields: computing theory and paradigms, data mining, data warehousing, machine learning, Fields of interest knowledge technology, intelligent information databases, statistics, knowledge acquisition, auto- Algorithm Analysis and Problem Complexity; processing, intelligent control, and applications. matic scientific discovery, data visualization, causal Computer Communication Networks; Information The papers are organized in topical sections on induction, and knowledge-based systems. Systems Applications (incl. Internet) rough and soft computing, rough mereology with applications, dominance-based rough set Fields of interest Target groups approach, fuzzy-rough hybridization, granular Artificial Intelligence (incl. Robotics); Information Researchers and professionals computing, logical and mathematical foundations, Storage and Retrieval formal concept analysis, data mining, machine Type of publication learning, intelligent information processing, Target groups Proceedings bioinformatics and cognitive informatics, web Researchers and professionals intelligence, pattern recognition, and real-life applications of knowledge technology. Type of publication Proceedings Fields of interest Artificial Intelligence (incl. Robotics); Database Management

Target groups Researchers and professionals

Type of publication Proceedings

Due June 2008 Due June 2008 Due June 2008

2008. XVIII, 765 p. (Lecture Notes in Computer Science, 2008. XXIV, 1102 p. (Lecture Notes in Computer Science, 2008. XV, 518 p. (Lecture Notes in Computer Science, Volume 5009) Softcover Volume 5012) Softcover Volume 5036) Softcover 7 € 84,00 | £63.50 7 € 105,00 | £79.00 7 € 64,00 | £48.00 9ISBN 978-3-540-79720-3 9ISBN 978-3-540-68124-3 9ISBN 978-3-540-68081-9 springer.com/booksellers Springer News 6/2008 Computer Science 53

E. Zudilova-Seinstra, T. Adriaansen, R. v. Liere (Eds.) Trends in Interactive Visualization State-of-the-Art Survey

The purpose of Interactive Visualization is to develop new scientific methods to increase scientists’ abilities to explore data and to under- stand better the results of experiments based on extensive calculations. These techniques not only provide users with a possibility to view the data but also permit them to use interaction capabilities to interrogate and navigate through datasets and communicate these insights. This book is a unique multi-disciplinary collection of scientific articles, which provides readers with insight in Interactive Visualization from various perspectives, representing the state-of-the-art with the special emphasis on: Advanced visualization algorithms and methods, Interactive data explora- tion, Display systems and interaction techniques, Multi-modal and collaborative visualization, Design and evaluation of interactive visualization tools and systems, Various application topics.

Features 7 First fully integrated book on Interactive Visualisation 7 Multi-disciplinary approach 7 Provides an overview of advanced visualisation algorithms and methods 7 Discusses principles for choosing appropriate display systems and input/output devices 7 Explores strategies for design and evaluation of interactive visualisa- tion and exploration tools 7 Presents successful case studies using virtual and augmented reality technologies

From the contents Part I Introduction.- Overview of Interactive Visu- alization.- Part II Challenges in Data Mapping.- Visualization of Information Uncertainty: Progress and Challenges.- Parallel Co-ordinates: Interactive Visualization for High Dimensions.- Interactive Particle Visualization.- Visual Parameters and Transfer Functions.- Part 111 Design and Evalu- ation.

Fields of interest Data Structures; Multimedia Information Systems; Input/Output and Data Communications

Target groups Researchers, graduate students

Type of publication Contributed volume

Due September 2008

2008. Approx. 385 p. 202 illus., 46 in color. (Advanced Information and Knowledge Processing) Hardcover 7 € 79,95 | £55.00 9ISBN 978-1-84800-268-5