ABCD springer.com

Springer Customized Book List

FRANKFURT BOOKFAIR 2007 springer.com/booksellers Computer Science 1

K. Aberer, Korea Advanced Institute of Science and Technolo- A. Abraham, Norwegian University of Science and Technology, gy, Korea; N. Noy, Stanford University, Stanford, CA, USA; D. Alle- Trondheim, Norway; Y. Dote, Muroran Institute of Technology, Transactions on Computational mang, TopQuadrant, CA, USA; K.-I. Lee, Saltlux Inc., Korea; L. Muroran, Japan Nixon, Free University Berlin, Germany; J. Goldbeck, University of Systems Biology VIII Maryland, MD, USA; P. Mika, Yahoo! Research Barcelona, Spain; D. Maynard, University of Sheffield, United Kingdom,; R. Mizoguchi, Engineering Hybrid Soft Computing Osaka University, Japan,; G. Schreiber, Free University Amster- dam, Netherlands,; P. Cudré-Mauroux, EPFL, Switzerland, (Eds.) Systems The LNCS journal Transactions on Computation- al Systems Biology is devoted to inter- and multi- disciplinary research in the fields of computer sci- The Semantic Web This book is focused on the latest technologies re- ence and life sciences and supports a paradigmat- 6th International Semantic Web Conference, 2nd Asian Se- lated to Hybrid Soft Computing targeting academia, ic shift in the techniques from computer and infor- mantic Web Conference, ISWC 2007 + ASWC 2007, Busan, Ko- scientists, researchers, and graduate students. mation science to cope with the new challenges aris- rea, November 11-15, 2007, Proceedings ing from the systems oriented point of view of bio- Features logical phenomena.  The six papers selected Latest technologies related to Hybrid Soft Comput- for this special issue are:Bio-inspired Network-Cen- ing tric Operation and Control for Sensor/Actuator This book constitutes the refereed proceedings of the joined 6th International Semantic Web Confer- Networks;A Computationally Fast and Parametric Fields of interest ence, ISWC 2007, and the 2nd Asian Semantic Web Model to Estimate Protein-Ligand Docking Time Appl.Mathematics/Computational Methods of En- Conference, ASWC 2007, held in Busan, Korea, in for Stochastic Event Based Simulation;Equation- gineering; Artificial Intelligence (incl. Robotics); Ap- November 2007. The 50 revised full academic pa- Based Congestion Control in the Internet Bio- plications of Mathematics; Numerical and Computa- pers and 12 revised application papers presented to- logic Environment;Computational Thinking in tional Methods in Engineering Biology;End-to-End Information Management for gether with 5 Semantic Web Challenge papers and Systems Biology;and a corrected version of: On Dif- 12 selected doctoral consortium articles were care- Target groups ferentiation and Homeostatic Behaviours of Boolean fully reviewed and selected from a total of 257 sub- Researchers, engineers, graduate students in Soft Dynamical Systems mitted papers to the academic track and 29 to the Computing and Fuzziness applications track. The papers address all current is- Fields of interest sues in the field of the semantic Web, ranging from Type of publication Computation by Abstract Devices; Bioinformatics; theoretical and foundational aspects to various ap- Monograph Mathematical Logic and Formal Languages; Algo- plied topics such as management of semantic Web data, ontologies, semantic Web architecture, social rithm Analysis and Problem Complexity Due November 2008 semantic Web, as well as applications of the semantic Target groups Web. Short descriptions of the top five winning ap- Researchers and professionals plications submitted to the Semantic Web Challenge 2008. Approx. 500 p. (Studies in Fuzziness and Soft Computing, competition conclude the volume. Preliminary entry 350) Hardcover Type of publication Collected works Fields of interest 129,95 € Information Systems Applications (incl.Internet); ISBN 978-3-540-25058-6 Due November 2007 Data Mining and Knowledge Discovery; Computer Communication Networks; Multimedia Information Systems; Logics and Meanings of Programs; Artifi- 2007. VII, 103 p. (Lecture Notes in Computer Science, Vol. 4780) cial Intelligence (incl. Robotics) Softcover

49,00 € Target groups ISBN 978-3-540-76638-4 Researchers and professionals Type of publication Proceedings

Due October 2007

2008. XXVII, 973 p. With CD. (Lecture Notes in Computer Science, Vol. 4825) Softcover

96,00 € ISBN 978-3-540-76297-3 2 Computer Science springer.com/booksellers

A. Abraham, Norwegian University of Science and Technology, M.S. Ackerman, University of Michigan, Ann Arbor, USA; C.A. J.C. Adams, W.S. Brainerd, R.A. Hendrickson, R.E. Maine, J.T. Mar- Trondheim, Norway; C. Grosan, Babes-Bolyai University, Cluj - Halverson, IBM TJ Watson Research, USA; Th. Erickson, IBM TJ tin, B.T. Smith Napoca, Romania; W. Pedrycz, University of Alberta, Edmonton, Watson Research, USA; W.A. Kellogg, IBM TJ Watson Research, AB, Canada (Eds.) USA (Eds.) The Fortran Handbook

Engineering Evolutionary Resources, Co-Evolution and A Toolkit for Fortran 2003 Intelligent Systems Artifacts

Theory in CSCW The Fortran 2003 Handbook is a definitive and com- prehensive guide to Fortran 2003 and its use. For- Evolutionary design of intelligent systems is gaining tran 2003, the latest standard version of Fortran, has much popularity due to its capabilities in handling A topic of significant interest to the CSCW, IT and many excellent features that assist the programmer several real world problems involving optimization, IS communities is the issue of how software and oth- in writing efficient, portable & maintainable complexity, noisy and non-stationary environment, er technical systems come to be adopted and used. programs. This book is an informal description of imprecision, uncertainty and vagueness. This edit- We know from considerable research that people Fortran 2003, developed to provide not only a read- ed volume 'Engineering Evolutionary Intelligent Sys- use systems in many ways, and that the process of in- able explanation of features, but also some rationale tems' deals with the theoretical and methodological corporating them in their everyday activities can re- for the inclusion of features & their use. Topics aspects, as well as various evolutionary quire a great deal of effort. One way of understand- & features include: The syntactic features of the applications to many real world problems originat- ing adoption and use is by considering artifacts as re- language are described completely in the appendices ing from science, technology, business or commerce. sources in people's environments. "Resources, Co- Each chapter begins with a summary of the main This volume comprises of 15 chapters including an Evolution and Artifacts: Theory in CSCW" looks at terms and concepts described in the chapter Each introductory chapter which covers the fundamen- how resources get created, adopted, modified, and of the intrinsic procedures is described in detail The tal definitions and outlines some important research die, by using a number of theoretical and empirical complete syntax of Fortran 2003 is supplied Contains challenges. Chapters were selected on the basis of studies to carefully examine and chart resources over a listing of the new and obsolescent features Numer- fundamental ideas/concepts rather than the thor- time. It examines issues such as: how resources are ous examples are given This handbook is intended oughness of techniques deployed. tailored or otherwise changed as the situations and for anyone who wants a comprehensive survey of Features purposes for which they are used change; how a re- Fortran 2003, including those familiar with program- Reports recent research results on Engineering Evo- source is maintained and reused within an organisa- ming language concepts but unfamiliar [..] lutionary Intelligent Systems tion; the ways in which the value of a resource comes to be recognised and portrayed; the ways in which an Features Fields of interest artifact is transformed to enable it to [..] Comprehensive coverage for anyone who wants a Appl.Mathematics/Computational Methods of Engi- comprehensive survey of Fortran 2003, including neering; Artificial Intelligence (incl. Robotics) Features those familiar with programming language concepts Proposes some new theories for CSCW by attempt- but unfamiliar with Fortran All authors have been Target groups ing to determine why computational systems or oth- intrinsically involved in the development of Fortran Engineers, researchers, and graduate students in er artifacts become so important in people's environ- computational intelligence ments (or how they become resources) Contents Preface.- Introduction.- Fortran Concepts and Type of publication Contents Terms.- Language Elements an Source Form.- Data Monograph Artifacts and Their Development.- The Birth of an Types.- Declarations.- Using Data.- Expressions and Organizational Resource.- The Zephyr Help Instance Assignment.- Block constructs and Execution con- trol.- Input and Output Processing.- Input and Out- Due January 2008 as a CSCW Resource.- Co-realisation: Towards a Principled Synthesis of Ethnomethodology and Par- put Editing.- Program Units.- Using Procedures.- ticipatory Design.- Figuring Out How to Figure Intrinsic Procedures and Modules.- Exceptions and 2008. Approx. 400 p. (Studies in Computational Intelligence, Vol. Out.- Contextualizing Influences: Language, Trust IEEE Arithmetic.- Interoperability with C.- Scope, 82) Hardcover and Time.- Representational Gestures as Cognitive Association, and Definition.- A: Fortran 2003 Syn- tax.- B: Language Evolution.- Index 129,95 € Artifacts for Developing Theories in a Scientific Lab- ISBN 978-3-540-75395-7 oratory.- Distributed Cognition and Joint activity in Computer-System Administration.- Representation, Fields of interest Coordination and Information Artifacts in Medical Programming Languages, Compilers, Interpreters; Work.- Reach, Bracket and the Limits of [..] Programming Techniques

Fields of interest Target groups User Interfaces and Human Computer Interaction; Professionals Information Systems and Communication Service; Type of publication Management of Computing and Information Sys- Handbook tems

Target groups Due June 2008 Researchers and educators in IT; software engineers and information technology managers 2008. Approx. 800 p. Hardcover

Type of publication 62,95 € Contributed volume ISBN 978-1-84628-378-9

Due November 2007

2007. Approx. 335 p. (Computer Supported Cooperative Work) Hardcover

72,95 € ISBN 978-1-84628-900-2 springer.com/booksellers Computer Science 3

C.C. Aggarwal, IBM T.J. Watson Research Center, Yorktown M. Agosti, University of Padova, Italy (Ed.) S. Aguzzoli, University of Milan, Italy; A. Ciabattoni, Technical Uni- Heights, NY, USA; P.S. Yu, IBM T.J. Watson Research Center, York- versity Vienna, Austria; B. Gerla, University of Insurbria, Italy; C. town Heights, NY, USA (Eds.) Manara, University of Milan, Italy; V. Marra, University of Milan, Information Access through Search Italy (Eds.) Privacy-Preserving Data Mining Engines and Digital Libraries Algebraic and Proof-Theoretic Models and Aspects of Non-Classical Logics The Information Management Systems group at the University of Padua, led by Maristella Agosti, has Papers in Honor of Daniele Mundici in the Occasion of His 60th Birthday Advances in hardware technology has increased been a major contributor to information retrieval the capability to store and record personal da- (IR) and digital libraries for nearly twenty years. ta about consumers and individuals. This, in This group has gained an excellent reputation in the turn, has led to concerns that personal data may IR community and has produced some of the best- Edited in collaboration with FoLLI, the Association be misused for a variety of purposes. Privacy known IR researchers, whose work spans a broad of Logic, Language and Information, this book con- Preserving Data Mining:  Models and range of topics. The papers in this book deal with e.g. stitutes the third volume of the FoLLI LNAI subline. Algorithms proposes a number of techniques automated text categorizations, web link analysis al- The 17 revised papers of this Festschrift volume - to perform the data mining tasks in a privacy-pre- gorithms, retrieval in multimedia digital libraries, published in honour of Daniele Mundici on the oc- serving way that alleviate these concerns. These tech- and multilingual information retrieval. The presen- casion of his 60th birthday - include invited extended niques generally fall into the following categories: tation of original research results built on the past versions of the most interesting contributions to the data modification techniques, cryptographic meth- work of the group which at the same time summa- International Conference on the Algebraic and Logi- ods & protocols for data sharing, statistical rizes past findings and opens up new directions and cal Foundations of Many-Valued Reasoning, held in techniques for disclosure and inference control, new areas of possible future research and coopera- Gargnano, Italy, in March 2006. Daniele Mundici is query auditing methods, randomization and pertur- tion will appeal to researchers and developers in in- widely acknowledged as a leading scientist in many- bation-based techniques. Privacy Preserving Data stitutions and companies working on search engines valued logic and ordered algebraic structures. In the Mining:  Models and Algorithms is an edited and information retrieval algorithms. last decades, his work has unvelead profound con- volume by distinguished world class leaders in the nections between logic and such diverse fields of re- field. Each chapter includes a survey, which contains Contents search as functional analysis, probability and mea- the key research content on the topic and future di- Information Access using the Guide of User Require- sure theory, the geometry of toric varieties, piecewise rections of research in this field. This volume is de- ments (M. Agosti) - From Linking Text to Linking linear geometry, and error-correcting codes. Several signed for researchers, professors [..] Crimes (F. Crestani) - Modeling Retrieval and Nav- prominent logicians, mathematicians, and computer igation in Context (M. Melucci) - Two Algorithms scientists attending the conference have contributed Features for Probabilistic Stemming (M. Melucci, N. Orio) - to this wide-ranging collection [..] Occupies an important niche in the privacy-preserv- Automated Text Categorization (G.M. Di Nunzio) - ing data mining field Survey information included Analysis of Web Link Analysis Algorithms (L. Pret- Fields of interest with each chapter is unique in terms of its focus on to) - Digital Annotations (N. Ferro) - Music Index- Artificial Intelligence (incl. Robotics); Mathematical introducing the different topics more comprehen- ing and Retrieval for Multimedia Digital Libraries Logic and Formal Languages; Language Translation sively Provides relative understanding of the work of (N. Orio) - A Statistical and Graphical Methodolo- and Linguistics different communities, such as cryptography, statis- gy for Comparing Bilingual and Monolingual Cross- tical disclosure control, data mining working in the Language Information Retrieval (F.Crivellari, [..] Target groups privacy field Comprehensive & current, bring- Researchers and professionals ing [..] Fields of interest Information Storage and Retrieval; Document Type of publication Contents Preparation and Text Processing; Library Science Proceedings -Preface.- Association Rule Hiding-. On Adversarial Privacy-Preserving Data Mining.- Privacy Preserv- Target groups Due October 2007 ing Data Mining across vertically partitioned data.- Researchers and libraries Privacy-Preserving Data Mining across horizontal- ly partitioned data.- Personalized Privacy Preserva- Type of publication 2007. VIII, 309 p. (Lecture Notes in Computer Science, Vol. 4460) Softcover tion.- Distributed and Cryptographic protocols for Monograph privacy-preserving computations.- A survey of Cryp- 48,00 € tographic Techniques for Privacy Preserving Data Due November 2007 ISBN 978-3-540-75938-6 Mining.- Cryptographic Approaches to Privacy.- Pri- vacy Preserving Stream Mining.- A Survey of Statis- 2008. XVI,196 pages with 39 illus. (The Information Retrieval Se- tical Disclosure Control Methods for Privacy Preser- ries, Vol. 22) Hardcover vation.- Condensation: A pseudo-data [..] 69,95 € Fields of interest ISBN 978-3-540-75133-5 Systems and Data Security; Database Management; Data Encryption; Information Storage and Retrieval; Multimedia Information Systems; Information Sys- tems Applications (incl.Internet)

Target groups Researchers, professors and graduate-level students

Type of publication Contributed volume

Due July 2008

2008. Approx. 600 p. (Advances in Database Systems, Vol. 34) Hardcover

76,25 € ISBN 978-0-387-70991-8 4 Computer Science springer.com/booksellers

H. Ammari, Ecole Polytechnique, CNRS, Palaiseau, France (Ed.) D.R. Anderson, Colorado State University, Fort Collins, CO, USA A.M. Andrew

Modeling and Computations in Model Based Inference in the Life A Missing Link in Cybernetics

Electromagnetics Sciences Logic and Continuity A Volume Dedicated to Jean-Claude Nédélec A Primer on Evidence

The relative failure of attempts to analyze and mod- el intelligence can be attributed in part to the cus- Modeling and computations in electromagnetics The abstract concept of “information” can be quan- tomary assumption that the processing of continu- is a quite novel and growing discipline, expanding tified and this has led to many important advances ous variables and the manipulation of discrete con- as a result of the steadily increasing demand for de- in the analysis of data in the empirical sciences. This cepts should be treated separately. In this book, the signing electrical devices, modeling electromagnet- text focuses on a science philosophy based on “mul- author considers concept-based thought as having ic materials, and simulating electromagnetic fields tiple working hypotheses” and statistical models evolved from processing of continuous variables. in nanoscale structures. The aim of this volume is to to represent them. The fundamental science ques- Although "fuzzy" theory acknowledges the need to bring together prominent worldwide experts to re- tion relates to the empirical evidence for hypothe- combine conceptual and continuous processing, its view state-of-the-art developments and future trends ses in this set—a formal strength of evidence. Kull- assumption of the primacy of concept-based process- of modeling and computations in electromagnetics. back-Leibler information is the information lost ing makes it evolutionarily implausible. The text be- This volume is devoted to merging the expertise of when a model is used to approximate full reality. Hi- gins by reviewing the origins and aims of cybernet- scientists working in this dynamic discipline, and rotugu Akaike found a link between K-L informa- ics with particular reference to Warren McCulloch’s to raising interest for challenging issues. The most tion (a cornerstone of information theory) and the declared lifetime quest of "understanding man’s un- significant advances in computational techniques maximized log-likelihood (a cornerstone of mathe- derstanding". It is shown that continuous systems have been made only in the last few years, and sever- matical statistics). This combination has become the can undergo complex self-organization, but a need al challenging technological applications are present- basis for a new paradigm in model based inference. for classification of situations becomes apparent and ed in this volume. The text advocates formal inference from all the hy- can be seen as the evolutionary beginning of con- potheses/models in the a priori set—multimodel in- cept-based processing. Possibilities for complex self- Fields of interest ference. This compelling approach allows a simple organization are emphasized by discussion of a [..] Computational Mathematics and Numerical Analy- ranking of the science hypothesis and their models. sis; Electromagnetism, Optics and Lasers; Numerical Simple methods are introduced for computing the Features and Computational Methods in Engineering; Mathe- likelihood [..] Advances an alternative approach to analyze and matical and Computational Physics model intelligence Systematically presented Features Target groups Very broad applicability, very science-based, and Contents Computational scientists practical Very powerful – the concept of formal Preface.- Cybernetics: Origins and Aims.- Where to “strength of evidence” Simple to use and understand Start?- Continuous Versus Discrete.- Adaptation, Type of publication An emphasis on science philosophy, not just “data Proceedings Self-Organization, and Learning.- Significance Feed- analysis” back.- Self-Reference.- Fractal Intelligence.- Conclu- sions.- References. Due October 2007 Contents Introduction--science hypotheses and science phi- Fields of interest losophy.- Data and models.- Information theory and 2008. IX, 229 p. 74 illus. (Lecture Notes in Computational Science Artificial Intelligence (incl. Robotics); Applications and Engineering, Vol. 59) Softcover entropy.- Quantifying the evidence about science hy- of Mathematics; Systems Theory, Control potheses.- Multimodel inference.- Advanced topics.- 59,95 € Summary. Target groups ISBN 978-3-540-73777-3 Researchers in AI, cybernetics, and systems science, Fields of interest graduate students Statistics for Life Sciences, Medicine, Health Sci- ences; Environmental Computing/Environmental Type of publication Modelling; Ecology; Evolutionary Biology; Epidemi- Monograph ology; Methodology of the Social Sciences

Target groups Due August 2008 Grad students, scientists 2008. Approx 230 p. (IFSR International Series on Systems Sci- Type of publication ence and Engineering, Vol. 27) Hardcover Graduate/advanced undergraduate textbook 69,30 € Due December 2007 ISBN 978-0-387-75163-4

2008. Approx. 190 p. Softcover

30,80 € ISBN 978-0-387-74073-7 springer.com/booksellers Computer Science 5

R. Annicchiarico, U. Cortés, C. Urdiales (Eds.) R. Anthony, University of Greenwich, UK; O.F. Rana, Cardiff Uni- L. Antunes, University of Lisbon, Portugal; K. Takadama, The Uni- versity, UK; D. Johnston-Watt, Enigmatec Corporation Limited, versity of Electro-Communications, Tokyo, Japan (Eds.) London, UK (Eds.) Agent Technology and e-Health Multi-Agent-Based Simulation VII Policy-Based Autonomic Computing International Workshop, MABS 2006, Hakodate, Japan, May 8, Multi-agent systems are one of the most exciting re- 2006, Revised and Invited Papers search areas in Artificial Intelligence. In the last ten years there has been a growing interest in the appli- Policy-based computing is one of many techniques used to implement autonomic computer systems. cation of agent-based systems in health care. More- This book constitutes the thoroughly refereed pro- The business function is expressed in terms of work- over, a growing European community of researchers ceedings of the 7th International Workshop on Mul- flow (logic + actions) or behavioural rules to be per- interested in the application of intelligent agents in ti-Agent-Based Simulation, MABS 2006, held in formed in response to certain situations, which is de- health care emerged as a result of the activities with- Hakodate, Japan, May 8, 2006 as an associated event coupled from the implementation mechanism. The in the AgentCities.NET European network and the of AAMAS 2006, the main international conference mechanisms are fixed at design time, but the actu- AgentLink III Technical Forum Group on Health- on autonomous agents and multi-agent systems. The al run-time behaviour is decided by the policy. This care Applications of Intelligent Agents. And special- 12 revised full papers presented together with 3 short facilitates contextual awareness as the policy may ly in R and D projects funded during the FP6. Thus, papers and 2 invited papers were carefully reviewed take account of various environmental inputs from this book reports on the results achieved in this area, and selected from 25 submissions during two rounds sensors and external software systems. Policy-based discuss the benefits (and drawbacks) that agent- of reviewing and improvement. The papers are or- mechanisms are also very useful in specifying system based systems may bring to medical domains and so- ganized in topical sections on Empirical Cross Stud- behaviour - such as when specifying Service Level ciety, and also to provide a list of the research topics ies, Experimental Ecology, Experimental Economics, Agreements, and subsequently monitoring whether that should be tackled in the near future to make the Foundations and Methodologies, Learning and So- these agreements have been adhered to. Policy-based deployment of health-care agent-based systems a re- cial Dependence. ality. configuration is highly versatile and generally ap- plicable across a very wide application space. When Fields of interest Features compared with other autonomics techniques, poli- Artificial Intelligence (incl. Robotics); Simula- Presents results achieved in Healthcare Applications cies represent one of the lowest risk and lowest cost tion and Modeling; Computer Communication of Intelligent Agents Comprehensive view of the solutions; because there is relatively low complexity. Networks; Computer Appl. in Social and Behav- field, up-to-date information and state of the art of ioral Sciences; Information Systems Applications Features the research (incl.Internet) Represents state of the art concepts and practice Var- Contents ious aspects of using policies in the context of au- Target groups HealthAgents - Agent-based Distributed Decision tonomic computing Survey articles that highlight Researchers and professionals Support System for Brain Tumour Diagnosis and research directions in policy languages, tools and Prognosis.- SAPHIRE: A Multi-Agent System for Re- frameworks Type of publication mote Healthcare Monitoring through Computerized Proceedings Clinical Guidelines.- K4CARE: Knowledge-Based Contents From the contents: Towards an Autonomic Com- HomeCare eServices for an Ageing Europe.- ASPIC: Due October 2007 Argumentation Service Platform with Integrated puting Testbed.- Categorizing and differencing sys- Components.- Applying Provenance in Distributed tem behaviors.- Invited Paper: Implementing Prato, Organ Transplant Management.- Supported Human a database on demand service.- Prize Paper: Enabling 2007. X, 189 p. (Lecture Notes in Computer Science, Vol. 4442) Autonomy for Recovery and Enhancement of cogni- Policy-Driven Self-Management for Enterprise-Scale Softcover tive and motor disabilities using Agent technologies. Systems.- Policies as Signals in Collaborative Policy Engineering.- Policy-Based Context Modelling and 42,00 € ISBN 978-3-540-76536-3 Fields of interest Ontologies in Autonomic Applications to Facilitate Artificial Intelligence (incl. Robotics); Computer the Information Interoperability in NGN.- Industry Systems Organization and Communication Net- Case Study: Policy-driven self-management for an works; Computer Appl. in Arts and Humanities; automotive middleware.- Exploiting Emergent Be- Computer Applications havior for Inter-Vehicle Communication.- [..]

Target groups Fields of interest Researchers, computer scientists, general practi- Artificial Intelligence (incl. Robotics); Special Pur- cioners and students pose and Application-Based Systems; Logic Design; Programming Languages, Compilers, Interpreters; Type of publication Information Systems and Communication Service Collected works Target groups Due December 2007 Researchers and research students, autonomics prac- titioners, autonomics and policy-computing com- munities, policy specialists 2008. Approx. 140 p. (Whitestein Series in Software Agent Tech- nologies and Autonomic Computing) Softcover Type of publication Collection of essays 39,90 € ISBN 978-3-7643-8546-0 Due February 2008

2008. Approx. 250 p. (Whitestein Series in Software Agent Tech- nologies and Autonomic Computing) Softcover

39,90 € ISBN 978-3-7643-8544-6 6 Computer Science springer.com/booksellers

F. Arbab, Leiden University, Leiden, The Netherlands; M. Sirjani, M. Arenas, Universidad Catolica de Chile, Santiago, Chile; M.I. I.K. Argyros, Cameron University, Lawton, OK, USA University of Tehran, Iran (Eds.) Schwartzbach, University of Aarhus, Denmark (Eds.) Convergence and Applications of International Symposium on Database Programming Languages Newton-type Iterations Fundamentals of Software 11th International Symposium, DBPL 2007, Vienna, Austria, Engineering September 23-24, 2007, Revised Selected Papers

International Symposium, FSEN 2007, Tehran, Iran, April Together with recent trends in local convergence, 17-19, 2007, Proceedings semilocal convergence analysis constitutes a natu- This book constitutes the thoroughly refereed post- ral framework for the theoretical study of iterative proceedings of the 11th International Symposium methods. This monograph is the first to adequately on Database Programming Languages, DBPL 2007, cover both basic theory and new results in the area. It This book constitutes the refereed proceedings of held in Vienna, Austria, in September 2007 in con- treats iterative methods for solving nonlinear equa- the International Symposium on Fundamentals of junction with VLDB 2007. The 16 revised full papers tions with particular emphasis on theoretical aspects Software Engineering, FSEN 2007, held in Tehran, presented together with 1 invited lecture were care- of semilocal convergence of Newton-type methods. Iran, April 17-19, 2007. The 32 revised papers pre- fully selected during two rounds of reviewing and An ideal introduction to the field, the book primari- sented were carefully reviewed and selected from improvement from 41 submissions. The papers are ly contains research results obtained by the author, 73 submissions. The topics include Models of pro- organized in topical sections on algorithms, XML extending classical theorems, such as convergence grams and systems, Software specification, validation query languages, inconsistency handling, data prove- results under weaker hypothesis, enlargement of the and verification, Software architectures and their de- nance, emerging data models, and type checking. radius of convergence, improvements of certain con- scription languages, Object and multi-agent systems, stants or bounds. The development of the material is Coordination and feature interaction, Integration Fields of interest intuitive, and each chapter contains new theoretical of formal and informal methods, Integration of dif- Database Management; Information Storage results and important applications to engineering, ferent formal methods, Component-based develop- and Retrieval; Information Systems Applications dynamic economic systems, input-output systems, ment, Service-oriented development, Model check- (incl.Internet); Data Storage Representation; Infor- nonlinear and linear differential equations, and opti- ing and theorem proving, Software and hardware mation Systems mization problems. Several classes of operators are verification and CASE tools and tool integration. considered: operators without [..] Target groups Fields of interest Researchers and professionals Features Software Engineering/Programming and Operat- * An ideal introduction to the field * Contains new Type of publication ing Systems; Logics and Meanings of Programs; Pro- theoretical results and important applications to en- Proceedings gramming Techniques; Models and Principles gineering, dynamic economic systems, input-output systems, nonlinear and linear differential equations, Target groups Due October 2007 and optimization problems * Useful to an au- Researchers and professionals dience of graduate students and researchers working Type of publication 2007. VIII, 261 p. (Lecture Notes in Computer Science, Vol. 4797) in the areas of numerical and functional analysis or Proceedings Softcover computer science * Includes many solved problems and [..] 45,00 € Due October 2007 ISBN 978-3-540-75986-7 Contents Preface.- Table of Contents.- Operators and Equa- 2007. XIII, 450 p. (Lecture Notes in Computer Science, Vol. 4767) tions.- The Newton-Kantorovich (NK) Method.- Ap- Softcover plications of the Weaker Version of the (NK) The- orem.- Special Methods.- Newton-Like Methods.- 60,00 € Analytic Computational Complexity: We are Con- ISBN 978-3-540-75697-2 cerned with the Choice of Initial Approximations.- Variational Inequalities.- Convergence Involving Operators with Outer or Generalized Inverses.- Con- vergence on Generalized Banach Spaces.- Point-to- Set Mappings.- The Newton-Kantorovich Theorem and Mathematical Programming.- Glossary of Sym- bols.

Fields of interest Numerical Analysis; Computational Mathematics and Numerical Analysis; Functional Analysis

Target groups Graduate students and researchers in numerical and functional analysis as well as computer science.

Type of publication Monograph

Due March 2008

2008. XII, 516 pp. Hardcover

ISBN 978-0-387-72741-7 springer.com/booksellers Computer Science 7

S. Arimoto, Ritsumeikan University, Kyoto, Japan A. Arnez, Schönaich, Germany; K. Polthier, Technische Universität A. Arnez, Schönaich, Germany; K. Polthier, Technische Universität Berlin, Germany; M. Steffens, Unterföhring, Germany; C. Teitzel, Berlin, Germany; M. Steffens, Unterföhring, Germany; C. Teitzel, Unterföhring, Germany Unterföhring, Germany Control Theory of Multi-fingered Hands Touching Soap Films Touching Soap Films A Modelling and Analytical–Geometry Approach for Dexterity and Intelligence This is a scientific video about the world of soap This is a scientific video about the world of soap films, designed for the general public. Few other films, designed for the general public. Few other The hand is an agency of the brain; it reflects activ- physical problems have influenced as many branch- physical problems have influenced as many branch- ities of the brain and thereby can be seen as a mir- es of mathematics in the past 200 years as have the es of mathematics in the past 200 years as have the ror to the mind. The dexterity of the hand has been study of soap films. A soap film is physically similar study of soap films. A soap film is physically similar investigated widely in developmental psychology to a piece of rubber surface which tries to contract it- to a piece of rubber surface which tries to contract it- and in anthropology. Since robotics launched in the self under surface tension to a surface with least area. self under surface tension to a surface with least area. mid-1970s, numerous multi-fingered hands mimick- This completely computer generated video explains This completely computer generated video explains ing the human hand have been designed and made the world of soap films in an amusing story, in which the world of soap films in an amusing story, in which in a number of universities and research institutes, a young boy explores the palace of soap films. Under a young boy explores the palace of soap films. Under in addition to sophisticated prosthetic hands with the guidance of an old professor, he gains fascinating the guidance of an old professor, he gains fascinating plural fingers. Control Theory of Multi-fingered insights and becomes a witness to never-before-seen insights and becomes a witness to never-before-seen Hands presents a comprehensive insight into the in- shapes and animations of soap films. The authors shapes and animations of soap films. The authors telligence and dexterity of robotic multi-fingered have achieved the unique result of making the film have achieved the unique result of making the film hands from both the physical and control- theoretic exciting and enjoyable for both anyone interested exciting and enjoyable for both anyone interested viewpoints. Control Theory of Multi-fingered Hands in science and researchers in differential geometry. in science and researchers in differential geometry. will be a useful reference for postgraduate students In addition, the film is ideally suited to be shown to In addition, the film is ideally suited to be shown to and researchers in this field, as well as engineers and school students, and hence of great interest to math- school students, and hence of great interest to math- roboticists. ematics teachers. For the DVD version, "Geodesics ematics teachers. For the DVD version, "Geodesics and Waves" has been added. and Waves" has been added. Features No other book has been written about the control of Features Features multi-fingered hands Explains what kinds of senso- The film has a unique mathematical content, which The film has a unique mathematical content, which ry-motor coordinated signals are necessary and suf- is not accessible anywhere else, neither in any print- is not accessible anywhere else, neither in any print- ficient for realizing stable grasping and/or object ma- ed publication nor any other film It is of immense ed publication nor any other film It is of immense nipulation interest to researchers and students in mathematics, interest to researchers and students in mathematics, and a general science-interested audience and a general science-interested audience Contents Characteristics of Human Hands.- Stability of Grasp- Fields of interest Fields of interest ing in a Static or Dynamic Sense.- Test-bed Problems Differential Geometry; Computer Graphics; Mathe- Differential Geometry; Computer Graphics; Mathe- of Control: How to Stabilise 2D Objects through matical and Computational Physics matical and Computational Physics Rolling Contact.- Two-dimensional Grasping by a Pair of Rigid Fingers.- Three-dimensional Grasping Target groups Target groups by a Pair of Rigid Fingers.- Dexterity and Control for Researchers and students in mathematics, and a gen- Researchers and students in mathematics, and a gen- Stable Grasp by Soft Fingers. eral science-interested audience eral science-interested audience

Fields of interest Type of publication Type of publication Automation and Robotics; Artificial Intelligence (in- Teachware Teachware cl. Robotics); Control Engineering Due November 2007 Due November 2007 Target groups Postgraduate students studying robotics, human sci- 2008. DVD-Video NTSC. (Springer VideoMATH) 2008. DVD-Video PAL. (Springer VideoMATH) ence and developmental psychology, Robotics en- gineers, roboticists, Engineers and researchers con- 34,95 € 34,95 € cerned with prosthetics, Researchers in computa- ISBN 978-3-540-24041-9 ISBN 978-3-540-24093-8 tional brain science

Type of publication Monograph

Due January 2008

2008. Approx. 275 p. Hardcover

109,95 € ISBN 978-1-84800-062-9 8 Computer Science springer.com/booksellers

B.C. Arnold, University of California, Riverside, CA, USA; N. Balakr- Y. Avramenko, Lappeenranta University of Technology, Lappeen- ishnan, McMaster University, Hamilton, ON, Canada; J.M. Sarabia, 2008. Approx. 504 p. 56 illus. (Statistics for Industry and Technol- ranta, Finland; A. Kraslawski, Lappeenranta University of Tech- University of Cantabria, Santander, Spain; R. Mínguez, University ogy) Hardcover nology, Lappeenranta, Finland of Castilla-La Mancha, Ciudad Real, Spain (Eds.) 97,00 € Case Based Design Advances in Mathematical and ISBN 978-0-8176-4625-7 Statistical Modeling Applications in Process Engineering

The book by Professors Avramenko and Kraslawski Enrique Castillo is a leading figure in several math- is unique in several important ways. First, it is an im- ematical and engineering fields, having contribut- pressive and in-depth treatment of the essence of the ed seminal work in such areas as Bayesian networks, case–based reasoning strategy and case-based design neural networks, functional equations, artificial in- dwelling upon the algorithmic facet of the paradigm. telligence, linear algebra, optimization methods, nu- Second, the authors provided an excellent applied re- merical methods, reliability engineering, as well as search framework by showing how this development sensitivity analysis and its applications. Organized can be effectively utilized in real word complicated to honor Castillo’s significant contributions, environment of process engineering- a pursuit that this volume is an outgrowth of the "International is rarely reported in the literature in such a compre- Conference on Mathematical and Statistical Mod- hensive manner as done in this book. In a highly au- eling," and covers recent advances in mathematical thoritative and systematic manner, the authors guide and statistical modeling. Applications to safety, re- the reader through the essential features of the CBR liability and life-testing, financial modeling, quali- machinery. ty control, general inference, as well as neural net- works and computational techniques are presented. Features The book is divided into seven main sections, Contributes to a broader use of case-based design in which include distribution the- engineering practice ory and order statistics, extreme value theory, modeling in Contents engineering, fatigue models, modeling Part I: Design Support.- The Design Process of Prod- in business and [..] uct and Process Development.- Decision Support in Design.- Part II: Case-Based Design Support.- Case- Features Based Reasoning Approach.- Similarity and Adapta- Contributors are prominent, distinguished, tion Concepts.- Case-Based Reasoning Environment and well-respected researchers in the field of math- – Cabareen.- Part III: Application to Support of De- ematical and statistical modeling Real-world appli- sign Process.- Product Design: Food Product Formu- cations to safety, reliability, life-testing, finan- lation.- Conceptual Design: Process Sequence Syn- cial modeling, quality control, general inference, eco- thesis.- Pre-Detailed Design: Process Model Selec- nomics, engineering, as well as neural networks and tion.- Equipment Design: Reactive Distillation Col- computational techniques Good reference work for umn Design. practitioners, researchers, and graduate students in [..] Fields of interest Appl.Mathematics/Computational Methods of Engi- Contents neering; Artificial Intelligence (incl. Robotics); Engi- Preface.- List of Contributors.- List of Tables.- List neering Design of Figures.- Part I. Distribution Theory and Appli- cations.- Enrique Castillo's Contributions to Con- Target groups ditional Specification.- The Polygonal Distribu- Engineers, researchers, and graduate students in tion.- Conditionally Specified Models: New computational intelligence and computer science Developments and Applications.- Modelling of Insurance Claim Count with Hurdle Distribu- Type of publication tion for Panel Data.- Distance-Based Asso- Monograph ciation and Multi-Sample Tests for General Multi- variate Data.- Part II. Probability and Statistics.- Em- Due January 2008 pirical Bayes Assessment of the Hyperparameters in Bayesian Factor Analysis.- Part III. Order [..] 2008. Approx. 170 p. (Studies in Computational Intelligence, Vol. 87) Hardcover Fields of interest Statistical Theory and Methods; Statistics for Busi- 99,95 € ness/Economics/Mathematical Finance/Insurance; ISBN 978-3-540-75705-4 Statistics for Engineering, Physics, Computer Sci- ence, Chemistry & Geosciences; Mathematical Mod- eling and Industrial Mathematics; Computational Science and Engineering; Optimization

Target groups Practitioners, researchers, and graduate students in statistics, applied mathematics, engineering, eco- nomics, and modeling.  

Type of publication Contributed volume

Due May 2008 springer.com/booksellers Computer Science 9

N. Ayache, INRIA, Sophia-Antipolis, France; S. Ourselin, CSIRO ICT N. Ayache, INRIA, Sophia-Antipolis, France; S. Ourselin, CSIRO ICT C. Badica, University of Craiova, Romania; M. Paprzycki, Warsaw Centre, Brisbane, Australia; A. Maeder, CSIRO ICT Centre, Bris- Centre, Brisbane, Australia; A. Maeder, CSIRO ICT Centre, Bris- School of Social Psychology, Warsaw, Poland (Eds.) bane, Australia (Eds.) bane, Australia (Eds.) Advances in Intelligent and Medical Image Computing and Medical Image Computing and Distributed Computing Computer-Assisted Intervention – Computer-Assisted Intervention – Proceedings of the 1st International Symposium on Intelligent MICCAI 2007 MICCAI 2007 and Distributed Computing IDC 2007, Craiova, Romania, Octo- ber 2007 10th International Conference, Brisbane, Australia, October 29 10th International Conference, Brisbane, Australia, October 29 - November 2, 2007, Proceedings, Part I - November 2, 2007, Proceedings, Part II

This book presents the proceedings of the 1st Inter- national Symposium on Intelligent and Distribut- The two-volume set LNCS 4791 and LNCS 4792 The two-volume set LNCS 4791 and LNCS 4792 ed Computing – IDC’2007, held in Craiova, Roma- constitute the refereed proceedings of the 10th Inter- constitute the refereed proceedings of the 10th Inter- nia, October 2007. IDC 2007 was the first Interna- national Conference on Medical Image Computing national Conference on Medical Image Computing tional Symposium bringing together researchers in- and Computer-Assisted Intervention, MICCAI 2007, and Computer-Assisted Intervention, MICCAI 2007, volved in intelligent and distributed computing to held in Brisbane, Australia, in October/November held in Brisbane, Australia, in October/November allow cross-fertilization and search for synergies of 2007. The program committee carefully selected 38 2007. The program committee carefully selected 38 ideas and to enable advancement of research in these revised full papers and 199 revised poster papers revised full papers and 199 revised poster papers exciting sub-fields of computer science. The 34 con- from 637 submissions for presentation in two vol- from 637 submissions for presentation in two vol- tributions in this book cover a broad area of topics umes, based on rigorous peer reviews. The first vol- umes, based on rigorous peer reviews. The first vol- related to intelligent and distributed computing, sys- ume contains 120 contributions related to diffusion ume contains 120 contributions related to diffusion tems and applications, including: autonomous and tensor imaging and computing, cardiac imaging and tensor imaging and computing, cardiac imaging and adaptive computing; constraint satisfaction; cooper- robotics, image segmentation and classification, im- robotics, image segmentation and classification, im- ation and coordination; data mining and knowledge age guided intervention and robotics, general med- age guided intervention and robotics, general med- discovery; distributed problem solving and decision ical image computing, computer assisted interven- ical image computing, computer assisted interven- making; e-business, e-health and e-learning; genetic tion and robotics, computational anatomy, compu- tion and robotics, computational anatomy, compu- algorithms; image processing; information retrieval; tational physiology, innovative clinical and biologi- tational physiology, innovative clinical and biologi- or intelligence in mobile and ubiquitous computing. cal applications, physiology and physics-based image cal applications, physiology and physics-based image computing, brain atlas computing, and simulation of computing, brain atlas computing, and simulation of Features therapy. The second volume includes 117 papers re- therapy. The second volume includes 117 papers re- Presents latest results in Intelligent and Distributed lated to computer assisted intervention and robotics, lated to computer assisted intervention and robotics, computing visualization [..] visualization [..] Contents Fields of interest Fields of interest Invited Papers.- Regular Papers.- Short Papers. Image Processing and Computer Vision; Pattern Image Processing and Computer Vision; Pattern Recognition; Computer Graphics; Artificial Intelli- Recognition; Computer Graphics; Artificial Intelli- Fields of interest gence (incl. Robotics); Imaging / Radiology; Health gence (incl. Robotics); Imaging / Radiology; Health Appl.Mathematics/Computational Methods of En- Informatics & Health Administration Informatics & Health Administration gineering; Artificial Intelligence (incl. Robotics); Ap- plications of Mathematics Target groups Target groups Researchers, professors, and clinical doctors Researchers, professors, and clinical doctors Target groups Researchers, engineers, graduate students in compu- Type of publication Type of publication tational intelligence and computer science Proceedings Proceedings Type of publication Due October 2007 Due October 2007 Monograph

2007. XLVI, 1012 p. (Lecture Notes in Computer Science, Vol. 2007. XLVI, 988 p. Also available online. (Lecture Notes in Com- Due October 2007 4791) Softcover puter Science, Vol. 4792) Softcover

102,00 € 99,00 € 2008. XIV, 309 p. 98 illus. (Studies in Computational Intelligence, Vol. 78) Hardcover ISBN 978-3-540-75756-6 ISBN 978-3-540-75758-0 99,95 € ISBN 978-3-540-74929-5 10 Computer Science springer.com/booksellers

P. Baker, Motorola Labs, Basingstoke, UK; Z.R. Dai, Fraunhofer S. Bandyopadhyay, University of Windsor, Canada J.J. Barbara, Florida Dept. of Law Enforcement, Tampa, FL, USA Fokus, Berlin, Germany; J. Grabowski, University of Goettingen, (Ed.) Germany; Ø. Haugen, University of Oslo, Norway; I. Schieferdeck- er, Fraunhofer Fokus, Berlin, Germany; C. Williams, IBM Watson Dissemination of Information in Research Center, Hawthorne, NY, USA Optical Networks: From Technology Handbook of Digital and Multimedia Forensic Evidence Model-Driven Testing to Algorithms In Cooperation with Ralf Klasing Using the UML Testing Profile This volume presents an overview of computer forensics perfect for beginners. A distinguished Optical networks and the related technologies, net- group of specialist authors have crafted chapters Model-driven development has become the most im- work management software and services have under- rich with detail yet accessible for readers who are portant new paradigm in software development and gone remarkable developments, and such networks not experts in the field. Tying together topics as di- has already demonstrated considerable impact in re- are now the ultra-high-speed backbone networks for verse as applicable laws on search and seizure, inves- ducing time to market and improving product qual- communication. Wavelength-Division Multiplexing tigating cybercrime, and preparation for courtroom ity. However, the development of high-quality sys- (WDM), the ability to support multiple communica- tesitmony, Handbook of Digital & Multimedia tems not only requires systematic development pro- tion pathways over the same fiber, enables efficient Evidence is an ideal overall reference for this mul- cesses but also systematic test processes. This book use of the enormous capability for data communi- ti-faceted discipline. is about systematic, model-driven test processes in cation of optical networks. This book gives a broad the context of UML. As UML provides only limited overview of techniques used in the design of WDM Features means for the design and development of test arti- networks for efficient dissemination of information Presents an overview of computer forensics perfect facts, a consortium was formed by the Object Man- in computer networks. It starts with an overview of for beginners An ideal overall reference for this mul- agement Group (OMG) to develop a UML profile the hardware components, then provides a thorough ti-faceted discipline for model-driven testing – the UML Testing Pro- review of WDM, wavelength-routed networks, al- file (UTP), an official OMG standard since 2005. Contents gorithms for route and wavelength assignment, de- Written by the original members of this standard- The Analog and Digital World.- Training and Ed- sign of broadcast and select networks, logical topol- ization group, this book shows you how to use UML ucation in Digital Evidence.- Certification and Ac- ogy design, and techniques to handle faults and al- to test complex software systems. The authors intro- creditation Overview.- History, Concepts and Tech- gorithms for efficient use of optical networks. Each duce UTP step-by-step, using a case study that illus- nology of Networks and their Security.- The Digi- topic has been covered rigorously with emphasis on trates how UTP can be used for test modeling and tal Crime Scene.- Investigating Cybercrime.- Duties, detailed explanations of the approaches used, start- test specification. You’ll learn how UTP concepts can Support Functions, and Competencies.- Electronic ing from the [..] be used for functional [..] Evidence and Digital Forensic Testimony in Court. Contents Features Fields of interest Introduction to Optical Networks.- Introduction to Learn from its creators how to apply the UML Test- Criminology & Criminal Justice; Legal Aspects of Optical Technology.- WDM Network Design.- Route ing Profile for test modeling and test specification Computing; Forensic Medicine and Wavelength Assignment (RWA) I.- Route and See how model-driven testing works with UML Ex- Wavelength Assignment (RWA) II.- Logical Topolo- perience best practices in the use of UML for differ- Target groups gy Design I.- Logical Topology Design II.- Faults in ent aspects of testing Understand the automated ex- Forensic scientists, criminal justice enthusiasts, radi- Optical Networks.- Traffic Grooming.- List of Sym- ecution of UML-based tests with existing test frame- ologists bols.- App. 1: in a Nutshell.- works like JUnit and TTCN-3 Find additional online App. 2: The De Bruijn Graph.- App. 3: Network Flow material at http://utp.omg.org/ Type of publication Programming.- References.- Index. Contributed volume Contents Fields of interest Introduction.- Part I: Foundations.- 1 Model-Based Theory of Computation; Communications Engi- Due December 2007 Testing - 2 Basics - 3 Library -Example Introduc- neering, Networks; Computer Communication Net- tion.- Part II: Functional Testing.- 4 Unit Level Test- works; Algorithm Analysis and Problem Complexity; 2008. Approx. 200 p. 13 illus. Hardcover ing - 5 Component and IntegrationLevel Testing - 6 Applied Optics, Optoelectronics, Optical Devices System and Acceptance Level Testing.- Part III: Ad- 74,95 € vanced Testing Conderns.- 7 Data Driven Testing Target groups ISBN 978-1-58829-782-2 - 8 Real-Time and Performance Testing.- Part IV: Graduate students, researchers, practitioners Applications of UTP.- 9 User-Interface Testing - 10 Testing Service-Oriented Architecture Applications.- Type of publication Part V: Tools.- 11 Tool Frameworks and Examples Monograph - 12 Test Execution with JUnit - 13 Test Execution with TTCN-3.- U2TP Reference Guide - [..] Due November 2007 Fields of interest Software Engineering; Management of Computing 2008. XII,308 pages with 95 illus. (Texts in Theoretical Computer and Information Systems Science. An EATCS Series) Hardcover

Target groups 64,95 € Professionals ISBN 978-3-540-72874-0

Type of publication Professional book

Due October 2007

2007. XIV, 183 p. 94 illus. Hardcover

39,95 € ISBN 978-3-540-72562-6 springer.com/booksellers Computer Science 11

V. Barbu, Université de Technologie de Compiègne, Compiègne, France; N. Limnios, Université de Technologie de Compiègne, Compiègne, France

Semi-Markov Chains and Hidden Semi-Markov Models toward Applications

Their use in Reliability and DNA Analysis

This book is concerned with the estimation of dis- crete-time semi-Markov and hidden semi-Markov processes. Semi-Markov processes are much more general and better adapted to applications than the Markov ones because sojourn times in any state can be arbitrarily distributed, as opposed to the geomet- rically distributed sojourn time in the Markov case. Another unique feature of the book is the use of dis- crete time, especially useful in some specific appli- cations where the time scale is intrinsically discrete. The models presented in the book are specifically adapted to reliability studies and DNA analysis. The book is mainly intended for applied probabilists and statisticians interested in semi-Markov chains theo- ry, reliability and DNA analysis, and for theoretical oriented reliability and bioinformatics engineers. It can also serve as a text for a six month research-ori- ented course at a Master or PhD level. The prerequi- sites are a background in probability theory and fi- nite state space Markov chains.

Features Explores the semi-Markov case Combines the flexi- bility of the semi-Markov chain with the known ad- vantages of HMMs

Contents Introduction.- Discrete-time renewal processes.- Semi-Markov chains.- Nonparametric estimation for semi-Markov chains.- Reliability theory for discrete-time semi-Markov systems.- Hidden se- mi-Markov model and estimation.

Fields of interest Statistical Theory and Methods; Statistics for En- gineering, Physics, Computer Science, Chemistry & Geosciences; Quality Control, Reliability, Safety and Risk; Operations Research, Mathematical Pro- gramming; Bioinformatics; Probability Theory and Stochastic Processes

Target groups Graduate students, researchers

Type of publication Monograph

Due December 2007

2008. Approx. 228 p. (Lecture Notes in Statistics, Vol. 191) Soft- cover

46,95 € ISBN 978-0-387-73171-1 springer.com/booksellers Computer Science 12

D. Barceló, CSIC Barcelona, Spain; M. Petrovic, CSIC Barcelona, Th. Barkowsky, University of Bremen, Germany; M. Knauff, Jus- G. Beliakov, Deakin University, Wheelers Hill, VIC, Australia; A. Spain (Eds.) tus-Liebig-Universität Gießen, Germany; G. Ligozat, LIMSI-CNRS, Pradera, Universidad Rey Juan, Madrid, Spain; T. Calvo, Universi- Orsay, France; D.R. Montello, University of California, Santa Bar- dad de Alcala, Alcala de Henares, Spain bara, CA, USA (Eds.) Emerging Contaminants from Industrial and Municipal Waste Aggregation Functions: A Guide for Spatial Cognition V Practitioners Reasoning, Action, Interaction

Contents Aggregation of information is of primary importance Petrovic: Occurrence of Emerging Contaminants This book constitutes the refereed proceedings of in the construction of knowledge based systems in in Wastewaters: Sources and Levels.- Removal of the International Conference on Spatial Cognition, various domains, ranging from medicine, economics, Emerging Contaminants in Wastewater Treatment.- Spatial Cognition 2006, held in Bremen, Germany, and engineering to decision-making processes, ar- Smital/Stella: Acute and Chronic Effect (Toxicity, Es- September 24-28, 2006. The 28 revised full papers tificial intelligence, robotics, and machine learning. trogenicity, Genotoxicity etc.).- Environmental Risk presented were carefully reviewed and selected from This book gives a broad introduction into the topic Assessment. Impact of Emerging Contaminants in 59 submissions. The papers are organized in topi- of aggregation functions, and provides a concise ac- the Environment.- Barcelo: Legislation (EU cal sections on Spatial Reasoning, Human-Robot In- count of the properties and the main classes of such and Non-EU Countries (USA)) teraction, Visuo-Spatial Reasoning and Spatial Dy- functions, including classical means, medians, or- namics, Spatial Concepts, Human Memory, Men- dered weighted averaging functions, Choquet and Fields of interest tal Reasoning and Assistance, Spatial Concepts, Hu- Sugeno integrals, triangular norms, conorms and Atmospheric Protection/Air Quality Control/Air man Memory and Mental Reasoning, Navigation, copulas, uninorms, nullnorms, and symmetric sums. Pollution; Statistics for Engineering, Physics, Com- Wayfinding and Route Instructions as well as Lin- It also presents some state-of-the-art techniques, puter Science, Chemistry & Geosciences guistic and Social Issues in Spatial Knowledge Pro- many graphical illustrations and new interpolatory cessing. aggregation functions. A particular attention is paid Target groups to identification and construction of aggregation Scientists, engineers, graduate students in the field of Fields of interest functions from application specific requirements and Environmental Sciences, Risk Assessment and Risk Simulation and Modeling; Computer Imaging, Vi- empirical data. This book provides scientists, IT spe- Controlling, Toxicology and Ecology; decision-mak- sion, Pattern Recognition and Graphics; Computer cialists and system architects with a self-contained ers in Government, Industrial and Regulatory Bodies Appl. in Social and Behavioral Sciences; Artificial In- easy-to-use guide, as well as examples of [..] telligence (incl. Robotics); Data Mining and Knowl- Type of publication edge Discovery Features Reviews Broad introduction into the topic of aggregation Target groups functions and discusses in detail the four broad class- Due June 2008 Researchers and professionals es of aggregation operators: averaging operators, conjunctive, disjunctive and mixed operators Comes Type of publication with a software package AOTool, which can be freely 2008. Approx. 250 p. Also available online. (Water Pollution, Part Proceedings 5X) Hardcover downloaded implementing a large number of meth- ods for fitting aggregation functions to empirical da- 189,95 € Due November 2007 ta, described in the relevant sections of the [..] ISBN 978-3-540-74793-2 Contents 2008. Approx. 535 p. (Lecture Notes in Computer Science, Vol. 4387) Softcover Introduction.- Averaging Functions.- Conjunc- tive and Disjunctive Functions.- Mixed Functions.- 64,00 € Choice and Construction of Aggregation Functions.- ISBN 978-3-540-75665-1 Interpolatory Type Aggregation Functions.- Other Types of Aggregation and Additional Properties.

Fields of interest Appl.Mathematics/Computational Methods of Engi- neering; Software Engineering; Artificial Intelligence (incl. Robotics)

Target groups Researchers, engineers, graduate students in compu- tational intelligence software engineering, computer science

Type of publication Monograph

Due October 2007

2007. XIX, 361 p. 181 illus. (Studies in Fuzziness and Soft Comput- ing, Vol. 221) Hardcover

129,95 € ISBN 978-3-540-73720-9 springer.com/booksellers Computer Science 13

M. Ben-Ari, Weizmann Institute of Science, Israel J. Benesty, Université de Québec, Montréal, QC, Canada; M. Sond- J. Benesty, Université de Québec, Montréal, QC, Canada; M.M. hi, Avayalabs Research, Basking Ridge, NJ, USA; Y. Huang, Bell Sondhi, Avayalabs Research, Basking Ridge, NJ, USA; Y.(. Huang, Labs, Murray Hill, NJ, USA (Eds.) Bell Labs, Murray Hill, NJ, USA (Eds.) Principles of the Spin Model Checker Springer Handbook of Speech Springer Handbook of Speech Processing Processing

Principles of Spin is an introductory book, the only requirement is a background in programming. Spin models are written in the Promela language which is From common consumer products such as cell From common consumer products such as cell easily learned by students and programmers. Spin is phones and MP3 players to more sophisticated phones and MP3 players to more sophisticated easy to install and use. The Spin model checker is not projects such as human-machine interfaces and re- projects such as human-machine interfaces and re- only a widely used professional tool but it is also a sponsive robots, speech technologies are now ev- sponsive robots, speech technologies are now ev- superb tool for teaching important concepts of com- erywhere. Many think that it is just a matter of time erywhere. Many think that it is just a matter of time puter science such as verification, concurrency and before more applications of the science of speech before more applications of the science of speech nondeterminism. The book introduces Spin-based become inescapable in our daily life. This hand- become inescapable in our daily life. This hand- software that the author has developed for teaching: book is meant to play a fundamental role for sustain- book is meant to play a fundamental role for sustain- •jSpin - an integrated development environment for able progress in speech research and development. able progress in speech research and development. Spin. •SpinSpider - uses output from Spin to auto- Springer Handbook of Speech Processing targets Springer Handbook of Speech Processing targets matically construct state diagrams of concurrent pro- three categories of readers: graduate students, profes- three categories of readers: graduate students, profes- grams. •VN is a tool for visualizing nondeterminism. sors and active researchers in academia and research sors and active researchers in academia and research Complete programs will demonstrate each construct labs, and engineers in industry who need to under- labs, and engineers in industry who need to under- and concept and these programs will be available on stand or implement some specific algorithms for stand or implement some specific algorithms for a companion website. their speech-related products. The handbook could their speech-related products. The handbook could also be used as a sourcebook for one or more gradu- also be used as a sourcebook for one or more gradu- Features ate courses on signal processing for speech and dif- ate courses on signal processing for speech and dif- First introductory textbook on Spin In- ferent aspects of speech processing and applications. ferent aspects of speech processing and applications. cludes complete programs which will demonstrate A quickly accessible source of application-oriented, A quickly accessible source of application-oriented, construct and concept, these programs will also be authoritative and comprehensive information about authoritative and comprehensive information about available on a companion website. Promela and Spin these [..] these [..] are presented in a graduated manner, to facilitate easy learning   Features Features Authoritative desk reference of one of tomorrow's Authoritative desk reference of one of tomorrow's Contents breakthrough technology Provides quick access to breakthrough technology Provides quick access to Foreword.- Preface.- Sequential programming applicable, reliable, and comprehensive knowledge applicable, reliable, and comprehensive knowledge in PROMELA.- Verification of Sequential Pro- Electronic contents on accompanying CD-ROM Electronic contents on accompanying DVD-ROM grams.- Concurrency.- Synchronization.- Ver- Handy format, lucid two-color layout, uniformly Handy format, lucid two-color layout, uniformly ification with Temporal Logic.- Data and Pro- styled figures styled figures gram Structures.- Channels.- Nondetermin- ism.- Advanced Topics in SPIN.- Case Contents Contents Studies.- Software Tools.- Links.- References.- Index Production, Perception, and Modeling of Speech.- Introduction to Speech Processing.- Production, Per- Signal Processing for Speech.- Speech Coding.- Text- ception, and Modeling of Speech.- Signal Process- Fields of interest to-Speech Synthesis.- Speech Recognition.- Speaker ing for Speech.- Speech Coding.-Text-to-Speech Syn- Software Engineering/Programming and Operating Identification and Verification.- Language Identifica- thesis.- Speech Recognition.- Speaker Recognition.- Systems; Programming Techniques; Programming tion.- Speech Enhancement.- Multichannel Speech Language Recognition.- Speech Enhancement.- Mul- Languages, Compilers, Interpreters; Operating Sys- Processing tichannel Speech Processing tems; Theory of Computation; Logics and Meanings of Programs Fields of interest Fields of interest Signal,Image and Speech Processing; Language Signal,Image and Speech Processing; Language Target groups Translation and Linguistics; Acoustics; Computa- Translation and Linguistics; Acoustics; Computa- 2nd/3rd year undergraduate students of computer tional Linguistics; Pattern Recognition; Communica- tional Linguistics; Pattern Recognition; Communica- science and software engineering. tions Engineering, Networks tions Engineering, Networks

Type of publication Target groups Target groups Graduate/advanced undergraduate textbook Researchers in electrical engineering, applied Researchers in electrical engineering, applied physics, computer science, linguistics; development physics, computer science, and linguistics; develop- Due February 2008 engineers in acoustics, signal processing, telecommu- ment engineers in acoustics, signal processing and nications telecommunications

2008. Approx. 250 p. Softcover Type of publication Type of publication Handbook Handbook 45,95 € ISBN 978-1-84628-769-5 Due November 2007 Due November 2007

2008. Online version. 2008. Approx. 1250 p. 456 illus. With DVD-ROM. Hardcover

249,00 € 249,00 € ISBN 978-3-540-49127-9 ISBN 978-3-540-49125-5 14 Computer Science springer.com/booksellers

S. Benzoni-Gavage, Université Claude Bernard Lyon I, France; D. K. Berns, Technische Universität Kaiserslautern; T. Luksch, Tech- M.W. Berry, University of Tennessee, Knoxville, TN, USA; M. Serre, Ecole Normale Supérieure, Lyon, France (Eds.) nische Universität Kaiserslautern (Eds.) Castellanos (Eds.)

Hyperbolic Problems: Theory, Autonome Mobile Systeme 2007 Survey of Text Mining II

Numerics, Applications 20. Fachgespräch Kaiserslautern, 18./19. Oktober 2007 Clustering, Classification, and Retrieval Proceedings of the XIth International Conference on Hyper- bolic Problems held in Ecole Normale Supérieure, Lyon, July 17-21, 2006 Das 20. Fachgespräch Autonome Mobile Systeme The proliferation of digital computing devices and (AMS 2007) ist ein Forum, das Wissenschaftlerin- their use in communication has resulted in an in- nen und Wissenschaftlern aus Forschung und In- creased demand for systems and algorithms capa- This volume contains papers that were presented at dustrie, die auf dem Gebiet der autonomen mo- ble of mining textual data. Thus, the development HYP2006, the eleventh international Conference on bilen Systeme arbeiten, eine Basis für den Gedake- of techniques for mining unstructured, semi-struc- Hyperbolic Problems: Theory, Numerics and Ap- naustausch bietet und wissenschfltiche Diskussio- tured, and fully structured textual data has become plications held at the Ecole Normale Supérieure de nen sowie Kooperationen auf diesem Forschungs- important in both academia and industry. This 2nd Lyon, France, July 17-21, 2006. This biennial series gebiet fördert bzw. initiiert. Inhaltlich setzt das edition surveys the emerging field of Text Mining of conferences has become one of the most impor- Fachgespräch den diesjährigen Schwerpunkt auf - the application of techniques of machine learning tant international events in Applied Mathematics. As Arbeiten im Bereich der kognitiven Automobile in conjunction with natural language processing, in- computers became more and more powerful, the in- und Laufmaschinen. Ausgewählte Beiträge zu den formation extraction and algebraic/mathematical terplay between theory, modelling, and numerical al- Themen Fahrerassistenzsysteme, Humanoide approaches to computational information retrieval. gorithms gained considerable impact, and the scope Roboter, Kartierung und Lokalisation, Navigation, Many issues are addressed, ranging from the devel- of HYP conferences expanded accordingly. The field Lernverfahren, System- und Steuerungsarchitekturen opment of new learning approaches to the paral- is currently in interaction with a variety of scientif- sowie der Anwendung von autonomen mobilen Sys- lelization of existing algorithms. Presenting a com- ic domains, including fluid dynamics, physics, elec- temen bilden den Inhalt dieses Bandes. prehensive selection of topics within the field to gen- tromagnetism, chemistry, biology, road and net- erate both interest and insight into the state of Text work traffic, and engineering. Many of these papers Features Mining, this book will be an indispensable resource present new effective numerical methods and their Das Forum für Wissenschaftler/innen aus Forschung for researchers, practitioners, and professionals in- application in various contexts. und Industrie Ausgewählte Beiträge zu aktuellen volved in information retrieval, computational [..] Themen Gedankenaustausch – Diskussion – Koop- Fields of interest eration Features Computational Mathematics and Numerical Anal- Overview of current methods and software for text ysis; Numerical Analysis; Partial Differential Equa- Contents mining Experts from academia and industry share tions; Numerical and Computational Methods Fahrerassistenzsysteme.- Humanoide Roboter.- their experiences in solving large-scale retrieval and Architektur kooperativer Systeme, Kognitive Bild- classification problems Highlights open research Target groups bearbeitung.- Sonsornetzwerke und Multisensorik.- questions in document categorization and clustering, Researchers and graduate students Modellierung und Simulation.- Planungs- und and trend detection Describes new application prob- Entscheidungsverfahren.- Lernen und Selbstorgani- lems in areas such as email surveillance and anomaly Type of publication sation.- Multi-Agenten-Systeme.- Anwendungen:.- detection Proceedings Servicerobotik.- Behindertenunterstützung.- Mikro- und Nanorobotik.- Fertigung.- Straßenverkehr. Fields of interest Due December 2007 Document Preparation and Text Processing; Infor- Fields of interest mation Storage and Retrieval; Information Systems Artificial Intelligence (incl. Robotics); Information Applications (incl.Internet); Multimedia Information 2008. Approx. 1000 p. Hardcover Systems Applications (incl.Internet); Processor Ar- Systems; Applications of Mathematics chitectures; System Performance and Evaluation 99,95 € Target groups ISBN 978-3-540-75711-5 Target groups Researchers, R and D, professionals, graduate stu- Wissenschaftler, Doktoranden, Studenten dents

Type of publication Type of publication Proceedings Contributed volume

Due October 2007 Due December 2007

2008. XII, 348 S. (Informatik aktuell) Softcover 2008. Approx. 255 p. 57 illus. Hardcover

60,70 € 62,95 € ISBN 978-3-540-74763-5 ISBN 978-1-84800-045-2 springer.com/booksellers Computer Science 15

S. Bhalla, University of Aizu, Japan (Ed.) B. Bhanu, University of California at Riverside, CA, USA; H. Chen, B. Bhanu, University of California, Riverside, CA, USA.; S. Das, Uni- University of California at Riverside, CA, USA versity of California, Riverside, CA, USA. Databases in Networked Information Systems Human Ear Recognition by Computational Learning for Computer Adaptive Computer Vision 5th International Workshop, DNIS 2007, Aizu-Wakamatsu, Japan, October 17-19, 2007, Proceedings

Biometrics deal with recognition of individuals based The goal of computer vision (CV) research is to pro- on their physiological or behavioural characteristics. vide computers with human-like perception capa- This book constitutes the refereed proceedings of the Researchers have done extensive studies on biomet- bilities so that they can sense the environment, un- 5th International Workshop on Databases in Net- rics such as fingerprint, face, palm print, iris and gait. derstand the sensed data, take appropriate actions, worked Information Systems, DNIS 2007, held in Ear, a viable new class of biometrics, has certain ad- and learn from this experience in order to enhance Aizu-Wakamatsu, Japan in October 2007. The 22 re- vantages over face and fingerprint, which are the two future performance. The field has evolved from the vised full papers presented together with 1 invited most common biometrics in both academic research application of classical pattern recognition and im- talk were carefully reviewed and selected for inclu- and industrial applications. This book explores all age processing methods to advanced techniques in sion in the book. Focusing on data semantics and in- aspects of 3D ear recognition: representation, detec- image understanding, like model-based and knowl- frastructure for information management and inter- tion, recognition, indexing and performance predic- edge-based vision. In recent years, there has been change, the papers are organized in topical sections tion. It uses large datasets to quantify and compare an increased demand for computer vision systems on geospatial decision-making, Web data manage- the performance of various techniques. Features and to address "real-world" applications, such as naviga- ment systems, infrastructure of networked informa- topics include: • Ear detection and recognition in 2D tion, target recognition, manufacturing, photointer- tion systems, and Web query and web mining sys- image • 3D object recognition and 3D biometrics • pretation, remote sensing, etc. This unique mono- tems. 3D ear recognition • Performance comparison and graph details the way machine learning, a field con- Fields of interest prediction The techniques discussed will be of great cerned with the temporal improvement of computer Database Management; Data Mining and Knowl- interest to researchers, developers and decision mak- algorithms and systems, can help create robust, flex- edge Discovery; Information Systems Applications ers who are involved in robust human recognition ible vision techniques for optimal functioning in re- (incl.Internet); Multimedia Information Systems; by computer for a large number of practical applica- al-world scenarios. Enriched by many concrete ex- User Interfaces and Human Computer Interaction; tions. amples and illustrations, it is an indispensable refer- Computer Communication Networks ence [..] Features Target groups Offers complete coverage of human ear recogni- Contents Researchers and professionals tion Describes complete human recognition systems 1. Introduction.- 2. Learning as a Discipline.- 3. Ba- using 3D ear biometrics Includes new biometrics, sic Paradigms of Learning.- 4. Selection of Learning Type of publication new application and results on the latest available Paradigms and Designing Practical Learning Systems Proceedings databases At the frontier of research on 3D ear-based for Vision.- 5. Learning Applied to Low-Level Vi- human recognition sion.- 6. Learning Applied to Intermediate-Level Vi- sion.- 7. Learning Applied to High-Level Vision.- 8. Due October 2007 Contents Learning Integrated Multi-Level Vision.- 9. Learning Introduction.- Ear Detection and Recognition in Applied to Integrating Vision and Action.- 10. Appli- 2007. X, 329 p. (Lecture Notes in Computer Science, Vol. 4777) 2D Images.- 3D Object Recognition and 3D Biomet- cations.- 11. Summary. Softcover rics.- 3D Ear Detection.- Recognizing 3D Ears Using Helix/Anti-helix.- Recognizing 3D Ears using Local Fields of interest 48,00 € Surface Patches.- Rapid 3D Ear Indexing and Recog- Computer Imaging, Vision, Pattern Recognition and ISBN 978-3-540-75511-1 nition.- Performance Comparison and Prediction.- Graphics Conclusion and Future Work Target groups Fields of interest Engineers, computer scientists in industry and Computer Imaging, Vision, Pattern Recognition and academia interested in machine vision and artificial Graphics; Biometrics; Image Processing and Com- intelligence. puter Vision; Pattern Recognition; Computer Graph- ics; The Computing Profession Type of publication Monograph Target groups Researchers, Developers, Decision Makers Due November 2007 Type of publication Monograph 2007. Approx. 520 p. Hardcover 39,95 € Due March 2008 ISBN 978-0-387-23703-9

2008. Approx. 230 p. Hardcover

59,95 € ISBN 978-1-84800-128-2 16 Computer Science springer.com/booksellers

U.N. Bhat, Professor Emeritus, Southern Methodist University, 46,20 € J.P.N. Bishwal, University of North Carolina, Charlotte, NC, USA Dallas, TX, USA ISBN 978-0-8176-4724-7 Parameter Estimation in Stochastic An Introduction to Queueing Differential Equations Theory

Modeling and Analysis in Applications Parameter estimation in stochastic differential equa- tions and stochastic partial differential equations is the science, art and technology of modelling com- This introductory textbook is designed for a one- plex phenomena and making beautiful decisions. semester course on queueing theory that does not The subject has attracted researchers from several require a course in stochastic processes as a prereq- areas of mathematics and other related fields like uisite. By integrating the necessary background on economics and finance. This volume presents the stochastic processes with the analysis of models, this estimation of the unknown parameters in the cor- book provides a sound foundational introduction to responding continuous models based on continu- the modeling and analysis of queueing systems for ous and discrete observations and examines exten- a broad interdisciplinary audience of students com- sively maximum likelihood, minimum contrast and ing from diverse disciplines, including applied math- Bayesian methods. Useful because of the current ematics, statistics, computer science, operations re- availability of high frequency data is the study of re- search, and industrial, systems, manufacturing, and fined asymptotic properties of several estimators communications engineering. Key features include when the observation time length is large and the an introductory chapter, which contains an histori- observation time interval is small. Also space time cal account of the growth of queueing theory in the white noise driven models, useful for spatial data, last 100 years; rigorous treatment of the foundations and more sophisticated non-Markovian and non- of basic models commonly used in applications with semimartingale models like fractional diffusions that appropriate references for advanced topics; a chapter model the long memory phenomena are examined in on modeling and analysis using computational tools; this volume. modeling exercises as a motivational tool, and review exercises covering background [..] Contents Preface.- 1.Parametric Stochastic Differential Equa- Features tions.- Part I: Continuous Sampling.- 2.Rates of The first textbook on queueing theory that does not Weak Convergence of Estimators in Homogeneous require a course in stochastic processes as a prerequi- Diffusions. -3.Large Deviations for Estimators in site; suitable for applied science students not needing Homogeneous Diffusions.- 4.Local Asymptotic a specialized course in queueing theory For a broad Mixed Normality for Nonhomogeneous Diffusions.- interdisciplinary audience of advanced undergradu- 5.Bayes and Sequential Estimation in Stochastic ates, graduate students, researchers, and practition- PDEs.- 6.Maximum Likelihood Estimation in Frac- ers in applied mathematics, statistics, computer sci- tional Diffusions.- Part II: Discrete Sampling.- 7.Ap- ence, operations research, and industrial, [..] proximate Maximum Likelihood Estimation in Non- Contents homogeneous Diffusions.- 8.Rates of Weak Conver- Introduction.- System Element Models.- An Intro- gence of Estimators in the Ornstein-Uhlenbeck Pro- duction to Stochastic Processes.- Simple Markovian cess.- 9.Local [..] Queueing Systems.- Imbedded Markov Chain Mod- Fields of interest els for M/G/I and G/M/I Queues.- Extended Markov Probability Theory and Stochastic Processes; Statisti- Models.- Queueing Networks.- Renewal Process cal Theory and Methods; Quantitative Finance; Nu- Models.- The General Queue G/G/I and Approxi- merical Analysis; Game Theory, Economics, Social mations.- Statistical Inference for Queueing Mod- and Behav. Sciences els.- Decision Problems in Queueing Theory.- Index   Target groups Researchers and graduate students Fields of interest Statistics for Engineering, Physics, Computer Sci- Type of publication ence, Chemistry & Geosciences; Statistical Theo- Monograph ry and Methods; Probability Theory and Stochastic Processes; Mathematical Modeling and Industrial Mathematics; Operations Research, Mathematical Due October 2007 Programming; Industrial and Production Engineer- ing 2008. XIV, 268 p. (Lecture Notes in Mathematics, Vol. 1923) Soft- cover Target groups Advanced undergraduates, graduate students, re- 39,95 € searchers, and practitioners in applied mathematics, ISBN 978-3-540-74447-4 statistics, computer science, operations research, and industrial, systems, manufacturing, and communica- tions engineering

Type of publication Graduate/advanced undergraduate textbook

Due February 2008

2008. Approx. 376 p. 5 illus. (Statistics for Industry and Technolo- gy) Hardcover springer.com/booksellers Computer Science 17

S. Biswas, Indian Statistical Institute, Kolkata, India; B.C. Lovell, D. Bjorner, Holte, Denmark; M.C. Henson, University of Essex, UK C. Blum, Universitat Politecnica Catalunya, Barcelona, Spain; D. University of Queensland, Brisbane, QLD, Australia (Eds.) Merkle, University of Leipzig, Germany (Eds.)

Bézier and Splines in Image Logics of Specification Languages Swarm Intelligence

Processing and Machine Vision Introduction and Applications

By a specification language we understand a formal system of syntax, semantics and proof rules. The syn- Digital image processing and machine vision have The laws that govern the collective behavior of social tax and semantics define a language; the proof rules grown considerably during the last few decades. Of insects, flocks of birds, or fish schools continue to define a proof system. Specifications are expressions the various techniques, developed so far, splines play mesmerize researchers. While individuals are rather in the language, and reasoning over properties of a significant role in many of them. This book deals unsophisticated, in cooperation they can solve com- these specifications is done within the proof system. with various image processing and machine vision plex tasks, a prime example being the ability of ant This book presents comprehensive studies on nine problems efficiently with splines and includes: the colonies to find shortest paths between their nests specification languages and their logics of reason- significance of Bernstein Polynomial in splines, de- and food sources. Task-solving results from self-or- ing. The editors and authors are authorities on these tailed coverage of Beta-splines applications which are ganization, which often evolves from simple means specification languages and their application. Ded- relatively new, Splines in motion tracking, various of communication, either directly or indirectly via icated chapters address: the use of ASM (Abstract deformative models and their uses. Finally the book changing the environment, the latter referred to as State Machines) in the classroom; the Event-B mod- covers wavelet splines which are efficient and effec- stigmergy. Scientists have applied these principles elling method; a methodological guide to CafeOBJ tive in different image applications. in new approaches, for example to optimization and logic; CASL, the Common Algebraic Specification the control of robots. Characteristics of the result- Language; the Duration Calculus; the logic of the Features ing systems include robustness and flexibility. This RAISE specification language (RSL); the specification Examines the various uses of splines in the area of field of research is now referred to as swarm intel- language TLA+; the typed logic of partial functions Image Processing and Machine Vision Includes all ligence. The contributing authors are among the and the Vienna Development Method (VDM); and significant splines as well as the latest one - the top researchers in their domain. The book is intend- Z logic and its applications. Each chapter is self-con- wavelet spline ed to provide an overview of swarm intelligence to tained, with references, and symbol and [..] novices, and to offer researchers in the field an up- Contents date on interesting recent [..] Part I Early Background.- 1 Bernstein Polynomial Features Unique overview of the key current formal specifica- and Bézier-Bernstein Spline.- Significance of Bern- Features tion languages stein Polynomial in Splines.- 2 Image Segmentation.- Combines an overview of swarm intelligence with an Two Different Concepts of Segmentation.- Contour Contents up-to-date treatment of the advances in the field. Based Segmentation.- Region Based Segmentation.- An Overview.- Abstract State Machines for the 3 1-d B-B Spline Polynomial and Hilbert Scan for Contents Classroom.- The Event-B Modelling Method: Con- Graylevel Image Coding.- Hilbert Scanned Image.- Biological Foundations of Swarm Intelligence.- cepts and Case Studies.- A Methodological Guide Shortcomings of Bernstein Polynomial and Error of Swarm Intelligence in Optimization.- Swarm to CafeOBJ Logic.- CASL - The Common Algebra- Approximation.- 4 Image Compression.- SLIC: Sub- Robotics.- Routing Protocols for Next-Generation ic Specification Language.- Duration Calculus.- The image Based Lossy Image Compression.- Part II In- Intelligent Networks Inspired by Collective Behav- Logic of the RAISE Specification Language.- The termediate Steps.- 5 B-Splines and its Applications.- iors of Insect Societies.- Evolution, Self-organization Specification Language TLA+.- The Typed Logic B-Spline Function.- 6 Beta-Splines: A [..] and Swarm Robotics.- Particle Swarms for Dynamic of Partial Functions and the Vienna Development Optimization Problems.- An Agent-Based Approach Method.- Z and Its Applications.- Reviews. Fields of interest to Self-organized Production.- Organic Computing Image Processing and Computer Vision; Computer Fields of interest and Swarm Intelligence Imaging, Vision, Pattern Recognition and Graphics Mathematical Logic and Formal Languages; Software Fields of interest Engineering; Logics and Meanings of Programs; Target groups Artificial Intelligence (incl. Robotics); Computation Theory of Computation Postgraduate and PhD students and researchers in by Abstract Devices; Simulation and Modeling; Op- Image Processing and Computer Vision Target groups erations Research, Mathematical Programming; Au- tomation and Robotics; Communications Engineer- Type of publication Researchers, graduate students ing, Networks Reference work Type of publication Monograph Target groups Due December 2007 Researchers in academia and industry, graduate stu- dents Due November 2007 2008. Approx. 250 p. Hardcover Type of publication 69,95 € 2008. XXI, 620 p. (Monographs in Theoretical Computer Science. Monograph ISBN 978-1-84628-956-9 An EATCS Series) Hardcover Due February 2008 89,95 € ISBN 978-3-540-74106-0 2008. Approx. 275 p. (Natural Computing Series) Hardcover

59,95 € ISBN 978-3-540-74088-9 18 Computer Science springer.com/booksellers

B.G. Blundell, University of the US Virgin Islands C. Bobda, Kaiserslautern University of Technology, Kaiser- L.L. Bonilla, Universidad Carlos III de Madrid, Spain; M. Moscoso, slautern, Germany Universidad Carlos III de Madrid, Spain; G. Platero, CSIC Madrid , Spain; J.M. Vega, Universidad Politécnica de Madrid, Spain (Eds.) An Introduction to Computer Graphics and Creative 3-D Introduction to Reconfigurable Computing Progress in Industrial Mathematics Environments at ECMI 2006 Architectures, algorithms and applications

This book introduces the fundamentals of 2-D and ECMI is synonymous with European Mathematics 3-D computer graphics. Additionally, a range of “Introduction to Reconfigurable Computing” pro- for Industry and organizes successful biannual con- emerging, creative 3-D display technologies are de- vides a comprehensive study of the field Reconfig- ferences. The 14th European Conference for Mathe- scribed, including stereoscopic systems, immersive urable Computing. It provides an entry point to matics in Industry held in Leganés (Madrid) focused virtual reality, volumetric, varifocal, and others. In- the novice willing to move in the research field re- on Aerospace, Information and Communications, teraction is a vital aspect of modern computer graph- configurable computing, FPGA and system on pro- Materials, Energy and Environment, Imaging, Biol- ics, and issues concerning interaction (including grammable chip design. The book can also be used ogy and Biotechnology, Life Sciences, Finances and haptic feedback) are discussed. Included with the as teaching reference for a graduate course in com- other topics including Education in Industrial Math- book are anaglyph, stereoscopic, and Pulfrich view- puter engineering, or as reference to advance electri- ematics and web learning. Attendees came from all ing glasses. Topics covered include: •essential math- cal and computer engineers. It provides a very strong over the world.  Overall, these proceedings ematics •vital 2-D and 3-D graphics techniques •key theoretical and practical background to the field of give a lively overview of the importance of mathe- features of the graphics pipeline (including GPU) reconfigurable computing, from the early Estrin’s matical modeling, analysis and numerical methods •display and interaction techniques •important his- machine to the very modern architecture like coarse- when addressing and solving problems from today’s torical milestones Designed to be a core teaching grained reconfigurable device and the embedded log- real world applications. The accessible presentation text at the undergraduate level, accessible to students ic devices. Apart from the introduction and the con- of real problems from industry and finance, model- with wide-ranging backgrounds, only an elementary clusion, the main chapters of the book are Architec- ing, solutions via appropriate numerical and mathe- grounding in mathematics is assumed as key maths ture of reconfigurable systems, Design and imple- matical techniques are a source of fresh ideas and in- is provided. Regular ‘Over to You’ activities are in- mentation, High-Level Synthesis for Reconfigurable spiration for mathematicians. Engineers and scien- cluded, and each chapter concludes with review and Devices, Temporal placement, On-line and Dynam- tists in application fields may find useful ideas and discussion questions. ic Interconnection, Designing a reconfigurable ap- techniques presented in familiar contexts that may plication on Xilinx Virtex FPGA, System on pro- help them to [..] Features grammable chip, [..] Covers the key areas of computer graphics including Features the relevant mathematics. Stereoscopic and anaglyph Features Proceedings of major industrial math conference glasses will be provided with the book to enable read- Architecture of Reconfigurable Systems: Exhaus- ers to undertake some interesting work in connec- tive description of existing reconfigurable architec- Fields of interest tion with 3D images.   tures, from the simple PLDs to very complex FPGAs Computational Mathematics and Numerical Anal- and coarse-grained technologies Low-level Synthe- ysis; Partial Differential Equations; Computational Contents sis of reconfigurable devices (RD): State of the art al- Science and Engineering; Numerical Analysis; Prob- Preface.-Acknowledgements.-Setting the Scene.- gorithms for FPGA synthesis, in particular for the ability Theory and Stochastic Processes; Statistics for A Maths Primer.- Images in a  2-D Look-up table technology mapping High-level syn- Business/Economics/Mathematical Finance/Insur- Space.- Curves in a 2-D Space.-Interfacing with thesis (HLS): Detailed presentation of high-level syn- ance the Visual System.- Into the Third Dimension.- thesis [..] Incorporating the third Dimension: Transforma- Target groups tions.-3-D Graphics: Representation.- 3-D Contents Mathematicians, engineers and physicists, and finan- Graphics: Mainly Rendering.-Creative 3-D Display From the contents Foreword. Preface. List of Fig- cial mathematicians in applications fields (aerospace, Systems.-Interaction and Haptic Feedback.- Ap- ures. List of Tables.- 1. Introduction.- 2. Reconfig- information and communications, materials, energy pendix A: Maths: Some Useful Results.- Appendix B: urable Architectures.- 3. Implementation.- 4. High- and environment, imaging, biology and biotechnolo- The Curvature of a Varifocal Mirror.- Appendix C: Level Synthesis For Reconfigurable Devices.- 5. Tem- gy, life sciences, sinances) The Scalar Product.- Appendix D: Concerning the poral Placement.- 6. On-Line Communication.- 7. Plane.- Feedback to Selected OTU Exercises.- Refer- Partial Reconfiguration Design.- 8. System on a Pro- Type of publication ences.- Index grammable Chip.- 9. Applications.- References.- Ap- Proceedings pendices. Fields of interest Due October 2007 Computer Hardware; Math Applications in Comput- Fields of interest er Science; User Interfaces and Human Computer Circuits and Systems; Processor Architectures; Com- Interaction; Computer Appl. in Arts and Humani- puter Systems Organization and Communication 2007. X, 1000 p. With colour appendix. (The European Consor- ties; Computer Graphics Networks; Computer Hardware; Software Engineer- tium for Mathematics in Industry, Vol. 12) Hardcover ing/Programming and Operating Systems 99,95 € Target groups ISBN 978-3-540-71991-5 Computer Graphics Undergraduates Target groups Computer engineers, computer architects, electri- Type of publication cal engineers, computer scientists, FPGA designers, Undergraduate textbook ASIC designers, students and teachers in computer engineering and electrical engineering Due March 2008 Type of publication Monograph 2008. Approx. 465 p. Hardcover

49,95 € Due October 2007 ISBN 978-1-84800-041-4 2007. xxvi, 362 pp Hardcover

89,95 € ISBN 978-1-4020-6088-5 springer.com/booksellers Computer Science 19

N. Borisov, P. Golle (Eds.) D. Borrajo, Universidad Carlos III de Madrid, Spain; L. Castillo, Uni- C. Boukis, Athens Information Technology; A. Pnevmatikakis, versidad de Granada, Spain; J.M. Corchado, Universidad de Sala- Athens Information Technology; L. Polymenakos, Athens Infor- manca, Spain (Eds.) mation Technology (Eds.) Privacy Enhancing Technologies

7th International Symposium, PET 2007 Ottawa, Canada, June Current Topics in Artificial Artificial Intelligence and 20-22, 2007 Revised Selected Papers Intelligence Innovations 2007: From Theory to

12th Conference of the Spanish Association for Artificial In- Applications This book constitutes the thoroughly refereed post- telligence, CAEPIA 2007, Salamanca, Spain, November 12-16, 2007, Selected Papers 4th IFIP International Conference on Artificial Intelligence Ap- proceedings of the 7th International Symposium on plications and Innovations (AIAI 2007) Privacy Enhancing Technologies, PET 2007, held in Ottawa, Canada, in June 2007 in conjunction with WOTE 2007, the IAVoSS Workshop on Trustwor- This book constitutes the refereed proceedings of the thy Elections. The 16 revised full papers presented 12th Conference of the Spanish Association for Ar- Features were carefully selected from 84 submissions during tificial Intelligence, CAEPIA 2007, held in Salaman- "Most recent volume from the AIAI conference se- two rounds of reviewing and improvement. The pa- ca, Spain, in November 2007, in conjunction with the ries" pers - both from academia and industry - cover de- 7th Workshop on Artificial Intelligence Technology sign and realization of privacy services for the inter- Transfer, TTIA 2007. The 28 revised full papers pre- Contents net and other communication networks and present sented were carefully selected during two rounds of Clustering Improves the Exploration of Graph Min- novel research on all theoretical and practical aspects reviewing and improvement from 134 submissions. ing Results.- Graph Based Workflow Validation.- of privacy technologies, as well as experimental stud- The papers address all current issues of artificial in- Resource Sharing in Multi-Agent Systems Through ies of fielded systems. telligence ranging from methodological and foun- Multi-Stage Negotiation.- Service Decomposition dational aspects to advanced applications in various and Task Allocation in Distributed Computing En- Fields of interest fields. vironments.- Measuring Expert Impact on Learn- Data Encryption; Computer Communication Net- ing how to Play a Board Game.- Mining Interesting works; Systems and Data Security; Information Stor- Fields of interest Clinico-Genomic Associations: The HealthObs Ap- age and Retrieval; Computers and Society; Manage- Artificial Intelligence (incl. Robotics); Mathematical proach.-Domain of Impact for Agents Collaborat- ment of Computing and Information Systems Logic and Formal Languages; Computation by Ab- ing in a Baggage Handling System.- ANN Prediction stract Devices Models for Indoor SIMO Millimeter Band System.- Target groups Image Compression with Competitive Networks and Researchers and professionals Target groups Pre-fixed [..] Researchers and professionals Type of publication Fields of interest Proceedings Type of publication Artificial Intelligence (incl. Robotics) Proceedings Due October 2007 Target groups Due October 2007 Researchers and practitioners in artificial intelli- 2007. X, 273 p. (Lecture Notes in Computer Science, Vol. 4776) gence. Softcover 2007. XI, 280 p. (Lecture Notes in Computer Science, Vol. 4788) Softcover Type of publication 45,00 € Proceedings ISBN 978-3-540-75550-0 45,00 € ISBN 978-3-540-75270-7 Due October 2007

2007. XIV, 408 p. 50 illus. (IFIP International Federation for Infor- mation Processing, Vol. 247) Hardcover

128,00 € ISBN 978-0-387-74160-4 20 Computer Science springer.com/booksellers

S. Bozapalidis, University of Thessaloniki, Greece; G. Rahonis, Uni- M. Bramer, University of Porthsmouth, UK; F. Coenen, University J. Braz, EST Setúbal/IPS, Portugal; A. Ranchordas, INSTICC, Portu- versity of Thessaloniki, Greece (Eds.) of Liverpool, UK; M. Petridis, University of Greenwich, London, UK gal; H. Araújo, Universidade de Coimbra, Portugal; J. Jorge, Insti- (Eds.) tuto Superior Técnico/UTL, Lisboa, Portugal (Eds.) Algebraic Informatics Research and Development in Advances in Computer Graphics and Second International Conference, CAI 2007, Thessalonkik, Greece, May 21-25, 2007, Revised Selected and Invited Papers Intelligent Systems XXIV Computer Vision Proceedings of AI-2007, The Twenty-seventh SGAI Initerna- International Conferences VISAPP and GRAPP 2006, Setúbal, tional Conference on Innovative Techniques and Applications Portugal, February 25-28, 2006, Revised Selected Papers This book constitutes the refereed proceedings of the of Artificial Intelligence Second International Conference on Algebraic In- formatics, CAI 2007, held in Thessaloniki, Greece, This book includes selected papers of the VISAPP in May 2007. The 10 revised full papers presented to- The papers in this volume are the refereed techni- and GRAPP International Conferences 2006, held in gether with 9 invited papers were carefully reviewed cal papers presented at AI-2007, the Twenty-sev- Funchal, Madeira, Portugal, February 25-28, 2006. and selected from 29 submissions. The papers cov- enth SGAI International Conference on Innova- The 27 revised full papers presented were carefully er topics such as algebraic semantics on graphs and tive Techniques and Applications of Artificial In- reviewed and selected from 314 submissions. The trees, formal power series, syntactic objects, algebraic telligence, held in Cambridge in December 2007. topics include Geometry and Modeling, Render- picture processing, infinite computation, acceptors They present new and innovative developments ing, Animation and Simulation, Interactive Envi- and transducers for strings, trees, graphs, arrays, etc., in the field, divided into sections on Constraint ronments, Image Formation and Processing, Image and decision problems. Satisfaction, AI Techniques, Data Mining and Analysis, Image Understading, Motion, Tracking Machine Learning, Multi-Agent Systems, Data and Stereo Vision. Fields of interest Mining and Knowledge Acquisition and Logics and Meanings of Programs; Mathematical Management, followed by the text of Fields of interest Logic and Formal Languages; Software Engineering; short papers presented as posters at the conference. Computer Imaging, Vision, Pattern Recognition and Symbolic and Algebraic Manipulation This is the twenty-fourth volume in the Research Graphics; Image Processing and Computer Vision; and Development series. The series is essential read- Computer Graphics; Simulation and Modeling; Pat- Target groups ing for those who wish to keep up to date with de- tern Recognition Researchers and professionals velopments in this important field. The Application Target groups Type of publication Stream papers are published as a companion volume Researchers and professionals Proceedings under the title Applications and Innovations in Intel- ligent Systems XV. Type of publication Due October 2007 Contents Proceedings From the Contents Technical Keynote Address: Ad- 2007. Approx. 310 p. (Lecture Notes in Computer Science, Vol. ventures in Personalized Web Search.- Best Tech- Due November 2007 4728) Softcover nical Paper: An Evolutionary Algorithm-Based Ap- proach to Robust Analog Circuit Design Using 48,00 € 2007. XV, 407 p. Also available online. (Communications in Com- Constrained Multi-Objective Optimization.- Con- puter and Information Science, Vol. 4) Softcover ISBN 978-3-540-75413-8 straint Satisfaction.- Construction of Heuristics for a Search-Based Approach to Solving Sudoku.- Dy- 66,00 € namic Rule Mining for Argumentation Based Sys- ISBN 978-3-540-75272-1 tems.- AI Techniques.- Extending Jess to Handle Uncertainty.- Learning Sets of Sub-Models for Spa- tio-Temporal Prediction.- Data Mining and Machine Learning.- Frequent Set Meta Mining: Towards Mul- ti-Agent Data [..]

Fields of interest Artificial Intelligence (incl. Robotics)

Target groups Researchers, practitioners, under-graduates/post- graduates, academics

Type of publication Proceedings

Due January 2008

2008. Approx. 410 p. Softcover

119,00 € ISBN 978-1-84800-093-3 springer.com/booksellers Computer Science 21

M.H. Breitner, Leibniz Universität Hannover, Germany; G. Denk, S. Brenner, L.R. Scott A. Bronstein, Technion-Israel Institute of Technology, Haifa, Is- Quimonda AG Products, München, Germany; P. Rentrop, Tech- rael; M. Bronstein, Technion-Israel Institute of Technology, Haifa, nische Universität München, Germany (Eds.) Israel; R. Kimmel, Technion-Israel Institute of Technology, Haifa, The Mathematical Theory of Finite Israel From Nano to Space Element Methods Numerical Geometry of Non-Rigid Applied Mathematics Inspired by Roland Bulirsch Shapes This book develops the basic mathematical theory of the finite element method, the most widely used Graduate students and postgraduates in Mathemat- technique for engineering design and analysis. It for- Deformable objects are ubiquitous in the world sur- ics, Engineering and the Natural Sciences want to malizes basic tools that are commonly used by re- rounding us, on all levels from micro to macro. The understand Applied Mathematics for the solution searchers in the field but not previously published. need to study such shapes and model their behavior of everyday problems. Scholars of Roland Bulirsch The book will be useful to mathematicians as well as arises in a wide spectrum of applications, ranging working at universities, at research institutions and engineers and physical scientists. It can be used for from medicine to security. In recent years, non-rigid in industry combine research and review papers in a course that provides an introduction to basic func- shapes have attracted a growing interest, which has this anthology. Their work is summed up under the tional analysis, approximation theory, and numeri- led to rapid development of the field, where state-of- title "From Nano to Space – Applied Mathematics cal analysis, while building upon and applying basic the-art results from very different sciences - theoret- Inspired by Roland Bulirsch". More than 20 contri- techniques of real variable theory. Different course ical and numerical geometry, optimization, linear al- butions are divided into scales: nano, micro, macro, paths can be chosen, allowing the book to be used for gebra, graph theory, machine learning and comput- space and real life. The contributions survey current courses designed for students with different interests. er graphics, to mention a few - are applied to find research and present case studies very interesting For example, courses can emphasize physical appli- solutions. This book gives an overview of current and informative for both graduate students and post- cations, or algorithmic efficiency and code develop- state of science in analysis and synthesis of non-rigid graduates. The contributions show how modern Ap- ment issues, or the more difficult convergence theo- shapes. Everyday examples are used to explain con- plied Mathematics influences our everyday lives. Sev- rems of the subject. This new edition is substantial- cepts and to illustrate different techniques. Self-con- eral contributions include complex graphics and il- ly updated with additional exercises throughout and tained presentation of topics unfolds systematically lustrations, many of them in color. new chapters on Additive Schwarz Preconditioners and numerous figures enrich the engaging exposi- and Adaptive Meshes. Review of [..] Fields of interest tion. Practice problems follow the end of each chap- Applications of Mathematics; Computational Mathe- Features ter, with detailed solutions to selected problems in matics and Numerical Analysis; Appl.Mathematics/ -A rigorous and thorough mathematical introduc- the appendix. A gallery of [..] Computational Methods of Engineering tion to the foundations of the subject -A clear and Features concise treatment of modern fast solution techniques Target groups Gives an up-to-date overview of the concepts and Graduate students, postgraduates and researchers Contents techniques in analysis and synthesis of non-rigid Preface(3rdEd).- Preface(2ndEd).- Preface(1stED).- shapes Bridges between theoretical and applied Type of publication Basic Concepts.- Sobolev Spaces.- Variational For- fields, spanning computer vision, pattern recogni- Contributed volume mulation of Elliptic Boundary Value Problems.- The tion and computer graphics Presents practical state- Construction of a Finite Element of Space.- Polyno- of-the-art algorithms and methods and exemplifies Due October 2007 mial Approximation Theory in Sobolev Spaces.- n- them on real applications Engaging exposition en- Dimensional Variational Problems.- Finite Element riched by numerous figures and everyday examples Reference to public [..] 2008. X, 342 p. 124 illus., 29 in Color Hardcover Multigrid Methods.- Additive Schwarz Precondition- ers.- Max-norm Estimates.- Adaptive Meshes.- Vari- Contents 54,95 € ational Crimes.- Applications to Planar Elasticity.- Introduction.- A Taste of Geometry.- Discrete Ge- ISBN 978-3-540-74237-1 Mixed Methods.- Iterative Techniques for Mixed ometry.- Shortest Paths and Fast Marching Meth- Methods.- Applications of Operator-Interpolation ods.- Numerical Optimization.- In the Rigid King- Theory.- References.- Index. dom.- Multidimensional Scaling.- Spectral Embed- Fields of interest ding.- Non-Euclidean Embedding.- Isometry-Invari- Computational Mathematics and Numerical Analy- ant Similarity.- Partial Similarity.- Non-Rigid Corre- sis; Numerical and Computational Methods in Engi- spondence and Calculus of Shapes.- Three-Dimen- neering; Theoretical and Applied Mechanics; Func- sional Face Recognition.- Epilogue.- Solutions of Se- tional Analysis lected Problems.- Notation.- Acronyms.- Glossary.- References.- Subject Index.- Author Index. Target groups Graduate students, researchers, practitioners Fields of interest Computer Imaging, Vision, Pattern Recognition and Type of publication Graphics; Geometry; Computational Mathematics Graduate/advanced undergraduate textbook and Numerical Analysis

Target groups Due January 2008 Graduate students, teachers, researchers, profession- als 2008. Approx. 375 p. (Texts in Applied Mathematics, Vol. 15) Hardcover Type of publication Graduate/advanced undergraduate textbook 53,90 € ISBN 978-0-387-75933-3 Due April 2008

2008. Approx. 320 p. (Monographs in Computer Science) Soft- cover

53,90 € ISBN 978-0-387-73300-5 22 Computer Science springer.com/booksellers

P.J. Brooke, University of Teeside, Middlesborough, UK; R.F. Paige, University of York, UK

Practical Distributed Processing

Distributed processing has a strong theoretical foun- dation, but many day-to-day practitioners make lim- ited use of the advantages this theory can give them. The result includes unreliable systems with obscure and intermittent failures, that can cost time, money and in extreme cases, lives. Reliable construction of distributed and concurrent systems must incorporate theory in practice. This book provides a concise pre- sentation of the theory closely linked to the practical realisation of these concepts. Practical presentation is given with examples from C, Java and Eiffel in this comprehensive textbook which contains all the ele- ments needed for a complete development of a dis- tributed system. Theoretical models of concurrency are linked with practical realisation of systems, pro- viding an integrated approach to the field. Written with undergraduates in mind, especially relevant for intermediate level students, this textbook will prove a comprehensive guide to the topic. Example code will be provided [..]

Features Integrated approach to the field of distributed pro- cessing Links theoretical models of concurrency with practical realisation of systems Practical presentation with examples from C, Java and Eiffel Other books are typically large volumes where the precise content becomes lost – this is a coherent textbook Contains the elements needed for a complete development of a distributed system, from theory to practice

Contents What is Distributed Processing?- Concepts of Con- currency.- Models of Concurrency.- Concurrency in Operating Systems.- Interprocess Communica- tion.- Protocols.- Security.- Languages and Distribut- ed Processing.- Building Distributed Systems.- Case Study: A Networked Game.- The End.- Exercises, Hints and Comments.- About the Example Code.- Bibliography.- Glossary.- Index.

Fields of interest Software Engineering/Programming and Operating Systems

Target groups Undergraduates

Type of publication Undergraduate textbook

Due October 2007

2007. XIV, 262 p. 24 illus. (Undergraduate Topics in Computer Science) Softcover

29,95 € ISBN 978-1-84628-840-1 springer.com/booksellers Computer Science 23

W.J. Buchanan, Napier University, Edinburgh, UK J.J. Buckley, University of Alabama, Birmingham, AL, USA; L.J. R.S. Burachik, University of South Australia, Mawson Lakes, Aus- Jowers, University of Alabama, Birmingham, AL, USA tralia; A.N. Iusem, IMPA, Rio de Janiero, Brazil The Handbook of Data & Networks Security Monte Carlo Methods in Fuzzy Set-Valued Mappings and Optimization Enlargements of Monotone Operators The Handbook of Security will build on the exist- ing Handbook of Data Communications and Net- Features works, and The Complete Handbook of the Inter- Set-valued analysis is an essential tool for the math- net. It will try to cover every aspect of computer and Clear and didactic book about Monte Carlo meth- ods using random fuzzy numbers to obtain approx- ematical formulation of many real-life situations, network security. This will include an analysis of the e.g., equilibrium theory in mathematical economics. physical connection and data transfer over networks, imate solutions to fuzzy optimization problems In- cludes various solved problems such as fuzzy linear This work offers the first comprehensive treatment the network protocols, the session protocols (such in book form of the fairly new subdiscipline of en- as HTTP and FTP), the network operating systems, programming, fuzzy regression, fuzzy inventory con- trol, fuzzy game theory, fuzzy queuing theory largements of maximal monotone operators, includ- network security devices, mobile networks, and an ing several important new results in the field. In the in-depth analysis of the principles and implementa- Contents last decades, with the development of nonsmooth tion of public-key encryption. Throughout the book Part I: Introduction.- 1 Introduction 3.- 2 Fuzzy optimization, effective algorithms have been devel- practical examples of security will be given, such as Sets.- 3 Crisp Random Numbers and Vectors.- 4 oped to solve these kinds of problems, such as nons- router programming commands and screen shots Random Fuzzy Numbers and Vectors.- 5 Tests for mooth variational inequalities. Several of these meth- showing key security principles. Randomness.- Part II: Applications.- 6 Fuzzy Monte ods, such as bundle methods for variational prob- lems, are fully developed and analyzed in this book. Features Carlo Method.- 7 Fully Fuzzied Linear Programming The first chapters provide a self-contained review of The complete reference on Internet Security A I.- 8 Fully Fuzzied Linear Programming II.- 9 the basic notions and fundamental results in set-val- unique and comprehensive overview in the area of Fuzzy Multiobjective LP.- 10 Solving Fuzzy Equa- ued analysis, including set convergence and continu- Networks Security Security remains a key issue in the tions.- 11 Fuzzy Linear Regression I.- 12 Univariate ity of set-valued mappings together with many im- field of communications, this reference provides a Fuzzy Nonlinear Regression.- 13 Multivariate Non- portant results in infinite-dimensional convex analy- thorough overview linear Regression.- 14 Fuzzy Linear Regression II.- 15 Fuzzy Two-Person Zero-Sum Games.- 16 Fuzzy sis, leading to the classical fixed point results due to Contents Queuing Models.- Part III: Unfinished Business.- 17 Ekeland, Caristi and Kakutani. Next, [..] Network and OS principles.- Security devices.- En- [..] Features cryption.- System attacks.- Network Operating sys- First comprehensive treatment in book form of the tems and servers.- Security policies.- Mobile Net- Fields of interest fairly new subdiscipline in set-valued analysis of en- works.- Implementation. Appl.Mathematics/Computational Methods of Engi- neering; Artificial Intelligence (incl. Robotics) largements of maximal monotone operators Presents Fields of interest several important new results in the field Addressed Management of Computing and Information Sys- Target groups to graduate students, mathematicians, engineers, tems; Electronic and Computer Engineering; Com- Engineers, researchers, and students in Fuzziness economists, and researchers Contains extensive exer- puter Science, general; Computer Systems Organiza- and applied mathematics cises and examples throughout the text tion and Communication Networks; Data Encryp- Type of publication Contents tion Monograph List of Figures.- Dedication.- Acknowledgments.- Target groups Preface.- Introduction.- Set Convergence and Point- Institutes, libraries Due January 2008 to-Set Mappings.- Convex Analysis and Fixed Point Theorems.- Maximal Monotone Operators.- 5. En- Type of publication largements of Monotone Operators.- Recent Topics 2008. Approx. 285 p. (Studies in Fuzziness and Soft Computing, in Proximal Theory.- Bibliography.- Notation.- In- Handbook Vol. 222) Hardcover dex. 99,95 € Due December 2007 Fields of interest ISBN 978-3-540-76289-8 Optimization; Operator Theory; Operations Re- 2008. Approx.1800 p. With CD-ROM. Hardcover search, Mathematical Programming; Operation Re- search/Decision Theory; Calculus of Variations and 320,00 € Optimal Control; Optimization; Analysis ISBN 978-0-387-28602-0 Target groups Graduate students and researchers in pure and applied mathematics, as well as engineers and economists interested in nonsmooth optimization, variational inequalities and nonlinear equations in infinite-dimensional spaces

Type of publication Graduate/advanced undergraduate textbook

Due November 2007

2008. XIV, 294 p. (Springer Optimization and Its Applications, Vol. 8) Hardcover

62,95 € ISBN 978-0-387-69755-0 24 Computer Science springer.com/booksellers

W. Burger, Fachhochschule Hagenberg, Austria; M.J. Burge, Na- M. Burmester, Florida State University, Tallahassee, FL, USA; A. F. Burstein, Monash University, Caulfield East, VIC, Australia; C.W. tional Science Foundation, Arlington, VA, USA Yasinsac, Florida State University, Tallahassee, FL, USA Holsapple, University of Kentucky, Versailles, KY, USA (Eds.)

Digital Image Processing Security Issues in Ad-Hoc Networks Handbook on Decision Support

An Algorithmic Introduction Using Java Systems 1 The Basics Ad-hoc networks are dynamic collections of self-or- ganizing mobile wireless nodes with links that are Written as an introduction for undergraduate stu- changing in an unpredictable way. This profession- dents, this textbook covers the most important meth- al reference work investigates the security aspects Decision support systems have experienced a ods in digital image processing. Formal and mathe- of ad-hoc networks. The lack of any formal mod- marked increase in attention and importance over matical aspects are discussed at a fundamental lev- el for such networks has resulted in uncoordinat- the past 25 years. The aim of this book is to survey el and various practical examples and exercises sup- ed research, which in many cases leads to confus- the decision support system (DSS) field – covering plement the text. The book uses the image process- ing or heuristic requirements, and to routing proto- both developed territory and emergent frontiers. It ing environment ImageJ, freely distributed by the cols whose security can only be established in very will give the reader a clear understanding of funda- National Institute of Health. A comprehensive web- restrictive environments. Security Issues in Ad-Hoc mental DSS concepts, methods, technologies, trends, site supports the book, and contains full source code Networks shows that it is possible to achieve secure and issues. It will serve as a basic reference work for for all examples in the book, a question and answer communication in ad hoc networks in a strong secu- DSS research, practice, and instruction. To achieve forum, slides for instructors, etc. Digital Image Pro- rity model using appropriate cryptographic mecha- these goals, the book has been designed according cessing in Java is the definitive textbook for comput- nisms, and by exploiting particular aspects of wire- to a ten-part structure, divided in two volumes with er science students studying image processing and less communication. Security Issues in Ad-Hoc Net- chapters authored by well-known, well-versed schol- digital processing. works is designed for practitioners and researchers ars and practitioners from the DSS community. Features in industry, as well as for advanced-level students in Features Compact introduction to the methods of the digital computer science and electrical engineering. Basic reference work for decision support system image processing Covers the most important proce- Features (DSS) concepts, methods, technologies, trends, and dures Formal and mathematical aspects are discussed Timely professional reference, written by world-class issues Authored by well-known scholars and practi- at a fundamental level Practical examples and exer- researchers Demonstrates that secure communica- tioners from the DDS community cises throughout A comprehensive website supports tion is possible in ad hoc networks the book, and contains full source code for all exam- Contents ples in the book, a question and answer forum, slide Contents Foundations of Decision Support Systems.- Decision sets for instructors, images, reviews and errata Preface.- Introduction.- Models for Analyzing Ad Support System Fundamentals.- Multiparticipant hoc Networks.- Point-to-Point Communication.- Decision Support Systems.- Intelligent Decision Sup- Contents Density in Ad hoc Networks.- Distributed Applica- port Systems.- Effects on Computer-Based Decision Crunching Pixels.- Digital Images.- ImageJ.- His- tions.- Conclusion.-Bibliography.- Index. Support. tograms.- Point Operations.- Filters.- Edges and Contours.- Corner Dectection.- Detecting Simple Fields of interest Fields of interest Curves.- Morphological Filters.- Regions in Bina- Data Encryption; Data Structures, Cryptology and Operation Research/Decision Theory; Information ry Images.- Color Images.- Introduction to Spec- Information Theory; Computer Communication Systems tral Techniques.- The Discrete Fourier Transform in Networks; Computer Systems Organization and 2D.- The Discrete Cosine Transform (DCT).- Geo- Communication Networks; Coding and Information Target groups metrical Operations.- Comparing Images.- A Math- Theory; Communications Engineering, Networks Researchers, practitioners ematical Notation.- B Java Notes.- C ImageJ Short Reference.- D Source Code.- References.- Index. Target groups Type of publication Practitioners and researchers in industry Handbook Fields of interest Computer Imaging, Vision, Pattern Recognition and Type of publication Due January 2008 Graphics; Computer Graphics; Image Processing and Monograph Computer Vision; Numerical and Computational Methods in Engineering 2008. Approx. 800 p. (International Handbooks on Information Due December 2007 Systems) Hardcover Target groups 179,95 € Undergraduates, lecturers 2007. Approx. 200 p. 20 illus. Hardcover ISBN 978-3-540-48712-8 Type of publication 72,95 € Undergraduate textbook ISBN 978-0-387-24433-4

Due January 2008

2008. Approx. 592 p. 288 illus., 72 in color. (Texts in Computer Science) Hardcover

54,95 € ISBN 978-1-84628-379-6 springer.com/booksellers Computer Science 25

F. Burstein, Monash University, Caulfield East, VIC, Australia; C.W. K. Busch, Rensselaer Polytechnic Institute, Troy, NY, USA; M. H. Bustince, Universidad Pública de Navarra, Pamplona, Spain; Holsapple, University of Kentucky, Versailles, KY, USA (Eds.) Mavronicolas, University of Cyprus, Nicosia, Cyprus F. Herrera, University of Granada, Spain; J. Montero, Universidad Complutense, Madrid, Spain (Eds.) Handbook on Decision Support Counting Networks Systems 2 Fuzzy Sets and Their Extensions: Representation, Aggregation and Variations This volume provides a comprehensive presenta- Models tion of counting networks — a fundamental class of distributed data structures providing efficient solu- Intelligent Systems from Decision Making to Data Mining, As the most comprehensive reference work dealing tions to important problems in distributed systems. Web Intelligence and Computer Vision with decision support systems (DSS), this book is es- Specifically, counting networks solve distributed co- sential for the library of every DSS practitioner, re- ordination problems such as counting, load balanc- searcher, and educator. Written by an international ing, and barrier synchronization. Among other top- This carefully edited book presents an up-to-date array of DSS luminaries, its more than 70 chapters ics, this book provides constructions of counting state of current research in the use of fuzzy sets and approach decision support systems from a wide vari- networks, examines their limitations as well as their their extensions, paying attention to foundation is- ety of perspectives ranging from classic foundations ability to support additional functionalities, and eval- sues and to their application to four important areas to cutting-edge thought, informative to provoca- uates several measures of performance for counting where fuzzy sets are seen to be an important tool for tive, theoretical to practical, historical to futuristic, networks. The main purpose of the book is to make modelling and solving problems. The book contains human to technological, and operational to strate- the most important results on counting networks ac- 34 chapters divided into two parts. The first part is gic. The chapters are conveniently organized into cessible to a wide audience and to stimulate new re- divided into two sections. Section 1 contains four re- 10 major sections: foundations of decision support search on this fascinating topic. Counting Networks view papers introducing some non standard repre- systems, DSS fundamentals, multiparticipant DSSs, is suitable as a text in advanced-level courses special- sentations that extend fuzzy sets (type-2 fuzzy sets, intelligent DSSs, effects of decision support, time ized in distributed computing with networked data Atanassov’s IFS, fuzzy rough sets and computing and space issues, scopes of decision support, devel- structures. The book is also a useful tool for the prac- with words under the fuzzy sets perspective). Section oping and managing decision support systems, cas- titioner who implements distributed data structures 2 reviews different aggregation issues from a theoret- es and applications, and decision support horizons. for distributed system applications.   ical and practical point of view; this second part is di- Novices and experts alike will refer to the authori- vided into four sections. Section 3 is devoted to deci- tative and stimulating content again and again for Features sion making, with seven papers that show how fuzzy years to come. First comprehensive textbook presentation of count- sets and their extensions are an important tool for ing networks Accessible to students, provides ample modelling choice problems. Section 4 includes eight Features exercises and instruction material papers that cover different aspects on the use of fuzzy Basic reference work for decision support system sets and their [..] (DSS) concepts, methods, technologies, trends, and Contents issues Authored by well-known scholars and practi- Preface.- Introduction.- Basic Regular Construc- Features tioners from the DDS community tions.- Irregular Constructions.- Advanced Con- Recent advances of fuzzy sets and their extensions structions.- Constructions with Arbitrary Output Special focus on fuzzy logic foundations (represen- Contents Width.- Combinatorial Properties and Impossibility tation and aggregation) and computer vision appli- Time and Space Issues for Decision Support.- Scopes Results.- Consistency Properties.- Contention Anal- cations, decision making, web intelligence and data of Decision Support.- Developing and Managing De- ysis.- Experimental Performance.- Increments and mining cision Support Systems.- Decision Support Cases and Decrements.- Extensions of Counting Networks.- Applications.- Decision Support Horizons. Beyond Counting.- Index. Contents Part I. Foundations: Representation and Aggrega- Fields of interest Fields of interest tion.- Aggregation.- Part II. From Decision Making Operation Research/Decision Theory; Information Computer Communication Networks; Data Struc- to Data Mining, Web Intelligence and Computer Vi- Systems tures; Operating Systems; Computer Systems Orga- sion.- Decision Making.- Data Mining.- Web Intelli- nization and Communication Networks; Algorithm gence.- Computer Vision. Target groups Analysis and Problem Complexity; Theory of Com- Researchers, practitioners putation Fields of interest Appl.Mathematics/Computational Methods of Engi- Type of publication Target groups neering; Artificial Intelligence (incl. Robotics) Handbook Industry practitioners working in distributed system applications, researchers in distributed computing Target groups Due January 2008 and theoretical computer science, discrete mathe- Researchers, engineers, graduate students in fuzzi- maticians interested in the mathematical theory of ness, soft computing, computer vision networks 2008. Approx. 800 p. (International Handbooks on Information Systems) Hardcover Type of publication Type of publication Monograph 179,95 € Monograph ISBN 978-3-540-48715-9 Due October 2007 Due September 2008

2007. XX, 674 p. 126 illus. (Studies in Fuzziness and Soft Comput- 2008. Approx. 300 p. 20 illus. Hardcover ing, Vol. 220) Hardcover

76,95 € 169,95 € ISBN 978-0-387-32991-8 ISBN 978-3-540-73722-3 26 Computer Science springer.com/booksellers

M. Butler, University of Southampton, UK; M.G. Hinchey, Loyola M. Calisti, Whitestein Technology, Zürich, Switzerland; S. van der G. Calvary, University of Grenoble, France; C. Pribeanu, National College in Maryland, Baltimore, MD, USA; M.M. Larrondo-Petrie, Meer, J. Strassner, Motorola Inc., Schaumburg, IL, USA (Eds.) Institute of Research and Development in Informatics, Bucharest, Florida Atlantic University, Boca Raton, FL, USA (Eds.) Romania; G. Santucci, Università di Roma "La Sapienza", Italia; J. Vanderdonckt, Université Catholique de Louvain, Louvain-la- Advanced Autonomic Networking Neuve, Belgium (Eds.) Formal Methods and Software and Communication Engineering Computer-Aided Design of User 9th International Conference on Formal Engineering Methods, Interfaces V ICFEM 2007, Boca Raton, Florida, USA, November 14-15, 2007, This book presents a comprehensive reference of Proceedings state-of-the-art efforts and early results in the area Proceedings of the Sixth International Conference on Comput- er-Aided Design of User Interfaces CADUI '06 (6-8 June 2006, of autonomic networking and communication. The Bucharest, Romania) essence of autonomic networking, and thus auto- This book constitutes the refereed proceedings of the nomic communications, is to enable the self-gov- 9th International Conference on Formal Engineering erning of services and resources within the con- Methods, ICFEM 2007, held in Boca Raton, Flori- straints of business rules. In order to support self- This book gathers the latest experience of experts, re- da, USA, November 14-15, 2007. The 19 revised full governance, appropriate self-* functionality will be search teams and leading organizations involved in papers together with 2 invited talks presented were deployed in the network on an application-specif- computer-aided design of user interfaces of interac- carefully reviewed and selected from 38 submissions. ic basis. The continuing increase in complexity of tive applications. This area investigates how it is de- The papers address all current issues in formal meth- upcoming networking convergence scenarios man- sirable and possible to support, to facilitate and to ods and their applications in software engineering. dates a new approach to network management. This speed up the development life cycle of any interac- They are organized in topical sections on security special issue explores different ways that autonomic tive system: requirements engineering, early-stage and knowledge, embedded systems, testing, automat- principles can be applied to existing and future net- design, detailed design, development, deployment, ed analysis, hardware and concurrency. works. In particular, the book has 3 main parts, each evaluation and maintenance. In particular, it stresses of them represented by three papers discussing them how the design activity could be better understood Fields of interest from industrial and academic perspectives. The first for different types of advanced interactive systems Programming Techniques; Software Engineering; part focuses on architectures and modeling strate- such as context-aware systems, multimodal appli- Models and Principles; Logics and Meanings of Pro- gies. Part two is dedicated to middleware and service cations, multi-platform systems, pervasive comput- grams; Programming Languages, Compilers, Inter- infrastructure as facilitators of autonomic [..] ing, ubiquitous computing and multi-device envi- preters ronments. Features Target groups Leading Scientists and Researchers show ways to ap- Features Researchers and professionals ply autonomic principles Enables for significant im- Gathers the latest research of experts, research teams provements in network management and leading organisations involved in computer-aid- Type of publication ed design of user interactive applications supported Proceedings Contents by software, with specific attention for platform-in- I Architectures and Models.- Technological Neutral dependent user interfaces and context-sensitive or Due October 2007 Principles and Concepts for Autonomic Network- aware applications ing.- A Telco Approach to Autonomic Infrastruc- ture Management.-Modelling distribution and be- Fields of interest 2007. VIII, 387 p. (Lecture Notes in Computer Science, Vol. 4789) haviour for network management of next generation Software Engineering; Information Systems Appli- Softcover networks.- II Middleware and Services.- Autonomic cations (incl.Internet); Multimedia Information Sys- 52,00 € Communication with RASCAL Hybrid Connectivity tems; User Interfaces and Human Computer Interac- ISBN 978-3-540-76648-3 Management.- Autonomic Resource Regulation in tion IP Military Networks: A Situatedness Based Knowl- edge Plane.- Autonomic Service Access Management Target groups for Converged Next Generation Networks.- III Net- Students, task analysts, designers, developers, soft- works.- Cross-Layer Optimisations for Autonomic ware engineers, teachers in interactive computing, Networks.- An [..] especially in language, models and tools aspects

Fields of interest Type of publication Computer Systems Organization and Communi- Proceedings cation Networks; Computer Communication Net- works; Software Engineering Due October 2007

Target groups 2008. XII, 298 p. Hardcover Researchers and practitioners in autonomic comput- ing, networking, and communication, Telecom oper- 109,95 € ators, manufacturers, and service providers, system ISBN 978-1-4020-5819-6 developers

Type of publication Contributed volume

Due December 2007

2008. Approx. 200 p. (Whitestein Series in Software Agent Tech- nologies and Autonomic Computing) Softcover

39,90 € ISBN 978-3-7643-8568-2 springer.com/booksellers Computer Science 27

D. Calvetti, Case Western Reserve University, Cleveland, OH, USA; F. Camastra, University of Naples, Parthenope, Italy; A. Vinciarelli, R.H. Campbell, University of Illinois, Urbana-Champaign, IL, USA; E. Somersalo, Helsinki University of Technology, Helsinki, Finland IDIAP Research Institute, Martigny, Switzerland P.G. Naldurg, University of Illinois, Urbana-Champaign, IL, USA

An Introduction to Bayesian Machine Learning for Audio, Image Security and Survivability

Scientific Computing and Video Analysis Analyzing, Modeling, and Verifying Dynamic Recovery in Inse- cure Systems Ten Lectures on Subjective Computing Theory and Applications

Security and Survivability presents new research on This book has been written for undergraduate and This book illustrates how to deal with complex me- the emerging discipline of design and analysis of se- graduate students in various areas of mathematics dia and convert raw data into useful information. curity systems that are survivable. Such systems are and its applications. It is for students who are willing Once the original data have been converted into a designed to continue to provide verifiable security to get acquainted with Bayesian approach to compu- digital representation, the processing of different me- guarantees, and allow the system to degrade grace- tational science but not necessarily to go through the dia can be performed under the unifying framework fully, even under threat or actual incidence of attack. full immersion into the statistical analysis. It has also of machine learning. Therefore only part of the in- The book introduces a theory of recovery-oriented been written for researchers working in areas where formation extraction processes is media specific and security and provides well-developed case studies mathematical and statistical modeling are of central most work can be made by applying general tech- that corroborate the utility of the theory, addressing importance, such as biology and engineering. niques valid for a wide range of problems. Apparent- privilege-escalation and Denial of Service (DoS) at- ly very different domains like face verification and tacks. Using their automated verification method- Features text categorization become, from a processing point ology, the authors formally prove for the first time Expository accessible book, internationally known of view, equivalent. Organized into 3 parts: The 1st whether strategies such as selective filtering, strong authors focuses on technical aspects, basic mathematical no- authentication, and client puzzles actually reduce the tions and elementary machine learning techniques. vulnerability of a network to DoS attacks. Contents The 2nd provides an extensive survey of most rel- Introduction .- Inverse Problems and Subjective evant machine learning techniques for media pro- Features Computing.- Basic Problem of Statistical Infer- cessing. The 3rd focuses on applications and shows ence.-The Praise Of Ignorance: Randomness as Lack Lays out a novel approach to surviving security at- how techniques are applied in actual problems. This tacks Shows how secure systems can be modeled and of Information.- Basic Problem in Numerical Linear unique book offers an introduction and advanced Algebra.- Sampling: First Encounter.- Statistically In- engineered to work well – and fail well Case studies material in the combined fields of machine learning corroborate utility of theory Author (and professor) spired Preconditioners.- Conditional Gaussian Den- and [..] sities and Predictive Envelopes.- More Applications Roy Campbell is the Director of the National Securi- ty Agency designated University of Illinois Center of of the Gaussian Conditioning.- Sampling: The Real Features Academic Excellence in Information Assurance Edu- Thing.- Wrapping up: Hypermodel, Dynamic Prior- Provides detailed introductions to algorithms and cation and the Director of the Systems Software [..] conditioners and Bayesian Learning. examples of their applications Domains that appear far from one another such as speech and handwrit- Fields of interest Contents ing recognition are shown to be equivalent from the A Formal Description of Survivability.- Information Computational Science and Engineering; Statistics processing point of view, via the unifying framework and Computing/Statistics Programs; Computational Access, Information Protection.- Modeling Insecu- of machine learning Supplies detailed appendices re- rity.- Modeling Recovery.- The Denial of Service Ex- Mathematics and Numerical Analysis; Probability viewing the basic background Provides pointers to Theory and Stochastic Processes ample.- Modeling Access Control.- Modeling De- publicly available data and software packages used in pendability. [..] Target groups Graduate students, researchers Fields of interest Contents Data Structures, Cryptology and Information Theo- Introduction.- Part 1: From Perception to Compu- Type of publication ry; Data Encryption; Coding and Information Theo- tation.- Audio Acquisition, Representation and Stor- Graduate/advanced undergraduate textbook ry; System Performance and Evaluation; Computer age.- Image and Video Acquisition, Representation Communication Networks and Storage.- Part 2: Machine Learning.- Machine Due December 2007 Learning.- Bayesian Theory of Decision.- Clustering Target groups Methods.- Foundations of Statistical Learning and Researchers and practitioners in computer security 2007. Approx. 200 p. (Surveys and Tutorials in the Applied Math- Model Selection.- Supervised Neural Networks and ematical Sciences, Vol. 2) Softcover Ensemble Methods.- Kernel Methods.- Markovian Type of publication Models for Sequential Data.- Feature Extraction and Monograph 32,95 € Manifold Learning Methods.- Part 3: Applications.- ISBN 978-0-387-73393-7 Speech and Handwriting Recognition.- Automatic Due December 2007 Face Recognition.- Video Segmentation and [..]

Fields of interest 2007. Approx. 240 p. 25 illus. Hardcover Pattern Recognition; Image Processing and Comput- 64,95 € er Vision; Multimedia Information Systems ISBN 978-0-387-27627-4 Target groups Graduates, researchers

Type of publication Graduate/advanced undergraduate textbook

Due December 2007

2008. Approx. 510 p. Also available online. (Advanced Informa- tion and Knowledge Processing) Hardcover

84,95 € ISBN 978-1-84800-006-3 28 Computer Science springer.com/booksellers

X.-R. Cao, Hong Kong University of Sciences and Technology, J. Cardoso, Universidade da Madeira, Funchal, Portugal; M. Hepp, ISBN 978-0-387-48530-0 Hong Kong, China University of Innsbruck, Austria; M. Lytras, University of Patras, Greece (Eds.) Stochastic Learning and Optimization The Semantic Web Real-World Applications from Industry A Sensitivity-Based Approach

Semantic Web: Real-World Applications from In- Performance optimization is vital in the design and dustry offers a glimpse into the opening door of se- operation of modern engineering systems, includ- mantic technologies by means of concentrated ex- ing communications, manufacturing, robotics, and amples of semantic applications in real business logistics. Most engineering systems are too compli- environments.  For quite a while, there has cated to model, or the system parameters cannot be been evidence from academic research and early in- easily identified, so learning techniques have to be dustrial prototypes that semantic technology can applied. This is a multi-disciplinary area which has help humans and machines substantially in access- been attracting wide attention across many disci- ing and using the unprecedented, and exponential- plines. Areas such as perturbation analysis (PA) in ly growing, amount of information that the World discrete event dynamic systems (DEDSs), Markov Wide Web provides. Now semantic technology is decision processes (MDPs) in operations research, moving from academic and industrial research in- reinforcement learning (RL) or neuro-dynamic pro- to real products and applications.  This book gramming (NDP) in computer science, identification provides a series of case studies which demonstrate and adaptive control (I&AC) in control systems, how real benefits can be derived from the adop- share the common goal: to make the "best decision" tion of semantic technology in popular business do- to optimize system performance. This book provides mains, such as telecommunication, B2B integration, a unified framework based on a sensitivity point of healthcare, education, and others. Semantic Web: view. It also introduces new approaches and propos- Real-World Applications from Industry summarizes es new research topics within this sensitivity-based state-of-the art expertise and practical experiences framework. from outstanding technology [..] Features Features Combines currently prominent research on rein- Designed to create platforms for bringing experts forcement learning / neuro-dynamic programming together (key government representatives, industry with a unique research approach based on sensi- and academia) from different countries, to compile tivity analysis and discrete-event systems concepts the most recent use of semantics and ontologies In- Presents a new perspective on a popular topic by a cludes the real benefits to be derived from the adop- well respected expert in the field tion of semantic web ontologies in real world situa- Contents tions Perturbation Analysis of Queueing Systems.- Per- Contents turbation Analysis of Markov Chains.- Performance Contributing Authors-Foreword by Michael L. Sensitivities of Markov Processes.- Learning and Op- Brodie, Chief Scientist, Verizon Communications, timization with Perturbation Analysis.- Markov De- Cambridge, USA.- Preface.- Semantic Enterprises.- cision Processes.- Ergodic Systems.- Sample-Path- The Future of the Semantic Web for Enterprises.- Based Policy Iteration.- Reinforcement Learning.- The Enterprise Semantic Web.- Finance and Gov- Stochastic Approximation.- Temporal Difference ernment.- Semantic Web Technologies for the Fi- Methods.- Identification and Adaptive Control.- nancial Domain.- Intelligent Search Engine for On- Constructing Sensitivity Formulas.- Event-Based line Access to Municipal Services.- Healthcare and Optimization of Markov Systems.- Estimating Ag- Life Sciences.- Ontology-Based Data Integration for gregated Potentials. Biomedical Research.- Active Semantic Electronic Fields of interest Medical Records.- Education.- Targeting Learning Discrete Mathematics in Computer Science; Artifi- Resources in competency-Based Organizations.- De- cial Intelligence (incl. Robotics); Calculus of Varia- veloping [..] tions and Optimal Control; Optimization; Probabil- Fields of interest ity Theory and Stochastic Processes; Operation Re- Information Systems Applications (incl.Internet); search/Decision Theory Information Systems and Communication Service; Target groups Multimedia Information Systems; Artificial Intel- Graduate students, system engineers, operations en- ligence (incl. Robotics); Database Management; e- gineers and researchers, complex system theorists, business and e-commerce artificial intelligence and reinforcement learning re- Target groups searchers, and the entire optimization community Industry professionals, researchers, and students in- Type of publication terested in the current state and future of semantic Monograph technology Type of publication Due November 2007 Contributed volume

2007. Approx. 500 p. Hardcover Due November 2007

109,95 € ISBN 978-0-387-36787-3 2008. Approx. 328 p. (Semantic Web and Beyond, Vol. 6) Hard- cover

69,95 € springer.com/booksellers Computer Science 29

C.G. Cassandras, Boston University, Boston, MA, USA; S. Lafor- O. Castillo, Tijuana Institute of Technology, Tijuana, Mexico; P. O. Castillo, Tijuana Institute of Technology, Tijuana, Mexico; L. Xu, tune, University of Michigan, Ann Arbor, MI, USA Melin, Tijuana Institute of Technology, Tijuana, Mexico Zhejiang University, Hangzhou, China; S.-I. Ao, IAENG Secretariat, Hong Kong, China (Eds.) Introduction to Discrete Event Type-2 Fuzzy Logic: Theory and Systems Applications Trends in Intelligent Systems and Computer Engineering

Introduction to Discrete Event Systems is a compre- This book describes new methods for building in- hensive introduction to the field of discrete event telligent systems using type-2 fuzzy logic and soft This volume contains contributions from partici- systems, offering a breadth of coverage that makes computing techniques. Soft Computing (SC) consists pants in the 2007 International Multiconference of the material accessible to readers of varied back- of several computing paradigms, including type-1 Engineers and Computer Scientists. Topics covered grounds. The book emphasizes a unified modeling fuzzy logic, neural networks, and genetic algorithms, include Automated planning, Expert system, Ma- framework that transcends specific application ar- which can be used to create powerful hybrid intelli- chine learning, Fuzzy Systems, Knowledge-based eas, linking the following topics in a coherent man- gent systems. The authors extends the use of fuzzy systems, Computer systems organization, Comput- ner: language and automata theory, supervisory con- logic to a higher order, which is called type-2 fuzzy ing methodologies, and industrial applications. The trol, Petri net theory, Markov chains and queuing logic. Combining type-2 fuzzy logic with traditional book offers the up to date information on advances theory, discrete-event simulation, and concurrent es- SC techniques, we can build powerful hybrid intel- in intelligent systems and computer engineering timation techniques. This edition includes new ma- ligent systems that can use the advantages that each and also serve as an excellent reference work for re- terial pertaining to the diagnosis of discrete event technique offers. We consider in this book the use of searchers and graduate students working on intelli- systems, decentralized supervisory control, and in- type-2 fuzzy logic and traditional SC techniques to gent systems and computer engineering. terval-based timed automata and hybrid automata solve pattern recognition problems in realworld ap- models. This textbook is valuable to advanced-level plications. This book is intended to be a major refer- Features students and researchers in a variety of disciplines ence for scientists and engineers interested in apply- Covers a variety of subjects in the frontiers of intel- where the study of discrete event systems is relevant: ing type-2 fuzzy logic for solving problems in pattern ligent systems and computer engineering and their control, communications, computer engineering, recognition, intelligent control, intelligent manufac- industrial applications An excellent reference work computer science, manufacturing engineering, oper- turing, robotics and automation. This book can also for researchers and graduate students working in the ations research, and industrial engineering. be used as a textbook or [..] field

Features Features Contents Includes numerous detailed examples and student Presents theory and applications of Type-2 Fuzzy A Metamodel-Assisted Steady-State Evolution Strat- exercises Second edition incorporates essential ele- Logic egy for Simulation-Based Optimization.- Automat- ments of Hybrid System modeling, thus contributing ically Defined Groups for Knowledge Acquisition to bridging the existing gap between time-driven and Contents from Computer Logs and Its Extension for Adap- event-driven systems Introduction to Type-2 Fuzzy Logic.- Type-1 Fuzzy tive Agent Size.- Robust Hybrid Sliding Mode Con- Logic.- Type-2 Fuzzy Logic.- A Method for Type-2 trol for Uncertain Nonlinear Systems Using Output Contents Fuzzy Inference in Control Applications.- Design of Recurrent CMAC.- A Dynamic GA-based Rhythm Preface.- 1 Systems and Models.- 2 Languages and Intelligent Systems with Interval Type-2 Fuzzy Log- Generator.- Evolutionary Particle Swarm Optimiza- Automata.- 3 Supervisory Control.- 4 Petri Nets.- ic.- Method for Response Integration in Modular tion.- Human Robot Interaction as a Cooperative 5 Timed Models.- 6 Stochastic Times Automata.- 7 Neural Networks with Type-2 Fuzzy Logic.- Type-2 Game.- Swarm and Entropic Modeling for Landmine Markov Chains.- 8 Introduction to Queueing Theo- Fuzzy Logic for Improving Training data and Re- Detection Robots.- Iris Recognition Based on 2D ry.- 9 Controlled Markov Chains.- 10 Introduction sponse Integration in Modular Neural Networks for Wavelet and AdaBoost Neural Network.- A Novel to Discrete-Event Simulation.- 11 Sensitivity Analy- Image Recognition.- Fuzzy Inference Systems Type-1 Multi-Classifier for [..] sis and Concurrent Estimation.- Review of Probabil- and Type-2 for Digital Images Edge Detection.- Sys- ity Theory.- IPA Estimator.- Index.- About the Au- tematic Design of a Stable Type-2 Fuzzy Logic Con- Fields of interest thors. troller.- Experimental Study of Intelligent [..] Communications Engineering, Networks; Computer Communication Networks; Signal,Image and Speech Fields of interest Fields of interest Processing; Artificial Intelligence (incl. Robotics); Control Engineering; Discrete Mathematics in Com- Appl.Mathematics/Computational Methods of Engi- Electronic and Computer Engineering; Comput- puter Science; Systems Theory, Control; Mechani- neering; Artificial Intelligence (incl. Robotics) er Systems Organization and Communication Net- cal Engineering; Operations Research, Mathematical works Programming; Industrial and Production Engineer- Target groups ing Engineers, researchers, and graduate students in Target groups computational intelligence and computer science Researchers and graduate students in intelligent sys- Target groups tems and computer engineering Advanced-level students, and researchers where the Type of publication study of discrete event systems is relevant: control, Monograph Type of publication communications, computer engineering, computer Contributed volume science, manufacturing engineering, operations re- Due January 2008 search, and industrial engineering Due February 2008

Type of publication 2008. Approx. 300 p. (Studies in Computational Intelligence, Vol. 91) Hardcover 2008. Approx. 750 p. (Lecture Notes Electrical Engineering, Vol. Graduate/advanced undergraduate textbook 6) Hardcover 99,95 € Due December 2007 ISBN 978-3-540-76283-6 134,95 € ISBN 978-0-387-74934-1

2007. Approx. 800 p. Hardcover

74,95 € ISBN 978-0-387-33332-8 30 Computer Science springer.com/booksellers

S. Chakravarthy, University of Texas at Arlington, TX, USA; Q.C. W.Y. Chang, AcuMaestro, Inc. USA 109,95 € Jiang, ANTS Software Inc., Burlingame, CA, USA ISBN 978-1-4020-6455-5 Network-Centric Service Oriented Stream Data Processing Enterprise Issues and Solutions

The emergence of Enterprise services has triggered a Traditional database management systems (DBMSs) major paradigm shift in distributed computing: from are widely used in applications that require per- Object-Oriented Architecture (OOA) to Service-Ori- sistent storage and processing of ad hoc queries to ented Architecture (SOA). As the need grows to in- manage and process a large volume of data. A large corporate and exchange information across wire-line class of newer applications – in finance, computer and wireless networks, so grows the necessity to es- network management, telecommunications, home- tablish an infrastructure for high-distribution com- land security, sensor/pervasive computing, and envi- munities in a timely and safe manner. Network-Cen- ronmental monitoring – produce data continuously tric Service-Oriented Enterprise (NSCOE) is seen as and the data is typically presented in a data stream. heralding the next generation of mainstream Enter- The systems used to process data streams and pro- prise-business information collaboration solution vide for the needs of stream-based applications are that can enforce information and decision superior- Data Stream Management Systems (DSMSs). Stream ity in the decentralized, loosely-coupled, and highly Data Processing: Issues and Solutions presents a new interoperable service environments. Network-Cen- paradigm to meet the needs of these applications, in- tric Service Oriented Enterprise establishes a sys- cluding a detailed discussion of the techniques pro- tem-of-systems (SoS) view of information technolo- posed. This volume is intended as a reference book gies, offering a synergistic combination of data and for researchers and advanced-level students in com- information-processing capacity upon an innovative puter science. It is also appropriate for practitioners networked-management framework. in industry who are interested in developing applica- tions. Features The first comprehensive book about the emerging Features technology of Network-Centric Service-Oriented Includes important aspects of a QoS-driven DSMS Enterprise (NCSOE) Discusses the practical capa- (Data Stream Management System) Introduces ap- bility of a competitive ecosystem in terms of how to plications where a DSMS can be used and discuss- achieve decision superiority from exploiting infor- es needs beyond the stream processing model Dis- mation and situation awareness as a key enabler in cusses in detail the design and implementation of multiple sectors of the economy GIG (designed by MavStream Department of Defense) is directed toward providing critical [..] Contents Preface.- Introduction.- Stream Data Processing Contents Operators.- Stream Data Processing Architecture.- Dedication. Preface. Acknowledgments. 1: Informa- Overview of Stream Processing Systems.- Continu- tion Superiority. 2: Enabler of Information Superi- ous Query Modeling.- Capacity Modeling.- Schedul- ority. 3: Wireless Network Technologies. 4: Wire- ing Strategies.- Load Shedding and Admission Con- less Sensor Networks and Applications. 5: Building a trol.- DBMS Implementation Issues.- Applications of Wireless Transport Service. 6: Network and Service DBMS.- Beyond DBMS.- Index. Monitoring. 7: Service Quality Management. 8: Inte- grated Information Assurance. 9: Service Knowledge Fields of interest Management. 10: Network-Centric Service-Oriented Database Management; Information Storage Enterprises. Notes. References. Index. and Retrieval; Information Systems Applications (incl.Internet); Computer Communication Net- Fields of interest works; Multimedia Information Systems Management of Computing and Information Sys- tems; Computer Systems Organization and Com- Target groups munication Networks; Information Systems and Researchers and advanced-level students in comput- Communication Service; Computer Communica- er science tion Networks; Information Systems Applications (incl.Internet) Type of publication Monograph Target groups Systems integrators who want to create their own Due March 2008 competitive edge by leveraging existing technological innovations; planning architects, system design engi- neers, software engineers and architects in service or 2008. Approx. 250 p. (Advances in Database Systems, Vol. 35) Hardcover technology companies; technical engineers who are responsible for planning or managing networked en- 88,55 € terprise IT applications systems; university students ISBN 978-0-387-71002-0 who would like to identify the trend of next genera- tion information management technology

Type of publication Monograph

Due October 2007

2008. Approx. 560 p. Hardcover springer.com/booksellers Computer Science 31

H. Che, University of Texas at Arlington, TX, USA C.-h. Chen, Academia Sinica, Taipei, Taiwan, China; W. Härdle, F. Chen, Chalmers University of Technology, Göteborg, Sweden; Humboldt-University of Berlin, Germany; A. Unwin, University of K. Jokinen, University of Helsinki, Finland (Eds.) Augsburg, Germany (Eds.) Internet Architecture Speech Technology Evolution and Convergence Handbook of Data Visualization Theory and Applications

Data, voice, and video services have followed a clear Visualizing the data is an essential part of any da- evolutionary path towards an IP-centric solution. To ta analysis. Modern computing developments have New Trends in Speech Based Interactive Systems support such a solution, the Internet has been expe- led to big improvements in graphic capabilities and will give an overview of the research and application riencing two evolutionary transformations. First, the there are many new possibilities for data displays. of speech technologies in different areas. The basic underlying transport media of the Internet is con- This new volume in the series Springer Handbooks technology development areas include: Automat- verging towards a monolithic solution based on Eth- of Computational Statistics gives an overview of ic speech recognition technology, speech synthesis, ernet Technologies. Second, in addition to the tra- modern data visualization methods, both in theory spoken interaction, natural language understanding, ditional control plane and data plane, a third plane, and practice. There are definitive chapters on mod- speaker recognition, emotion in spoken dialogue sys- known as service plane, has emerged to support ern graphical tools such as mosaic plots, parallel co- tems, expressive speech synthesis, affective comput- more sophisticated services over the global Internet. ordinate plots and linked views. There are chapters ing, multimodal communication, interaction tech- Internet Architecture: Evolution and Convergence dedicated to graphical methodology for particular nologies, and animated agents. The application ar- will carefully examine the reasoning underlying ma- areas of statistics, for example Bayesian analysis, ge- eas include: in-vehicle information system and inter- jor changes with Internet Architecture, which lead nomic data and cluster analysis, as well as chapters action, military application, other industrial applica- to a converged IP centric solution. An ATM-based on software for graphics. Specialists from all over the tions such as for space, air traffic control, or compli- overlay model to an MPLS-based peering model will world have contributed papers on their areas of ex- cated control room interaction, simulator control, be covered and more. This book will also assist users pertise. etc., and application for special users and in enter- with the existing internet technologies and future tainment systems. General design and usability eval- trends provided by case studies. Internet Architec- Features uation methodologies from the user’s perspective ture: Evolution and Convergence is designed for pro- Complete overview of data visualization Compre- will also be included in the book. The overview of fessionals in industry, including [..] hensive coverage of the field, both in theory and each technology includes: 1. The history and the de- practice velopment of the technology. 2. What are the [..] Features -Provides an integrated view of ever evolving (not Contents Features static) Internet architecture and its convergence to- Data Visualization.- Principles.- Methodologies.- Se- Reviews new automatic speech recognition technol- wards an IP centric architecture -Includes protocol lected Applications. ogy and spoken dialogue systems Includes applica- functions implemented with internet routers   tions on in-vehicle information systems, military ap- Fields of interest plications, and other industrial speech applications Contents Statistics and Computing/Statistics Programs; Com- Focuses on human factors in automatic speech-based Review of Networking Fundamentals.-ATM Inter- putational Biology/Bioinformatics; Statistical Theo- systems networking.-MPLS Internetworking.-Migration to ry and Methods; Computer Imaging, Vision, Pattern Packet-based IP Internet.-IP Convergence.-Service Recognition and Graphics Contents Plane Architectures.-Node Level Design Issues.-Fun- Introduction.- Basic Research Trends.- ASR Devel- damental Design Issues:.-References.-Glossary.-In- Target groups opment/History.- Speech Recognition and Cogni- dex. Researchers, practitioners tion.- Speech Synthesis History. Expressive Speech Synthesis.- Spoken Interaction.- Emotions in Spo- Fields of interest Type of publication ken Dialogue Systems.- Affective Computing.- In- Communications Engineering, Networks; Com- Handbook teraction Technologies.- Multimodal Communica- puter Systems Organization and Communication tion.- Animated Agents.- Eye-Tracking.- New Appli- Networks; Computer Communication Networks; Due December 2007 cations and Application Areas.- In-Vehicle Informa- Information Systems Applications (incl.Internet); tion Communication Application.- Military Applica- Signal,Image and Speech Processing; Information tion.- Application for Special Users.- Other Industri- 2008. Approx. 1000 p., 569 figs., 50 tables (Springer Handbooks Systems and Communication Service of Computational Statistics) Hardcover al Applications.- Ubiquitous Computing and Appli- cations in Home Environments.- Application in En- Target groups 249,00 € tertainment [..] -Professionals, engineers in networking technologies ISBN 978-3-540-33036-3 Fields of interest Type of publication Signal,Image and Speech Processing; User Interfaces Monograph and Human Computer Interaction; Cognitive Psy- chology; Psycholinguistics Due October 2008 Target groups Engineers and designers in industry, computer in- 2008. Approx. 300 p. Hardcover terface designers, telecommunication engineers, 96,25 € ergonomists, work psychologists, university re- ISBN 978-0-387-75627-1 searchers and teachers, students on these topics Type of publication Contributed volume

Due April 2008

2008. Approx. 400 p. Hardcover

83,95 € ISBN 978-0-387-73818-5 32 Computer Science springer.com/booksellers

H. Chen, The University of Arizona, Tucson, AZ, USA; C. Yang, The H. Chen, University of Arizona, AZ, USA; L. Brandt, Potomac, Chinese University of Hong Kong (Eds.) MD, USA; V. Gregg, Alexandria, VA, USA; R. Traunmüller, Institut 2008. Approx.784 p. (Integrated Series in Information Systems, für Informatics in Wirtschaft und Verwaltung, Linz, Austria; S. Vol. 17) Hardcover Dawes, University of Albany - SUNY, NY, USA; E. Hovy, University Intelligence and Security of Southern California, CA, USA; A. Macintosh, Napier University, 134,95 € Informatics Edinburgh, UK; C.A. Larson, University of Arizona, AZ, USA (Eds.) ISBN 978-0-387-71610-7 Digital Government

E-Government Research, Case Studies, and Implementation Fields of interest Appl.Mathematics/Computational Methods of Engi- neering; Data Encryption; Artificial Intelligence (in- cl. Robotics); e-business and e-commerce; Informa- Digital Government: E-Govern- tion Systems ment Research, Case Studies, and Implementation provides the field with a Target groups definitive, interdisciplinary, and understandable Researchers, Engineers, Graduate Students in Com- work that surveys the field of digital government in putational Intelligence, Computer Science terms of key research, case studies of successful ap- plications in a variety of government settings, along Type of publication with discussions of current and future policy impli- Monograph cations. Each chapter will be prepared and carefully edited within a structured format by a known expert Due March 2008 on the chapter topic. The editors - who are also writ- ing chapters themselves - and the authors are well- known researchers and practitioners in digital gov- 2008. Approx. 200 p. Also available online. (Studies in Computa- ernment. They have all been on the forefront of the tional Intelligence, Preliminary entry 99) Hardcover IT and digital government research initiatives. To- 89,95 € gether the editors and expert chapter authors have ISBN 978-3-540-69207-2 developed a definitive textbook that can be used by researchers, practitioners and students across the discipline domains, of Information Systems, Infor- mation Science, Computer Science, Social Sciences, Public Policy and Business.

Features Information technology - as it has with so many as- pects of our business and everyday lives - is dramat- ically changing the way government manages data, shares data, plans, provides decision support and de- livers services. At the core of all these changes is digi- tal government or e-government. This is the first sys- tematic survey treatment of the area written by those individuals who are at the leading edge of the [..]

Contents Introduction to foundations of digital government.- The state of the art for digital government research.- The US e-government evolution.- E-government in Europe.- Introduction to information technology re- search.- History of digital government funding and research in the US.- Information usability for elec- tronic government.- User access to government sta- tistical information.- Data and knowledge integra- tion for e-government.- Data mining and informa- tion sharing for homeland security and disaster man- agement.- Law enforcement information sharing and analysis.- Geospatial information [..]

Fields of interest Information Systems; e-business and e-commerce; Political Science; Information Systems and Commu- nication Service; Information Systems Applications (incl.Internet); Operation Research/Decision Theory

Target groups Researchers and graduate level students in Informa- tion Systems, Computer Sciences, Social Sciences and Public Policy, practitioners in IT, Public Service, and consultants engaged in planning or implement- ing government initiatives

Type of publication Graduate/advanced undergraduate textbook

Due December 2007 springer.com/booksellers Computer Science 33

H. Chen, University of Arizona, Tucson, AZ, USA; E. Reid, Univer- H. Chen, University of Arizona, Tucson, AZ, USA; M.C. Roco, Na- sity of Arizona, Tucson, AZ, USA; J. Sinai, Logos Technologies, Ar- 2007. Approx. 640 p. (Integrated Series in Information Systems, tional Science Foundation, Arlington, VA, USA lington, VA, USA; A. Silke, University of Arizona, Tucson, AZ, USA; Preliminary entry) Hardcover B. Ganoz, Lauder School of Government and Diplomacy, Herzliya, Israel 115,50 € Mapping Nanotechnology ISBN 978-0-387-71612-1 Innovations and Knowledge Terrorism Informatics

Knowledge Management and Data Mining for Homeland Se- curity Mapping Nanotechnology Innovations and Knowl- edge will define the application of Information Technology’s systematic and automated knowledge mapping methodology to collect, analyze and report Terrorism informatics has been defined as the ap- nanotechnology research on a global basis. The re- plication of advanced methodologies, information sult of these analyses will be a systematic presenta- fusion and analysis techniques to acquire, integrate tion of the state of the art of nanotechnology, which process, analyze, and manage the diversity of ter- will include basic analysis, content analysis, and ci- rorism-related information for international and tation network analysis of comprehensive nanotech- homeland security-related applications. The vari- nology findings across technology domains, inven- ety of methods used in terrorism informatics are de- tors, institutions, and countries. Many sources will rived from Computer Science, Informatics, Statistics, be explored in detail to ensure the examination will Mathematics, Linguistics, Social Sciences, and Pub- be global in nature, comprehensive in scope, reli- lic Policy and they involve the collection of a mass able in content, and completely current. Among the of information from multiple sources and in numer- sources investigated and catalogued will be the nan- ous languages. Terror Informatics: Knowledge Man- otechnology patent and literature databases from the agement and Data Mining for Homeland Security US patent Office (USPTO), the European Patent Of- will provide an interdisciplinary and understand- fice (EPO), and the Japanese Patent Office (JPO). able textbook that surveys the state-of-the-art of ter- rorism informatics domain along three basic dimen- Features sions: methodological issues in terrorism research; Reflects recent growth in nanoscale science and en- information infusion techniques to support terror- gineering Analyzes an industry expected to reach $1 ism prevention, detection, and response; and legal, trillion by 2015 Includes analysis of Patent Office social, privacy, and data confidentiality challenges databases in the US, Europe and Japan and approaches. Contents Features Nanotechnology: the field.- Knowledge Mapping: Emphasizes the cutting-edge concepts, technologies, methodology.- Mapping nanotechnology innova- and practices that are being developed in terrorism tions and knowledge: research framework.- Mapping informatics to meet today’s worldwide challenges nanotechnology innovations via USPTO database Each of the 28 chapters in the book has been devel- (1978-2004): a longitudinal study.- Mapping nan- oped by leading expert on the chapter topic. Each otechnology innovations via USPTO database: re- chapter comprehensively reviews of the past and re- cent development.- Nanotechnology patent citation cent research work in the chapter area and many network topological analysis.- Federal funding and chapters include detailed case studies nanotechnology innovations: NSF funding analysis.- Mapping nanotechnology innovations via USPTO, Contents EPO, and JPO databases.- Patent literature citation Introduction to Terrorism Informatics, Information analysis.- Mapping nanotechnology knowledge via Fusion, Data Mining and Knowledge Management.- ISI citation [..] Trends, Achievements and Failures in Terrorism Re- search.- Methodological Challenges in Terrorism Fields of interest Research.- Case Study of First-Hand Research on Information Systems; Data Structures, Cryptology Terrorism.- MIPT Sharing Terrorism Information.- and Information Theory; Nanotechnology; Electron- Connections in the World of International Terror- ic and Computer Engineering; Database Manage- ism.- The Effect of Databases and Website Incon- ment; Technology Management stancy on the Terrorism Domain.- Root Causes of Terrorism and the Implications for Terrorism Infor- Target groups matics.- Mapping the Contemporary Terrorism Re- Researchers and students in the fields of information search Domain.- A Study of "Root Causes of Con- systems and management, computer science; practi- flict" Using [..] tioners in nanotechnology industries, policy makers and analysts in government Fields of interest Information Systems; Data Structures, Cryptolo- Type of publication gy and Information Theory; Information Systems Monograph and Communication Service; e-business and e-com- merce; Political Science Due March 2008 Target groups Counter-terrorism experts and professionals, aca- 2007. Approx. 300 p. (Integrated Series in Information Systems, demic researchers in information systems, computer Preliminary entry) Hardcover science, political science, and public policy, graduate 76,25 € students in these areas ISBN 978-0-387-71619-0 Type of publication Handbook

Due November 2007 34 Computer Science springer.com/booksellers

M.X. Cheng, University of Missouri, Rolla, MO, USA; D. Li, Renmin University of China, Beijing, China (Eds.)

Advances in Wireless Ad Hoc and Sensor Networks

Wireless ad hoc networks, mobile or static, have spe- cial resource requirements and different topology features, which make them different from classic computer networks in resource management, rout- ing, media access control, and QoS provisioning. The book presents papers written by distinguished re- searchers in the field and focuses on the theoretical and experimental study of the following advanced research topics: security and trust, broadcasting and multicasting; power control and energy efficiency, and QoS provisioning. This book is a great reference tool for graduate students, researchers, and mathe- maticians interested in studying mobile ad hoc and sensor networks.

Features Presents the most recent research on the rapidly growing field of research on mobile ad hoc and sen- sor networks Presents authored papers, written by distinguished researchers in the field Focuses on subtopics that have emerged from mobile ad hoc and sensor network research, ie., QoS routing, broadcast and multicast Elaborates on several multicasting ap- proaches in mobile wireless ad hoc networks Dis- cusses [..]

Contents Preface.- Backbone Quality-of-Service Routing Pro- tocol for Heterogeneous Mobile Ad Hoc Networks (X. Du).- Optimal Path Selection in Ad Hoc Net- works Based on Multiple Metrics (H. Badis, K. Al Agha).- Analyzing Voice Transmission between Ad Hoc Networks and Fixed IP Networks Providing End-to-End Quality of Service (M.C. Domingo, D. Remondo).- Separable Threshold Decryption for Ad-Hoc Wireless Networks (W. Susilo, F. Zhang, Y. Mu).- A Secure Group Communication Protocol for Ad Hoc Wireless Networks (Y.-M. Tseng, C.-C. Yang, D.-R. Liao).- Reliable Routing in Ad-hoc Net- works Using Direct [..]

Fields of interest Computer Communication Networks; Communica- tions Engineering, Networks

Target groups Researchers in the fields of networking and telecom- munications, graduate students and professors in- terested in a wireless networks curriculum, and practitioners working on sensor net- works

Type of publication Contributed volume

Due April 2008

2008. Approx. 325 p. (Signals and Communication Technology) Hardcover

77,00 € ISBN 978-0-387-68565-6 springer.com/booksellers Computer Science 35

J.W. Chinneck, Carleton University, Ottawa, ON, Canada K.J. Cios, University of Colorado at Denver, CO, USA; W. Pedrycz, A. Clemm, Cisco Systems, USA; L. Zambenedetti Granville, Uni- University of Alberta, Edmonton, AB, Canada; R.W. Swiniarski, versidade Federal do Rio Grande do Sul, Porto Alegre, Brazil; R. San Diego State University, San Diego, CA, USA; L.A. Kurgan, Uni- Stadler, The Royal Institute of Technology (KTH), Stockholm, Feasibility and Infeasibility in versity of Alberta, Edmonton, AB, Canada Sweden (Eds.) Optimization Data Mining Managing Virtualization of Algorithms and Computational Methods A Knowledge Discovery Approach Networks and Services

18th IFIP/IEEE International Workshop on Distributed Sys- Feasibility and Infeasibility in Optimization is an ex- tems: Operations and Management, DSOM 2007, San José, CA, pository book focused on practical algorithms related This comprehensive, senior through graduate level USA, October 29-31, 2007, Proceedings to feasibility and infeasibility in optimization. Part I textbook on data mining details the unique steps of addresses algorithms for seeking feasibility quickly, the knowledge discovery process that prescribes the including recent algorithms for the difficult cases of sequence in which data mining projects should be This book constitutes the refereed proceedings of nonlinear and mixed-integer programs. Part II pro- performed. The book offers an authoritative treat- the 18th IFIP/IEEE International Workshop on Dis- vides algorithms for analyzing infeasibility by isolat- ment of all development phases from problem and tributed Systems, Operations and Management, ing minimal infeasible (or maximum feasible) sub- data understanding through data preprocessing to DSOM 2007, held in San José, CA, USA, in October sets of constraints, or by finding the best repair for deployment of the results. This knowledge discov- 2007 in the course of the 3rd International Week on the infeasibility. Part III describes surprising appli- ery approach is what distinguishes this book from Management of Networks and Services, Manweek cations in areas such as classification, computation- other texts in the area. The text concentrates on da- 2007. The 20 revised full papers and 5 revised short al biology, and medicine. Connections to constraint ta preparation, clustering and association rule learn- papers presented were carefully reviewed and select- programming are shown. A main goal is to impart an ing (required for processing unsupervised data), de- ed from 54 submissions. The papers are organized understanding of the methods so that practitioners cision trees, rule induction algorithms, neural net- in topical sections on decentralized and peer-to-peer can make immediate use of existing algorithms and works, and many other data mining methods, focus- management, fault detection and diagnosis, perfor- software, and so that researchers can extend the state ing predominantly on those which have proven suc- mance tuning and dimensioning, problem detec- of the art and find new applications. The book is of cessful in data mining projects. Researchers, prac- tion and mitigation, operations and tools, service ac- interest to researchers, students, and practitioners titioners and students are certain to consider Data counting and auditing, Web services and manage- across the applied sciences who are working on opti- Mining an indispensable resource in successfully ac- ment. mization problems. complishing the goals of their data mining projects. Fields of interest Features Features Computer Communication Networks; Programming “I am extremely happy with this upcoming book. It Provides suite of exercisesIncludes links to instruc- Techniques; Systems and Data Security; Manage- is very well-written as well as impressively up-to-date tional presentationsContains appendices of relevant ment of Computing and Information Systems; Com- and comprehensive” Fred Hillier, Stanford Universi- mathematical material   puters and Society ty (ISOR Series Editor) As originator for many of the developments in the field, Chinneck is in an excellent Contents Target groups position to write the authoritative, expository book Part I. Data Mining and Knowledge Discovery: Researchers and professionals on the subject and create a website that collects all Introduction.- Knowledge Discovery Process.- the ongoing developments. The website [..] Part II. Data Understanding: Data.- Concepts of Type of publication Learning, Classification and Regression.- Knowl- Proceedings Contents edge Representation.- Part III. Data Preprocess- Part I: Analyzing Infeasibility.- Isolating an Infeasi- ing: Databases, Data Warehouses and OLAP.- Fea- Due October 2007 bility.- Methods Specific to Linear Programming.- ture Extraction and Selection Methods.- Discretiza- Methods Specific to Mixed Integer Programming.- tion Methods.- Part IV. Data Mining: Methods Methods Specific to Nonlinear Programming.- Find- for Constructing Data Models: Unsupervised 2007. XIII, 269 p. (Lecture Notes in Computer Science, Vol. 4785) Softcover ing the Maximum Feasible Subset of Linear Con- Learning: Clustering.- Unsupervised Learning: Asso- straints.- Finding the Best Fix for an Infeasible Sys- ciation Rules.- Supervised Learning: Statistical Meth- 63,00 € tem.- Part II: Reaching Feasibility Quickly.- Linear ods.- Supervised Learning: Decision Trees, Rule Al- ISBN 978-3-540-75693-4 Programming.- Mixed Integer Programming.- Non- gorithms and Their [..] linear Programming.- Part III: Applications.- Ana- lyzing Unboundedness in Linear Programs.- Ana- Fields of interest lyzing the Viability of Network Models.- Analyzing Data Mining and Knowledge Discovery; Informa- Multiple-Objective Linear Programs.- Data [..] tion Storage and Retrieval; Statistics for Engineer- ing, Physics, Computer Science, Chemistry & Geo- Fields of interest sciences; Pattern Recognition; Artificial Intelligence Optimization; Operation Research/Decision Theory; (incl. Robotics) Mathematical Modeling and Industrial Mathemat- ics; Engineering Economics, Organization, Logistics, Target groups Marketing; Industrial and Production Engineering; Advanced-level students, researchers and practition- Econometrics ers in computer science

Target groups Type of publication Researchers and graduate students Graduate/advanced undergraduate textbook

Type of publication Due October 2007 Contributed volume

2007. IV, 500 p. Hardcover Due January 2008 69,95 € 2008. Approx. 300 p. (International Series in Operations Research ISBN 978-0-387-33333-5 & Management Science, Vol. 118) Hardcover

79,95 € ISBN 978-0-387-74931-0 36 Computer Science springer.com/booksellers

C.A. Coello Coello, CINVESTAV-IPN, México City, México; G.B. La- P.H. Cole, University of Adelaide, SA, Australia; D.C. Ranasinghe, M. Colnaric, University of Maribor, Slovenia; D. Verber, Universi- mont, Air Force Institute of Technology, WPAFB, Dayton, OH, University of Adelaide, SA, Australia (Eds.) ty of Maribor, Slovenia; W.A. Halang, FernUniversität Hagen, Ger- USA; D.A. Van Veldhuizen, AFMC/DR, Wright-Patterson AFB, OH, many USA Networked RFID Systems and Lightweight Cryptography Distributed Embedded Control Evolutionary Algorithms for Solving Systems Multi-Objective Problems Raising Barriers to Product Counterfeiting Improving Dependability with Coherent Design

Solving multi-objective problems is an evolving ef- The book consists of a collection of works on utilis- fort, and computer science and other related disci- ing the automatic identification technology provid- Very often, practical design of embedded systems plines have given rise to many powerful determin- ed by Radio Frequency Identification (RFID) to ad- lacks consistency resulting in computer control istic and stochastic techniques for addressing these dress the problems of global counterfeiting of goods. systems that do not provide the performance they large-dimensional optimization problems. Evolu- The book presents current research, directed to se- should. Most notably they lack the key property of tionary algorithms are one such generic stochastic curing supply chains against the efforts of counterfeit dependability. Distributed Embedded Control Sys- approach that has proven to be successful and widely operators, carried out at the Auto-ID Labs around tems handles the domains encountered when design- applicable in solving both single-objective and mul- the globe. The collection of works and the organi- ing a distributed embedded computer control system ti-objective problems. This textbook is a second edi- sation of the book assume very little knowledge on as an integrated whole. First to be discussed are some tion of Evolutionary Algorithms for Solving Mul- the part of the reader on Networked RFID systems as basic issues about real-time systems and their prop- ti-Objective Problems, significantly expanded and the material provided in the introduction familiarises erties, specifically safety. Then, system and hardware adapted for the classroom. The various features of the reader with concepts, underlying principles and architectures are dealt with: areas like scheduling, multi-objective evolutionary algorithms are present- vulnerabilities of modern RFID systems. The collec- asymmetrical distributed multiprocessor architec- ed here in an innovative and student-friendly fash- tion of works presented on highlighting the coun- tures, time-triggered communications, middleware, ion, incorporating state-of-the-art research. The terfeiting problem and problems with existing low fault-tolerant peripherals, etc. Next, programming is- book disseminates the application of evolutionary cost RFID technology is an important guide to prac- sues, embodying desired properties, basic language algorithm techniques to a variety of practical prob- titioners, professionals and graduates in the area of subsets, object orientation and language support for lems, including test suites with associated perfor- RFID systems application, implementation and inte- hardware and software specifications and co-design mance based on a variety of appropriate metrics, gration. are elaborated and finally, the prototype implemen- as well as serial and parallel algorithm implementa- tation of a distributed embedded control system is tions. Features given as a detailed example. Highlighting advanced RFID systems Presenting the Features use of lightweight cryptography to address security Features Designed for courses on Evolutionary Multi-objec- and privacy related issues Teaches the engineer which approaches and tech- tive Optimization and Evolutionary Algorithms 2nd nologies are best used for reliable and flexible im- Edition is completely updated and presents the latest Fields of interest plementation of distributed embedded control Em- research Provides a complete set of teaching tutori- Computer Communication Networks; Engineering phasis on reliability to deal with the increasing use als, exercises and solutions Contains exhaustive ap- Economics, Organization, Logistics, Marketing; In- of distributed control in safety-critical systems En- pendices, index and bibliography formation Systems Applications (incl.Internet) courages verification of function and real-time per- formance by simple ex tempore testing rather than Contents Target groups rigid planned procedures Basic Concepts.- Evolutionary Algorithm MOP Computer professionals in research and develop- Approaches.- MOEA Test Suites.- MOEA Testing ment Contents and Analysis.- MOEA Theory and Issues.- Applica- Part I: Concepts.- Real-time Characteristics and Type of publication tions.- MOEA Parallelization.- Multi-Criteria Deci- Safety of Embedded Systems.- Multitasking.- Hard- Professional book sion Making.- Special Topics.- Appendix A: MOEA ware and System Architectures.- Programming Classification and Technique Analysis.- Appendix of Embedded Systems.- Part II: Implementation.- B: MOPs in the Literature.- Appendix C: Ptrue and Due November 2007 Hardware Platform.- Implementation of a Fault-tol- PFtrue for Selected Numberic MOPs.- Appendix D: erant Distributed Embedded System.- Asynchronous Real-time Execution with Runtime State Restora- Ptrue and PFtrue for Side-constrained MOPs.- Ap- 2008. VIII, 355 p. Hardcover pendix E: MOEA Software Availability.- Appendix F: tion.- Epilogue. MOEA-Related Information. 59,95 € ISBN 978-3-540-71640-2 Fields of interest Fields of interest Control Engineering; Computer Systems Organiza- Theory of Computation; Optimization; Probability tion and Communication Networks; Communica- Theory and Stochastic Processes; Algorithm Analysis tions Engineering, Networks; Control Structures and and Problem Complexity; Artificial Intelligence (in- Microprogramming; Engineering Design; Program- cl. Robotics); Numeric Computing ming Languages, Compilers, Interpreters

Target groups Target groups Students, researchers and computer scientists work- Designers and engineers working with embedded ing in evolutionary computation, genetic algorithms systems in an industrial environment; researchers in- and artificial intelligence terested in distributed control systems, real-time ar- chitectures, programming languages and fault toler- Type of publication ance; postgraduate students in control, electrical and Graduate/advanced undergraduate textbook computer engineering; libraries

Type of publication Due October 2007 Monograph

2007. XXII, 800 p. 50 illus. (Genetic and Evolutionary Computa- Due December 2007 tion) Hardcover

76,95 € 2008. Approx. 290 p. 101 illus. (Advances in Industrial Control) ISBN 978-0-387-33254-3 Hardcover

99,95 € springer.com/booksellers Computer Science 37

ISBN 978-1-84800-051-3 M. Conti, Institute for Informatics and Telematics (IIT) - National D. Cook, Iowa State University, Ames, IA, USA; D.F. Swayne, AT&T Research Council (CNR), Pisa, Italy Labs, Florham Park, NJ, USA

MobileMAN Interactive and Dynamic Graphics

Mobile Multi-Hop ad hoc Networks - Present and Future for Data Analysis With R and GGobi

Features Addresses in an integrated way the mobile-ad-hoc- This richly illustrated book describes the use of in- network protocol stack: from enabling technologies teractive and dynamic graphics as part of multidi- to middleware and applications; considering also mensional data analysis. Chapters include clustering, the socio-economic perspectives of this technolo- supervised classification, and working with miss- gy Combines theoretical studies, simulation experi- ing values. A variety of plots and interaction meth- ments to validate the solutions, prototyping, and ex- ods are used in each analysis, often starting with perimentation on real test-beds brushing linked low-dimensional views and working up to manual manipulation of tours of several vari- Contents ables. The role of graphical methods is shown at each 1. Introduction. 2. Mobileman Architecture. 3. Wire- step of the analysis, not only in the early explorato- less Technologies. 4. Networking. 5. Cooperation ry phase, but in the later stages, too, when compar- Models and Mechanisms. 6. Middelware. 7. Applica- ing and evaluating models. All examples are based tions. 8. Economic Models. 9. Mesh Networks. on freely available software: GGobi for interactive graphics and R for static graphics, modeling, and Fields of interest programming. The printed book is augmented by a Computer Science, general; Computer Communica- wealth of material on the web, encouraging readers tion Networks; Communications Engineering, Net- follow the examples themselves. The web site has all works the data and code necessary to reproduce the analy- ses in the book, along with movies demonstrating the Target groups examples. The book may be used as a text [..] Researchers and graduate students in computer sci- ence and electrical engineering, researchers Features and developers in telecommunication industry, re- The book's examples use the software R and GGobi searchers in the area, who are interested in aspects of Illustrated examples, supplemented by movies on ad hoc networking that are complementary to their the web, help he reader learn how to use interactive activity, and researchers that want to approach and graphics for data anlaysis Full color figures illumi- get a general view of this new area nate high-dimensional data spaces Everything in the book can be replicated by the reader with free soft- Type of publication ware Contributed volume Contents Due August 2008 Introduction.- The toolbox.- Missing values.- Super- vised classification.- Cluster analysis.- Miscellaneous topics.- Data sets. 2008. Hardcover Fields of interest 99,00 € Statistical Theory and Methods; Statistics and Com- ISBN 978-1-4020-4402-1 puting/Statistics Programs; Data Mining and Knowl- edge Discovery; Bioinformatics; Visualization

Target groups Students, researchers

Type of publication Monograph

Due November 2007

2007. Approx. 205 p. (Use R) Softcover

46,95 € ISBN 978-0-387-71761-6 38 Computer Science springer.com/booksellers

S.B. Cooper, University of Leeds, UK; B. Löwe, Institute of Logic, E. Corchado, Escuela Politécnica Superior, Burgos, Spain; J.M. M. Cord, ENSEA, CERGY-PONTOISE, France; P. Cunningham, Uni- Amsterdam, the Netherlands; A. Sorbi, Universita di Siena, Italy Corchado, Universidad de Salamanca, Spain; A. Abraham, Norwe- versity College Dublin, Ireland (Eds.) (Eds.) gian University of Science and Technology, Trondheim, Norway (Eds.) Machine Learning Techniques for New Computational Paradigms Innovations in Hybrid Intelligent Multimedia Changing Conceptions of What is Computable Systems Case Studies on Organization and Retrieval

In recent years, classical computability has expand- Processing multimedia content has emerged as a key ed beyond its original scope to address issues relat- Hybrid Artificial Intelligence Systems (HAIS) com- area for the application of machine learning tech- ed to computability and complexity in algebra, anal- bines symbolic and sub-symbolic techniques to con- niques, where the objectives are to provide insight ysis, and physics. The deep interconnection between struct more robust and reliable problem solving into the domain from which the data is drawn, and "computation" and "proof" has originated much of models. This volume focused on "Hybrid Artificial to organize that data and improve the performance the most significant work in constructive mathe- Intelligence Systems" contains a collection of pa- of the processes manipulating it. Applying machine matics and mathematical logic of the last 70 years. pers that were presented at the 2nd International learning techniques to multimedia content involves Moreover, the increasingly compelling necessity to Workshop on Hybrid Artificial Intelligence Systems, special considerations – the data is typically of very deal with computability in the real world (such as held in 12 - 13 November, 2007, Salamanca, Spain. high dimension, and the normal distinction between computing on continuous data, biological comput- This carefully edited book provides a comprehensive supervised and unsupervised techniques does not ing, and physical models) has brought focus to new overview of the recent advances in the hybrid intelli- always apply. This book provides a comprehensive paradigms of computation that are based on biologi- gent systems and covers a wide range of application coverage of the most important machine learning cal and physical models. These models address ques- areas, including data analysis and data mining, in- techniques used and their application in this domain. tions of efficiency in a radically new way and even telligent control, pattern recognition, robotics, opti- Arising from the EU MUSCLE network, a program threaten to move the so-called Turing barrier, i.e. mization, etc. The book is aimed at researchers, prac- that drew together multidisciplinary teams with ex- the line between the decidable and the un-decidable. titioners and postgraduate students who are engaged pertise in machine learning, pattern recognition, ar- This book examines new developments in the theo- in developing and applying advanced intelligent sys- tificial intelligence, and image, video, text and cross- ry and practice of computation from a mathematical tems principles to solving real-world problems. media processing, the book first introduces the ma- perspective, with topics ranging from classical com- Features chine learning principles and techniques that are ap- putability to complexity, from biocomputing to [..] Proceedings of the Hybrid Artificial Intelligence Sys- plied in multimedia data processing and [..] Features tems Workshop (HAIS 07 – CAEPIA 2007) Recent Contents Explores new developments in the theory and prac- developments in Hybrid Intelligent Systems Part I: Introduction to Learning Principles for Mul- tice of computation from a mathematical per- Fields of interest timedia Data – Introduction to Bayesian Methods spective Includes topics ranging from classical com- Appl.Mathematics/Computational Methods of En- and Decision Theory; Supervised Learning; Unsu- putability to complexity, biocomputing, and quan- gineering; Artificial Intelligence (incl. Robotics); Ap- pervised Learning and Clustering; Dimension Re- tum computing Offers content that appeals to spe- plications of Mathematics duction. Part II: Multimedia Applications – Online cialists and non-specialists alike Features contribu- Content-Based Image Retrieval Using Active Learn- tors who are prominent scholars and internationally Target groups ing; Conservative Learning for Learning Object De- known specialists Researchers, engineers, graduate students in soft tectors; Machine Learning Techniques for Face Anal- computing and statistics Contents ysis; Mental Search in Image Databases; Combining Preface.- Introduction.- Alan Turing's Legacy, and Textual and Visual Information for Semantic Label- Type of publication ing of Images and Videos; Classification and Cluster- New Computational Paradigms.- Section I. The Tur- Monograph ing Model of Computation and its Applications to ing of Music for Novel Music Access Applications; Logic, Mathematics, Philosophy and Computer Sci- [..] ence.- Section II. Logic, Algorithms, and Complex- Due October 2007 Fields of interest ity.- Section III. Models of Computation from Na- Data Mining and Knowledge Discovery; Artificial ture.- Section IV. Computable Analysis and Real 2008. XVI, 497 p. Also available online. (Advances in Soft Com- Intelligence (incl. Robotics); Information Storage Computation.- Author Index puting, Vol. 44) Softcover and Retrieval; User Interfaces and Human Comput- Fields of interest 149,95 € er Interaction; Document Preparation and Text Pro- Math Applications in Computer Science; Theory of ISBN 978-3-540-74971-4 cessing; Computer Imaging, Vision, Pattern Recog- Computation; Mathematical Logic and Foundations; nition and Graphics Philosophy; Quantum Computing, Information and Target groups Physics Practioners, researchers, graduate students in Target groups machine learning Researchers and graduate students in mathematics Type of publication and philosophy with a special interest in logic Monograph and foundational issues in computer science

Type of publication Due February 2008 Contributed volume 2008. Approx. 320 p. (Cognitive Technologies) Hardcover Due January 2008 ISBN 978-3-540-75170-0

2008. 576 pp. 19 illus. Hardcover

107,05 € ISBN 978-0-387-36033-1 springer.com/booksellers Computer Science 39

R. Dahlhaus, Universität Heidelberg, Germany; J. Kurths, E. Damiani, University of Milan, Italy; A. Dipanda, Université O. Danvy, BRICS, University of Aarhus, Denmark; H. Mairson, Universität Potsdam,Germany; P. Maass, Universität Bremen, de Bourgogne, France; K. Yetongnon, Université de Bour- Brandeis University, Waltham, MA, USA; F. Henglein, DIKU, Uni- Germany; J. Timmer, Universität Freiburg, Germany (Eds.) gogne, France; L. Legrand, Université de Bourgogne, France; P. versity of Copenhagen, Denmark; A. Pettorossi, DISP, University Schelkens, Vrije University of Brussels, Belgium; R. Chbeir, Univer- of Roma 'Tor Vergata', Italy (Eds.) sité de Bourgogne, France (Eds.) Mathematical Methods in Signal Automatic Program Development Processing and Digital Image Signal Processing for Image Analysis Enhancement and Multimedia A Tribute to Robert Paige Processing “Automatic Program Development” is a tribute to The aim of this volume is to bring together research Robert Paige (1947-1999), our accomplished and re- directions in theoretical signal and imaging process- spected colleague, and moreover our good friend, ing developed rather independently in electrical en- Traditionally, signal processing techniques lay at the whose untimely passing was a loss to our academic gineering, theoretical physics, mathematics and the foundation of multimedia data processing and anal- and research community. We have collected the re- computer sciences.  In particular, mathemat- ysis. In the past few years, a new wave of advanced vised, updated versions of the papers published in ically justified algorithms and methods, the mathe- signal-processing techniques has delivered exciting his honor in the Higher-Order and Symbolic Com- matical analysis of these algorithms, and methods results, increasing systems capabilities of efficiently putation Journal in the years 2003 and 2005. Among as well as the investigation of connections between exchanging image data and extracting useful knowl- them there are two papers by Bob: (i) a retrospec- methods from time series analysis and image pro- edge from them. Signal Processing for Image En- tive view of his research lines, and (ii) a proposal for cessing are reviewed. An  interdisci- hancement and Multimedia Processing is an edited future studies in the area of the automatic program plinary comparison of these methods, drawing up- volume, written by well-recognized international re- derivation. The book also includes some papers by on common sets of test problems from medicine and searchers with extended chapter style versions of the members of the IFIP Working Group 2.1 of which geophysical/enviromental sciences, is also addressed. best papers presented at the SITIS 2006 Internation- Bob was an active member. All papers are related to This volume coherently summarizes work car- al Conference. This book presents the state-of-the- some of the research interests of Bob and, in partic- ried out in the field of theoretical signal and image art and recent research results on the application of ular, to the transformational development of pro- processing. It focuses on non-linear and non-para- advanced signal processing techniques for improving grams and their algorithmic derivation from formal metric models for time series as well as on adaptive the value of image and video data. Signal Processing specifications. “Automatic Program Development” methods in image processing. for Image Enhancement Video and Multimedia Pro- cessing is designed for a professional audience com- offers a renewed stimulus for continuing and deep- Contents posed of practitioners and researchers in industry. ening Bob's research visions. A familiar touch is giv- Multivariate time series analysis.- Multiscale approx- This book is also suitable for advanced-level students en to the [..] imation.- Local adaptive estimation of complex mo- in computer science. Features tion and orientation patterns.- Inverse problems Review of some techniques for automatic program and parameter identification.- Structural adaptive Features development Applications of program transfor- smoothing procedures.- Analysis of bivariate cou- Discusses feature-based techniques for deep, fea- mation to algorithm derivation Algorithm design pling by means of recurrence.- Surrogate methods. ture-oriented analysis of images Introduces new re- methodology based on systematic derivations and   sults on video coding on time-honored topic of se- curing image information applications in computer science and software engi- Fields of interest neering Computer Imaging, Vision, Pattern Recognition Contents Contents and Graphics; Information and Communication, Image Restoration, Filtering and Compression.- From the contents Part I Robert Paige's Research: A Circuits; Nonlinear Dynamics, Complex Systems, On-orbit Spatial Resolution Estimation of CBERS-2 Retrospective and a Proposal. Part II Robert Paige: Chaos, Neural Networks; Signal,Image and Speech Imaging System Using Ideal Edge Target.- Distribut- Brother, Friend, Colleague. Part III Contributed Pa- Processing ed Pre-Processed CA-CFAR Detection Structure for Non Gaussian Clutter Reduction.- Multispectral pers. Target groups Satellite Images Processing through Dimensional- Fields of interest researchers in academic and industrial R + D ity Reduction.- SAR Image Compression based on Wedgelet-Wavelet.- Texture Analysis and Feature Software Engineering/Programming and Operating Type of publication Extraction.- 2 Texture Discrimination Using Hier- Systems; Software Engineering; Programming Tech- Monograph archical Complex Networks.- An Enhanced Detec- niques; Programming Languages, Compilers, Inter- tor of Blurred and Noisy Edges.- Face Recognition preters and Shape Analysis.- A3FD: Accurate 3D Face De- Due December 2007 Target groups tection.- Two [..] Institutional market and researchers, graduate stu- 2008. Approx. 290 p. (Understanding Complex Systems) Hard- Fields of interest dents and university teachers in the field of computer cover Multimedia Information Systems; Signal,Image and sciences Speech Processing; Image Processing and Computer 99,95 € Type of publication Vision; Computer Communication Networks; Com- ISBN 978-3-540-75631-6 Monograph puter Graphics; Information Storage and Retrieval

Target groups Due January 2008 Advanced-level students and researchers in comput- er science 2008. Approx. 300 p. Hardcover

Type of publication 79,95 € Contributed volume ISBN 978-1-4020-6584-2

Due December 2007

2008. Approx. 341 p. (Multimedia Systems and Applications, Vol. 31) Hardcover

99,35 € ISBN 978-0-387-72499-7 40 Computer Science springer.com/booksellers

A. DasGupta, Purdue University, West Lafayette, IN, USA R. Davis, Ipswich, UK G. De Micheli, Ecole Polytechnique Federale de Lausanne, Switzerland; S. Mir, TIMA- Institut National Polytechnique de Grenoble, France; R. Reis, Universidade Federal do Rio Grande do Asymptotic Theory of Statistics and Advanced Modelling with the ARIS Sul, Brazil (Eds.) Probability Design Platform VLSI-SoC: Research Trends in VLSI and Systems on Chip This book is an encyclopedic treatment of classic Following on from Rob Davis’ successful introducto- as well as contemporary large sample theory, deal- ry book, ARIS Design Platform: Getting Started with Fourteenth International Conference on Very Large Scale In- tegration of System on Chip (VLSI-SoC2006), October 16-18, ing with both statistical problems and probabilistic BPM, Rob now covers in detail some of the more ad- 2006, Nice, France issues and tools. It is written in an extremely lucid vanced concepts of using ARIS Business Architect. style, with an emphasis on the conceptual discussion This is a practical ‘how-to’ guide and contains tips, of the importance of a problem and the impact and techniques and short cuts gained from practical ex- relevance of the theorems. The book has 34 chapters perience and explains clearly how to use ARIS and This book contains extended and revised versions over a wide range of topics, nearly 600 exercises for why ARIS is a powerful tool for process modeling. of the best papers that were presented during the practice and instruction, and another 300 worked Advanced concepts such as the following are pre- fouteenth IFIP TC 10/WG 10.5 International Con- out examples. It also includes a large compendium sented in this reader-friendly and concise guide: • ference on Very arge Scale Integration. The purpose of 300 useful inequalities on probability, linear al- Matrix editor • Find and query • Model generation of this conference, sponsored by IFIP TC 10 WG gebra, and analysis that are collected together from • Method filters and method changes • Templates 10.5 and by the IEEE Council on Electronic Design numerous sources, as an invaluable reference for re- and fonts • Reports and semantic checks • Macros • Automation (CEDA), is to provide a forum to ex- searchers in statistics, probability, and mathemat- Transformations • Database administration • User change ideas and show industrial and academic re- ics. It can be used as a graduate text, as a versatile re- management This easy-to-follow advanced text is a search results in the field of microelectronics design. search reference, as a source for independent read- must have guide and reference for all users who want The current trend toward increasing chip integra- ing on a wide assembly of topics, and as a window to increase their ARIS skills, and for those who need tion and technology process advancements brings to learning the latest developments in contemporary to undertake advanced model and database manage- about stimulating new challenges both at the physi- topics. The book is unique in its detailed coverage of ment. cal and system-design levels. For more information fundamental topics such as [..] about the 300 other books in the IFIP series, please Contents visit www.springer.com. For more information about Features A practical ‘how-to guide, following the success of IFIP, please visit www.ifip.org. Encyclopedic coverage of classical topics and at the the author’s introductory text Offers tips, techniques same time of some of the most modern topics Versa- and short cuts gained from practical experience Pro- Features tile research reference to anyone working on theoret- vides guidance on the more advanced aspects of “Most recent volume from the VLSI-SoC Conference ical statistics and probability Emphasis on presenting ARIS Business Architect Series” the material in a lucid and accessible style, suitable for conceptual understanding of a very broad range Fields of interest Contents of topics. Information Systems; Models and Principles; Simu- Oversampled Time Estimation Techniques for Pre- lation and Modeling cision Photonic Detectors.- Electronic Detecting Contents of DNA Absorption and Hybridization.- A CMOS Basic convergence concepts and theorems.- Metrics, Target groups Mixed-Mode Sample-and-Hold Circuit for Pipelined information theory, convergence, and Poisson ap- Professionals, practitioners, industrial and commer- ADCs.- Long Synthesis of EXOR Projected Sum of proximations.- More general weak and strong laws cial users of ARIS Products.- Designing Routing and Message-Depen- and the Delta theorem.- Transformations.- More dent Deadlock Free Netorks on Chips.- Human++, general CLTs.- Moment convergence and uniform Type of publication Emerging Technology for Body Area Networks, Re- integrability.- Sample percentiles and order statis- Professional book sults from IMEC’s. tics.- Sample extremes.- Central limit theorems for dependent sequences.- Central limit theorem for Due June 2008 Fields of interest Markov chains.- Accuracy of CLTs.- Invariance prin- Processor Architectures ciples.- Edgeworth expansions and cumulants.- Sad- 2008. Approx. 300 p. 100 illus. Softcover Target groups dlepoint approximations.- U-statistics.- Maximum Researchers and practitioners of VLSI. likelihood estimates.- M estimates.- The trimmed [..] 49,95 € ISBN 978-1-84800-110-7 Type of publication Fields of interest Proceedings Statistical Theory and Methods

Target groups Due December 2007 Students 2008. Approx. 410 p. (IFIP International Federation for Informa- Type of publication tion Processing, Vol. 249) Hardcover Graduate/advanced undergraduate textbook 128,00 € Due June 2008 ISBN 978-0-387-74908-2

2008. X, 680 p. (Springer Texts in Statistics) Hardcover

69,30 € ISBN 978-0-387-75970-8 springer.com/booksellers Computer Science 41

L. De Raedt, University of Freiburg, Germany K. Deb, Indian Institute of Technology, Kanpur, India Z. Deng, University of Houston, TX, USA; U. Neumann, University of Southern California, Los Angeles, CA, USA (Eds.) Logical and Relational Learning Innovization Data-Driven 3D Facial Animation From ILP to MRDM Innovative Solution Principles Using Multiobjective Optimiza- tion

“Data-Driven 3D Facial Animation” systematically This textbook covers logical and relational learn- describes the important techniques developed over Every designer wants to know what makes a product ing in depth, and hence provides an introduction to the last ten years or so. Although 3D facial anima- or process optimal. This book suggests a holistic ap- inductive logic programming (ILP), multirelation- tion is used more and more in the entertainment in- proach to optimization that involves two steps: find al data mining (MRDM) and (statistical) relational dustries, to date there have been very few books that a set of trade-off optimal solutions involving two or learning (SRL). These subfields of data mining and address the techniques involved. Comprehensive more conflicting objectives related to the problem, machine learning are concerned with the analysis in scope, the book covers not only traditional lip- and then analyze these high-performing solutions to of complex and structured data sets that arise in nu- sync (speech animation), but also expressive facial determine solution principles that commonly pre- merous applications, such as bio- and chemoinfor- motion, facial gestures, facial modeling, editing and vail among these solutions. Since the solutions are matics, network analysis, Web mining, natural lan- sketching, and facial animation transferring. It pro- optimal, such common principles are likely to exist; guage processing, within the rich representations vides an up-to-date reference source for academic and since these principles are common to many so- offered by relational databases and computational research and for professionals working in the facial lutions they are likely to provide robust, reliable so- logic. The author introduces the machine learning animation field. An edited volume, the book brings lution principles. The author is one of the leading re- and representational foundations of the field and ex- together contributions from leading researchers and searchers in multiobjective optimization, and an ex- plains some important techniques in detail by using practitioners working in both academia and in the pert in design methodology. In this book he offers some of the classic case studies centered around well- leading animation studios. known ILP, MRDM and SRL systems. The book is introductions to innovation in design; multiobjective suitable for use in graduate courses and should be of optimization, in particular evolutionary multiobjec- Features interest to graduate students and researchers in com- tive optimization (EMO) techniques that find multi- The contributions span both active researchers in puter science, databases and artificial intelligence, as ple, trade-off, optimal solutions; and knowledge ex- academia and graphics/animation experts working in well as practitioners of data mining and [..] traction from multivariate data using graphical, re- leading studios There is no other book available that gression and clustering [..] specifically and systematically describes the new and Features popular data-driven facial animation techniques de- Contents First textbook on multi-relational data mining and veloped in recent years inductive logic programming Self-contained and eas- Introduction.- Innovation in Product and Process ily accessible Provides a complete overview of the Design.- Monotonicity Principles for Knowledge Ex- Contents field traction.- Multiobjective Optimization.- Innoviza- Computer Facial Animation: A Survey.- Expressive tion Procedure.- Engineering Case Studies.- Chal- Visual Speech Generation.- Data-driven Expres- Contents lenges in Automated Knowledge Extraction.- Con- sive Speech Animation Synthesis and Editing.- Eye Introduction.- An Introduction to Logic.- Rep- clusions.- References Movements, Saccades, and Multi-Party Conversa- resentations for Mining and Learning.- Learning tions.- Realistic Eye Motion Synthesis by Texture Fields of interest as Search.- Generality in Logic.- Upgrading At- Synthesis.- Learning Expressive Human-like Head Artificial Intelligence (incl. Robotics); Engineering tribute-Value Learning Systems.- Inducing Theo- Motion Sequences from Speech.- A User Interface Design; Optimization; Pattern Recognition; Algo- ries.- Probabilistic Logic Learning and Statistical Re- Technique for Controlling Blend Shape Interfer- rithm Analysis and Problem Complexity lational Learning.- Kernel and Distance-Based Rela- ence.- Sketching Articulation and Pose for Facial An- tional Learning.- Computational Aspects.- Conclu- imation.- Learning Controls for Blend Shapes Based sions Target groups Researchers, practitioners and students of computer Realistic Facial Animation.- Speech Motion Decom- position and Editing.- Facial Animation by Expres- Fields of interest science, optimization and design. sion [..] Artificial Intelligence (incl. Robotics); Database Management; Information Storage and Retrieval; In- Type of publication Monograph Fields of interest formation Systems Applications (incl.Internet) Computer Graphics; Simulation and Modeling

Target groups Due March 2008 Target groups Lecturers, graduates, scientists Graduate students in computer graphics and graph- ics and animation researchers Type of publication 2008. Approx. 300 p. Hardcover Graduate/advanced undergraduate textbook 54,95 € Type of publication ISBN 978-3-540-73172-6 Graduate/advanced undergraduate textbook Due February 2008 Due November 2007 2008. Approx. 325 p. (Cognitive Technologies) Hardcover 2007. Approx. 338 p. 149 illus. in color. Softcover 39,95 € ISBN 978-3-540-20040-6 76,95 € ISBN 978-1-84628-906-4 42 Computer Science springer.com/booksellers

N. Dershowitz, Tel Aviv University, Israel; A. Voronkov, University Y.G. Desmedt, Florida State University, Tallahassee, FL, USA (Ed.) L. DiPippo, University of Rhode Island, Kingston, RI, USA; C.D. Gill, of Manchester, UK (Eds.) Washington University, St. Louis, MO, USA (Eds.) Secure Public Key Infrastructure Logic for Programming Artificial Design Patterns for Distributed Intelligence and Reasoning Standards, PGP and Beyond Real-Time Embedded Systems

14th International Conference, LPAR 2007, Yerevan, Armenia, October 15-19, 2007, Proceedings Public Key Infrastructures (PKI) are a trust manage- ment technology for public keys, consisting of sev- This book provides a taxonomy of distributed re- eral interconnected Certifying Authorities (CAs). al-time and embedded system design patterns, allow- ing the reader to understand how the patterns can This book constitutes the refereed proceedings of The CAs issue certificates that establish ownership of fit together to form a complete application. Based on the 14th International Conference on Logic for Pro- public keys, which can be used to support authenti- the information captured from previous DRE system gramming, Artificial Intelligence, and Reasoning, cation, integrity and privacy. The structure of a PKI development experience, the text explores the rela- LPAR 2007, held in Yerevan, Armenia, October can be quite complex, and securing PKIs has there- tionships among all of the patterns described with- 15-19, 2007. The 36 revised full papers presented to- fore become a major concern, exacerbated with the in. Several comprehensive examples are presented, gether with 15 short papers and 3 invited talks were commercialization of the Internet. Secure Public Key illustrating how these patterns can be combined to carefully reviewed and selected from 78 submissions. Infrastructure: Standards, PGP and Beyond focuses build real applications, giving the reader motivation The papers address all current issues in logic pro- on security aspects of public key infrastructures, ad- for further study and offering concrete descriptions gramming, logic-based program manipulation, for- dressing such issues as inadequacy of security checks of pattern-oriented design of DRE systems. Devel- mal method, automated reasoning, and various kinds when certificates are issued, and revocation time. opers of DRE systems and members of the open- of AI logics. The editor presents several possible solutions for withstanding malicious attacks, while laying the source middleware community, as well as advanced Fields of interest groundwork for future safeguards. Secure Public Key students of real-time and distributed systems and/or Artificial Intelligence (incl. Robotics); Program- Infrastructure: Standards, PGP and Beyond is de- software engineering, will find Design Patterns for ming Techniques; Software Engineering; Logics and signed for practitioners and researchers in industry, Distributed Real-Time and Embedded Systems to be Meanings of Programs; Mathematical Logic and For- as well as advanced-level students in computer sci- one of the most comprehensive pictures of DRE sys- mal Languages ence and mathematics.   tems available.

Target groups Features Features Researchers and professionals -Focus on security aspects of public key infrastruc- Provides researchers and professionals with guide- tures -Strategies to survive limited malicious attacks lines for producing well-organized, reusable code in Type of publication on public key infrastructures (PKI) -Most other their DRE systems Presents material in a concise, ac- Proceedings books on PKI focus solely on PGP or on X500/X509 cessible format, allowing for efficient application of -Deals with corrupt certification authorities (CAs) each pattern Contains contributions from experts in Due October 2007 and CAs whose computers were hacked the field with experience designing, developing and evaluating complex mission-critical DRE systems in Contents which the breadth of design considerations is essen- 2007. XIII, 562 p. (Lecture Notes in Computer Science, Vol. 4790) Preface.- Introduction.- The X509 Infrastructure.- tial Softcover The PGP Paradigm.- Trust Models.- Platform De- Contents 68,00 € pendencies/Independencies.- Revocation.- Boom or Introduction.- Resource Management Patterns Sec- ISBN 978-3-540-75558-6 Bust or Alternatives?.- Index. tion:   General Resource Management Pat- Fields of interest terns.- RM Specification and Enforcement Patterns.- Data Encryption; Computer Systems Organization RM Monitoring.- RM Actuation Patterns.- Schedul- and Communication Networks; Management of ing Patterns Section: Scheduling Specification and Computing and Information Systems; Data Struc- Enforcement Patterns.- Scheduling Actuation Pat- tures, Cryptology and Information Theory; Operat- terns.- Engineering Patterns Section: System Engi- ing Systems; Coding and Information Theory neering Patterns.- Real-Time Data Distribution Ex- amples.- Conclusion.- Index.   Target groups Practitioners and researchers in industry Fields of interest Computer Systems Organization and Commu- Type of publication nication Networks; Special Purpose and Applica- Contributed volume tion-Based Systems; Electronic and Computer Engi- neering; Processor Architectures; Computer-Aided Due April 2008 Engineering (CAD, CAE) and Design; System Per- formance and Evaluation

2008. Approx. 128 p. 20 illus. Hardcover Target groups Researchers and professionals in real-time systems, 39,95 € distributed systems, software engineering, and/or a ISBN 978-0-387-27159-0 combination of these topics; graduate-level course specifically addressing software for DRE systems

Type of publication Contributed volume

Due February 2008

2008. Approx. 384 p. (Real-Time Systems Series, Vol. 24) Hardcov- er

64,95 € ISBN 978-0-387-24357-3 springer.com/booksellers Computer Science 43

J. Diederich, American University of Sharjah, United Arab Emi- C. Ding, Lawrence Berkeley National Laboratory, Berkeley, CA, A. Divakaran, Mitsubishi Electronic Research Laboratories, Cam- rates (Ed.) USA; H. Zha, Penn State University, State College, PA, USA bridge, MA, USA (Ed.)

Rule Extraction from Support Spectral Clustering, Ordering and Multimedia Content Analysis

Vector Machines Ranking Theory and Applications Statistical Learning with Matrix Factorizations

Multimedia Content Analysis: Theory and Features Applications covers the latest in multime- Data mining methods are essential for analyzing the Introduces a number of different approaches to ex- dia content analysis and applications based on such ever-growing massive quantities of data. Data clus- tracting rules from support vector machines devel- analysis.  As research has progressed, it has tering is one of the key data mining techniques. In oped by key researchers in the field Successful appli- become clear that this field has to appeal to recent years, spectral clustering has been developed cations are outlined and future research opportuni- other disciplines such as psycho-physics, media pro- as an effective approach to data clustering. It starts ties are discussed duction, etc. This book consists of invited chapters with well-motivated objective functions; optimiza- that cover the entire range of the field.  Some Contents tion eventually leads to eigenvectors as the solutions, of the topics covered include low-level audio-visu- PART I: Introduction.- Rule extraction from support with many clear and interesting algebraic properties. al analysis based retrieval and indexing techniques, vector machines – An introduction.- Rule extrac- Spectral clustering, ordering and ranking extensively the TRECVID effort, video browsing interfaces, con- tion from Support Vector Machines: An Overview uses matrix-based methods and algorithms. This ap- tent creation and content analysis, and multimedia of Issues and Application in Credit Scoring.- PART proach is amenable to vigorous analysis and is ben- analysis-based applications, among others.  II: Algorithms and Techniques.- Rule Extraction efiting from a treasury of knowledge of linear alge- The chapters are written by leading researchers in from Transfer Learning.- Rule Extraction from Lin- bra and applied mathematics accumulated through the multimedia field. ear Support Vector Machines via Mathematical Pro- the centuries. This exposition presents recent ad- gramming.- Rule Extraction based on Support and vances in this new subfield. New concepts are care- Features Prototype Vectors.- SVMT-Rule: Association Rule fully developed and practical examples are extensive- Captures the most significant milestones in the mul- Mining over SVM Classification Trees.- Using rele- ly utilized to illustrate the ideas. A key feature are the timedia field. Includes chapters by the leading re- vance vector machines to generate prototype based mathematical proofs outlined throughout the text in searchers in the field. Covers the latest in multimedia rules.- PART III: Applications.- Prediction of First- reasonable detail which highlight the rigorous and content analysis and applications. Contains chapters Day [..] principled quality of [..] on a range of topics including the TRECVID effort, low-level audio-visual analysis based retrieval, video Fields of interest Features browsing interfaces, and the human experience of Appl.Mathematics/Computational Methods of Engi- Presents recent advances in the field of spectral multimedia, among others. neering; Artificial Intelligence (incl. Robotics) clustering, an interdisciplinary text Mathematical proofs discussed throughout the text in reasonably Contents Target groups heavy detail Includes applications to web The Human Experience of Multimedia.- An Engineers, researchers, and graduate students in and text mining and genomics Systematic Overview of the TRECVID Effort: Milestones and computational intelligence and computer science presentation  Challenges for the Future.- Content Creation and Content Analysis: A Re-Examination of Content Type of publication Contents Semantics.- Content Semantics Extraction.- Multi- Monograph Part 1 Basic Theory and Algorithms: Introduction.- media Content Analysis Overview.- Computational K-means clustering and spectral relaxation.- Spec- Aesthetics.- Content Browsing on the Internet.- A tral graph clustering.- Multi-way spectral cluster- Due January 2008 Survey of State-of-the-Art Multimedia.- Application ing.- Bipartite graph clustering.- Part 2 Advanced of Multimedia Content Analysis to Sports Video Ap- Spectral Clustering and Ordering: Perturbation anal- 2008. Approx. 300 p. (Studies in Computational Intelligence, Vol. plications.- Multimedia Content Analysis in Collab- ysis of spectral clustering.- Green's function.- Ran- 80) Hardcover oration with Content Creators.- Multimedia Content dom walk and probabilistic spectral clustering.- Se- Analysis Based Products and Possibilities for the Fu- mi-definite programming solution for spectral clus- 99,95 € ture. ISBN 978-3-540-75389-6 tering.- Spectral data ordering.- Part 3 Related unsu- pervised learning topics: Spectral ranking.- Further Fields of interest developments on PCA and SVD.- Nonlinear embed- Signal,Image and Speech Processing; Image Process- ding/representation.- Other [..] ing and Computer Vision; Electronic and Computer Engineering; Multimedia Information Systems Fields of interest Computational Science and Engineering; Manage- Target groups ment of Computing and Information Systems; Math Academic and industry researchers and practition- Applications in Computer Science; Statistics and ers. Computing/Statistics Programs; Statistics for Engi- neering, Physics, Computer Science, Chemistry & Type of publication Geosciences Contributed volume Target groups Senior undergraduate and graduate students, Due July 2008 researchers, practitioners 2008. Approx. 350 p. (Signals and Communication Technology) Type of publication Hardcover Monograph 69,30 € Due August 2008 ISBN 978-0-387-76567-9

2008. Approx. 400 p. Hardcover

61,60 € ISBN 978-0-387-30448-9 44 Computer Science springer.com/booksellers

A. Dong, University of Sydney, NSW, Australia; A. Moere, Vande, R. Downey, Victoria University of Wellington, New Zealand; D. T. Downey, Florida International University, Miami, FL, USA University of Sydney, NSW, Australia; J.S. Gero, George Mason Hirschfeldt, University of Chicago, IL, USA University, Fairfax, VA, USA (Eds.) Web Development with Java Algorithmic Randomness and Computer-Aided Architectural Complexity Using Hibernate, JSPs and Servlets Design Futures 2007

Proceedings of the 12th International CAAD Futures Confer- Web development is simpler than it seems, especial- ence This book is concerned with the theory of com- ly with the software tools freely available on the web. putability and complexity over the real numbers. This book breaks from the tradition of teaching a This theory was initiated by Turing, Grzegorczyk, history of web development and jumps to the good CAAD Futures is a biennial conference that aims to Lacombe, Banach, and Mazur and has seen rapid stuff from the outset so that students can start writ- promote the advancement of computer-aided archi- growth in recent years. Computability and complexi- ing real applications. It introduces readers to a 3- tectural design research and teaching. The confer- ty theory are two central areas of research in theoret- tiered, Model-View-Controller architecture by using ences are organised under the auspices of the CAAD ical computer science. Until recently, most work in Hibernate, JSPs, and Java Servlets. These three tech- Futures Foundation. The conference series started in these areas concentrated on problems over discrete nologies all use Java, so that a student with a good 1985 in Delft and has since traveled to major cities in structures, but there has been enormous growth of background in programming will be able to master Europe, Asia, and USA. This volume is the proceed- computability theory and complexity theory over the them. Java Server Pages are HTML pages that have ings of the 12th International Conference of CAAD real numbers and other continuous structures, espe- some data references in them. Java Servlet contain Futures, which took place in Sydney, Australia. The cially incorporating concepts of "randomness". One the business logic. Hibernate handles the data. This internationally refereed papers in this book present reason for this growth is that more and more com- book uses existing powerful technologies such as JSP, the state of the art in computer-aided architectural putation problems over the real numbers are being JavaBeans, Annotations, JSTL, Java 1.5, Hibernate, design research. The papers in this year's conference dealt with by computer scientists - in compu- Apache Velocity and Tomcat. It also presents Mod- theme, Integrating Technologies for Computer-Aid- tational geometry and in the modeling of dynami- el 1 architectures using Servlets and JSP as alterna- ed Design, provide the technological foundation for cal and hybrid systems. Scientists working on these tives to Perl and PHP. Written novice developers, new ways of thinking about using computers in de- questions come from such diverse fields as theoret- this book provides an introductory course in web de- signing and the use of computers in design itself as ical computer science, domain theory, logic, con- velopment for undergraduates as well [..] well as in the education of designers. Information structive mathematics, computer arithmetic, numeri- about the 2007 Conference and this book is avail- cal mathematics, [..] Features able at: http://www.arch.usyd.edu.au/kcdc/confer- Focuses on using existing tools that are freely avail- Contents ences/cf07 able on the web to speed up web development - A Preface.- Acknowledgments.- Introduction.- I. Back- student with a good background in programming Features ground.- Preliminaries.- Computability Theory.- will be able to develop a complete web site that ac- Part of an ongoing conference series that has been Kolmogorov Complexity of Finite Strings.- Relating cesses a database Uses Hibernate as the primary tool running for 22 years State-of-the-art CAAD research Plain and Prefix-Free Complexity.- Effective Reals.- to speed web development, as well as JSP Uses the and practice Broad topical coverage of applications II. Randomness of Sets.- Martin-Löf Randomness.- model-view-controller (mvc) approach for web de- of computing in architectural design Includes best Other Notions of Effective Randomness.- Algorith- velopment; also known as a three-tiered model practices about teaching and learning computing in mic Randomness and Turing Reducibility.- III. Rel- architectural design ative Randomness.- Measures of Relative Random- Contents ness.- The Quantity of K- and Other Degrees.- Ran- Browser-Server Communication.- Markup Lan- Contents domness-Theoretic Weakness.- Lowness for Other guage.- HTML forms.- Sending Data to Another From the contents Preface. Becoming Virtual.- Be- Randomness Notions.- Effective Hausdorff Dimen- Form.- The Truth About JSPs.- Using a Controller.- coming Educated.- Becoming Designed.- Algogram.- sion.- IV. Further Topics.- Omega as an Operator.- Registering a Servlet with Tomcat.- Servlet-JSP Di- Becoming Kiniesthetic.- Becoming Logical.- Being [..] rectory Structure.- Java beans.- Reorganizing the Supportive.- Being Virtual.- Becoming Tools.- Be- Bean.- Member Variables in Servlets.- Extending the coming Futuristic.- Becoming Determinable.- Being Fields of interest Bean.- Model, View Controller.- Required Valida- Creative.- Contact Author’s E-Mail Address. Author Algorithm Analysis and Problem Complexity; The- tion.- Saving a Bean to a Database.- HTML Informa- Index. ory of Computation; Computation by Abstract De- tion.- Style Sheets.- Form Elements.- Cookies.- Busi- vices ness Key in a Database.- Shopping Cart.- Shopping Fields of interest Cart Application.- Emailing a Confirmation.- MIME Target groups Design, general (Design, allgemein); Computer-Aid- Types.- Security.- Model 1 Architectures Using Java.- Researchers Scientists ed Engineering (CAD, CAE) and Design; Computer [..] Appl. in Arts and Humanities; Computers and Edu- Type of publication cation Fields of interest Monograph Information Systems and Communication Service; Target groups Information Systems Applications (incl.Internet) CAAD researchers, CAD researchers, design re- Due May 2008 searchers, graduate architecture students Target groups 2007. Approx. 600 pp. 40 illus. Hardcover Undergraduates Type of publication Proceedings ISBN 978-0-387-95567-4 Type of publication Undergraduate textbook Due October 2007 Due November 2007 2007. Approx. 616 p. With CD-ROM. Hardcover 2008. XIV, 284 p. 93 illus. Softcover 139,95 € ISBN 978-1-4020-6527-9 44,95 € ISBN 978-1-84628-862-3 springer.com/booksellers Computer Science 45

D. Draheim, Software Competence Center Hagenberg, Germany; G. Weber, University of Auckland, New Zealand (Eds.)

Trends in Enterprise Application Architecture

2nd International Conference, TEAA 2006, Berlin, Germany, November 29 - Dezember 1, 2006, Revised Selcted Papers

This book constitutes the thoroughly refereed post- proceedings of the 2nd International Conference on Trends in Enterprise Application Architecture, TEAA 2006, held in Berlin, Germany, November 29 - December 1, 2006. The 24 revised full papers pre- sented together with 1 invited talk were carefully re- viewed and selected from numerous submissions for inclusion in the book. Their common purpose is to identify problems or issues in enterprise appli- cation architecture and propose and evaluate a so- lution. Topics of interest are model driven architec- ture, enterprise development environments, service oriented architecture, data integration, sizing and cost estimation, performance benchmarking, mo- bile workforce access, multi-channel architecture, autonomous computing, enterprise grid computing, load balancing, and enterprise component platforms.

Fields of interest Special Purpose and Application-Based Systems; System Performance and Evaluation; Software Engineering; Information Systems Applications (incl.Internet)

Target groups Researchers and professionals

Type of publication Proceedings

Due October 2007

2007. X, 356 p. (Lecture Notes in Computer Science, Vol. 4473) Softcover

52,00 € ISBN 978-3-540-75911-9 springer.com/booksellers Computer Science 46

D. Draheim, Software Comptence Center, Hagenberg, Austria; S. Dudoit, University of California, Berkeley, CA, USA; M.J. van der R. Dutta, NC State University, Raleigh, NC, USA; A.E. Kamal, Iowa J. Grundy, University of Auckland, New Zealand; J. Hosking, Uni- Laan, University of California, Berkeley, CA, USA State University, Ames, IA, USA; G.N. Rouskas, NC State Universi- versity of Auckland, New Zealand; C. Lutteroth, University of ty, Raleigh, NC, USA (Eds.) Auckland, New Zealand; G. Weber, University of Auckland, New Zealand Multiple Testing Procedures with Applications to Genomics Traffic Grooming for Optical Software Engineering Tools Networks

Trends of Software Engineering Tools and Platforms Foundations and Techniques This book establishes the theoretical foundations of a general methodology for multiple hypothesis testing and discusses its software implementation in R and Traffic grooming is the name given to a family of op- The authors provide a high-level discussion of tools SAS. The methods are applied to a range of testing tical network design problems that has attracted sig- successfully used in today’s software engineering problems in biomedical and genomic research, in- nificant attention from both academia and indus- projects. Beyond state-of-the-art technology and cur- cluding the identification of differentially expressed try in the last decade or so. The huge bandwidth of rent trends, the book also provides a discussion of vi- and co-expressed genes in high-throughput gene fiber optical networking is much larger than the typ- sions and possible future trends of software develop- expression experiments, such as microarray experi- ical bandwidth demands experienced by network ment. It explains how tools support several activities ments; tests of association between gene expression service providers. This mismatch creates a need for in a software engineering life cycle. Tools for manag- measures and biological annotation metadata (e.g., multiplexing the low rate traffic demands into opti- ing work products, for requirements engineering, de- Gene Ontology); sequence analysis; and the genetic cal wavelength channels, but this requires costly elec- sign, coding, testing, version control, configuration mapping of complex traits using single nucleotide tronic switching equipment, potentially offsetting the management, deployment, and documentation are polymorphisms. The book is aimed at both statisti- benefit of cheap optical transport. Traffic grooming considered, as are tools for project management and cians interested in multiple testing theory and ap- refers to network design and resource allocation al- tracking. The book summarizes the features of each plied scientists encountering high-dimensional test- gorithms that can enable cost-efficient use of both class of software engineering tools on a conceptual ing problems in their subject matter area. Specifical- network bandwidth and electronic switching. Due to level, so that the reader is able to estimate the poten- ly, the book proposes resampling-based single-step the increasing bandwidth of optical communication tial risks and rewards of various software tools to de- and stepwise multiple testing procedures for control- on the one hand, and the growing variety of traffic cide which is best suited for their task. This makes ling a broad class of Type I error rates, defined as tail demand magnitudes on the other, traffic grooming the book a valuable resource for software develop- probabilities and expected values for [..] ers, solution providers, decision makers and project has grown from a narrow research area to a main- managers. Features stream requirement for real world practitioners. This This book provides a detailed account of the theoret- book presents the practical motivation, [..] Features ical foundations of proposed multiple testing meth- Features Requirements analysis of software tools. The book ods and illustrates their application to a range of test- Covers fundamental and theoretical concepts relat- focuses on technologies that have been proven to add ing problems in genomics value in software engineering projects. The book em- ed to traffic grooming as well as a wide range of ex- phasizes the importance of several different tools, Contents isting approaches Includes a description of various which address all other software engineering activi- Multiple hypothesis testing.- Test statistics null dis- areas of research by the leading researchers in those ties. tribution.- Overview of multiple testing procedures.- areas Presents the practical motivation, theoretical Single-step multiple testing procedures for control- description, and extant techniques for traffic groom- Contents ling general Type I error rates.-Step-down ing in optical networks Part 1: Software Tools.- Tools for different phases of multiple testing procedures for controlling the fam- Contents the software lifecycle - a taxonomy.- Project manage- ily-wise error rate.- Augmentation multiple testing Introduction.- Section 1 Enabling Technology and ment, requirements engineering, design coding, test- procedures for controlling generalized tail probabil- Standards.- Grooming Switches.- Control Plane Sup- ing, version control, configuration management, de- ity error rates.- Resampling-based empirical Bayes port for Traffic Grooming.- Mechanisms Enabling ployment, documentation.- Part 2: Tool Platforms.- multiple testing procedures for controlling general- Grooming in First and Next Generation SONET/ Tool integration and extension: data/control/presen- ized tail probability error rates.- Simulation studies: SDH.- Section 2 Theoretical Backround.- Complex- tation/process integration of tools.- Examples: Assessment of test statistics null distributions.- Iden- ity Theory for Traffic Grooming.- Traffic Models LINUX/Unix.- VisualStudio.- Eclipse, Net- tification of [..] Beans.- Part 3: Tool Directins.- Current and future in Dynamic Traffic Grooming.- Hierarchical Traf- trends of tools: MDD, agents, autonomic computing, Fields of interest fic Grooming.- Section 3 Static Traffic Grooming.- open source, agile methods, global software develop- Bioinformatics; Statistical Theory and Methods; Traffic Grooming in SONET Rings.- Traffic Groom- ment.- Statistics for Life Sciences, Medicine, Health Sciences ing in Next Generation SONET/SDH Networks.- Large-Scale Hybrid Optoelectronic Networks.- Net- Fields of interest Target groups work Dimensioning and Provisioning Exact Ap- Multimedia Information Systems; Software Engi- Researchers proaches.- Network [..] neering; Computer Communication Networks; Soft- ware Engineering/Programming and Operating Sys- Type of publication Fields of interest tems; Programming Techniques; Programming Lan- Monograph Communications Engineering, Networks; Computer guages, Compilers, Interpreters Communication Networks; Microwaves, RF and Op- tical Engineering Due December 2007 Target groups IT-architects, developers, project managers and sys- Target groups tem administrators 2007. Approx. 585 p. (Springer Series in Statistics) Hardcover Students and engineers of optical network design and traffic grooming Type of publication 69,95 € Professional book ISBN 978-0-387-49316-9 Type of publication Monograph Due June 2008 Due March 2008

2008. Approx. 400 p. Hardcover 2008. Approx. 300 p. (Optical Networks) Hardcover 49,95 € ISBN 978-3-540-74939-4 99,35 € ISBN 978-0-387-74517-6 springer.com/booksellers Computer Science 47

J.L. Dvorak, Motorola iDEN Emerging Technologies, Boca Raton, 76,95 € L. Dybkjær, Natural Interactive Systems Laboratory, Brøndby, FL, USA ISBN 978-0-387-69139-8 Denmark; W. Minker, University of Ulm, Germany (Eds.) Moving Wearables into the Recent Trends in Discourse and Mainstream Dialogue

Taming the Borg

This book is a collection of eleven chapters which together represent an original contribution to the The term "Wearable Technology" encompasses a field of (multimodal) spoken dialogue systems. The wide spectrum of devices, services and systems for chapters include highly relevant topics, such as dia- wireless communications and the web. Wearables logue modeling in research systems versus industri- are by their nature closely associated with the per- al systems, evaluation, miscommunication and er- son, and their use generates many social and even le- ror handling, grounding, statistical and corpus-based gal issues that have little to do with specific technolo- approaches to discourse and dialogue modeling, da- gies. This professional book discusses the character- ta analysis, and corpus annotation and annotation istics and design elements required for wearable de- tools. The book contains several detailed application vices and systems to be widely adopted by the main- studies, including, e.g., speech-controlled MP3 play- stream population for use in their everyday lives. ers in a car environment, negotiation training with It shows how wearables can help people with a virtual human in a military context, application of daily tasks without getting between the user and the spoken dialogue to question-answering systems, and task. Moving Wearables into the Mainstream also in- cognitive aspects in tutoring systems. The chapters troduces concepts such as Operational Inertia that vary considerably with respect to the level of exper- form a mindset conducive to designing wearables tise required in advance to benefit from them. How- suitable for broad adoption by consumers. This book ever, most chapters start with a state-of-the-art de- provides insight into legal and cultural issues poten- scription from which all readers from the spoken di- tially unfamiliar to research engineers, as well as a alogue community may benefit. Overview [..] broad discussion of technologies underlying wear- able devices. Moving Wearables into the [..] Features Unique and original contribution to the fields of spo- Features ken dialogue systems and human-computer interac- Provides a broad discussion of the various technolo- tion Covers hot topics such as miscommunication, gies underlying wearable devices Useful to practi- error handling and recovery, evaluation, and sensi- tioners of wearable research by giving an overview tivity to the cognitive states of the user Includes sev- of areas outside their own that are relevant to wear- eral highly relevant and original application studies ables and may form the context in which they con- concerning, e.g., MP3 players in a car environment, duct their research Strives to answer how wearables negotiation training in a military context, and [..] can be designed to help people with daily tasks with- out getting between the users and the tasks they are Contents trying to do Preface.- Contributing Authors.- Trends and Chal- lenges in Discourse and Dialogue.- 1 Where Do We Contents Go From Here?.- 2 Designing Speech-controlled Acknowledgments.- Preface.- Introduction To Wear- Media File Selection for Automotive Systems.- 3 A ables.- Background.- Wearable System Applications.- Virtual Human Dialogue Model for Non-Team In- Overview Of Wearable Systems.- Mainstream Wear- teraction.- 4 Evaluating Interactions with Spoken able Design.- Overview Of Mainstream Wearable Dialogue Telephone.- 5 Handling Miscommunica- Design .- Mainstream Wearable Design In Detail.- tion: Why Bother?.- 6 Sorry I Didn’t Catch Supporting Technologies.- Awareness And Immer- That!.- 7 GALATEA: A Discourse Modeller Support- sion.- Communication And Power.- Mainstream ing Concept-Level Error Handling in Spoken Dia- Wearable Systems User Interfaces.- Sight And Sound logue Systems.- 8 Partially Observable Markov Deci- User Interfaces.- Emerging User Interfaces.- Some sion Processes with Continuous Observations for Di- Tough Hurdles And The Future.- Social Issues Of alogue Management.- 9 [..] Wearables.- Future Of Wearable Systems.- Why Tame The Borg?.- Glossary Of Wearable Terms.- In- Fields of interest dex.   Linguistics (General); User Interfaces and Human Computer Interaction; Artificial Intelligence (incl. Fields of interest Robotics); Computational Linguistics Computer Communication Networks; Communi- cations Engineering, Networks; Information Sys- Target groups tems Applications (incl.Internet); Operating Sys- Advanced graduate students, PhD students, academ- tems; Computer Systems Organization and Com- ic and industrial researchers and practitioners munication Networks; Special Purpose and Applica- tion-Based Systems Type of publication Contributed volume Target groups Researchers and practitioners in industry; secondary, Due March 2008 advance-level students

Type of publication 2008. Approx. 345 p. (Text, Speech and Language Technology, Monograph Vol. 39) Hardcover

140,00 € Due December 2007 ISBN 978-1-4020-6820-1

2008. Approx. 404 p. 30 illus. Hardcover 48 Computer Science springer.com/booksellers

S. Džeroski, J. Struyf (Eds.) R.A. Earnshaw, University of Bradford, UK; J.A. Vince, University of A. Ebersbach, Regensburg, Germany; M. Glaser, Regensburg, Ger- Bournemouth, UK (Eds.) many; R. Heigl, Regensburg, Germany Knowledge Discovery in Inductive Databases Digital Convergence - Libraries of Wiki the Future Web Collaboration 5th International Workshop, KDID 2006 Berlin, Germany, September 18th, 2006 Revised Selected and Invited Papers

The convergence of IT, telecommunications, and Wikis are Web-based applications that allow all users media is changing the way information is collected, not only to view pages but also to change them. The This book constitutes the thoroughly refereed joint stored and accessed. This is mainly due to reducing success of the Internet encyclopedia Wikipedia has postproceedings of the 5th International Workshop cost, increasing quality, and increasing bandwidth. drawn increasing attention from private users, small on Knowledge Discovery in Inductive Databases, Digital information preserves content accuracy (e.g. organizations and enterprises to the various possi- KDID 2006, held in Berlin, Germany, September digital television) in a way other systems do not. In- ble uses of wikis. Their simple structure and straight- 18th, 2006 in association with ECML/PKDD. The 15 formation is ubiquitous and globally accessible, and forward operation make them a serious alternative revised full papers presented together with 1 invit- can be held and accessed just as easily on a global to expensive content management systems and al- ed paper were carefully selected during two rounds network as on a local personal computer or in a lo- so provide a basis for many applications in the area of reviewing and improvement for inclusion in the cal library. Devices are increasingly intelligent and of collaborative work. We show the practical use of book. Bringing together the fields of databases, ma- are network-ready. User interfaces are more adapt- wikis in carrying out projects for users as well as for chine learning, and data mining the papers address able and flexible, and can be tailored to particular ap- maintainers. This includes a step-by-step introduc- various current topics in knowledge discovery and plication domains. Digital intelligence is becoming tion to wiki philosophy, social effects and functions, data mining in the framework of inductive databases seamless and invisible, enabling more attention to be a survey of their controls and components, and the such as constraint-based mining, database technolo- paid to the content and the user’s interaction with it. installation and configuration of the wiki clones Me- gy and inductive querying. This revolution is having effects on the development diaWiki and TWiki. In order to exemplify the possi- Fields of interest and organisation of information and artefact repos- bilities of the software, we use it as a project tool for Database Management; Artificial Intelligence (incl. itories such as libraries, museums, and exhibitions, planning a conference. Robotics) and the way in which physical and digital aspects are mediated to users. Features Target groups Offers a guide to the application of Wikis Prac- Researchers and professionals Features tice-oriented presentation with directly applica- This book presents key aspects in the rapidly ble tools CD-ROM with OpenSource Wiki Tools, a Type of publication moving field of digital convergence in the areas of project data base with sample pages Proceedings technology and information sciences. The chapters are written by international experts who are leaders Contents in their fields. Preface to the Second Edition.- Wiki: The Wiki Con- Due October 2007 cept.- The Installation.- First Steps.- The Core Func- Contents tions of MediaWiki.- Formatting.- Multi-Page Struc- 2007. X, 301 p. also available online. (Lecture Notes in Computer From the contents: From Boutique to Mass Digitiza- tures.- Components: the Function Pages.- Admin- Science, Vol. 4747) Softcover tion: the Google Library Project at Oxford.- Digital istration.- Life in MediaWiki.- TWiki, the Jack of Services in Academic Libraries: the Internet is Setting all Trades: Installing TWiki.- Working with TWi- 48,00 € Benchmarks.- Early History of Janet and Library De- ki.- Formatting in TWiki.- Searching in TWiki.- Us- ISBN 978-3-540-75548-7 velopments.- World-Class Universities Need World- er Permissions in TWiki.- Administering TWiki.- Class Libraries and Information Resources – but Designing a TWiki.- TWiki as a Project Kit: Pre- how can they be provided?- The International Di- liminary Thoughts: What is a Project.- Conceptual mensions of Digital Science and Scholarship: Aspi- Phase: Collecting Ideas and Outlining the Project.- rations of the British Library in Serving the Interna- Composing the Project Plan.- Preparing for Your [..] tional Scientific and Scholarly Communities.- Con- sortium of University Research Libraries (CURL) – Fields of interest Past, Present and Future.- For Better [..] Information Systems Applications (incl.Internet); Multimedia Information Systems; Document Prepa- Fields of interest ration and Text Processing; Media Design Information Storage and Retrieval; Information Sys- tems and Communication Service; User Interfaces Target groups and Human Computer Interaction Media designers, web designers, screen designers

Target groups Type of publication Information Scientists and Librarians Professional book

Type of publication Due November 2007 Monograph

2008. Approx. 400p. With CD-ROM. Softcover Due November 2007 44,95 € 2007. Approx. 555 p. Hardcover ISBN 978-3-540-35150-4

119,95 € ISBN 978-1-84628-902-6 springer.com/booksellers Computer Science 49

N. Ehrentreich, RiverSource Investments, Minneapolis, MN, USA R. Elber, , Ithaca, NY, USA A. Elgammal, Rutgers State University, Piscataway, NJ, USA; B. Rosenhahn, Max-Planck-Center, Saarbruecken, Germany; R. Klette, University of Auckland, New Zealand (Eds.) Agent-Based Modeling Protein Modeling with

The Santa Fe Institute Artificial Stock Market Model Revisited Bioinformatics and Biophysics Human Motion - Understanding, Modeling, Capture and Animation

This book reconciles the existence of technical trad- At the core of biological complexity are the small Second Workshop, HumanMotion 2007, Rio de Janeiro, Brazil, October 20, 2007, Proceedings ing with the Efficient Market Hypothesis. By analyz- machines that maintain the whole: the protein ing a well-known agent-based model, the Santa Fe molecules. Proteins are encoded by DNA sequences, Institute Artificial Stock Market (SFI-ASM), it finds spontaneously adopt unique three-dimensional that when selective forces are weak, financial evolu- shapes, and perform a wide range of biological func- This book constitutes the refereed proceedings of tion cannot guarantee that only the fittest trading tions in living systems. Scientists from a broad range the Second Workshop on Human Motion, Human- rules will survive.Its main contribution lies in the ap- of disciplines are fascinated by these biological ma- Motion 2007, held in Rio de Janeiro, Brazil October plication of standard results from population genet- chines and use computational means to study the 20, 2007 in conjunction with ICCV 2007. The 22 re- ics which have widely been neglected in the agent- evolution, biophysical properties and biological con- vised full papers presented were carefully reviewed based community. This has led to various misinter- text of proteins. This book discusses the interface be- and selected from 38 submissions. The papers are or- pretations of previous simulation results. The book tween the different disciplines and the mixed sets of ganized in topical sections on Motion Capture and is able to finally establish the emergence of technical theoretical and computational methods used by each Pose Estimation, Body and Limb Tracking and Seg- trading for faster learning speeds in the SFI-ASM be- to study proteins. Tools vary from machine learning mentation and Activity Recognition. yond a doubt. In emphasizing the importance of ge- and statistical methods to text matching and identifi- netic drift as an important evolutionary factor and cation of homologous proteins, to statistical physics Fields of interest analyzing its effects on various mutation operators, formulation of random energies and protein folding, Simulation and Modeling; Artificial Intelligence (in- this book provides agent-based modelers with several and to molecular dynamic simulations of proteins in cl. Robotics); Computational Biology/Bioinformat- tools to design better evolutionary algorithms. action. Protein Modeling with Bioinformatics and ics; Biometrics Biophysics will benefit scientists and advanced-level Contents students interested in this [..] Target groups Agent-Based Modeling in Economics: Introduc- Researchers and professionals tion.- The Rationale for Agent-Based Modeling.- The Features Concept of Minimal Rationality.- Learning in Eco- Interdisciplinary approach to computational study of Type of publication nomics.- Replicating the Stylized Facts of Fincan- proteins, based on notions from computer science, Proceedings cial Markets.- The Santa Fe Institute Artificial Stock physics, chemistry and biology, offers an especially Market Model Revisited: The Original Santa Fe In- broad perspective on the field Traditionally proteins Due October 2007 stitute Artificial Stock Market.- A Suggested Modifi- were studied on the sequence, structure, or dynami- cal and functional levels Outlines a complete hierar- cation to the SFI-ASM.- An Analysis of Wealth Lev- 2007. X, 329 p. (Lecture Notes in Computer Science, Vol. 4814) els.- Selection, Genetic Drift, and Technical Trad- chy of theoretical and computational studies used to Softcover ing.- Summary and Future Research. study proteins by researchers from different fields 48,00 € Fields of interest Contents ISBN 978-3-540-75702-3 Financial Economics; Artificial Intelligence (incl. The Darwin approach to proteins: Protein fami- Robotics); Operation Research/Decision Theory; lies (function, structure, and sequence). Protein se- Methodology and the History of Economic Thought; quences. Introduction to Protein structures. Fold Computer Appl. in Social and Behavioral Sciences recognition. Statistical mechanics of sequence space.- The Boltzmann approach to proteins: The hy- Target groups drophobic force. Modeling protein energy and ther- Scientists modynamics. Ab-initio protein folding. Kinetics.- Index. Type of publication Monograph Fields of interest Simulation and Modeling; Bioinformatics; Theoreti- Due October 2007 cal and Computational Chemistry; Mathematical Bi- ology in General; Mathematical and Computational Physics; Computer Applications in Chemistry 2008. XVI, 230 p., 39 illus. (Lecture Notes in Economics and Math- ematical Systems, Vol. 602) Softcover Target groups 59,95 € Research scientists ISBN 978-3-540-73878-7 Type of publication Monograph

Due July 2008

2008. Approx. 350 p. 20 illus. Hardcover

74,95 € ISBN 978-0-387-32988-8 50 Computer Science springer.com/booksellers

D. Eppstein, University of California, Irvine, CA, USA; J.-C. Fal- R. Epstein, University of California, San Diego, CA, USA; G. M. Ericsson, University of Cambridge, UK (Ed.) magne, University of California, Irvine, CA, USA; S. Ovchinnikov, Roberts, NCR, San Diego, CA, USA; G. Beber, Gartner Consulting, San Francisco State University, CA, USA Stamford, CT, USA (Eds.) Quantum Information and Many Media Theory Parsing the Turing Test Body Quantum Systems

Interdisciplinary Applied Mathematics Philosophical and Methodological Issues in the Quest for the Thinking Computer In the last years a growing attention has been dedi- cated to many body quantum systems from the point The focus of this book is a mathematical structure of view of quantum information. Indeed, after the modeling a physical or biological system that can be Parsing the Turing Test is a landmark exploration initial investigation of simple systems as single or in any of a number of `states.' Each state is charac- of both the philosophical and methodological issues two qubits, the need of understanding the character- terized by a set of binary features, and differs from surrounding the search for true artificial intelligence. istics of a realistic quantum information device leads some other neighbor state or states by just one of Will computers and robots ever think and commu- necessarily to the study of many body quantum sys- those feature. A simple example of a `state’ is a par- nicate the way humans do? When a computer cross- tems. These studies are also driven by the very fast tial solution of a jigsaw puzzle, which can be trans- es the threshold into self-consciousness, will it im- development of experiments which in the last years formed into another partial solution or into the final mediately jump into the Internet and create a World reach the goal of coherent control of a few qubits solution just by adding or removing a single adjoin- Mind? Will intelligent computers someday recog- (ion traps, charge qubits, etc.) with a roadmap for ing piece. The evolution of such a system over time nize the rather doubtful intelligence of human be- further scaling and improvement of coherent control is considered. Such a structure is analyzed from alge- ings? Distinguished psychologists, computer scien- and manipulation techniques. This book gives a se- braic and probabilistic (stochastic) standpoints. tists, philosophers, and programmers from around lection of current research topics in the field the world debate these weighty issues – and, in effect, of quantum information for many body quantum Features the future of the human race – in this important vol- systems together with open problems. Provides an algebraic framework and fundametal ume. results of Media Theory Reference for e-games, e- Features learning, e-genetics Features First book in this area New paradigm of performing The most comprehensive analysis of The Turing quantum information tasks, such as quantum infor- Fields of interest Test - the ultimate benchmark of true artificial intel- mation transfer, quantum cloning and others, with- Applications of Mathematics; Theory of Computa- ligence ever published Features new contributions out direct control of the whole quantum system but tion; Artificial Intelligence (incl. Robotics); Combi- from 37 eminent scholars in computer science, psy- using our knowledge of it has increased the need of natorics chology and philosophy, including Ray Kurzwell, tools to understand in details the behaviour of many Noam Chomsky, Paul Churchland, John R. Sear- body quantum system as we find them in nature Target groups le and Andrew Hodges Includes running commen- New goals of the quantum information community Scientists, researchers taries by Stevan Harnad, Kenneth Ford, Pat Hayes lead to an [..] and others on Alan Turing's [..] Type of publication Contents Monograph Contents Preface.- Entanglement percolation in quantum net- From the contents Foreword. Acknowledgements. works.- Classical simulation of strongly correlated Due October 2007 Introduction. About the Editors. Part I. Setting the systems.- Quantum information and many body the- Stage. Part II. The Ongoing Philosophical Debate. ory.- Electronic Hong-Ou-Mandel interferometer for Part III. The New Methodological Debates. Part IV. 2008. X, 328 p. 92 illus., some in color. Hardcover multi-mode entanglement detection.- Energy, entan- Afterthoughts on Thinking Machines. glement, and information transfer in many body sys- 74,95 € tems.- Infinite spin chains and algebras.- New results Fields of interest ISBN 978-3-540-71696-9 on MPS.- A quantum approach to classical statistical Computational Linguistics; User Interfaces and Hu- mechanics.- Atom-light teleportation.- Lieb Robin- man Computer Interaction; Artificial Intelligence son bounds in quantum spin systems and application (incl. Robotics); Philosophy of Language; Psycholin- to quantum information theory.- A metric approach guistics to phase transitions. Target groups Fields of interest Professionals, students Information and Communication, Circuits; Mathe- Type of publication matics of Computing; Data Structures, Cryptology Contributed volume and Information Theory Target groups Due December 2007 Graduate students and researchers that want to get an overview and introduction to current develop- 2008. Approx. 535 p. Hardcover ments in the field

149,95 € Type of publication ISBN 978-1-4020-6708-2 Proceedings

Due January 2008

2008. Approx. 400 p. (CRM Series, Vol. 5) Softcover

25,00 € ISBN 978-88-7642-307-9 springer.com/booksellers Computer Science 51

A. Esposito, University of Naples, Italy; M. Faundez-Zanuy, Escola V. Esposito Vinzi, Università di Napoli, Italy; W.W. Chin, University L. Fan, Surrey University, Guildford, UK; H. Cruickshank, Surrey Universitaria Politecnica de Mataro, Spain; E. Keller, Université de of Houston, TX, USA; J. Henseler, Radboud Universiteit Nijmegen, University, Guilford, UK; Z. Sun, Surrey University, Guildford, Uk Lausanne, Switzerland; M. Marinaro, Università di Salerno, Italy The Netherlands; H. Wang, Beijing University of Aeronautics and (Eds.) (Eds.) Astronautics, Beijing, China (Eds.) IP Networking over Next- Verbal and Nonverbal Handbook of Partial Least Squares Generation Satellite Systems Communication Behaviours Concepts, Methods and Applications in Marketing and Related Fields International Workshop, Budapest, July 2007 COST Action 2101 International Workshop, Vietri sul Mare, Italy, March 29-31, 2007, Revised Selected and Invited Papers

The new volume of Computational Statis- With the boom of Internet, IP-based applications, tics represents a comprehensive overview of Partial such as WWW and multimedia, bave been an essen- This book constitutes the thoroughly refereed post- Least Squares (PLS) methods with specific reference tial part of our life, and there is an ever-increasing proceedings of the COST Action 2102 Internation- to their use in marketing and with a discussion of demand for accessing high-speed Internet services al Workshop on Verbal and Nonverbal Communi- the directions of current research and perspectives. anywhere and anytime. This trend unavoidably has cation Behaviours held in Vietri sul Mare, Italy, in The handbook covers the broad area of PLS meth- huge impacts on the design of the next-generation March 2007. The 26 revised full papers presented to- ods -from regression to structural equation model- satellite systems. On the other hand, with its broad- gether with 1 introductory paper comprise careful- ing applications, software and interpretation of re- casting nature and unique coverage, satellite systems ly reviewed and selected participants’ contributions sults. It features papers on the use and the analysis also can play an important role in the next-genera- and invited lectures given at the workshop. The pa- of latent variables and indicators by means of the tion Internet. For example, satellite systems can be pers are organized in topical sections on verbal and PLS path modeling approach from the design of the a good driver for the deployment of IPv6 in the In- nonverbal coding schema, emotional expressions, causal network to model assessment and improve- ternet, and can provide a fast way to reach end-users gestural expressions, analysis and algorithms for ver- ment. Within the PLS framework, the handbook al- because they do not rely on construction of a high- bal and nonverbal speech, as well as machine multi- so addresses advanced topics such as the analysis of speed terrestrial networks. The workshop proceed- modal interaction. multi-block, multi-group and multi-structured data, ings will focus on the IP networking of next-genera- tion satellite systems. Topics include IPv6 over satel- Fields of interest the use of categorical indicators, the study of inter- lites, new architectures of next-generation satellite Artificial Intelligence (incl. Robotics); User Inter- action effects, the integration of classification issues, systems, satellite and terrestrial network integration, faces and Human Computer Interaction; Informa- the validation aspects and the comparison between network monitoring and measurement, and perf- tion Systems Applications (incl.Internet); Computers the PLS approach and covariance based structural mance enhancement. and Society; Computers and Education equation modeling. Most chapters comprise a [..] Features Target groups Features Introduces the latest innovations and trends in IP- Researchers and professionals Up-to-date review of the PLS methods recently de- velopped and their applications in marketing Com- based applications and satellite networking Explains Type of publication plete and comprehensive overview of the field Fo- many aspects of advanced satellite networking sys- Proceedings cus both on statistical methodology and selected real tems, such as deployment of IPv6 over satellites, world problems working with WLAN and WiMax, and rules con- cerning multi-segment networks (including satel- Due October 2007 Contents lites). Covers hot-button issues such as security, ar- Methods: PLS Path Modeling: Concepts, Model Es- chitecture improvement, resource allocation, video 2007. XII, 325 p. (Lecture Notes in Computer Science, Vol. 4775) timation and Assessment.- PLS Path Modeling: Ex- networking, and [..] Softcover tensions.- PLS Path Modeling with Classification Is- sues.- PLS Path Modeling for Customer Satisfaction Contents 48,00 € Studies.- PLS Regression.- Applications to Market- New Architecture for Next Generation Broadband ISBN 978-3-540-76441-0 ing and Related Areas.- Tutorials with Didactic Ap- Satellite Systems -- the Satsix Approach.- SATLIFE: proach. A Big Step into the Enhancement of the Regenera- tive Satellite Generation.- SATSIX Satellite System Fields of interest and Network.- Fast IP Handover Between Satellite Statistics and Computing/Statistics Programs; Statis- Network and Wireless LAN Network for high-speed tical Theory and Methods; Marketing trains.- SATSIX Mobility Architecture and its Per- formance Evaluation.- Cross-Layer Anticipation of Target groups Resources Allocatino for Multimedia Applicatinos Scientists over DVB-RCS Based on SIP Signalling.- Radio Re- source Management for Next Generation DVB-RCS Type of publication Systems.- SATSIX: A Network Architecture for Next Handbook [..]

Due February 2008 Fields of interest Information Systems and Communication Service; Information Systems Applications (incl.Internet); 2008. Approx. 850 p. (Springer Handbooks of Computational Space Exploration and Astronautics Statistics) Hardcover

249,00 € Target groups ISBN 978-3-540-32825-4 Professionals involved in research, development, and implementation, of next-generation networks and satellite systems

Type of publication Proceedings

Due February 2008

2008. Approx. 350 p. Hardcover

107,05 € 52 Computer Science springer.com/booksellers

ISBN 978-0-387-75427-7 R.T. Farouki, University of California, Davis, CA, USA H. Fathi, Aalborg University, Denmark; S.S. Chakraborty, Finland University, Finland; R. Prasad, Aalborg University, Denmark Pythagorean-Hodograph Curves: A Framework for VoIP in IP-based Algebra and Geometry Inseparable Wireless Heterogeneous Networks

Signaling, Mobility, Security By virtue of their special algebraic structures, Pythagorean-hodograph (PH) curves offer unique advantages for computer-aided design and manu- Nowadays, the convergence of systems and services facturing, robotics, motion control, path planning, reaches another dimension. Users experience several computer graphics, animation, and related fields. wireless systems such as the general packet radio ser- This book offers a comprehensive and self-contained vice (GPRS) system, the universal mobile telecom- treatment of the mathematical theory of PH curves, munication system (UMTS), and wireless local area including algorithms for their construction and ex- networks (WLANs) and demand ubiquitous mobile amples of their practical applications. Special fea- services including real-time services, and high data tures include an emphasis on the interplay of ideas rate applications. It is therefore natural to forecast from algebra and geometry and their historical ori- the convergence of these existing systems towards gins, detailed algorithm descriptions, and many fig- an IP-based wireless heterogeneous network. In this ures and worked examples. The book may appeal, in new heterogeneous system, the user expects to roam whole or in part, to mathematicians, computer scien- seamlessly while using real-time services. The service tists, and engineers. providers should therefore provide applications that are independent of access infrastructures and should Features support seamless user experience in any kinds of net- Fantastic new textbook on mathematical background works (cellular, WLAN etc.). On the other hand, it is to computer-aided geometric design. important to note that the envisioned convergence Fields of interest of different systems is preceded by the convergence Computational Mathematics and Numerical Analy- of different types of traffic. Voice and data traffic are sis; Geometry; Algebra; Computer Imaging, Vision, usually treated [..] Pattern Recognition and Graphics; Numerical and Features Computational Methods in Engineering; Automotive The provision of real-time services in wireless het- and Aerospace Engineering erogeneous networks requires a set of time-efficient Target groups control mechanisms to support a VoIP session with Students, researchers and professionals in mathe- acceptable quality. In this book, we specifically focus matics, computer science, computer aided geometric on mechanisms that affect the VoIP user satisfaction design, engineering and manufacturing while not explicitly involved in the media session (i.e. the coded speech). This relates to the extra delays in- Type of publication troduced by the security and the [..] Graduate/advanced undergraduate textbook Contents 1. Introduction: Background, Due October 2007 Motivation, Challenges, Session Setup Delay in IP Multimedia Subsystem, Authentication De- 2008. XVI, 728 p. 204 illus. (Geometry and Computing, Vol. 1) lay in WLAN 802.11b, Handover Delay at the Net- Hardcover work Layer, Secure Handover at the Network Lay- er 2. Overview of IP-based Wireless Heterogeneous 59,95 € Networks: Introduction, Access Networks Consid- ISBN 978-3-540-73397-3 ered, IEEE 802.11b, 3GPP Cellular Systems: GPRS/ UMTS, Integration of WLAN and GPRS/UMTS, Re- al-time service: Voice over IP, VoIP in the IP Multi- media Subsystem 3. Models for Delay Analysis: Ran- dom Error Process, Correlated Error Process, Impact of Signaling on Real-time Services: [..]

Fields of interest Communications Engineering, Networks; Comput- er Systems Organization and Communication Net- works; Signal,Image and Speech Processing

Target groups Graduate level students, engineers and researchers active in the area of Wireless Networks and Commu- nications

Type of publication Monograph

Due March 2008

2008. Approx. 300 p. Hardcover

89,95 € ISBN 978-1-4020-6630-6 springer.com/booksellers Computer Science 53

R. Featherstone, The Australian National University, Canberra, G. Fey, University of Bremen, Germany; R. Drechsler, University of J. Filipe, INSTICC, Setubal, Portugal; H. Coelhas, INSTICC, Setubal, ACT, Australia Bremen, Germany Portugal; M. Saramago, INSTICC, Setubal, Portugal (Eds.)

Rigid Body Dynamics Algorithms Robustness and Usability in Modern E-business and Telecommunication Design Flows Networks

Second International Conference, ICETE 2005, Reading, UK, Rigid Body Dynamics Algorithms presents the sub- October 3-7, 2005. Selected Papers ject of computational rigid-body dynamics through The size of technically producible integrated circuits the medium of spatial 6D vector notation. It explains increases continuously. But the ability to design and how to model a rigid-body system and how to ana- verify these circuits does not keep up with this devel- lyze it, and it presents the most comprehensive col- This book constitutes the refereed proceedings of the opment. Therefore today’s design flow has to be im- lection of the best rigid-body dynamics algorithms Second International Conference on E-business and proved to achieve a higher productivity. In Robust- to be found in a single source. The use of spatial vec- Telecommunication Networks, ICETE 2005, held in ness and Usability in Modern Design Flows the cur- tor notation greatly reduces the volume of algebra Reading, UK, on October 3-7, 2005. The 85 revised rent design methodology and verification methodol- which allows systems to be described using fewer full papers presented were carefully reviewed and se- ogy are analyzed, a number of deficiencies are iden- equations and fewer quantities. It also allows prob- lected from 151 submissions. The papers are orga- tified and solutions suggested. Improvements in the lems to be solved in fewer steps, and solutions to be nized in topical sections on Global Communication methodology as well as in the underlying algorithms expressed more succinctly. In addition algorithms Information Systems and Services, Security and Reli- are proposed. An in-depth presentation of prelimi- are explained simply and clearly, and are expressed ability in Information Systems and Networks, Wire- nary concepts makes the book self-contained. Based in a compact form. The use of spatial vector nota- less Communication Systems and Networks, and on this foundation major design problems are tar- tion facilitates the implementation of dynamics algo- Multimedia Signal Processing. geted. In particular, a complete tool flow for Synthe- rithms on a computer: shorter, simpler code that is sis for Testability of SystemC descriptions is present- easier to write, understand and debug, with no loss Fields of interest ed. The resulting circuits are completely testable and of efficiency. Unique features include: A comprehen- e-business and e-commerce; Systems and Data Se- test pattern generation in polynomial time is possi- sive collection of the best rigid-body dynamics algo- curity; Data Structures, Cryptology and Informa- ble. Verification issues are covered in even more de- rithms Use of spatial (6D) vectors to [..] tion Theory; Computer Communication Networks; tail. A whole new paradigm for formal design verifi- Computer Systems Organization and Communica- Features cation is suggested. This is [..] tion Networks Contains a comprehensive collection of the best Features rigid-body dynamics algorithms Shows how the use Target groups More automation for time consuming tasks Power- of spatial (6D) vectors greatly reduces the volume of Researchers and professionals ful tools by exploiting formal techniques Visionary algebra and simplifies the computer code to imple- approach for formal design verification Debugging Type of publication ment algorithms Expresses algorithms both mathe- at the source level becomes easy Robustness against Proceedings matically and in pseudocode for easy translation to error prone manual interventions computer programs Includes a new chapter on how Due November 2007 to build computer-oriented models of rigid-body Contents systems Provides [..] Dedication. List of Figures. List of Tables. Preface. 1. Introduction. 2. Preliminaries. 3. Algorithms and 2007. XIII, 293 p. (Communications in Computer and Information Contents Data Structures. 4. Synthesis. 5. Property Generation. Science, Vol. 3) Softcover Introduction.- Spatial Vector Algebra.- Dynamics 6. Diagnosis. 7. Summary and Conclusions. Refer- of Rigid Body Systems.- Modelling Rigid Body Sys- 58,00 € ences. Index of Symbols. Index.   tems.- Inverse Dynamics.- Forward Dynamics - In- ISBN 978-3-540-75992-8 ertia Matrix Methods.- Forward Dynamics - Propa- Fields of interest gation Methods.- Closed Loop Systems.- Hybrid Dy- Circuits and Systems; Mathematical Logic and For- namics and Other Topics.- Accuracy and Efficiency.- mal Languages; Electronics and Microelectronics, In- Contact and Impact. strumentation

Fields of interest Target groups Simulation and Modeling; Artificial Intelligence (in- Persons who work in the area of computer aided de- cl. Robotics); Theoretical and Applied Mechanics; sign of circuits and systems, in particular, those who Automation and Robotics; Numerical and Compu- are interested in new methods to further increase the tational Methods in Engineering; Computer-Aided productivity within the design flow; includes tool de- Engineering (CAD, CAE) and Design velopers, researchers, and graduate students

Target groups Type of publication Students and engineers interested in rigid-body sys- Monograph tems

Type of publication Due January 2008 Monograph 2008. Approx. 250 p. Hardcover Due December 2007 99,95 € ISBN 978-1-4020-6535-4 Originally published as volume 22 in the series: The Springer In- ternational Series in Engineering and Computer Science

2008. Approx. 350 p. Hardcover

99,95 € ISBN 978-0-387-74314-1 54 Computer Science springer.com/booksellers

U. Flegel, University of Dortmund, Germany L.d. Floriani, Università di Genova, Italia; M. Spagnuolo, Univer- C.A. Floudas, Princeton University, NJ, USA; P.M. Pardalos, Dept. sità di Genova, Italia (Eds.) of Industrial and Systems Engineering, University of Florida, Gainesville, USA (Eds.) Privacy-Respecting Intrusion Shape Analysis and Structuring Detection Encyclopedia of Optimization

Several techniques have been developed in the liter- With our society's growing dependency on informa- ature for processing different aspects of the geome- The goal of the Encyclopedia of Optimization is to tion technology systems (IT), IT security is crucial. try of shapes, for representing and manipulating a introduce the reader to a complete set of topics that To properly respond to misuse or abusive activity shape at different levels of detail, and for describing a show the spectrum of research, the richness of ideas, in IT systems, one needs to establish the capability shape at a structural level as a concise, part-based, or and the breadth of applications that has come from to detect and understand improper activity. Intru- iconic model. Such techniques are used in many dif- this field. In 2000, the first edition was widely ac- sion Detection Systems observe activity occurring in ferent contexts, such as industrial design, biomedical claimed and received high praise. J.B. Rosen crowned the IT system, record these observations in audit da- applications, entertainment, environmental monitor- it "an indepensible resource" and Dingzhu Du laud- ta, and analyze collected audit data to detect misuse. ing, or cultural heritage. This book covers a variety of ed it as "the standard most important reference in Collecting and processing audit data for misuse de- topics related to preserving and enhancing shape in- this very dynamic research field." Top authors such tection conflicts with expectations and rights of sys- formation at a geometric level, and to effectively cap- as Herbert Hauptman (winner of the Nobel Prize) tem users regarding their privacy. A viable solution turing the structure of a shape by identifying relevant and Leonid Khachiyan (the Ellipsoid theorist) con- is replacing personal data with pseudonyms in audit shape components and their mutual relationships. tributed and the second edition keeps these seminal data. Privacy-Respecting Intrusion Detection intro- entries. The second edition builds on the success of duces technical purpose binding, restricting the link- Features the former edition with more than 150 completely ability of pseudonyms in audit data, to the amount Relevant, up-to-date account of research by major new entries, designed to ensure that the reference required for misuse detection. Also, it limits the re- European research consortium. addresses recent areas where optimization theories covery of original personal data to pseudonyms in- and techniques have advanced. Particularly heavy volved in a detected misuse scenario. This book in- Contents attention resulted in health science and transporta- cludes case studies with constructively validated so- Shape Interrogation - Stefanie Hahmann, Alexan- tion, with entries such as "Algorithms for Genomics," lutions by providing [..] der Belayev, Laurent Buse, Gershon Elber, Bernard "Optimization and Radiotherapy [..] Mourrain, Christian Roessl.- Recent Advances in Features Remeshing of Surfaces - Pierre Alliez, Marco At- Features Includes broad systematic introduction into the tene, Craig Gotsman, Giuliana Ucelli.- Multi-resolu-  • Comprehensive reference work for a grow- problem — from legal framework to developing re- tion Analysis - George-Pierre Bonneau, Gershon El- ing field of crucial importance to researchers in a va- quirements and general models with technical solu- ber, Stefanie Hahmann, Basile Sauvage.- Subdivision riety of subject areas including industrial engi- tions for multilateral security Demonstrates how so- Surfaces and Applications - Chiara Eva Catalano, neering, operations research and mathematics &nb- lutions can be designed and evaluated while rigor- Ioannis Ivrissimtzis, Ahmad Nasri.- Skeletal Struc- sp;• Revised and expanded edition of successful ref- ously adhering to derived requirements   tures - Silvia Biasotti, Dominique Attali, Jean-Daniel erence work published by Kluwer Academic Publish- Boissonnat, Herbert Edelsbrunner, Gershon Elber, ers in 2001  • Enhanced online content, up-to- Contents Michela Mortara, Gabriella Sanniti di Baja, [..] date cross references, and entries keyed to MSC sub- -Foreword by Richard A. Kemmerer, University of ject [..] California, Santa Barbara, USA.- Introduction and Fields of interest Background.- Introduction.- Authorizations.- An Visualization; Computer Graphics; Image Processing Fields of interest Architectural Model for Secure Authorizations.- Tra- and Computer Vision; Geometry Optimization; Algorithms; Mathematical Modeling ditional Security Objectives.- Personal Data Protec- and Industrial Mathematics tion Objectives.- Technical Enforcement of Multilat- Target groups eral Security.- Pseudonyms - A Technical Point of Graduate Students, researchers and professionals in Target groups View.- An Architectural Model for Pseudonymous computer graphics, geometric and solid modeling, Students, scientists, engineers and researchers in Authorizations.- Comparing Architectures.- Audit computational geometry, scientific visualization, and academia, industry and government Data Pseudonymization.- Set-Based Approach.- Re- computer vision quirements, Assumptions and Trust Model.- Model- Type of publication ing Conditions for Technical Purpose Binding.- [..] Type of publication Contributed volume Contributed volume Fields of interest Due July 2008 Systems and Data Security; Computer Communica- Due November 2007 tion Networks; Data Encryption; Information Sys- tems Applications (incl.Internet); Data Structures, 2008. eReference. Cryptology and Information Theory; Computer Sys- 2008. XVI, 296 p. 156 illus. With colour appendix. (Mathematics 1.925,00 € tems Organization and Communication Networks and Visualization) Hardcover ISBN 978-0-387-74759-0 79,95 € Target groups ISBN 978-3-540-33264-0 Professionals and graduate-level students

Type of publication Monograph

Due November 2007

2007. Approx. 327 p. 60 illus. (Advances in Information Security, Vol. 35) Hardcover

76,95 € ISBN 978-0-387-34346-4 springer.com/booksellers Computer Science 55

C.A. Floudas, Princeton University, NJ, USA; P.M. Pardalos, Univer- V. Fomichov, K.E.Tsiolkovsky Russian State Technological Univer- P. Forer, University of Auckland, New Zealand; A. Yeh, University sity of Florida, Gainesville, USA (Eds.) sity of Hong Kong, Hong Kong; J. He, University of Hong Kong, Hong Kong (Eds.) Encyclopedia of Optimization Semantics-Oriented Natural Advances in GIS Research Second Edition Language Processing Mathematical Models and Algorithms Spatial and geographic data and the information sys- The goal of the Encyclopedia of Optimization is to tems which handle them are a major IT growth area introduce the reader to a complete set of topics that This book examines key issues in designing seman- for the 21st century. This book assembles the work show the spectrum of research, the richness of ideas, tics-oriented natural language processing systems. of a number of leading researchers concerned with and the breadth of applications that has come from A broad conceptual framework for describing struc- developing new models for describing, analysing and this field. In 2000, the first edition was widely ac- tured meanings of NL-texts is obtained by defining a visualising such data. The authors address themes claimed and received high praise. J.B. Rosen crowned new class of formal languages called standard knowl- in data modelling, data error management, remote it "an indepensible resource" and Dingzhu Du laud- edge languages (SK-languages) using a system the- sensing techniques, neural networks, agent-based ed it as "the standard most important reference in oretical approach. Readers will gain knowledge of systems, generalisation, interactive cartography and this very dynamic research field." Top authors such these languages and will learn a way of building se- networked decision support systems.The collection as Herbert Hauptman (winner of the Nobel Prize) mantic representations using them. With extensive provides an exciting and authoritative selection of and Leonid Khachiyan (the Ellipsoid theorist) con- use of examples and illustrations to clarify complex work occuring at the forefront of GIS and spatial da- tributed and the second edition keeps these seminal material and demonstrate practical applications, gen- ta handling. entries. The second edition builds on the success of erous historical and bibliographical notes, end-of- the former edition with more than 150 completely chapter exercises, and glossaries, this book will serve Features new entries, designed to ensure that the reference as an ideal graduate-level textbook, as well as a good The book provides a cross section of cutting-edge re- addresses recent areas where optimization theories reference for researchers and practitioners who deal search beeing pursued by researchers in geograph- and techniques have advanced. Particularly heavy with the various problems involving semantics of ic information science and spatial data handling. As attention resulted in health science and transporta- natural language texts. such it gives insights into developments of new tech- tion, with entries such as "Algorithms for Genomics," niques in data management, analysis and visualisa- "Optimization and Radiotherapy [..] Features tion. Substantially formal treatment of issues for design- Features ers of natural language processing systems Presents Contents  • Comprehensive reference work for a grow- an in-depth treatment of NL semantics and a math- Triangles and Computational Geometry - Cluster- ing field of crucial importance to researchers in a va- ematical model of a linguistics database Extensive ing/Grouping - Learning and Reasoning - Geometric riety of subject areas including industrial engi- use of examples and illustrations to clarify complex Modeling - Data Quality, Metadata - Multiscale Da- neering, operations research and mathematics &nb- material and demonstrate practical applications End ta - Constraints-based approaches - Environmental sp;• Revised and expanded edition of successful ref- of chapter exercises, historical and bibliographical Data Models - Distributed Databases/Network So- erence work published by Kluwer Academic Publish- notes, and glossaries enrich the text lutions - GIS: Systems and Science - Generalization ers in 2001  • Enhanced online content, up-to- and Compression - Interoperability - Time - Appli- date cross references, and entries keyed to MSC sub- Contents cations - Exploratory Data Visualization - Compu- ject [..] Preface.- Mathematical Models for Designing Natu- tational Geometry (Overlay) - Query and Interface ral Language Processing Systems as a New Field of - Triangulated Irregular Networks and Contours - Fields of interest Studies for Systems Science.- A Mathematical Model Generalization - Geometric Models - Three-Dimen- Optimization; Operations Research, Mathematical for Describing a System of Primary Units of Concep- sional Modeling. Programming; Algorithms; Calculus of Variations tual Level Used by Linguistic Processors.- A Math- and Optimal Control; Optimization; Mathematical ematical Model for Describing Structured Mean- Fields of interest Modeling and Industrial Mathematics ings of Natural Language Sentences and Discours- Geoinformation/Cartography; Environmental Com- puting/Environmental Modelling; Systems and In- Target groups es.- A Study of the Expressive Possibilities of SK-lan- guages.- The Analysis of the Possibilities of Using formation Theory in Engineering; Geography; Land- Students, scientists, engineers and researchers in scape/Regional and Municipal Planning; Monitor- academia, industry and government SK-languages for Solving Some Important Problems of Computer Science.- A Mathematical Model of a ing/Environmental Analysis/Environmental Ecotox- icology Type of publication Linguistic Database.- A New Method of Fulfilling [..] Encyclop(a)edia Fields of interest Target groups Systems Theory, Control; Language Translation and scientists/researchers in many disciplines (e.g. geog- Due July 2008 Linguistics; Algorithms; Discrete Mathematics in raphy, geoinformatics, surveying, urban planning, Computer Science; Information Systems Applica- environmental sciences....); libraries; institutes 2008. Approx. 4000 p. Hardcover tions (incl.Internet) Type of publication 1.925,00 € Target groups Proceedings ISBN 978-0-387-74758-3 Graduate students, researchers and practitioners Due May 2008 Type of publication Graduate/advanced undergraduate textbook 2008. Approx. 800 p. 300 illus. Hardcover

Due June 2008 139,95 € ISBN 978-3-540-43456-6 2008. Approx. 360 pgs. (IFSR International Series on Systems Sci- ence and Engineering, Vol. 26) Hardcover

ISBN 978-0-387-72924-4 56 Computer Science springer.com/booksellers

H.D. Foster, Mentor Graphics, Plano, TX, USA; A.C. Krolnik, LSI J. Friesen, Winnipeg, Canada Logic Corporation, Allen, TX, USA Beginning Java™ SE 6 Platform Creating Assertion-Based IP From Novice to Professional

Assertion-based IP is much more than a compre- hensive set of related assertions. It is a full-fledged This core book, Beginning Java SE 6 Platform, intro- reusable and configurable transaction-level verifica- duces Java programmers who are new to the latest tion component, which is used to detect both inter- Java SE 6 platform. It does not waste their time re- esting and incorrect behaviors. Upon detecting in- hashing basic Java knowledge. Instead, this book will teresting or incorrect behavior, the assertion-based give them what they need to know regarding the new IP alerts other verification components within a and enhanced features in Java SE 6. simulation environment, which are responsible for Features taking appropriate action. The focus of this book First among the few on Java SE 6 platform Re- is to bring the assertion discussion up to a higher al-world examples driven book written by Jeff level and introduce a process for creating effective, Friesen, notable industry Java expert and author Ex- reusable, assertion-based IP, which easily integrates ercises and quiz at the end of each chapter – may with the user’s existing verification environment, in make for a good textbook other words the testbench infrastructure. The guid- ing principles promoted in this book when creating Contents an assertion-based IP monitor are: modularity—as- Java SE 6 Overview.- Core Libraries.- GUI Toolkits: sertion-based IP should have a clear separation be- AWT.- GUI Toolkits: Swing.- International- tween detection and action clarity—assertion-based ization.- JDBC.- Monitoring and Management.- Net- IP should be written initially focusing on capturing working.- Scripting.- Security.- Common Annota- intent (versus optimizations) A [..] tions (Web Services).- New and Improved Tools.- Performance Enhancements.-Quiz Answers. Features Demonstrates a systematic process for formal speci- Fields of interest fication and formal testplanning Demonstrates effec- Programming Techniques tive use of assertions languages beyond the tradition- al language construct discussions No existing books Target groups that talk about either formal testplanning or guide- Beginner to Intermediate Java programmers/devel- lines for creating assertion-based verification IP opers.

Contents Type of publication Foreword.- Preface.- Introduction.- Definitions and Professional book Terminology.- The Process.- Bus-Based Design Ex- ample.- Interfaces.- Arbiters.- Controllers.- Datapath Due November 2007 Units.

Fields of interest Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Circuits and Systems; Computer-Aided Engineering Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest (CAD, CAE) and Design; Electronic and Computer Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Engineering Oman, Qatar, Palestine: Jordan Book Center

Target groups 2007. Approx. 500p. Softcover Design and verification engineers; SoC/ASIC design project managers ISBN 978-1-59059-830-6

Type of publication Professional book

Due December 2007

2008. Approx. 200 p. (Series on Integrated Circuits and Systems) Hardcover

99,95 € ISBN 978-0-387-36641-8 springer.com/booksellers Computer Science 57

T.L. Friesz, Pennsylvania State University, University Park, PA, USA B. Furht, Florida Atlantic University, Boca Raton, FL, USA (Ed.) G. Fusai, Università del Piemonte Orientale, Novara, Italy; A. Ron- coroni, ESSEC, Cergy Pontoise, France Dynamic Optimization and Encyclopedia of Multimedia Differential Games Implementing Models in Quantitative Finance: Methods and Encyclopedia of Multimedia, Second Edition Cases provides easily accessible coverage of important con- Dynamic Optimization and Differential Games has cepts, issues and technology trends in the field of been written to address the increasing number of multimedia technologies, systems, techniques, and Operations Research and Management Science prob- applications.  Hundreds of leading researchers This book puts numerical methods into action for lems (that is, applications) that involve the explic- and world experts have contributed to this compre- the purpose of solving concrete problems arising it consideration of time and of gaming among mul- hensive collection of more than 250 entries. Over in quantitative finance. Part one develops a com- tiple agents. It is a book that will be used both as a 1300 heavily-illustrated pages (including 120 new prehensive toolkit including Monte Carlo simula- textbook and as a reference and guide to engineers, and long entries) present concise overviews tion, numerical schemes for partial differential equa- operation researchers, applied mathematicians and of all aspects of software, systems, web tools & tions, stochastic optimization in discrete time, copu- social scientists whose work involves the theoreti- hardware that enable video, audio & develop- la functions, transform-based methods and quadra- cal aspects of dynamic optimization and differential ing media to be shared & delivered electronical- ture techniques. The content originates from class games. Included throughout the text are detailed ex- ly. Borko Furht, Editor-in-Chief, in col- notes written for courses on numerical methods for planations of several original dynamic and game-the- laboration with the Editorial Board, have sur- finance and exotic derivative pricing held by the au- oretic mathematical models which are of particular veyed and divided the field of multimedia into spe- thors at Bocconi University since the year 2000. Part relevance in today’s technologically-driven-global cific topics that collectively encompass foundations, two proposes eighteen self-contained cases cover- economy: revenue management, supply chain man- technologies, applications, and emerging elements ing model simulation, derivative valuation, dynam- agement, electric power systems, urban freight sys- behind web technologies, wireless information trans- ic hedging, portfolio selection, risk management, sta- tems, dynamic congestion pricing, dynamic traffic fer, and audio-visual formatting and storage.  tistical estimation and model calibration. It encom- assignment, electronic commerce and the Internet. Borko Furht is also the Founder and [..] passes a wide variety of problems arising in markets In addition, there will be some more traditional ap- for equity, interest rates, credit risk, energy and exot- plications with useful pedagogical content included Features ic derivatives. Each case introduces a problem, devel- in Chapter 1. -120+ new & long entries -10 new ops a detailed solution and illustrates empirical re- Board members, plus new contributors -2 volume set sults. Proposed algorithms are implemented [..] Features   Will be of interest to students, researchers, and prac- Features titioners of OR/MS, Industrial Engineering, Sup- Fields of interest Fills a gap in the current published literature by de- ply Chain Management, Applied Economics, Trans- Multimedia Information Systems; Database Man- livering a case-study collection together with a self- portation, and Economic Geography. These fields agement; Computer Imaging, Vision, Pattern Recog- contained course on major numerical methods de- are very actively working on the new, high-interest nition and Graphics; Information Storage and Re- veloped and used by the finance industry Learn- problems that require the strengthening of modeling trieval; Computer Communication Networks; Cod- ing-by-doing approach: all steps detailed in a self- skills to solve dynamic optimization problems and ing and Information Theory contained way Covers a range of numerical meth- dynamic games While the mathematics of continu- ods Blends theoretical presentation and practical im- ous time games can [..] Type of publication plementations Originality in the choice of cases Pro- Encyclop(a)edia vides [..] Contents Preface.- Introduction.- Nonlinear programming Due August 2008 Contents and discrete time optimal control.- The classical Contents: Part I: Methods. Finite Difference Meth- calculus of variations and optimal control in con- ods; Numerical Solution of Linear Systems; Basic tinuous time.- Infinite dimensional mathemati- 2008. Approx. 1010 p. Hardcover Monte Carlo; Advanced Monte Carlo; Quadrature cal programming.- Static Cournot-Nash-Bertrand Methods; Laplace Transforms; Structuring Depen- 379,00 € games and finite dimensional variational inequali- dence using Copula Functions; Dynamic Program- ISBN 978-0-387-74724-8 ties.- Cournot-Nash-Bertrand differential games.- ming - Part II: Cases. Portfolio Selection: "Optimiz- Stochastic differential variational inequalities and ing an Error"; Alpha, Beta, and Beyond; Automatic stochastic dynamic games.- Dynamic supply, pro- Trading: Winning or Losing in a kBit; Estimating the duction and distribution planning.- Dynamic traffic Risk Neutral Density; An "American" Monte Car- assignment.- Dynamic competitive revenue manage- lo; Fixing Volatile Volatility; An Average Problem; ment in competition.- Index. Quasi Monte Carlo; Lookback Options: A Discrete Problem; Electrifying the Price of Power; A Sparkling Fields of interest [..] Operation Research/Decision Theory; Optimization; Game Theory, Economics, Social and Behav. Sci- Fields of interest ences; Mathematical Modeling and Industrial Math- Quantitative Finance; Computational Mathematics ematics; Production/Logistics and Numerical Analysis; Partial Differential Equa- tions; Numerical Analysis Target groups Students, practitioners, researchers Target groups MSs students, Ph.D. candidates, teachers and re- Type of publication searchers in applied finance, traders and model de- Monograph velopers at financial, insurance and industrial insti- tutions Due November 2007 Type of publication 2007. Approx. 480 p. (International Series in Operations Research Monograph & Management Science) Hardcover Due December 2007 73,90 € ISBN 978-0-387-72777-6 2007. XIX, 686 p. 145 illus., 4 in color. Also available online. (Springer Finance) Hardcover 58 Computer Science springer.com/booksellers

69,95 € M. Gagnaire, ENST, Paris, France; J. Kuri, France Telecom Research J. Gama, University of Porto, Portugal; M.M. Gaber, University of ISBN 978-3-540-22348-1 and Development, San Francisco, CA, USA; M. Koubaa, ENIT, Tu- Sydney, Australia (Eds.) nis, Tunisia Learning from Data Streams Network Planning and Traffic Engineering Processing Techniques in Sensor Networks

Translucent Optical WDM Networks Sensor networks consist of distributed autonomous devices that cooperatively monitor an environment. This book focuses on two types of approaches to Sensors are equipped with capacities to store infor- optical network design. One approach is network mation in memory, process this information and planning for the routing and wavelength alloca- communicate with their neighbors. Processing data tion (RWA) problem within the context of static or streams generated from wireless sensor networks has permanent traffic demands. The other approach is raised new research challenges over the last few years traffic engineering which also addresses the RWA due to the huge numbers of data streams to be man- problem but it approaches it within the context of aged continuously and at a very high rate. The book random or transient traffic demands. The research provides the reader with a comprehensive overview method used for these two approaches involves of stream data processing, including famous proto- Scheduled Lightpath Demands (SLD). SLD is a dy- type implementations like the Nile system and the namic but deterministic traffic demand that typical- TinyOS operating system. The set of chapters covers ly corresponds to a Virtual Optical Private Network the state-of-art in data stream mining approaches us- (OPVN).  The format of this book is based on ing clustering, predictive learning, and tensor analy- optimization techniques and a great majority of re- sis techniques, and applying them to applications in search is in the context of industrial contracts. This security, the natural sciences, and education. This re- book analyzes the impact of time-space correlation search monograph delivers to researchers and grad- between traffic demands (SLDs) on optical network uate students the state of the art in data stream pro- design. It also discusses the impact of physical layer cessing in sensor networks. The huge [..] impairments on optical network design. Features Features Shows how to apply machine learning techniques to Analyzes the impact of time-space correlation be- stream data processing Details data stream mining tween traffic demands (SLDs) on optical network de- approaches using clustering, predictive learning, and sign. Discusses the impact of physical layer impair- tensor analysis techniques Presents applications in ments on optical network design. Approaches net- security, the natural sciences, and education Includes work planning for the routing and wavelength allo- descriptions of famous prototype implementations cation (RWA) problem within the context of stat- like the Nile system and the TinyOS operating sys- ic or permanent traffic demands. Addresses traffic tem engineering for the RWA problem within the Contents context of random or [..] 1 Introduction (Gama, Gaber).- Part I: Overview: 2 Contents Sensor Networks (Barros) - 3 Data Stream Process- WDM Optical Networks Characteristics.- Optical ing (Gama, Rodrigues) - 4 Data Stream Processing Enabling Technologies for WDM Systems.- WDM in Sensor Networks (Gaber).- Part II: Data Stream Optical Network Design: A First Approach.- Net- Management Techniques in Sensor Networks: 5 Da- work Planning.- Network Engineering.- Traffic ta Stream Management Systems and Architectures Grooming.- Traffic Engineering.- Lightpath Rerout- (Hammad, Ghanem, Aref, Elmagarmid, Mokbel) - ing for Traffic Engineering.- Impact of Physical Lay- 6 Querying of Sensor Data (Trigoni, Guitton, Sko- er Impairments on Optical Network Design rdylis) - 7 Aggregation and Summarization in Sensor Networks (Shrivastava, Buragohain) - 8 Sensory Data Fields of interest Monitoring (Cardell-Oliver).- Part III: Mining Sen- Communications Engineering, Networks; Computer sor Network Data Streams: 9 Clustering Techniques Communication Networks; Microwaves, RF and Op- in [..] tical Engineering Fields of interest Target groups Information Storage and Retrieval; Computer Com- Research engineers and graduate students in optical munication Networks; Signal,Image and Speech Pro- and telecommunications networks cessing; Communications Engineering, Networks; Artificial Intelligence (incl. Robotics) Type of publication Monograph Target groups Researchers and libraries Due July 2008 Type of publication Monograph 2008. Approx. 400 p. (Optical Networks) Hardcover Due October 2007 99,35 € ISBN 978-0-387-76563-1 2007. X, 244p. 73 illus. Also available online Hardcover

64,95 € ISBN 978-3-540-73678-3 springer.com/booksellers Computer Science 59

D. Gardner-Bonneau, Principal, Bonneau and Associates, Portage, M. Garofalakis, Bell Labs, Murray Hill, NJ, USA; J. Gehrke, Cornell A. Gelbukh, Instituto Politécnico Nacional, Vallejo, Mexico; À.F. OR, USA; H.E. Blanchard, AT&T Shannon Labs, Middletown, NJ, University, Ithaca, NY, USA; R. Rastogi, Bell Labs, Murray Hill, NJ, Kuri Morales, Tizapán San Angel, Mexico (Eds.) USA (Eds.) USA (Eds.) MICAI 2007: Advances in Artificial Human Factors and Voice Data Stream Management Intelligence Interactive Systems Processing High-Speed Data Streams 6th Mexican International Conference on Artificial Intelli- gence, Aguascalientes, Mexico, November 4-10, 2007, Pro- ceedings Human Factors and Voice Interactive Systems, Sec- Traditional Database Management Systems are built ond Edition provides in-depth information on cur- on the concept of persistent data sets, that are stored rent topics of major interest to speech application reliably in stable storage and queried/updated sever- This book constitutes the refereed proceedings of the developers,  and updates material from chap- al times throughout their lifetime. For several emerg- 6th Mexican International Conference on Artificial ters that appeared in the previous edition. The first ing application domains, however, data arrives and Intelligence, MICAI 2007, held in Aguascalientes, nine chapters of the book cover issues related to in- needs to be processed on a continuous (24x7) basis, Mexico, in November 2007. The 116 revised full pa- teractive voice response systems, including both mo- and they need data-processing algorithms and sys- pers presented were carefully reviewed and select- bile and multimodal device user interfaces as well as tems that work over continuous data streams. This ed from numerous submissions for inclusion in the classic automated telephone systems. The remain- book is the first in-depth treatment of this important book. The papers are organized in topical sections on ing chapters cover special topics including synthet- topic, covering basic data stream techniques, data computational intelligence, neural networks, knowl- ic speech and the design of speech applications to stream synopses, mining data streams, advanced data edge representation and reasoning, agents and mul- enhance accessibility to people with disabilities and stream computations, and systems and architectures tiagent systems, machine learning and data mining, the ever-growing population of older adults. Human for data stream management systems. image processing, computer vision, and robotics, Factors and Voice Interactive Systems, Second Edi- natural language processing, speech processing and tion is a collection of applied research and scholar- Contents human-computer interfaces, planning and schedul- ly synthesis contributions by seasoned professionals Part I: Introduction.- Part II: Computation of Basic ing, bioinformatics and medical applications, indus- in the field that highlight continuing efforts to study Stream Synopses.- Part III: Mining Data Streams.- trial applications, and intelligent tutoring systems. human interaction with speech technologies. Part IV: Advanced Topics.- Part V: Systems and Ar- chitectures.- Part VI: Applications. Fields of interest Features Artificial Intelligence (incl. Robotics); Computation Includes in-depth information on current topics of Fields of interest by Abstract Devices; Mathematical Logic and Formal major interest to speech application developers such Database Management; Information Storage and Re- Languages; Image Processing and Computer Vision as use of speech technologies in automobiles, speech trieval; Computer Applications; Signal,Image and in mobile phones among others Speech Processing Target groups Researchers and professionals Contents Target groups IVR Usability Engineering Using Guidelines and Scientists and libraries Type of publication Analyses of End-to-End Calls.- User Interface De- Proceedings sign for Natural Language Systems: From Research Type of publication to Reality.- Linguistics and Psycholinguistics in IVR Graduate/advanced undergraduate textbook Due October 2007 Design.- Designing the Voice User Interface for Au- tomated Directory Assistance.- Spoken Language In- Due January 2008 terfaces for Embedded Applications.- Speech Gener- 2007. XXIV, 1234 p. (Lecture Notes in Computer Science, Vol. ation in Mobile Phones.- Voice Messaging User In- 4827) Softcover 2008. Approx. 400 p. (Data-Centric Systems and Applications) terface.- Silence Locations and Durations in Dialog Hardcover 114,00 € Management.- Using Natural Dialogs as the Basis for ISBN 978-3-540-76630-8 Speech Interface Design.- Telematics: Artificial Pas- 54,95 € senger and Beyond.- A Language to Write [..] ISBN 978-3-540-28607-3

Fields of interest Signal,Image and Speech Processing; User Interfaces and Human Computer Interaction

Target groups Speech technology application developers, user in- terface designers, human factors specialists doing re- search in the speech technology field

Type of publication Contributed volume

Due December 2007

Originally published as Volume 498 in the series: The Kluwer In- ternational Series in Engineering and Computer Science

2008. Approx. 350 p. (Signals and Communication Technology) Hardcover

69,95 € ISBN 978-0-387-25482-1 60 Computer Science springer.com/booksellers

C. Georgiou, University of Cyprus, Cyprus; A.A. Shvartsman, MIT, F. Geraets, Deutsche Bahn AG, Berlin, Germany; L. Kroon, NS M. Gertz, University of California at Davis, CA, USA; S. Jajodia, Cambridge, MA, USA Reizigers, Utrecht, The Netherlands; A. Schoebel, University of George Mason University, Fairfax, VA, USA (Eds.) Göttingen, Germany; D. Wagner, University of Karlsruhe, Ger- many; C. Zaroliagiis, University of Patras, Germany (Eds.) Do-All Computing in Distributed Handbook of Database Security

Systems Algorithmic Methods for Railway Applications and Trends Cooperation in the Presence of Adversity Optimization

International Dagstuhl Workshop, Dagsthl Castle, Germany, The Handbook of Database Security: Applications June 20-25, 2004, 4thInternational Workshop, ATMOS 2004, & Trends, an edited volume by renowned re- Do-All Computing for Distributed Systems: Coop- Bergen, Norway, September 16-17, 2004, Revised Selected searchers within data security, provides an up-to- eration in the Presence of Adversity studies algorith- Papers date overview of data security models, techniques, mic issues associated with cooperative execution of and architectures in a variety of data management multiple independent tasks by distributed comput- applications and settings. This edited volume repre- ing agents including partitionable networks. Recent This state-of-the-art survey constitutes papers that sents the most comprehensive work on numerous results have shed light on the understanding of how were selected after an open call that followed the In- data security aspects published in the last ten years. adversity affects efficiency, by presenting failure-sen- ternational Dagstuhl-Seminar on Algorithmic Meth- Handbook of Database Security: Applications and sitive upper and lower bounds for Do-All in sever- ods for Railway Optimization, held in Dagstuhl Cas- Trends places a particular focus on data-centric secu- al models for computation. The ability to cooper- tle, Germany, in June 2004. The second part of the rity aspects that reach beyond traditional and well- atively perform a collection of tasks is key to solv- volume constitutes the refereed proceedings of the studied data security aspects in databases. It also cov- ing a broad array of computation problems rang- 4th International Workshop on Algorithmic Meth- ers security in advanced database systems, data pri- ing from distributed search to distributed simula- ods and Models for Optimization of Railways, AT- vacy and trust management, and data outsourcing, tion and multi-agent collaboration which is intro- MOS 2004, held in Bergen, Norway, in September and outlines directions for future research in these duced within this book. Do-All Computing for Dis- 2004 in the context of the combined conference AL- fields. Handbook of Database Security: Applications tributed Systems: Cooperation in the Presence of GO 2004. The volume covers algorithmic methods and Trends is designed for a professional audience Adversity is structured to meet the needs of a for analyzing and solving problems arising in rail- composed of practitioners and researchers in indus- professional audience composed of researchers and way optimization with special focus on the interplay try and academia as a reference book. This volume is practitioners in industry. This volume is also suitable between railway and other public transport systems. also suitable for advanced-level students in [..] for graduate-level students in computer science. Beside algorithmics and mathematical optimization, the relevance of formal models and the influence of Features Features applicational aspects for problem modeling are con- Most comprehensive work on data security aspects Most significant algorithmic solution developed and sidered as well. The papers also address experimen- published in the last 10 years Includes SQL stan- available today for do-all computing for distributed tal studies and or useful prototype implementations. dards and security in commercial and open-source systems (including partitionable networks) The first The 17 revised full papers presented were carefully database management systems Outlines future re- monograph that deals with do-all computing for dis- reviewed [..] search direction in the field   tributed systems   Fields of interest Contents Contents Algorithm Analysis and Problem Complexity; Data Preface.- List of Contributors.- Recent Advances in List of Figures.- List of Symbols.- Foreword by Structures; Discrete Mathematics in Computer Sci- Access Control.- Access Control Models for XML.- Michel Raynal.- Authors’ Preface.- Introduction.- ence; Artificial Intelligence (incl. Robotics); Comput- Access Control Policy Languages in XML.- Database Distributed Cooperation Problems: Models and Def- er Graphics; Numeric Computing Issues in Trust Management and Trust Negotia- initions.- Synchronous Do-All with Crashes: Using tion.- Index Structures for Outsourced Databases.- Perfect: Knowledge and Reliable Multicast.- Syn- Target groups Towards Secure Data Outsourcing.- Managing and chronous Do-All with Crashes and Point-to-Point Researchers and professionals Querying Encrypted Data.- Security in Data Ware- Messaging.- Synchronous Do-All with Crashes and houses and OLAP Systems.- Security for Workflow Restarts.- Synchronous Do-All with Byzantine Fail- Type of publication Systems.- Secure Semantic Web Services.- Geospa- ures.- Asynchrony and Delay-Sensitive Bounds.- Proceedings tial Database Security.- Security Re-engineering for Analysis of Omni-Do in Asynchronous Partition- Databases: Concepts and Techniques.- Database Wa- able Networks.- Competitive Analysis of Omni-Do Due October 2007 termarking for Copyright Protection.- Database [..] in Partitionable Networks.- Cooperation in the Ab- sence of [..] 2007. XVI, 321 p. (Lecture Notes in Computer Science, Vol. 4359) Fields of interest Systems and Data Security; Database Management; Fields of interest Softcover Data Encryption; Information Storage and Retrieval; Computer Communication Networks; Operating 46,00 € Computer Communication Networks; Data Struc- Systems; Theory of Computation; Algorithm Anal- ISBN 978-3-540-74245-6 tures, Cryptology and Information Theory ysis and Problem Complexity; Computer Systems Organization and Communication Networks; In- Target groups put/Output and Data Communications Professional audience

Target groups Type of publication University and industry researchers and graduate Contributed volume students in Computer Science

Type of publication Due December 2007 Monograph 2008. Approx. 579 p. Hardcover Due December 2007 137,85 € ISBN 978-0-387-48532-4 2008. Approx. 243 pp. Hardcover

99,35 € ISBN 978-0-387-30918-7 springer.com/booksellers Computer Science 61

S. Ghosh, University of Texas, Tyler, TX USA F. Giannotti, ISTI-CNR, Pisa, Italia; D. Pedreschi, Università di Pisa, A. Goel, MIT-Zaragoza Logistics Center, Spain Italia (Eds.) Innovative Network Analysis and Fleet Telematics Mobility, Data Mining and Privacy Design Real-Time Management and Planning of Commercial Vehicle Geographic Knowledge Discovery Operations A Modeling and Simulation Approach

The technologies of mobile communications and In the past 30 years, commercial transport traffic   Innovative Network Analysis and Design ubiquitous computing pervade our society, and wire- has more than doubled in both Europe and North presents an accessible, thorough examination of less networks sense the movement of people and ve- America, while Asian traffic has likely increased even network design based on modeling and simula- hicles, generating large volumes of mobility data. more. As any mismatch between supply and demand tion, rather than the traditional OSI/ISO layered This is a scenario of great opportunities and risks: on can result into significant disturbances of manufac- paradigm.  Part I focuses on the ele- one side, mining this data can produce useful knowl- turing processes, just-in-time practices necessitate ments that comprise networking, their properties, edge, supporting sustainable mobility and intelligent punctual, reliable, and flexible transportation. Fleet and the underlying control and coordination algo- transportation systems; on the other side, individual Telematics: Real-Time Management and Planning of rithms that govern how the elements interact with privacy is at risk, as the mobility data contain sensi- Commercial Vehicle Operations combines wireless each other to define the nature and overall behavior tive personal information. A new multidisciplinary telematics systems with dynamic vehicle routing al- of the network.  Part II describes and research area is emerging at this crossroads of mobil- gorithms and vehicle-positioning systems to produce employs behavior modeling and asynchronous dis- ity, data mining, and privacy. This book assesses this a telematics-enabled information system that can tributed simulation as a scientific approach.  research frontier from a computer science perspec- be employed by commercial fleet operators for re- This approach permits any design concept under tive, investigating the various scientific and techno- al-time monitoring, control, and planning. The book consideration to be studied, experimented, and ana- logical issues, open problems, and roadmap. The edi- presents a Messaging & Fleet Monitoring Sys- lyzed scientifically and later incorporated in- tors manage a research project called GeoPKDD, Ge- tem that automatically identifies deviations between to a prototype network design. Professionals, policy ographic Privacy-Aware Knowledge Discovery and the planned and the current state of the transporta- makers, and advanced students in network design, Delivery, funded by the EU Commission and involv- tion system and a Dynamic Planning System (DPS) information systems, computer and communications ing 40 researchers from 7 countries, and this book that provides real-time decision support considering engineering, networking, and consulting will find tightly integrates and relates their [..] the current state of the transportation system. the book an essential and practical resource. It is also highly suitable for short [..] Contents Features Mobility, Data Mining, and Privacy: A Vision of Demonstrates how commercial fleet telematics sys- Features Convergence.- Basic Concepts of Movement Da- tems can be integrated into management informa-  This text/reference on innovative network ta.- Characterising the Next Generation of Mobile tion systems without telematics functionality Pro- design provides the fundamentals of advanced net- Applications Through a Privacy-Aware Geographic vides a fleet monitoring system to support commu- working and thoroughly describes a unique model- Knowledge Discovery Process.- Wireless Network nication between drivers and dispatchers. Based on ing and simulation-based approach to prototype net- Data Sources: Tracking and Synthesizing Trajec- this, timely dynamic decisions not only become pos- work design. tories.- Privacy Protection: Regulations and Tech- sible, but timely, in case of disturbances and any Contents nologies, Opportunities and Threats.- Trajectory means of changes to plans in vehicle routing and dis-  * Introduction * Origin of networking and its Data Models.- Trajectory Database Systems.- To- patching, as well [..] role in the information age * Definition and funda- wards Trajectory Data Warehouses.- Privacy and Contents mental attributes of networking * History and evolu- Security in Spatio-temporal Data and Trajectories.- Introduction.- Telematics.- Commercial vehicle op- tion of networking * Network design fundamentals Knowledge Discovery from Geographical Data.- Spa- erations.- Management information systems.- Mod- * Role of modeling and simulation in future network tio-temporal Data [..] els for routing a fleet of commercial vehicles.- Dy- design * ATM networking principles * Buffer archi- Fields of interest namic vehicle routing.- Conclusions.- Bibliography.- tecture and management design for ATM networks * Data Mining and Knowledge Discovery; Database Symbols and abbreviations.- Index. Routing algorithms in ATM networks * IP + ATM = Management; Computers and Society; Legal Aspects IVCC? * IVCC as a new networking algorithm * Dis- of Computing Fields of interest tributed computing architectures for ATM network Operation Research/Decision Theory; Information nodes * Network management * Self-healing algo- Target groups Systems; Regional Science; Economics/Management rithms in ATM networks * Network topology and [..] Researchers and professionals Science, general; Engineering Economics, Organiza- tion, Logistics, Marketing; Production/Logistics Fields of interest Type of publication Computer Systems Organization and Communi- Monograph Target groups cation Networks; Computer Communication Net- Practitioners, researchers in transportation, IS and works; Computer System Implementation; Comput- Due December 2007 OR ing Methodologies; Simulation and Modeling Type of publication Target groups 2008. Approx. 460 p. Hardcover Monograph  Professionals, advanced students 74,95 € Type of publication ISBN 978-3-540-75176-2 Due November 2007 Monograph 2008. Approx. 200 p. (Operations Research/Computer Science Due June 2008 Interfaces Series, Vol. 40) Hardcover 84,95 € 2008. Approx. 305 p. 125 illus. Hardcover ISBN 978-0-387-75104-7

49,95 € ISBN 978-0-387-21296-8 62 Computer Science springer.com/booksellers

E. Goetz, Dartmouth College, Hanover, NH, USA; S. Shenoi, Uni- D. Goldberg, University of Illinois at Urbana-Champaign, IL, USA; 54,95 € versity of Tulsa, OK, USA (Eds.) K. Sastry, University of Illinois at Urbana-Champaign, IL, USA ISBN 978-0-387-35374-6 Critical Infrastructure Protection Genetic Algorithms

The Design of Innovation

The information infrastructure---comprising com- puters, embedded devices, networks and software Genetic Algorithms: The Design of Innovation il- systems---is vital to day-to-day operations in every lustrates how to design and implement scalable ge- sector: information and telecommunications, bank- netic algorithms that solve hard problems quickly, ing and finance, energy, chemicals and hazardous reliably, and accurately. This revised edition of the materials, agriculture, food, water, public health, landmark The Design of Innovation includes recent emergency services, transportation, postal and ship- results and new groundbreaking material. The core ping, government and defense. Global business and chapters have been updated and some chapters have industry, governments, indeed society itself, cannot been thoroughly rewritten. The chapter on scalable function effectively if major components of the criti- GA design introduces other key techniques, includ- cal information infrastructure are degraded, disabled ing the Dependency Structure Matrix GA (DSMGA), or destroyed. Critical Infrastructure Protection de- which sheds light on probabilistic model builders scribes original research results and innovative ap- such as the Bayesian Optimization Algorithm. A ma- plications in the interdisciplinary field of critical in- jor new chapter demonstrates practical scalability of frastructure protection. Also, it highlights the impor- GAs on a problem with over a billion variables, and tance of weaving science, technology and policy in shows how these results can be used to obtain rou- crafting sophisticated, yet practical, solutions that tine solutions to important problems. Genetic Algo- will help secure information, computer and network rithms is an essential reference for the innovation re- assets in the various critical infrastructure sectors. searcher – from the social and behavioral sciences, Areas of coverage include: [..] the natural sciences, the humanities, or the arts – or Features for the specialist in GAs and evolutionary computa- First book in annual series on Critical Infrastructure tion. Protection Features Contents Provides an entrée into the world of scalable genetic Themes and Issues.- On the Security Implications of algorithms and innovation Combines two decades Disruptive Technologies.- Cyber Security: Are Eco- of hard-won research results in a single volume to nomic Incentives Adequate?.- Government Interven- provide a step-by-step guide to designing genetic al- tion in Information Infrastructure Protection.- In- gorithms that scale well with problem size and diffi- frastructure Security.- Security of Information Flow culty Includes additional new results and algorithms, in the Electric Power Grid.- Securing Positive Train and two new chapters: "Principled Efficiency En- Control Systems.- Lessons Learned from the Ma- hancement Techniques" and "A Billion Variables and roochy Water Breach.- Reducing Risk in Oil and Gas Beyond" Production Operations.- Control Systems Security.- Contents Securing Current and Future Process Control Sys- List of Figures.- List of Tables.- Preface.- Acknowl- tems.- Security Strategies for SCADA Networks.- Se- edgments.- Genetic Algorithms and Innovation.- curity Enhancements for Distributed Control [..] Making Genetic Algorithms Fly.- Three Tools of Fields of interest Conceptual Engineering.- Goals and Elements of GA Computer Science, general Design.- Understanding Building Blocks.- A Design Approach to Problem Difficulty.- Ensuring Building Target groups Block Supply.- Ensuring Building Block Growth.- Researchers, faculty members and graduate students, Making Time for Building Blocks.- Deciding Well.- as well as for policy makers, practitioners and other Mixing, Control Maps, and GA Success.- Designing individuals with interests in homeland security Scalable Genetic Algorithms.- Principled Efficiency Enhancement Techniques.- A Billion Variables and Type of publication Beyond.- Cool Technology, Philosophical [..] Proceedings Fields of interest Due December 2007 Artificial Intelligence (incl. Robotics); Appl.Mathematics/Computational Methods of Engi- neering; Optimization; Computing Methodologies; 2008. Approx. 415 p. (IFIP International Federation for Informa- Engineering, general; Mechanical Engineering tion Processing, Vol. 253) Hardcover Target groups 128,00 € Researchers and practitioners in genetic algorithms ISBN 978-0-387-75461-1 and evolutionary computation Electrical and com- puter engineers interested in computational intelli- gence, soft computing, and intelligent control Com- puter scientists and AI researchers

Type of publication Monograph

Due May 2008

2008. Approx. 350 p. Hardcover springer.com/booksellers Computer Science 63

M.C. Golumbic, University of Hafia, Israel M. Gondran, Université Pierre et Marie Curie - CNRS, France; M. Y. Gong, NEC Laboratories America, Inc., Cupertino, CA, USA; W. Minoux, Université Pierre et Marie Curie - CNRS, France Xu, NEC Laboratories America, Inc., Cupertino, CA, USA Fighting Terror Online Graphs, Dioïds and Semirings Machine Learning for Multimedia The Convergence of Security, Technology, and the Law New Models and Algorithms Content Analysis

Fighting Terror Online The Convergence of Security, Technology, and the Law Martin Charles Golumbic The primary objectives of Graphs, Dioïds and Semir- Challenges in complexity and variability of multime-   The unprecedented events that have taken ings: New Models and Algorithms are to emphasize dia data have led to revolutions in machine learning place in recent years have led legislators and gov- the deep relations existing between the semiring and techniques. Multimedia data, such as digital images, ernments throughout the world to reconsider and dioïd structures with graphs and their combinatori- audio streams and motion video programs, exhibit restructure their policies regarding security issues. al properties, while demonstrating the modeling and richer structures than simple, isolated data items. A Today, worldwide attention is being given to a new problem-solving capability and flexibility of these number of pixels in a digital image collectively con- security threat, in the form of global terrorism. Le- structures. In addition the book provides an exten- veys certain visual content to viewers. A TV video gal systems are being called upon to provide a re- sive overview of the mathematical properties em- program consists of both audio and image streams sponse to these threats, in all areas of life, includ- ployed by “nonclassical” algebraic structures, which that unfold the underlying story.  To recog- ing the online environment. Among its many tools, either extend usual algebra (i.e., semirings), or corre- nize the visual content of a digital image, or to un- global terror also uses advanced technological meth- spond to a new branch of algebra (i.e., dioïds), apart derstand the underlying story of a video program, we ods. This fact presents a difficult challenge to poli- from the classical structures of groups, rings, and may need to label sets of pixels or groups of image cymakers. Therefore, we have chosen to focus this fields. and audio frames jointly. Machine Learning for Mul- book on the issue of formulating appropriate policy timedia Content Analysis introduces machine learn- at the interface between security and technology, hu- Features ing techniques that are particularly powerful and ef- man rights and economic policy. The fundamental A modern treatment of Graph Theory and its theo- fective for modeling spatial, temporal structures of issue – the tension between security needs and civ- retical developments and recent algorithmic applica- multimedia data and for accomplishing common il rights – is not new. A great deal of experience has tions tasks of multimedia content analysis. This book sys- been amassed in various countries in this [..] tematically covers these techniques in an intuitive Contents fashion and demonstrates their applications [..] Fields of interest Pre-Semirings, Semirings and Dioïds.- Combinato- Criminology & Criminal Justice; Computers and So- rial Properties of (Pre-) Semirings.- Topology in Or- Features ciety; Criminal Law dered Sets/ Topological Dioïds.- Solving Linear Sys- First book dedicated to the multimedia community tems in Dioïds.- Linear Dependence and Indepen- to address unique problems and interesting applica- Type of publication dence in Semi-Modules and Moduloïds.- Eigenval- tions of machine learning in this area Includes exam- Monograph ues and Eigenvectors of Endomorphisms.- Dioïds ples of unsupervised learning, generative models and and Nonlinear Analyses.- Collected Examples of discriminative models Includes Maximum Margin Due December 2007 Monoïds, (Pre-) Semirings and Dioïds.- Bibliogra- Markov (M3) networks, which strives to combine the phy.- Index. advantages of both the graphical models and Support Vector Machines (SVM)   2008. 180 pp Hardcover Fields of interest Operations Research, Mathematical Programming; Contents 61,60 € Computer Systems Organization and Communi- Preface.- Introduction.- Unsupervised Learning.- Di- ISBN 978-0-387-73577-1 cation Networks; Combinatorics; Operation Re- mension Reduction.- Data Clustering Techniques.- search/Decision Theory; Discrete Mathematics in Generative Graphical Models.- Introduction of Computer Science; Mathematical Modeling and In- Graphical Models.- Markov Chains and Monte Car- dustrial Mathematics lo Simulation.- Markov Random Fields and Gibbs Sampling.- Hidden Markov Models.- Inference and Target groups Learning for General Graphical Models.- Discrimi- Students and researchers in Applied Mathematics native Graphical Models.- Maximum Entropy Model and Operations Research, as well as industry and Conditional Random Field.- Max-Margin Clas- sifications.- A. Appendix.- References.- Index. &nb- Type of publication sp; Monograph Fields of interest Due February 2008 Multimedia Information Systems; Artificial Intelli- gence (incl. Robotics); Information Storage and Re- trieval; Database Management; Computer Graphics; 2008. Approx. 415 p. (Operations Research/Computer Science Interfaces Series, Vol. 41) Hardcover Biometrics

99,95 € Target groups ISBN 978-0-387-75449-9 Advanced-level students and researchers in comput- er science

Type of publication Monograph

Due November 2007

2008. Approx. 295 p. 20 illus. (Multimedia Systems and Applica- tions, Vol. 30) Hardcover

76,95 € ISBN 978-0-387-69938-7 64 Computer Science springer.com/booksellers

S. Gorlatch, Univ. of Muenster, Germany; M. Bubak, Institute of D.H. Greene, Xerox Palo Alto Research Center, Palo Alto, CA, USA; D. Grune, Vrije Universiteit, Amsterdam, The Netherlands; C.J.H. C.S. AGH, Krakow, Poland; T. Priol, IRISA/INRIA, Rennes, France D.E. Knuth, Stanford University, Palo Alto, CA, USA Jacobs, Vrije Universiteit, Amsterdam, The Netherlands (Eds.) Mathematics for the Analysis of Parsing Techniques 2/e Achievements in European Algorithms Research on Grid Systems Parsing, also referred to as syntax analysis, has been and continues to be an essential part of computer This monograph, derived from an advanced comput- science and linguistics. Today, parsing techniques This volume comprises the edited proceedings of er science course at Stanford University, builds on are also implemented in a number of other dis- the 2006 CoreGRID Integration Workshop the fundamentals of combinatorial analysis and com- ciplines, including but not limited to, document (CGIW'2006), held October 2006 in Krakow, Poland. plex variable theory to present many of the major preparation and conversion, typesetting chemical A “Network of Excellence” funded by the European paradigms used in the precise analysis of algorithms, formulae, and chromosome recognition. This sec- Commission’s Sixth Framework Program, Core- emphasizing the more difficult notions. The authors ond edition presents new developments and dis- GRID, aims to strengthen and advance scientific and cover recurrence relations, operator methods, and coveries that have been made in the field. Pars- technological excellence in the area of Grid and Peer- asymptotic analysis in a format that is terse enough ing techniques have grown considerably in impor- to-Peer technologies by bringing together a critical for easy reference yet detailed enough for those with tance, both in computational linguistics where such mass of well-established researchers from 41 Euro- little background. Approximately half the book is de- parsers are the only option, and computer science, pean research institutions. Achievements in Euro- voted to original problems and solutions from exam- where advanced compilers often use general CF pean Research on Grid Systems covers, though is not inations given at Stanford. limited to, the following topics: knowledge and da- parsers. Parsing techniques provide a solid ta management; programming models; system ar- Features basis for compiler construction and contribute to chitecture; Grid information, resource and work- A collection of some fundamental mathematical all existing software: enabling Web browsers to ana- flow monitoring services; resource management and techniques that are required for the analysis of algo- lyze HTML pages and PostScript printers to analyze scheduling; systems, tools and environments; trust rithms Is very well written; the style and the mathe- PostScript. Some of the more advanced techniques and security issues on the Grid. Designed for a pro- matical exposition make the book pleasant to read are used in code generation in compilers and in data fessional audience of industry practitioners and re- A wide range of topics are covered, including many compression. In linguistics, the importance of formal searchers, Achievements in European Research on of the major paradigms used in the analysis of algo- grammars was recognized [..] Grid Systems is also suitable for advanced-level stu- rithms, in an extremely concise manner (one hun- Features dents in computer science.   dred plus pages) Contains a wealth of highly original, Accessible, yet comprehensive introduction to pars- [..] Features ing techniques helps readers to quickly gain a broad Brings together worldwide distinguished leaders Contents understanding of subject Summarizes more than 700 in research and industry within Grid Computing Binomial Identities.- Recurrence Relations.- Opera- papers referenced in the book, saving readers count- Presents best papers, following additional round of tor Methods.- Asymptotic Analysis.- Bibliography.- less hours Many exercises include hints and partial peer-review Appendices.- Index. solutions, making it ideal for self-study or classroom use Extensive bibliography, and annotated bibliogra- Contents Fields of interest phy on website, help interested readers to find [..] From the Contents Preface.- Divide et Impera: Par- Algorithm Analysis and Problem Complexity; Algo- titioning Unstructured Peer-to-Peer Systems to Im- rithms; Numerical Analysis; Computational Math- Contents prove Resource Location.- Passive End-to-End Pack- ematics and Numerical Analysis; Mathematics of Introduction.- Grammars as a Generating Device.- etloss Estimation for Grid Traffic Monitoring.- Val- Computing Introduction to Parsing.- General Non-Direction- idating Desktop Grid Results by Comparing Inter- al Parsing.- Regular Grammars and Finite-State Au- mediate Checkpoints.- Using ReflexD for a Grid So- Target groups tomata.- General Directional Top-Down Parsing.- lution to the N-Queens Problem: A Case Study.- In- Advanced undergraduate and graduate students in General Directional Bottom-Up Parsing.- Deter- tegrating the Palantir Grid Meta-Information Sys- Computer Science and Applied Mathematics ministic Top-Down Parsing.- Deterministic Bot- tem with GRMS.- Integration of the Enanos Exe- tom-Up Parsing.- Non-Canonical Parsers.- General- cution Framework with GRMS for Grid Purposes.- Type of publication ized Deterministic Parsers.- Substring Parsing.- Pars- User-Transparent Scheduling for Software Compo- Graduate/advanced undergraduate textbook ing as Intersection.- Parallel Parsing.- Non-Chon- nents on the Grid.- Problem Solving Environment sky Grammars and Their Parsers.- Error Handling.- for Distributed [..] Due November 2007 Practical Parser Writing and Usage.- Annotated Bib- liography.- Hints and Solutions to Selected Prob- Fields of interest lems.- [..] Hardcover edition originally published as volume 1 in the series: Computer Communication Networks; Database Progress in Computer Science and Applied Logic (PCS) Management; Computer Systems Organization and Fields of interest Communication Networks; Information Systems Programming Techniques; Software Engineer- and Communication Service; Data Structures; Pro- 2008. X, 132 p. (Modern Birkhäuser Classics) Softcover ing/Programming and Operating Systems; Program- cessor Architectures ming Languages, Compilers, Interpreters; Document 34,90 € Preparation and Text Processing; Language Transla- Target groups ISBN 978-0-8176-4728-5 tion and Linguistics Professionals and advanced-level students Target groups Type of publication Researchers, recreational mathematicians, and ad- Contributed volume vanced graduate students

Type of publication Due November 2007 Monograph

2008. Approx. 300 p. 20 illus. Hardcover Due December 2007 109,95 € ISBN 978-0-387-72811-7 Originally published by Ellis Horwood Ltd, Prentice Hall, UK.

2008. XXIV, 664 p. 288 illus. (Monographs in Computer Science) Hardcover

54,95 € springer.com/booksellers Computer Science 65

ISBN 978-0-387-20248-8 P. Grzybek, University of Graz, Austria (Ed.) G. Grätzer, University of Manitoba, Winnipeg, MB, Canada

Contributions to the Science of Text More Math Into LaTeX and Language

Word Length Studies and Related Issues "Gratzer’s book is a solution." -European Mathe- matical Society Newsletter   For close to two decades, Math into Latex has been the standard in- This volume contains a collection of contributions troduction and complete reference for writing arti- to the science of language, focusing on the study of cles and books containing mathematical formulas. word length in particular. Within a synergetic frame- In this fourth edition, the reader is provided with work, the word turns out to be a central linguistic important updates on articles and books. An impor- unit, as is clearly outlined in the Editor's preface. The tant new topic is discussed: transparencies (comput- book's first chapter is an extensive introduction to er projections). Key features of More Math into La- the history and state of the art of word length stud- tex, 4th edition: - Installation instructions for PC and ies. The studies included unify contributions from Mac users - An example-based, visual approach and three important linguistic fields, namely, linguistics a gentle introduction with the Short Course - A de- and text analysis, mathematics and statistics, and tailed exposition of multiline math formulas corpus and data base design, which together give a with a Visual Guide - A unified approach to Tex, La- comprehensive approach to the quantitative study tex, and the AMS enhancements - A quick introduc- of text and language and word length studies. The tion to creating presentations with computer projec- broad spectrum of word length studies covered with- tions From earlier reviews of Math into Latex: "There in this volume will be of interest to experts working are several Latex guides, but this one wins hands in the fields of general linguistics, text scholarship down for the elegance of its approach and breadth of and related fields, and, understanding language as coverage." -Amazon.com Best of 2000, Editor’s [..] one example of complex semiotic systems, the vol- ume should be of interest for scholars from other Features fields as well. - Installation instructions for PC and Mac users - An example-based, visual approach and a gentle Features introduction with the Short Course - A detailed Presents a collection of papers on the quantitative exposition of multiline math formulas with a study of language, in particular word length studies Visual Guide - A unified approach to Tex, Latex, and the AMS enhancements - A quick introduction to Contents creating presentations with computer projections Preface. Papers by: Peter Grzybek; Simone Ander- sen and Gabriel Altmann; Gordana Antic, Emmerich Contents Kelih and Peter Grzybek; August Fenk and Gertraud Preface.- Introduction.- Setting Up.- Part I. Typing Fenk-Oczlon; Primoz Jakopin; Reinhard Koehler; your first article.- Part II. Text and math.- Typing Victor V. Kromer; Werner Lehfeldt; Anatolij A. Po- text.- Text environments.- Typing math.- Multiline likarpov; Otto A. Rottmann; Ernst Stadlober and math displays.- Part III. Document structure.- La- Mario Djuzelic; Udo Strauss, Peter Grzybek and TeX documents.- Standard LaTeX document class- Gabriel Altmann; Marko Tadic; Dusko Vitas, Gor- es.- AMS documents.- Part IV. Presentations and dana Pavlovic-Lazetic and Cvetana Krstev; Andrew pdf files.- Simple presentations.- Presentations on Wilson; Gejza Wimmer and Gabriel Altmann. Con- steroids.- Hyperlinks and pdf files.- Part V. Cus- tributing Authors. Author Index. Subject Index. tomization.- Customizing LaTeX.- Part VI. Long Documents.- BibTeX.- MakeIndex.- amsrefs.- Books Fields of interest in LaTeX.- Appendix A. Math symbol tables.- Ap- Computational Linguistics; Mathematical Logic and pendix B. Text symbol tables.- Appendix C. [..] Formal Languages; Theoretical Linguistics Fields of interest Target groups Document Preparation and Text Processing; Math- Computational linguists ematical Software; Math Applications in Computer Science; Programming Languages, Compilers, Inter- Type of publication preters; Media Design; Computer Applications Contributed volume Target groups Due October 2007 Undergraduates, graduate students, typesetters, re- searchers in STM fields

2008. XII, 350 p. (Text, Speech and Language Technology, Vol. Type of publication 31) Softcover Manual 39,95 € ISBN 978-1-4020-4069-6 Due October 2007

Originally published by Birkhauser Boston

2007. Approx. 650 p. 44 illus. Softcover

39,95 € ISBN 978-0-387-32289-6 66 Computer Science springer.com/booksellers

T. Grötker, Synopsys Inc., Aachen, Germany; U. Holtmann, Synop- O. Guler, University of Maryland, Baltimore, MD, USA B. Gustafsson, Uppsala University, Uppsala, Sweden sys Inc., Aachen, Germany; H. Keding, Synopsys Inc., Aachen, Ger- many; M. Wloka, Synopsys Inc., Aachen, Germany Foundations of Optimization in High Order Difference Methods for The Developer's Guide to Finite Dimensions Time Dependent PDE Debugging

This book is intended as a textbook to be used The subject of this book is high order finite differ- in a first graduate level course, and covers the ence methods for time dependent PDE. The idea The Developer's Guide to Debugging is a book for fundamental principals of optimization in finite is to give an overview of the basic theory and con- both professional software developers seeking to dimensions.  It develops the necessary back- struction principles by using model examples. The broaden their skills and students that want to learn ground material in multivariable calculus using co- book also contains a general presentation of the tech- the tricks of the trade from the ground up. With ordinates as well as in a coordinate-free manner, so niques and results for well-posedness and stability, small examples and exercises it is well suited to ac- that the recent developments such as semidefinite with inclusion of the three fundamental methods of company a CS course or lecture. At the same time it programming can be dealt with ease.  All the analysis both for PDE in its original and discretized can be used as a reference guide to address problems standard topics of mathematical programming, such form: the Fourier transform, the eneregy method as the need arises. This book goes beyond the level as necessary and sufficient optimality conditions and the Laplace transform. Various types of wave of simple source code debugging scenarios. In ad- for optimality, convex analysis and duality, are cov- propagation problems are treated in specific detail dition, it covers the most frequent real-world prob- ered in great detail, often from multiple points of since high order methods are particularly effective lems from the areas of program linking, memory ac- view.  A distinctive feature of this book is its for these problems. cess, parallel processing and performance analysis. set of worked-out examples and problems, including The picture is completed by chapters covering static hundreds of well-chosen problems and important Fields of interest checkers and techniques to write code that leans well examples. Computational Mathematics and Numerical Analy- towards debugging. While the focus lies on C and C sis; Partial Differential Equations ++, the workhorses of the software industry, one can Features apply many techniques described in The Developer's Covers the fundamental principles of optimization Target groups Guide to Debugging to programs written in other in finite dimensions Develops the necessary back- Researchers and graduate students languages. ground material in multivariable calculus using co- ordinates as well as in a coordinate–free manner, so Type of publication Features that the recent developments such as semidefinite Monograph It’s got the right focus. It is not restricted to a specif- programming can be dealt with ease All the standard ic combination of compiler, debugger, and operat- topics of mathematical programming, such as neces- Due December 2007 ing system. At the same time it is not too high lev- sary and sufficient optimality conditions for optimal- el; it contains examples that can be reproduced with ity, [..] open source software on different UNIX and Win- 2008. Approx. 350 p. (Springer Series in Computational Mathe- matics, Vol. 38) Hardcover dows platforms. It remains focused on software de- Contents bugging and does not drift into areas such as fixing Calculus in Vector Spaces.- Unconstrained Opti- 79,95 € broken hardware. It is complete. Software debugging mization.- Convex Analysis.- Theory of Convex ISBN 978-3-540-74992-9 [..] Polyhedra.- Some Basic Optimization Algorithms.- Theory of Lagrange Multipliers.- Semi-infinite Pro- Contents gramming.- Duality Theory and Convex Program- 1. INTRODUCTION 2. BASIC DEBUGGING 3. ming.- References.- Index. MORE DEBUGGING 4. LINKER PROBLEMS 5. MEMORY PROBLEMS 6. MEMORY PROFILING Fields of interest 7. STATIC CHECKERS 8. WRITING DEBUG-ABLE Optimization; Calculus of Variations and Optimal CODE 9. ADVANCED DEBUGGING 10. DE- Control; Optimization; Operations Research, Mathe- BUGGING PARALLEL PROGRAMS 11. PERFOR- matical Programming; Applications of Mathematics MANCE MEASUREMENT 12. GENERAL HINTS 13. SUMMARY Appendices   A Access to Target groups Tools   B Source code References Graduate Students and Researchers in optimization, operations research Fields of interest Software Engineering/Programming and Operating Type of publication Systems; Circuits and Systems; Programming Lan- Graduate/advanced undergraduate textbook guages, Compilers, Interpreters; Software Engineer- ing; Programming Techniques; Control Engineering Due May 2008 Target groups The target audience is rather broad: people writing 2008. Approx. 350 p. Hardcover (or planning/learning to write) software in C or C+ 46,95 € +. Debugging is an integral part of software develop- ISBN 978-0-387-34431-7 ment.

Type of publication Professional book

Due January 2008

2008. Approx. 300 p. Hardcover

64,95 € ISBN 978-1-4020-5539-3 springer.com/booksellers Computer Science 67

J.A. Gutierrez, Emerson Corporation, St. Louis, MO, USA; B.S.R. M.A. Gutierrez, EPFL VRlab, Switzerland; F. Vexo, EPFL VRlab, F. Hacklin, ETH Zurich, Switzerland Armstrong, University of Wisconsin, Milwaukee, WI, USA Switzerland; D. Thalmann, EPFL VRlab, Switzerland Management of Convergence in Precision Landmark Location Stepping into Virtual Reality: A Innovation for Machine Vision and Practical Approach Strategies and Capabilities for Value Creation Beyond Blurring Photogrammetry Industry Boundaries Finding and Achieving the Maximum Possible Accuracy Virtual reality techniques are increasingly becoming indispensible in many areas including medicine, en- Throughout the past decade, the phenomenon of tertainment, architecture, education and manufac- technological convergence has increasingly gained The applications of image-based measurement turing, with VR tools being used for testing and pro- managerial attention. In this special form of techno- are many and various: image-guided surgery, mo- totyping products at design stages, as well as for cre- logical change, the coming-together of previously bile-robot navigation, component alignment and ating applications in finished products. This book distinct knowledge bases gives rise to the creation of photogrammetry, among others. This book address- looks at how to generate advanced virtual reality new applications and business models. When such es the problem of measurement error associated with worlds. It covers principles, techniques, devices and innovations emerge at the intersection of industries, determining the location of landmarks in images. mathematical foundations, beginning with basic def- the resulting creative destruction may exceed previ- The least possible photogrammetric uncertainty in initions, and then moving on to the latest results ously established industry boundaries. As a conse- a given situation is determined using the Cramér– from current research and exploring the social impli- quence, convergence does not only promise the cre- Rao Lower Bound (CRLB). This monograph pro- cations of these.    Very practical in its ation of new value, but may imply significant disrup- vides the reader with: the most complete treatment approach, the book is fully illustrated in colour and tions to established industries. Based on investigat- to date of precision landmark location and the engi- contains numerous examples, exercises and ing 26 firms within the ICT industry, this book high- neering aspects of image capture and processing; de- case studies. Careful reading of this textbook will al- lights implications of the convergence phenomenon tailed theoretical treatment of the CRLB; a software low students and practitioners alike to gain a on firms’ innovation management practices, and de- tool for analyzing the potential performance-specif- practical understanding of virtual reality concepts, rives strategic guidelines for building and sustaining ic camera/lens/algorithm configurations; two nov- devices and possible applications. business models beyond blurring industry bound- el algorithms which achieve precision very close to aries. the CRLB; a method for determining the accuracy Features Carefully balanced between fundamentals and ap- of landmark location; a downloadable MATLAB® Contents plications, this book also looks at topics not normal- package to assist the reader with applying theoreti- Introduction.- Fundamentals of convergence and in- ly covered in the literature such as proprioception, cally-derived results to practical engineering config- novation.- An evolutionary perspective on conver- physiological signal analysis, and the social implica- urations. gence.- Capabilities for coevolutionary contingency.- tions of these new techniques. Conclusions. Features Contents Shows the reader how to derive theoretical limits to Fields of interest Part 1: The Fundamentals – Definitions.- Mathemat- the precision of landmark identification in electronic Technology Management; Information Systems images MATLAB® package assists the reader with ap- ical and Computer Sciences Foundations.- Virtual plying theoretical results in real engineering systems World Creation.- Part 2: Applications and Devices – Target groups Steps outside the usual earth-sciences and civil-engi- Feedback Virtual Devices.- Input Virtual Devices.- Scientists, professionals neering base of photogrammetry to improve anima- Virtual Reality Applications.- Social Implication of tion, medical imaging and robotic vision applications Virtual Reality Techniques Type of publication Monograph Contents Fields of interest Introduction.- Physics of Digital Image Formation.- Computer Graphics; Multimedia Information Sys- Due October 2007 Analytical Framework for Landmark Location Un- tems; User Interfaces and Human Computer Interac- certainty.- Two-dimensional Unconstrained Numer- tion ical Integration.- Computational Tools.- Experimen- 2008. XVIII, 260 p. 33 illus. (Contributions to Management Sci- tal Validation.- Results.- Conclusions. Target groups ence) Hardcover Undergraduate/graduate students on Virtual Real- Fields of interest ity courses and professional programmers and re- 84,95 € Image Processing and Computer Vision; Automa- searchers requiring an understanding of Virtual Re- ISBN 978-3-7908-1989-2 tion and Robotics; Remote Sensing/Photogramme- ality concepts. try; Signal,Image and Speech Processing; Imaging / Radiology; Statistics for Engineering, Physics, Com- Type of publication puter Science, Chemistry & Geosciences Graduate/advanced undergraduate textbook

Target groups Due August 2008 Engineers and scientists working in photo- and videogrammetry, in image metrology or in industrial 2008. Approx. 230 p. 71 illus., 58 in color. Softcover automation also in human-motion analysis and mo- tion capture for medicine, virtual reality and digital 49,95 € animation systems; corporate libraries of companies ISBN 978-1-84800-116-9 working in the above areas

Type of publication Monograph

Due December 2007

2008. Approx. 160 p. 78 illus. Hardcover

84,95 € ISBN 978-1-84628-912-5 springer.com/booksellers Computer Science 68

J.-L. Hainaut, University of Namur, Belgium; E.A. Rundensteiner, J.O. Hamblen, Georgia Tech, Atlanta, GA, USA; T.S. Hall, Southern M. Harders, ETH Zurich, Switzerland Worcester Polytechnic Institute, Worcester, MA, USA; M. Kirch- Adventist University, Collegedale, TN, USA; M.D. Furman, Univer- berg, Massey University, Auckland, New Zealand; M. Bertolotto, sity of Florida, Gainesville, FL, USA University College Dublin, Ireland; M. Brochhausen, Saarland Uni- Surgical Scene Generation for versity, Germany; P. Chen, Deakin University, VIC, Australia; S. Si- said Cherfi, CEDRIC-CNAM, Paris, France; M. Doerr, Foundation Rapid Prototyping of Digital Virtual Reality-Based Training in for Research and Technology, Heraklion, Greece; H. Han, Drex- Medecine el University, Philadelphia, PA, USA; S. Hartmann, Massey Uni- Systems SOPC Edition versity, New Zealand; J. Parsons, Memorial University of New- foundland, Canada; G. Poels, Ghent University, Belgium; C. Rol- land, Université Paris 1 Sorbonne, France; J. Trujillo, University of Recent years have brought about a drastic change Alicante, Spain; E. Yu, University of Toronto, Canada; E. Zimlanyi, New to this edition is an introduction to embedded University of Brussels, Belgium (Eds.) operating systems for SOPC designs.  The in patient awareness and acceptance of adverse ef- µClinux OS is configured for Altera's DE1 and DE2 fects in medical care. The combination of this pro- cess with an increasing focus on patient safety has Advances in Conceptual Modeling - boards and is provided on a DVD along with several application programs. Featuring four accel- put traditional educational paradigms in the medical Foundations and Applications erated tutorials on the Quartus II and Nios II design area to the test. The potential of training approaches environments, this edition progresses from introduc- using virtual reality techniques has been recognized ER 2007 Workshops CMLSA, FP-UML, ONISW, QoIS, RIGiM, tory programmable logic to full-scale SOPC design for sometime and a key element of VR-based train- SeCoGIS, Auckland, New Zealand, November 5-9, 2007, Pro- ing is the ability to generate various scenarios. There- ceedings integrating hardware implementation, software de- velopment, operating system support, state-of-the- fore, the book examines in detail the main compo- art I/O, and IP cores. This edition features Altera's nents required to define a scenario, in the context of new 7.1 Quartus II CAD and Nios II SOPC tools and surgical scene generation: •Generation of the scene This book constitutes the refereed joint proceedings includes projects for Altera's DE1, DE2, UP3, UP2, geometry •Modelling of organ appearance •Defini- of six international workshops held in conjunction and UP1 FPGA development boards. Laboratory tion of biomechanical parameters The book is the with the 26th International Conference on Concep- projects provided on the book's DVD include com- ideal reference for any reader involved in generating tual Modeling, ER 2007, in Auckland, New Zealand, plete projects for video graphics and text, mouse and training scenarios, as well as in VR-based training in in November 2007. The 40 revised full papers pre- keyboard input, and three separate computer exam- general. sented were carefully reviewed and selected from 114 ples including a Nios II "reference" design for the Features submissions. Topics addressed by the workshops are DE2, DE1, and UP3 FPGA boards. conceptual modeling for life sciences applications Provides an extensive overview of related work in the (CMLSA 2007), foundations and practices of UML Features three different directions of scene generation and in- (FP-UML 2007), ontologies and information systems Includes Student Laboratory Tutorials and Projects troduces specific solutions in detail. for the semantic Web (ONISW 2007), quality of in- using the latest CAD tools and newest FPGA boards Contents formation systems (QoIS 2007), requirements, in- from Altera Integrates student projects into the text- Introduction.- Surgical Education.- Geometry.- Rele- tentions and goals in conceptual modeling (RIGiM book and software Covers SoPC design using proces- vance to Surgical Education.- Process Elements.- Da- 2007), and semantic and conceptual issues in geo- sor cores and C application programs Provides infor- ta Acquisition.- Uterine Image Acquisition.- Healthy graphic information systems (SeCoGIS 2007). mation on porting RTOS to an FPGA processor core Anatomy Generation.- Shape Prediction.- Pathol- Contains source files and additional example files on ogy Integration.- Skeleton-based Design.- Cellular Fields of interest the enclosed CD-ROM for all designs presented Information Systems Applications (incl.Internet); Automata Growth Model.- Particle System Growth Database Management; Information Storage and Re- Contents Model.- Volumetric Representation.- Appearance.- trieval; Artificial Intelligence (incl. Robotics); Com- Tutorial I: The 15 Minute Design.- FPGA Devel- Texturing in Computer Graphics.- Relevance to Sur- puter Applications in Geosciences; Information Sys- opment Board Hardware and I/O Features.- Pro- gical Education.- Data Acquisition and Enhance- tems grammable Logic Technology.- Tutorial II: Sequen- ment.- In-vivo Image Acquisition.- Image Enhance- tial Design and Hierarchy.- FPGAcore Library Func- ment.- Base Texture Generation.- Texture Genera- Target groups tions.- Using VHDL for Synthesis of Digital Hard- tion for Laparoscopic Simulation.- Texture Genera- Researchers and professionals ware.- Using Verilog for Synthesis of Digital Hard- tion [..] ware.- State Machine Design: The Electric Train Fields of interest Type of publication Controller.- A Simple Computer Design: The µP 3.- Simulation and Modeling; Computer Graphics Proceedings VGA Video Display Generation using FPGAs.- In- terfacing to the PS/2 Keyboard and Mouse.- Lega- Target groups Due October 2007 cy Digital I/O Interfacing Standards.- FPGA Researchers-Game Developers-Digital Model Robotics Projects.- A RISC Design: Synthesis of the Builders 2007. XIX, 420 p. (Lecture Notes in Computer Science, Vol. 4802) MIPS Processor [..] Softcover Type of publication Fields of interest Monograph 56,00 € Circuits and Systems; Computer-Aided Engineering ISBN 978-3-540-76291-1 (CAD, CAE) and Design; Engineering Design; Elec- tronic and Computer Engineering Due April 2008

Target groups 2008. 80 illus. in color. Hardcover Undergraduates and first year graduates in EE, CmpE and CS Systems areas 69,95 € ISBN 978-1-84800-106-0 Type of publication Undergraduate textbook

Due November 2007

2008. Approx. 432 p. With DVD. Softcover

52,95 € ISBN 978-0-387-72670-0 springer.com/booksellers Computer Science 69

S. Harper, University of Manchester, UK; Y. Yesilada, University of X. He, Peking University, China; S. Xu, Peking University, China B. Hefley, Carnegie Mellon University, Pittsburgh, PA, USA; W. Manchester, UK (Eds.) Murphy, IBM Almaden Research Center, San Jose, CA, USA (Eds.) Process Neural Networks Web Accessibility Service Science, Management and Theory and Applications Research Foundations Engineering (SSME) Education for the 21st Century Part of the new series, Advanced Topics in Science Web Accessibility tends to be considered as a Web and Technology in China, this book proposes the Design challenge and therefore existing relevant concept and model of a process neural network for IBM has taken the lead in recognizing that college books are prescriptive tutorials on how to achieve the first time, showing how it expands the mapping graduates need new skills to address business and Web accessibility. However there are hundreds, if relationship between the input and output of tradi- technical issues in a service business environment. not thousands, of research scientists, engineers, and tional neural networks, and enhancing the expres- Because services depend critically on people work- research & development programmers work- sion capability for practical problems, with broad ap- ing together and with technology to provide val- ing in academia and industry to advance the current plicability to solving problems relating to process in ue for others, these new skills include the ability Web, and to make developments in the next Web, practice. Some theoretical problems such as continu- to integrate across traditional disciplinary areas accessible. This book, containing a strong founda- ity, functional approximation capability, and com- to obtain globally effective solutions. Service Sci- tion of research, is aimed at academics, sci- puting capability, are strictly proved. The application ence, Management and Engineering (SSME) is one entists, engineers, and postgraduate students as the methods, network construction principles, and opti- such approach to properly focusing definitive, foundational text on Web Accessibility mization algorithms of process neural networks in education and research on services, and to prepar- from a deeply research perspective. Written by lead- practical fields, such as nonlinear time-varying sys- ing tomorrow’s graduates to work in an expanding ing experts in the field, it will provide not only an tem modeling, process signal pattern recognition, services economy. This contributed volume was de- overview of existing research but will look to future dynamic system identification, and process forecast, veloped from the IBM-hosted conference on Octo- developments and include expert opinions. This kind are introduced in detail. There are rich illustrations ber 5-7, 2006, designed to discuss the current sta- of insight cannot be derived purely from existing re- for information processing flow and the mapping tus and foster the development and advancement of search publication stores such as Google Scholar. If relationship between inputs and outputs of process SSME.  Contributions explore the ways SSME you need to know about deeper Web Accessibility, neural networks. has been introduced into curricula, services research and about current and future trends, this is the [..] that is underway or is planned, and recom- Features mended actions for academia and governments to Features Proposes concept and model of a process neural net- establish SSME as its own discipline. Written from a research perspective, this is a unique work for the first time Shows how a process neural ‘how to’ book, on Web accessibility Each chapter network improves the expressing capability of ar- Features is written by an acknowledged expert in the field A tificial neural networks Proves theory and proper- Provides a unique insight into the evolving field definitive research text and ideal research primer for ties of process neural networks such as continuity, of SSMEProvides exemplars for educators and in- postgraduates functional approximation ability, and computing dustrial leaders in service science education and power Shows how a process neural network can pro- Contents trainingContributors  have international back- cess time-varying signals directly and has extensive grounds with SSME experience and educationRead- Understanding Disabilities.- Visual Impairments.- adaptability [..] Cognitive and Learning Impairments.- Hearing ers will derive an understanding of education needs and programs offering in SSME Impairments.- Ageing.- What is Web Accessibili- Contents ty?.- Evaluation and Methodologies.- Best practice Introduction.- Artificial Neural Networks.- Process Fields of interest and guidelines.- Automated evaluation / validation Neurons.- FeedForward Process Neural Networks Business/Management Science, general; The Com- and correction.- Site Conformance & Evalu- and Theoretical Issues.- Learning Algorithm of Pro- puting Profession; Technology Management; Com- ation Methodologies.- End User Evaluations.- Ap- cess Neural Networks.- FeedBack Process Neural puting Milieux; Information Systems; Management plications.- Assitive Technologies.- Convention- Networks.- Multi-aggregation Process Neural Net- of Computing and Information Systems al Browsers.- Specialised Browsers.- Browser Aug- works.- Design and Construction of Process Neural mentation.- Transcoding.- Authoring Tools and Networks.- The Applications of Process Neural Net- Type of publication Document Engineering.- Specialised Areas (Quick works. Contributed volume Overviews).- Education.- Specialist Documents.- Multimedia and [..] Fields of interest Due January 2008 Artificial Intelligence (incl. Robotics); Pattern Recog- Fields of interest nition Information Systems Applications (incl.Internet); 2008. Approx. 355 p. (Service Science: Research and Innovations Multimedia Information Systems; User Interfaces Target groups in the Service Economy) Hardcover and Human Computer Interaction; Document Students and researchers interested in artificial neu- Preparation and Text Processing; Computers and ral networks, time-varying information processing, 99,35 € Society; Media Design and machine learning ISBN 978-0-387-76577-8

Target groups Type of publication Researchers, Academincs, Research & Develop- Monograph ment staff Due November 2007 Type of publication Contributed volume Distribution rights in China: Zhejiang University Press Due March 2008 Jointly published with Zhejiang University Press

2008. Approx. 300 p. Hardcover 2008. Approx. 325 p. 85 illus. (Advanced Topics in Science and 73,95 € Technology in China ) Hardcover ISBN 978-1-84800-049-0 119,00 € ISBN 978-3-540-73761-2 70 Computer Science springer.com/booksellers

M. Hepp, University of Innsbruck, Austria; P. De Leenheer, Vrije A. Holovaty, Chicago, IL, USA; J. Kaplan-Moss, Lawrence, KS, USA J. Holub, Czech Technical University of Prague, Czech Republic; Universiteit Brussel, Belgium; A. de Moor, Vrije Universiteit Brus- J. Ždárek, Czech Technical University of Prague, Czech Republic sel, Belgium; Y. Sure, University of Karlsruhe, Germany (Eds.) (Eds.) The Definitive Guide to Django

Ontology Management Web Development Done Right Implementation and Application of

Semantic Web, Semantic Web Services, and Business Applica- Automata tions Django, the Python-based equivalent to Ruby’s 12th International Conference, CIAA 2007, Prague, Czech Re- public, July 16-18, 2007, Revised Selected Papers Rails Web development framework, is presently one of the hottest topics in Web development to- Managing ontologies and annotated data throughout day. Its creator (and co-author of this book) Adri- their life-cycles is at the core of semantic systems of an Holovaty has since become a superstar of sorts This book constitutes the thoroughly refereed post- all kinds.  Ontology Management, an edited due to the compelling array of Web applications he’s proceedings of the 12th International Conference on volume by senior researchers in the field, provides built using Django, including most notably http:// Implementation and Application of Automata, CIAA an up-to-date, concise and easy-to-read reference on www.chicagocrime.org/. Along with Django lead de- 2007, held in Prague, Czech Republic, in July 2007. this topic. This volume describes rele- veloper Jacob Kaplan-Moss, they’re writing this book The 23 revised full papers and 7 revised poster pa- vant tasks, practical and theoretical challenges, lim- with the intention of making it the definitive guide pers presented together with the extended abstracts itations and methodologies, plus available software to the technology. Django: Web Development Done of 4 invited lectures were carefully reviewed and se- tools. The editors discuss integrating the conceptu- Right is broken into three parts, with the first intro- lected from 79 submissions and have gone through al and technical dimensions with a business view on ducing Django fundamentals such as installation and two rounds of reviewing and improvement. The pa- using ontologies, by stressing the cost dimension of configuration, and creating the components that ul- pers cover various topics in the theory, implementa- ontology engineering and by providing guidance on timately together power a Django-driven website. tion, and applications of automata and related struc- how up-to-date tooling helps to build, maintain, and Part II delves into the more sophisticated features of tures. use ontologies.  Also included is a one- Django, such as outputting non-HTML non-html stop reference on all aspects of managing ontological content such as RSS feeds and PDFs, caching, and Fields of interest data and best practices on ontology management for user management. Part III serves as a detailed refer- Computation by Abstract Devices; Algorithm Anal- a number of application domains. Ontology Man- ence to Django’s many configuration options and ysis and Problem Complexity; Logics and Meanings agement is designed as a reference or secondary text commands. [..] of Programs; Mathematical Logic and Formal Lan- for researchers and advanced-level students studying guages semantic systems, Semantic Web [..] Features This is the first Django book Authored by the cre- Target groups Features ators and developers of Django Adrian Holovaty and Researchers and professionals -Provides a one-stop reference on all aspects of man- Jacob Kaplan-Moss, this high-profile duo continues aging ontological data -Disseminates experiences, to win numerous awards for their compelling Web Type of publication lessons learned, and best-practices on ontology man- applications Both a tutorial on creating websites us- Proceedings agement from a number of application domains ing Django, and a reference guide for more advanced   developers Due October 2007 Contents Contents -Dedications.- Foreword by Professor Di- 2007. XIII, 324 p. (Lecture Notes in Computer Science, Vol. 4783) Part 1: Getting Started.- Introduction to Django.- eter Fensel, DERI, University of Innsbruck.- Ac- Softcover Getting Started.- Creating Models.- The Admin Site.- knowledgements.- List of Reviewers.- List of Au- Writing Views.- The Template Engine.- Form Pro- 48,00 € thors.-Overview.- Ontologies: State of the Art, Busi- cessing.- Part 2: Django's Sub-Frameworks.- Gener- ISBN 978-3-540-76335-2 ness Potential, and Grand Challenges.- Infrastruc- ic Views.- Extending The Template Engine.- Out- ture.-Engineering and Customizing Ontologies: The putting Non-HTML Content.- Users, Sessions, and Human-Computer Challenge in Ontology Engi- Registration.- Comments.- Caching.- Integrating neering.- Integrated Environments for Ontology With Legacy Databases.- Customizing The Django Management.- Ontology Reasoning with Large Data Admin.- Internationalization and Localization.- De- Repositories.- Evolution, Alignment, And The Busi- ploying Django.- Part 3: Reference.- Appendix. Mod- ness Perspective.- Ontology Evolution: State-of-the- el Definition.- Appendix. Database API.- Appendix. art and Future Directions.- Ontology Alignments: Generic Views.- Appendix. Built-In Template.- [..] An Ontology [..] Fields of interest Fields of interest Special Purpose and Application-Based Systems Information Systems Applications (incl.Internet); In- formation Systems and Communication Service; Ar- Target groups tificial Intelligence (incl. Robotics); e-business and e- All levels of web developers commerce; Database Management; Multimedia In- formation Systems Type of publication Professional book Target groups Advanced-level students and researchers in comput- Due December 2007 er science

Type of publication Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Contributed volume Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center Due December 2007

2008. Approx. 400 p. Softcover 2008. Approx. 314 p. (Semantic Web and Beyond, Vol. 7) Hard- cover 34,95 € ISBN 978-1-59059-725-5 77,00 € ISBN 978-0-387-69899-1 springer.com/booksellers Computer Science 71

J.-P. Homann, Berlin, Germany V. Honavar, Iowa State University, Ames, IA, USA; D. Caragea, C. Hood, Hood Group, Northampton, UK; S. Wiedemann, Hood Iowa State University, Ames, IA, USA Group, Munich, Germany; S. Fichtinger, Hood Group, Munich, Germany; U. Pautz, Hood Group Munich, Germany Color Management Collaborative Knowledge Principles and Practical Applications Acquisition from Semantically Requirements Management Disparate, Distributed Data Sources Interface between Requirements Development and all other Engineering Processes The use of differing input and output equipment (scanners, monitors, printers, etc.) in computer-aid- ed publishing often results in the unsatisfactory This is the first book to offer a cohesive treatment of Requirements Management has proven itself to be reproduction of color originals in print and on- the research problems in collaborative knowledge ac- an enormous potential for the optimisation of devel- line media. The theoretical principles of a theory quisition from semantically disparate information opment projects throughout the last few years. Espe- of color, color measurement, and offset printing sources & approaches for addressing the prob- cially in the climate of an increasingly competitive are indispensable for calibrating the overall course lems. The book discusses the fundamental advances market Requirements Management helps in carrying of production.This volume, printed in four-color in this area covering a broad range & complex- out developments faster, cheaper and with a higher throughout, provides not only this, but also numer- ity of research issues. The approach taken incorpo- quality. This book focusses on the interfaces of Re- ous tips and tricks on how to work with color in pre- rates a synergistic synthesis of insights, algorithms quirements Management to the other disciplines of press. And it does so in a practical and graphic man- & results drawn from multiple areas including: Systems Engineering, for example Project Manage- ner. This edition pays special attention to a digital • Artificial Intelligence – especially machine learn- ment, Change Management and Configuration and media production workflow that makes use of Adobe ing, data mining, knowledge representation & Version Management. To this end, an introduction Photoshop.The accompanying CD-ROM includes inference, intelligent agents & multi-agent sys- into Requirements Management and Requirements numerous demo versions of color management tools. tems; • Information Systems – especially databases, Development is given, along with a short sketch of information integration, semantic web; & • Dis- Systems Engineering, and especially the necessary in- Features tributed computing & software engineering (e.g. puts and resulting outputs of Requirements Manage- With a large part of the book devoted to illustra- service-oriented computing). Written for researchers ment are explained. Using these flows of information tions, it is especially suited to providing occupational & graduate students as well as advanced prac- it is shown how Requirements Management can sup- groups from the areas of design, image editing, and titioners in data mining, semantic technologies, AI, port and optimse the other project disciplines and offset printing with efficient access to the principles Information integration, the semantic web, & how very important therefore a functioning Require- and practical applications of digital color manage- information systems, this accessible [..] mentA presentation of how to use Photoshop and ments Management is for all areas of development. ICC-profilesA CD-ROM for Mac and Windows with Features Fields of interest an array of demo software The first book to offer: • Comprehensive treatment Software Engineering; Information Systems; Man- of the theoretical framework, algorithms & ap- agement; Management of Computing and Informa- Contents plications involving knowledge acquisition from tion Systems From the contents:The Color Theory of Ideal Col- large distributed autonomous data repositories • ors.- The Color Theory of Real Colors.- Color Treatment of the theoretical framework for integra- Target groups Swatch Catalogue for the LCH Color Spectrum.- tion of information, from a user’s point of view • Software engineers, project managers, consultants Foundations of Color Management.- Foundations Theoretically well-founded algorithms for learning of Print and Reproduction.- The ICC Standard and classifiers from semantically heterogeneous informa- Type of publication PostScript.- Scanning Optimization Using Standard tion sources Professional book Profiles.- Individual Profiles and Complete Docu- ments.- Important Addresses.- Index.- CD-ROM for Contents Due November 2007 Macintosh and Windows. Introduction.- Learning Predictive Models from Da- ta Revisited.- Learning Predictive Models from Dis- Fields of interest tributed Data.- Self-Describing Data Sources and 2008. Approx. 220 p. Hardcover Document Preparation and Text Processing; Com- Programs.- Bridging the Semantic Gap.- Learning puter Graphics Predictive Models from Semantically Disparate Da- 59,95 € ta.- Learning Predictive Models from Partially Speci- ISBN 978-3-540-47689-4 Target groups fied Data.- Steps Toward a Collaborative Knowledge Graphic designers, advertising and multimedia agen- Acquisition Environment.- Summary and Discussion cies, publishers, pre-press firms, in-house publishers, printers, independent educational institutes, univer- Fields of interest sities, technical schools Information Storage and Retrieval; Information Sys- tems Applications (incl.Internet) Type of publication Professional book Target groups Researchers, Graduates Due April 2008 Type of publication Monograph 2008. Approx. 220 pp. 200 figs., 120 in color., with CD-ROM. (X.media.publishing) Hardcover Due May 2008 59,95 € ISBN 978-3-540-67119-0 2008. Approx. 250 p. Also available online. (Advanced Informa- tion and Knowledge Processing) Hardcover

74,95 € ISBN 978-1-84628-894-4 72 Computer Science springer.com/booksellers

E. Hossain, University of Manitoba, Winnipeg, MB, Canada; V.K. E. Hossain, University of Manitoba, Winnipeg, MB, Canada; K.K. Bhargava, University of British Columbia, Vancouver, BC, Canada 2007. Approx. 450 p. Hardcover Leung, Imperial College, London, UK (Eds.) (Eds.) 76,95 € Wireless Mesh Networks Cognitive Wireless Communication ISBN 978-0-387-68830-5 Networks Architectures and Protocols

The book includes a set of research and survey arti- The proposed book includes a set of research and cles featuring the recent advances in theory and ap- survey articles featuring the recent advances in the- plications of wireless mesh networking technology ory and applications of cognitive radio technology which will be a significant component in the next for the next generation (e.g., fourth generation) wire- generation (e.g., fourth generation) mobile commu- less communication networks. Cognitive radio has nication networks. Wireless mesh networks consist emerged as a promising technology for maximizing of mesh clients and mesh routers, where the mesh the utilization of the limited radio bandwidth while routers form a wireless infrastructure/backbone accommodating the increasing amount of services and interwork with the wired networks to provide and applications in the wireless networks. A cogni- multihop wireless Internet connectivity to the mesh tive radio transceiver is able to adapt to the dynam- clients. Wireless mesh networking has emerged as ic radio environment and the network parameters one of the most promising concept for self-organiz- to maximize the utilization of the limited radio re- ing and auto-configurable wireless networking to sources while at the same time providing flexibility provide adaptive and flexible wireless Internet con- in wireless access. Development of cognitive radio nectivity to mobile users. This concept can be used technology has to deal with technical and practical for different wireless access technologies such as considerations as well as regulatory requirements, IEEE 802.11, 802.15, 802.16-based WLAN, WPAN, and therefore, there is an increasing interest on this and WMAN technologies. Potential application sce- technology among the researchers and the spectrum narios for wireless mesh networks include access and policy makers. The contributed articles cover both backhaul support for cellular networks, home net- the theoretical concepts (e.g., [..] works, enterprise [..]

Features Features Presents a unified view of the cognitive radio tech- Presents a unified view of the wireless mesh net- nology (both theory and practice) Offers a compre- works (both theory and practice) Offers a compre- hensive treatment of state-of-the-art cognitive ra- hensive treatment of the state-of-the-art of wireless dio technology Covers a wide range of topics mesh networking technology Covers of a wide range starting from information-theoretic analysis to pro- of topics starting from information-theoretic analysis tocol design and optimization issues, and test-bed to protocol design and optimization issues, and test- results Includes contributions from world-class re- bed results Includes contributions from world-class searchers in this area researchers in this area

Contents Contents Fundamental Issues in Cognitive Radio.- Informa- Challenges and Issues in Designing Architectures tion Theoretic Analysis of Cognitive Radio Systems.- and Protocols for Wireless Mesh Networks.- Ar- Coexistence and Dynamic Sharing in Cognitive Ra- chitectures and Deployment Strategies for Wire- dio Networks.- Cooperative Spectrum Sensing.- less Mesh Networks.- End-to-End Design Principles A Protocol Suite for Cognitive Radios in Dynam- for Broadband Cellular Mesh Networks.- Medium ic Spectrum Access Networks.- OFDM-Based Cog- Access Control and Routing Protocols for Wireless nitive Radios for Dynamic Spectrum Access Net- Mesh Networks.- Channel Assignment Strategies for works.- Link Adaptation in OFDM-Based Cognitive Wireless Mesh Networks.- Optimal Resource Allo- Radio Systems.- UWB-based Cognitive Radio Net- cation for Wireless Mesh Networks.- Resource Al- works.- Degrees of Cooperation in Dynamic Spec- location and Cost in Hybrid Solar/Wind Powered trum Access for Distribution Cognitive Radios.- WLAN Mesh Nodes.- Scheduling, Routing and Re- Cognitive MAC Protocols for Dynamic Spectrum lated Cross-Layer Management through Link Activa- Access.- Game Theoretic Learning [..] tion Procedures in [..]

Fields of interest Fields of interest Communications Engineering, Networks; Com- Communications Engineering, Networks; Computer puter Communication Networks; Microwaves, RF Communication Networks; Signal,Image and Speech and Optical Engineering; Artificial Intelligence (in- Processing; Microwaves, RF and Optical Engineer- cl. Robotics); Computer Systems Organization and ing; Electronic and Computer Engineering; Comput- Communication Networks; Signal,Image and Speech er Systems Organization and Communication Net- Processing works

Target groups Target groups Graduate students in wireless communications, re- Graduate students, researchers in academia and in- searchers in academia and industry in wireless com- dustry, practitioners working in the area of wireless munications, practitioners working in the area of technology and telecommunications in general wireless technology and telecommunications in gen- eral Type of publication Contributed volume Type of publication Contributed volume Due November 2007

Due December 2007 2007. Approx. 480 p. Hardcover springer.com/booksellers Computer Science 73

109,95 € S. Huang, City University of Hong Kong, China; D. MacCallum, X. Huang, University of Canberra, ACT, Australia; Y.-S. Chen, Na- ISBN 978-0-387-68838-1 University of Minnesota, MN, USA; D.-Z. Du, University of Texas at tional Taipei University, San Shia, Taipei County, Taiwan; S.-I. Ao, Dallas, TX, USA (Eds.) IAENG Secretariat, Hong Kong, China (Eds.)

Network Security Advances in Communication Systems and Electrical Engineering

This book provides a reference tool for the increas- ing number of the scientists whose research is related This volume contains contributions from partici- to sensor network security. The book is organized in- pants in the 2007 International Multiconference of to several sections, each including some chapters ex- Engineers and Computer Scientists Topics covered ploring a specific topic. Network security is attract- include communications theory, communications ing great attention and there are many research top- protocols, network management, wireless networks, ics waiting to be studied. In this book, the topics cov- telecommunication, electronics, power engineering, ered include network design and modeling, network control engineering, signal processing, and industri- management, data management, security and appli- al applications. The book will offer the states of arts cations. The aim, intent, and motivation of this book of tremendous advances in communication systems is to provide a reference tool for the increasing num- and electrical engineering and also serve as an excel- ber of scientists whose research is more or less in- lent reference work for researchers and graduate stu- volved in network security. dents working with/on communication systems and Features electrical engineering. Contains the most current techniques and advances Features in network security Covers a variety of subjects in the frontiers of intel- Contents ligent systems and computer engineering and their Conventional Cryptographic Primitives.- A Cryp- industrial applications An excellent reference work tographic Framework for the Controlled Release of for researchers and graduate students working in Certified Data.- Mechanical Verification of Crypto- the field Deals with theories and applications for the graphic Protocols.- Scalable Group Key Management modern communications and electrical engineer- for Secure Multicast: A Taxonomy and New Direc- ing, including wireless communications, mobile net- tions.- Secure Metering Schemes.- Web Forms and working, and ubiquitous computing communica- Untraceable DDoS Attacks.- Attacks and Counter- tions Covers a [..] measures in Sensor Networks: A Survey.- Efficient Contents Trapdoor-Based Client Puzzle Against DoS Attacks.- Cooperative Transmission to Increase Gain by Em- Security Issues of Mobile Ad Hoc Networks.- Rout- ploying Pre-Coding Scheme.- High Capacity and ing Security in Ad Hoc Wireless Networks.- Insid- Reliable Technique for Wireless Personal Area Net- er Threat Assessment: Models, Analysis, and Tools.- works.- Including Adaptive Behavior in a Wireless Toward [..] Network System.- Classification Technique Using Fields of interest Neural Networks and Clustering Architecture for Coding and Information Theory; Data Structures, Wireless Sensor Networks.- PALMS: A Reliable and Cryptology and Information Theory; Special Pur- Incentive-Based P2P Live Media Streaming System.- pose and Application-Based Systems; Data Encryp- A Novel Dynamical Compressing of XML Data for tion; Computer Communication Networks Transmission on Networks.- An Authenticated Key Management Scheme for Hierarchical Wireless Sen- Target groups sor Networks.- A New Approach in Scheduling for Researchers in Computer Science and Computer En- Differentiated [..] gineering, Operations Research, and Mathematics Fields of interest Type of publication Communications Engineering, Networks; Computer Monograph Communication Networks; Signal,Image and Speech Processing; Electronic and Computer Engineering; Computer Systems Organization and Communica- Due April 2008 tion Networks; Power Engineering

2008. Approx. 370 p. Hardcover Target groups Communication systems engineers and electrical en- 99,35 € gineers as well as researchers and graduate students ISBN 978-0-387-73820-8 working with communication systems and electrical engineering

Type of publication Contributed volume

Due February 2008

2008. Approx. 695 p. (Lecture Notes Electrical Engineering, Vol. 4) Hardcover

134,95 € ISBN 978-0-387-74937-2 74 Computer Science springer.com/booksellers

M. Hyslop, Onyx Group, UK S. Iannuzzi, Palmyra, NJ, USA; A. Jones, A. Freeman H. Ichikawa, The University of Electro-Communications, Japan; W.-D. Cho, UCN/CUS Ajou University, Korea; I. Satoh, National In- stitute of Informatics, Japan; H.Y. Youn, Sungkyunkwan Universi- Critical Information Infrastructures Beginning ASP.NET 2.0 Web ty, Korea (Eds.)

Resilience and Protection Services in C# Ubiquitous Computing Systems From Novice to Professional 4th International Symposium, UCS 2007, Tokyo, Japan, The world moves on Critical Information Infras- November 26-28, 2007, Proceedings tructures, and their resilience and protection is of vi- Web Services are the ideal technology for anyone tal importance. Starting with some basic definitions who wants to deploy and consume services and func- and assumptions on the topic, this book will go on tionality over the web, in a secure, platform indepen- This book constitutes the refereed proceedings of the to explore various aspects of Critical Infrastructures dent manner, for example, stock reports, timetable 4th International Symposium on Ubiquitous Com- throughout the world – including the technologi- data, banking credentials, etc. This book covers the puting Systems, UCS 2007, held in Tokyo, Japan, in cal, political, economic, strategic and defensive. This latest Microsoft technologies for developing web ser- November 2007. The 16 revised full papers and 8 re- book will be of interest to the CEO and Academic vices (the .NET 2.0 platform, C# language, and Visu- vised short papers presented were carefully reviewed alike as they grapple with how to prepare Critical In- al Studio 2005 development environment,) with an and selected from 96 submissions. The papers are formation Infrastructures for new challenges. emphasis on security, probably the most important organized in topical sections on security and priva- Features consideration for developers wanting to make their cy, context awareness, sensing systems and sensor Thorough investigation of various elements of crit- web services practical and useful. Previous knowl- network, middleware, modeling and social aspects, ical information infrastructures historically and in edge of these technologies is recommended, but not smart devices, and network. today's society Comprehensive structure relevant essential. The book is in a classic tutorial-based style. Fields of interest and accessible to both professionals and academics Starting with the basic functionality behind web ser- Computer Communication Networks; Soft- New work in emerging subject matter of timely im- vices, and an overview of Visual Studio 2005, and ware Engineering; Special Purpose and Applica- portance how web services fit into it, the authors go on to show you how to build a basic but secure web ser- tion-Based Systems; Information Systems Applica- Contents vice, build SOAP and HTTP clients, debug your web tions (incl.Internet); User Interfaces and Human Definitions and Assumptions.- Critical Infrastruc- services, add exception handling, consume web ser- Computer Interaction; Computers and Society tures and Critical Information Infrastructures: Ap- vices and deploy them for others to utilize in [..] Target groups proaches by Geography.- Critical Infrastructures and Researchers and professionals Critical Information Infrastructures: by Type.- Criti- Features cal Information Infrastructure.- Some Political, Eco- Totally up-to-date—covers .NET 2.0, C#, and Vi- sual Studio 2005 Security is very important for web Type of publication nomic, Social, Technological, Environmental, Le- Proceedings gal and Other Process Effects on Critical Infrastruc- services—this is given special treatment Little direct tures.- Comments on Standards In Information Se- competition from other books - no dedicated .NET Due November 2007 curity, Disaster Recovery, Business Continuity and 2.0 web services books Business Resilience.- A Tangential Threat To OECD Contents Resilience: The 21st Century East India Company.- 2007. XIII, 307 p. (Lecture Notes in Computer Science, Vol. 4836) Part 1: Understanding XML Web Services. Introduc- Resilience and Outsourcing Call Centers [..] Softcover tion to XML Web Services. Getting Started with Vi- Fields of interest sual Studio 2005. Developing XML Web Services Us- 48,00 € Systems and Data Security; Computers and Society ing Visual Studio .NET. Building the Credit Card ISBN 978-3-540-76771-8 Validation Service.- Part 2: XML Web Services and Target groups Clients. Building a SOAP Client. Building an HTTP Researchers and professionals concerned with criti- Client. Data Types in XML Web Services. Exception cal infrastructure protection Handling. Debugging XML Web Services with Vi- sual Studio .NET. Publishing and Discovering XML Type of publication Web Services.- Part 3 Advanced XML Web Services. Monograph State Management. The DataSet and XML Web Ser- vices. Caching and Application Events. Securing Due October 2007 XML Web [..] Fields of interest 2007. XI, 360 p. Hardcover Programming Techniques

99,95 € Target groups ISBN 978-0-387-71861-3 Beginner and Intermediate developers with some prior .NET experience who need a solid introduction to Web Services

Type of publication Professional book

Due August 2008

Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center

2008. Approx. 400 p. Softcover

ISBN 978-1-59059-726-2 springer.com/booksellers Computer Science 75

K. Ikeuchi, The University of Tokyo, Japan; D. Miyazaki, The Uni- N. Ince, Istanbul Technical University, Ankara, Turkey; A. Bragg, T. Issariyakul, Vancouver, BC, Canada; E. Hossain, Winnipeg, MB, versity of Tokyo, Japan (Eds.) Raleigh, NC (Eds.) Canada

Digitally Archiving Cultural Objects Recent Advances in Modeling An Introduction to Network and Simulation Tools for Simulator NS2 Communication Networks and A large number of cultural heritage objects around the world are deteriorating or being destroyed due Services The proposed book will be a beginners’ guide for to the work of natural disasters, such as earthquakes network simulator NS2. NS2 is an open-source dis- and floods, and human-inflicted destruction, such as crete event simulator designed mainly for network- war and vandalism. In the wake of these threats, 3D This book contains a selection of papers presented ing research. NS2 has been widely accepted as a reli- data becomes a critical component to permanent- at a symposium organized under the aegis of COST able simulation tool for computer communication ly recording the shapes of these important objects Telecommunications Action 285. COST (European networks both in academia and industry. However, so that they might be passed down to future genera- Cooperation in the field of Scientific and Technical surprisingly, there is no book, by which researchers tions. Digitally Archiving Cultural Objects describes Research) is a framework for scientific and techni- and students can use to learn NS2. From our expe- thorough research and methods for preserving cul- cal cooperation, allowing the coordination of nation- rience with network simulation during the last few tural heritage objects through the use of 3D digital al research on a European level. The main objective years, we have observed that it is not at all easy for a data. These methods were developed through using of the Action is to enhance existing tools and devel- beginner to grasp the basis architecture and concepts computer vision and computer graphics technolo- op new modeling and simulation tools for research of NS2. For a beginner, developing customized sim- gies. This data can also be used for simulation and in emerging multi-service telecommunications net- ulation modules is virtually out of question. This is restoration purposes as well as towards various mul- works in the areas of model performance improve- due to the absence of any comprehensive tutorial on timedia applications. This comprehensive book is or- ments, multilayer traffic modeling, and the impor- NS2 and the fact that the resources available on NS2 ganized into four parts. Part 1 describes various sen- tant issue of evaluation and validation of the new (through online) are quite limited. The major objec- sors designed to obtain data. Part 2 contains a collec- modeling tools. tive of this book is to fill in this vacuum. Intended for tion of papers that describe the geometric pipeline, researchers in industry working in the area of com- converting obtained data into a [..] Contents munication networks, the book will be also valuable A Review of High Performance Simulation Tools to senior undergraduate students and [..] Features and Modeling Concepts.- Using Visualization Tech- Editors are experts in the field of digital preservation niques in Multilayer Traffic Modeling.- A Multilevel Features Thorough approach to digital preservation Approach for the Modeling of Large TCP/IP Net- The book provides a guideline on how to setup, use, works.- Cross-Layer Interaction in Wireless Ad-Hoc Contents and extend NS2. This book presents a layered ap- Networks.- Multilayer Description of Large-Scale Introduction.- Shaping Rectification of 3D Data Ob- proach to introduce communication networking Communication Networks.- Modeling and Simula- tained by a Moving Range Sensor by Using Image protocols and their simulation using NS2. The book tion of TCP Performance with Link Layer Retrans- Sequences.- The Climbing Sensor: 3D Modeling of includes a large number of examples (e.g., codes) mission and Fragmentation for Satellite-UMTS Net- Narrow Areas by Using Space-Time Analysis.- In- on simulation using NS2. The book contatins sup- works.- The Design of a FPGA-Based Traffic Light verse Polarization Raytracing: Estimating Surface plementary material (e.g., simulation exercises) for Control System.- Distributed Multihop Clustering Shapes of Transparent Objects.- Robust Simulta- classes and laboratories on telecommunications net- Approach for Sensor Networks.- Toward Flexible neous Registration of Multiple Range Images.- A working. High Throughput [..] Fast Simultaneous Alighnment of Multiple Range Contents Images.- Parallel Alignment of a Large Number of Fields of interest Introduction.-Network Simulator NS2.-C++ and Range Images.- Simultaneous Determination of Reg- Computer Systems Organization and Communica- OTcl Linkage.-Implementation of Discrete Event istration and Deformation Parameters Among 3D tion Networks; Information Systems and Communi- Simulation in NS2.-Base Classes and Inheritance Range Images.-Parallel Processing of Range Data cation Service Concept in NS2.-Node Connection and Packet Flow Merging.- Adaptively [..] Mechanism.-Applications and Transport Control Target groups Fields of interest Protocols.-Related Supporting Classes.-Post Simu- Practicing engineers and academic researchers in the lation Processing.-Slected Extension Samples.-Oth- Computer Imaging, Vision, Pattern Recognition and field of telecommunications networks Graphics; Image Processing and Computer Vision; er NS2 Classes.-Importing MATLAB into NS2.-Re- view of Probability Principles and Random Vari- Computing Methodologies; Simulation and Model- Type of publication ables.-Review of Objected Oriented Programming by ing Proceedings OTcll.-Various Tips and Troubleshooting.-Tcl/OTcl Target groups Command List.-NS2 Command List.-Index. Due December 2007 Researchers and practitioners interested in digital archival methods, computer vision, and computer Fields of interest graphics technologies 2008. XX, 466 p. Hardcover Communications Engineering, Networks; Simula- tion and Modeling; Computer Systems Organization Type of publication 134,95 € and Communication Networks; Computer Commu- Contributed volume ISBN 978-0-387-73907-6 nication Networks; Electronic and Computer Engi- neering; System Performance and Evaluation

Due December 2007 Target groups researchers in the industry working in the area of 2008. Approx. 540 p. Hardcover telecommunications networking, professors, and se- nior undergraduate and graduate students 114,95 € ISBN 978-0-387-75806-0 Type of publication Monograph

Due April 2008

2008. Approx. 400 p. Hardcover

100,10 € ISBN 978-0-387-71759-3 76 Computer Science springer.com/booksellers

T. Ito, Nagoya Institute of Technology, Nagoya, Japan; H. Hat- A.K. Jain, Michigan State University, East Lansing, MI, USA; P. Fly- Y. Jiang, Norwegian University of Science and Technology, tori, University of Liverpool, UK; M. Zhang, University of Wollon- nn, University of Notre Dame, IN, USA; A.A. Ross, West Virginia Trondheim, Norway; Y. Liu, National University of Singapore, Sin- gong, NSW, Australia; T. Matsuo, Nagoya Institute of Technology, University, Morgantown, WV, USA (Eds.) gapore Nagoya, Japan (Eds.) Handbook of Biometrics Stochastic Network Calculus Rational, Robust, and Secure Negotiations in Multi-Agent Systems Biometrics is a rapidly evolving field with applica- The development of an information theory for tions ranging from accessing one’s computer to gain- stochastic service guarantee analysis has been iden- ing entry into a country. The deployment of large- tified as a grand challenge for future networking re- scale biometric systems in both commercial and search. Towards it, Stochastic Network Calculus, the This book addresses all aspects of negotiation mech- government applications has served to increase the probabilistic version or generalization of the (deter- anisms in multi-agent systems, including Multi-Is- public’s awareness of this technology. This rapid ministic) Network Calculus, has been recognized sue Negotiations, Concurrent Negotiations, Strat- growth has highlighted the challenges associated by researchers as a crucial step. This book is devot- egy-proof Mechanisms, Rational Argumentation, with designing and deploying biometric systems. In- ed to a comprehensive treatment of this active re- Auctions and Voting, and so on. These issues are be- deed, the problem of biometric authentication is a search area, which covers the results from the au- ing explored by researchers from different commu- Grand Challenge in its own right. Significant growth thors as well as other researchers in this area. This nities in Multi-Agent systems. They are, for instance, in biometric research in recent years has resulted in book presents an overall picture for the state of the being studied in agent negotiation, multi-issue ne- the development of innovative sensors, new algo- art of stochastic QoS analysis research by providing gotiations, auctions, mechanism design, electron- rithms, enhanced test methodologies and novel ap- basic introductory material on the subject as well as ic commerce, voting, secure protocols, matchmak- plications. The Handbook of Biometrics compris- discussing the most recent research in the area. Top- ing & brokering, argumentation, and co-opera- es chapters authored by prominent Biometric re- ics covered include Traffic Models and Server Mod- tion mechanisms. This workshop will bring together searchers describing the fundamentals and the latest els for Stochastic Network Calculus, and Indepen- researchers from these communities to learn about innovations in their areas of expertise. This unique dent Case Analysis and its applications. Researchers each other ’s approaches, form long-term collabora- and timely volume is designed for researchers and and graduates in the area of performance evaluation tions, and cross-fertilize the different areas to accel- advanced-level students in computer science. It is of computer communication networks will benefit erate progress towards scaling up to larger and more also suitable for Biometric and Computer Security hugely from this comprehensive volume. realistic applications. professionals. Features Features Features First book to address Stochastic Network Calcu- Recent advances in multi-agent systems No other single book succinctly captures the ad- lus, a recently developed theory for stochastic qual- vancements made in all aspects of biometrics in re- ity of service (QoS) analysis in computer networks Contents cent years while presenting the reader with a funda- Presents a general picture for the state of the art of Part I Theories for Complex Multi-agent Systems.- mental understanding of basic concepts in various stochastic QoS analysis research Provides a compre- Negotiation Agents’ Decision Making Using Markov biometric traits A comprehensive book with chap- hensive treatment of recent developments and results Chains.- A Multi-Issue Negotiation Protocol among ters authored by prominent researchers in biometrics in this active research area Nonlinear Utility Agents : A Preliminary Report.-   A Decentralized Model for Multi-attribute Negotia- Contents tions with Incomplete Information and General Util- Contents Introduction to Network Calculus.- Determinis- ity Functions.- A General Model for Pareto Optimal Foreword by James L. Wayman, San Jose State Uni- tic Network Calculus.- Traffic Models for Stochas- Multi-Attribute Negotiations.- Cooperation-based versity.- Preface.- Introduction to Biometrics.- Fin- tic Network Calculus.- Server Models for Stochas- Multilateral Multi-issue Negotiation for Crisis Man- gerprint Recognition.- Face Recognition.- Iris Recog- tic Network Calculus.- Stochastic Network Calcu- agement.- A Fuzzy Logic-based Approach for Flex- nition.- Hand Geometry Recognition.- Gait Recog- lus.- Independent Case Analysis.- Applications of ible Self-interested Agent Team Forming.- Part II nition.- The Ear as a Biometric.- Voice Biomet- Stochastic Network Calculus.- Summary and Open Practical Approach for Complex Multi-agent [..] rics.- A Palmprint Authentication System.- On- Problems Line Signature Verification.- 3D Face Recogni- Fields of interest tion.- Automatic Forensic Dental Identification.- Fields of interest Appl.Mathematics/Computational Methods of Engi- Hand Vascular Pattern Technology.- System Performance and Evaluation; Computer neering; Artificial Intelligence (incl. Robotics) Introduction to Multibiometrics.- Multispectral Face Communication Networks; Computer Systems Or- ganization and Communication Networks Target groups Recognition.- Multibiometrics Using Face and Ear.- Engineers, researchers, and graduate students in Incorporating Ancillary Information in Multibio- metric [..] Target groups computational intelligence and multi-agent systems Researchers, Academics, Graduates Fields of interest Type of publication Type of publication Monograph Pattern Recognition; Image Processing and Comput- er Vision; Data Encryption; Data Structures, Cryp- Monograph tology and Information Theory; Computer Imaging, Due January 2008 Vision, Pattern Recognition and Graphics; Multime- Due May 2008 dia Information Systems 2008. Approx. 180 p. (Studies in Computational Intelligence, Vol. 2008. Softcover 89) Hardcover Target groups Research scientists 69,95 € 99,95 € ISBN 978-1-84800-126-8 ISBN 978-3-540-76281-2 Type of publication Handbook

Due November 2007

2008. Approx. 566 p. Hardcover

54,95 € ISBN 978-0-387-71040-2 springer.com/booksellers Computer Science 77

B. Kagström, Umea University, Umea, Sweden; E. Elmroth, Umea R. Kaiser, Tübingen R. Kaiser, Tübingen, Germany University, Umea, Sweden; J. Dongarra, University of Tennessee, Knoxville, TN, USA; J. Wasniewski, Technical University of Den- mark, Kongens Lyngby, Denmark (Eds.) C++ with Borland C++Builder C++ with Microsoft Visual C++2005

An Introduction to the ANSI/ISO Standard and Object-Orient- An Introduction to the C++ Standard and Object Oriented Applied Parallel Computing ed Windows Programming Windows Programming

State of the Art in Scientific Computing. 8th International Workshop, PARA 2006, Umea, Sweden, June 18-21, 2006, Re- vised Selected Papers C++ with the Borland C++Builder presents compre- C++ with Microsoft Visual C++2005 provides hensively and systematically all language elements comprehensive and systematic coverage of all lan- of the ANSI/ISO standard of C++. Contexts and lan- guage features of the C++ standard. The main fo- guage concepts are in the foreground. The author cus is on language concepts and their context, This book constitutes the thoroughly refereed post- uses Borland C++Builder as development sys- rather than on details which are available in the on- proceedings of the 8th International Workshop on tem. This visual system is the C++ variant of the Pas- line help. The book uses Microsoft Visual studio Applied Parallel Computing, PARA 2006, held in cal development system Delphi and makes a simple 2005 as development system. This visual program- Umeå, Sweden, in June 2006. This volume contains development of programs for Windows possible. Al- ming environment facilitates easy development of 4 keynote lectures and 86 revised papers of 15 in- most all examples and exercises are Windows pro- Windows .Net programs. Most examples and exer- vited minisymposia arranged on the following top- grams. However, since the ANSI/ISO standard of C cises are Windows .Net programs. However, as the ics: stretching time and length scales in biomolec- ++ is in the foreground, this book is also suitable for focus is on the C++ standard, the book is also suit- ular modelling, recent advances in dense linear al- readers who work with other compilers. The class li- able for readers working with other compilers. The gebra, cfd applications for high performance com- brary of the C++Builder (VCL) is used as an example author presents the principles of object-oriented puting, hpc environments: visualization and paral- of a class hierarchy. The CD-ROM contains many analysis and design along with object-oriented pro- lelization tools, tools, frameworks and applications examples and exercises with solutions. gramming and the .Net Framework class library as for high performance computing, grid data manage- an example of a class hierarchy. ment, simulations in geophysics and space physics, Features tools for parallel performance analysis, grids for sci- Systematical and comprehensive introduction to all Features entific computing, simulations of materials, novel elements of the ANSI/ISO standard of C++ With Comprehensive overview of all language features of data formats and algorithms for dense linear algebra Version 6 of the Borland C++Builder as develop- the C++ standard With Micosoft Visual Studio 2005 computations, bioinformatics and computational bi- ment system CD-ROM with examples and exercises as development system With fully worked out solu- ology, scientific visualization and hpc applications, tions to exercises and questions on the accompany- software tools for parallel cfd applications, and mul- Contents ing CD-ROM ti-scale physics. The 45 revised full papers papers of From the contents: The Integrated Development [..] Environment.- The Component Palette.- Elemen- Fields of interest tary Data Types and Statements.- Structured Data Programming Languages, Compilers, Interpreters; Fields of interest Types and Predefined Classes.- Statements and Im- Programming Techniques; Software Engineering; Mathematics of Computing; Software Engineer- pressions.- Functions.- Modular Programming in Software Engineering/Programming and Operating ing/Programming and Operating Systems; Algo- Namespaces.- Object-Oriented Programming.- The Systems rithm Analysis and Problem Complexity; Systems Visual Component Library (VCL).- Templates and and Information Theory in Engineering; Computa- the STL.- Miscellaneous.- Bibliography.- Index. Target groups tional Mathematics and Numerical Analysis Practitioners and students of Computer Science; pro- Fields of interest grammers Target groups Programming Languages, Compilers, Interpreters; Researchers and professionals Programming Techniques Type of publication Professional book Type of publication Target groups Proceedings Practitioners and students of Computer Science and Due July 2008 Economics IT Due October 2007 Type of publication 2008. Approx. 900 p. With CD-ROM. Softcover Professional book 2007. XXIX, 1192 p. (Lecture Notes in Computer Science, Vol. 59,95 € 4699) Softcover ISBN 978-3-540-69821-0 Due April 2008 110,00 € ISBN 978-3-540-75754-2 2008. Approx. 1000 p. With CD-ROM. Hardcover

59,95 € ISBN 978-3-540-01027-2 78 Computer Science springer.com/booksellers

H. Kalva, Florida Atlantic University, Boca Raton, FL, USA; J.-B. M.Y. Kao (Ed.) Lee, Sarnoff Corp., Princeton, NJ, USA Encyclopedia of Algorithms The VC-1 and H.264 Video Compression Standards for Broadband Video Services The Encyclopedia of Algorithms will provide a com- prehensive set of solutions to important algorithmic problems for students and researchers interested in quickly locating useful information. The first edi- The MPEG committee recently standardized the tion of the reference will focus on high-impact solu- MPEG AVC (H.264) video coding standard. This is a tions from the most recent decade; later editions will highly efficient compression standard that can make widen the scope of the work. Nearly 500 entries will high-quality video services possible over broadband be organized alphabetically by problem, with suben- networks. A competing standard developed by Mi- tries allowing for distinct solutions and special cases crosoft, VC-1 was standardized in SMPTE in August to be listed by the year. An entry will include: a de- 2005, and this novel standard is also seeing signifi- scription of the basic algorithmic problem the input cant industry interest. These two standards are ex- and output specifications the key results examples pected to form the basis for high-quality broadband of applications citations to the key literature. Open video services. The VC-1 and H.264 Video Compres- problems, links to downloadable code, experimen- sion Standards for Broadband Video Services cov- tal results, data sets, and illustrations may be provid- ers these video coding standards as well as issues in ed. All entries will be written by experts with links broadband video delivery over IP networks. This to Internet sites that outline their research work will professional reference is designed for industry prac- be provided. The entries will be peer-reviewed. This titioners, including video engineers, and profession- defining reference will be published in print and on als in consumer electronics, telecommunications and [..] media compression industries. This volume is also suitable as a secondary text for advanced-level stu- Features dents in computer science and electrical engineering. No similar reference work on Algorithms is current- ly available Comprehensive A-Z coverage of this Features complex subject area makes this volume easily acces- No other reference book on the new VC-1 standard sible to professionals and researchers in all fields who covers VC-1 in detail First reference book to cover are interested in a particular aspect of Algorithms the two new key video technologies for broadband Targeted literature references provide additional val- video services Authors of this book have been work- ue for researchers looking to study a topic in more ing on video compression and communications for detail Entries are cross-linked with journal articles more than 12 years Fields of interest Contents Mathematics of Computing; Computer Science, gen- -Preface.- Multimedia Systems.- Syntax Hi- eral; Theory of Computation; Applications of Mathe- erarchies and Encapsulation.- HRD Models matics; Math Applications in Computer Science; Nu- and Rate Control.- Transform and Quanti- merical Analysis zation.- Intra Prediction.- Inter Pre- diction.- In-Loop Deblocking Operations Target groups and Out-Loop Deringing.- Interlace Han- Computer scientists working in a wide range of areas dling.- Bitstream Syntax.- HD-DVD and Blu- such as Bioinformatics, Cryptography, Data Com- ray Provisions.- IPTV Provisions.- Index. pression, Medical Informatics, Network and Com-   munication Protocols, Artificial Intelligence, and Pattern Recognition; scholars, students, and pro- Fields of interest fessionals who work in fields such as mathematics, Multimedia Information Systems; Information Stor- statistics, computational biology, economics, finance age and Retrieval; Computer Communication Net- and stochastics, medical informatics, data mining, works; Computer Imaging, Vision, Pattern Recog- industrial engineering, and decision science nition and Graphics; Information Systems Applica- tions (incl.Internet) Type of publication Encyclop(a)edia Target groups Professionals Due July 2008 Type of publication Monograph 2008. eReference.

Due March 2008 309,00 € ISBN 978-0-387-30162-4

2008. XX, 320 p. 20 illus. (Multimedia Systems and Applications, Vol. 41) Hardcover

107,80 € ISBN 978-0-387-71042-6 springer.com/booksellers Computer Science 79

M.Y. Kao (Ed.) A. Karasaridis, AT&T Labs, Middletown, NJ, USA S. Kartalopoulos, University of Oklahoma, Tulsa, OK, USA

Encyclopedia of Algorithms DNS Security Next Generation Intelligent Optical Networks

From Access to Backbone The Encyclopedia of Algorithms will provide a com- This book provides a comprehensive coverage of prehensive set of solutions to important algorithmic DNS security. It gives the reader an in depth under- problems for students and researchers interested in standing of how DNS works securely. After reading quickly locating useful information. The first edi- the book, the reader will be able to complete the set- The book covers protocols and other significant is- tion of the reference will focus on high-impact solu- up of DNS knowing which architecture and what sues of the next generation optical network for un- tions from the most recent decade; later editions will type of software and configuration it will need to dergraduate and graduate students, researchers, and widen the scope of the work. Nearly 500 entries will have given the working environment (e.g., large, managers in industry. Topics are discussed without be organized alphabetically by problem, with suben- medium or small corporation, educational organiza- complex math, but with citations to references for tries allowing for distinct solutions and special cases tion, government). those interested in an advanced math level. to be listed by the year. An entry will include: a de- scription of the basic algorithmic problem; the input Features Features and output specifications; the key results; examples Supported by a website which will cover addendums Covers protocols and other significant issues of the of applications; citations to the key literature. Open and corrections, as well as additional configuration next generation optical networks problems, links to downloadable code, experimen- scripts and code that implements algorithms pre- tal results, data sets, and illustrations may be provid- sented in the book Includes illustrations of various Contents ed. All entries will be written by experts with links concepts, architecture plots, graphs Contains exam- Introduction.- Digital Networks.- WDM Technology to Internet sites that outline their research work will ples of uses and configurations, results of simula- and Networks.- Next Generation SONET/SDH.- The be provided. The entries will be peer-reviewed. This tions, installation and setup instructions Optical Transport Network.- Network Synchroniza- defining reference will be published in print and on tion.- Network Performance.- Network Protection line. The [..] Contents & Fault Management.- Network Security.- Con- Introduction: Why DNS Security is important.- DNS clusion. Features Overview: Protocol, Architecture and Applications.- No comparable reference work on Algorithms is cur- Protocol Security Extensions-DNSSEC and beyond.- Fields of interest rently available A-Z organization allows easy, intu- DNS Vulnerabilities.- Monitoring and Detection of Communications Engineering, Networks; Comput- itive access to professionals and researchers inter- Security Breaches.- Prevention, Protection and Miti- er Communication Networks; Computer Systems ested in a particular aspect of Algorithms Targeted gation of DNS attacks. Organization and Communication Networks; Ap- literature references provide additional value for re- plied Optics, Optoelectronics, Optical Devices; Mi- searchers looking to study a topic in more detail Use- Fields of interest crowaves, RF and Optical Engineering; Signal,Image ful for scholars, researchers, and professionals who Communications Engineering, Networks; Data and Speech Processing work in other fields — such as mathematics, [..] Structures, Cryptology and Information Theory; Da- ta Encryption; Computer Communication Networks Target groups Contents Senior level undergraduate students, graduate stu- VLSI.- Distributed Computing.- Parallel Processing.- Target groups dents, technical managers, research and development Automated Design.- Robotics.- Graphics.- Data Base Network and system administrators, operations per- engineers, technical marketers Design.- Software Tools.- Sorting.- Searching.- Data sonnel, and network design/architecture profession- Type of publication Structures.- Computational Geometry.- Linear Pro- sals as well as researchers in the applied network se- Professional book gramming. curity community

Fields of interest Type of publication Due December 2007 Algorithm Analysis and Problem Complexity; Theo- Professional book ry of Computation; Algorithms; Appl.Mathematics/ 2008. Approx. 350 p. Hardcover Computational Methods of Engineering; Mathemat- Due August 2008 ics of Computing; Applications of Mathematics 76,95 € 2008. Approx. 300 p. Hardcover ISBN 978-0-387-71755-5 Target groups Computer scientists working in a wide range of areas 38,50 € such as Bioinformatics, Cryptography, Data Com- ISBN 978-0-387-76545-7 pression, Medical Informatics, Network and Com- munication Protocols, Artificial Intelligence, and Pattern Recognition; scholars, students, and pro- fessionals who work in fields such as mathematics, statistics, computational biology, economics, finance and stochastics, medical informatics, data mining, industrial engineering, and decision science

Type of publication Encyclop(a)edia

Due June 2008

2008. Approx. 1500 p. Hardcover

309,00 € ISBN 978-0-387-30770-1 80 Computer Science springer.com/booksellers

J. Katz, University of Maryland, College Park, MD, USA A. Kelemen, University at Buffalo, NY, USA; A. Abraham, Norwe- U.B. Kjaerulff, Aalborg University, Aalborg, Denmark; A.L. Mad- gian University of Science and Technology, Trondheim, Norway; sen, HUGIN Expert A/S, Aalborg, Denmark Y. Liang, University at Buffalo, NY, USA (Eds.) Digital Signatures Bayesian Networks and Influence Computational Intelligence in Diagrams: A Guide to Construction Medical Informatics Digital Signatures is the first and only book to ex- and Analysis plain the underlying cryptographic principles and techniques used in designing the secure digital sig- nature schemes being utilized today. This book will Medical Informatics (MI) is an emerging interdisci- Probabilistic networks, also known as Bayesian net- help the reader understand and appreciate the se- plinary science that deals with clinical health-relat- works and influence diagrams, have become one of curity guarantees provided by digital signatures. ed information, its structure, acquisition and use. MI the most promising technologies in the area of ap- Full descriptions, detailed constructions, and for- is grounded in the principles of computer science, plied artificial intelligence, offering intuitive, effi- mal proofs of security are provided for essentially all computational intelligence, as well as the clinical and cient, and reliable methods for diagnosis, prediction, known provably-secure signature schemes; state-of- basic sciences. This book deals with the application decision making, classification, troubleshooting, and the-art signature schemes used extensively in prac- of computational intelligence in medical informatics. data mining under uncertainty. Bayesian Networks tice are also explained in detail. A valuable refer- Addressing the various issues of medical informatics and Influence Diagrams: A Guide to Construction ence book for researchers and industry practitioners, using different computational intelligence approach- and Analysis provides a comprehensive guide for Digital Signatures can also be used as a tutorial for es is the novelty of this edited volume. This volume practitioners who wish to understand, construct, self-study by advanced-level students in computer comprises of 15 chapters including an introductory and analyze intelligent systems for decision support science, or as a textbook in a seminar on signature chapter giving the fundamental definitions and some based on probabilistic networks. Intended primarily schemes.  Preface written by Moti Yung. &nb- important research challenges. Chapters were select- for practitioners, this book does not require sophisti- sp; ed on the basis of fundamental ideas/concepts rather cated mathematical skills or deep understanding of than the thoroughness of techniques deployed. Features the underlying theory and methods nor does it dis- - Contains full descriptions and formal proofs of al- Features cuss alternative technologies for reasoning under un- most all known provably-secure signature schemes Reports recent research results on computational in- certainty. The theory and methods presented are il- - Includes details on state-of-the-art signature telligence in medical informatics lustrated through more than 140 examples, and exer- schemes used extensively in practice - Explains many cises are included for the reader to check his/her lev- of the the underlying methodologies for construct- Contents el of understanding. The techniques and [..] ing secure signature schemes - Appropriate for prac- Review of Computational Intelligence for Gene- titioners and students; will serve well as a reference Gene and Gene-Environment Interactions in Dis- Features or as a text for self-study   ease Mapping.- Intelligent Approaches to Mining Comprehensive introduction to probabilistic net- the Primary Research Literature: Techniques, Sys- works Written specifically for practitioners of ap- Contents tems, and Examples.- Intuitionistic Fuzzy Set: Appli- plied artificial intelligence Complete guide to under- Preface by Moti Yung.- Background.- Introduction.- cation to Medical Image Segmentation.- Decompos- stand, construct, and analyze probabilistic networks Preliminaries and Number-Theoretic Background.- able Aggregability in Population Genetics and Evo- Contents Definitions of Security.- On The Existence of Dig- lutionary Computations: Algorithms and Computa- Introduction.- Networks.- Probabilities.- Probabilis- ital Signature Schemes.- Main Feasibility Results.- tional Complexity.- Evolutionary Learning of Neu- tic Networks.- Solving Probabilistic Networks.- Elic- Signature Schemes Based on the RSA Problems.- ral Structures for Visuo-Motor Control.- Dimension iting the Model.- Modeling Techniques.- Data-Driv- Signature Schemes in Practice.- Introduction to the reduction for performing discriminant analysis for en Modeling.- Conflict Analysis.- Sensitivity Analy- Random Oracle Model.- Signature Schemes from Microarrays.- Auxiliary tool for the identification of sis.- Value of Information Analysis. Identification Schemes.- Hash-and-Sign Signature genetic [..] Schemes.- Standards and Standardized Schemes.- In- Fields of interest dex. Fields of interest Statistics and Computing/Statistics Programs; Prob- Appl.Mathematics/Computational Methods of Engi- ability and Statistics in Computer Science; Data Min- Fields of interest neering; Artificial Intelligence (incl. Robotics); Bioin- ing and Knowledge Discovery; Artificial Intelligence Data Encryption; Data Structures, Cryptology and formatics Information Theory; Computer Communication (incl. Robotics); Operations Research, Mathemati- Networks; Computer Systems Organization and Target groups cal Programming; Probability Theory and Stochastic Communication Networks; Coding and Information Engineers, medical practitioners, researchers, and Processes Theory; Communications Engineering, Networks graduate students in medical informatics, bioinfor- Target groups matics, and computational intelligence Target groups Practitioners Professionals in industry Type of publication Type of publication Monograph Type of publication Monograph Monograph Due January 2008 Due January 2008 Due November 2007 2008. Approx. 390 p. (Studies in Computational Intelligence, Vol. 85) Hardcover 2008. Approx. 300 p. (Information Science and Statistics) Hard- cover 2008. Approx. 250 p. Hardcover 129,95 € 61,60 € 64,95 € ISBN 978-3-540-75766-5 ISBN 978-0-387-74100-0 ISBN 978-0-387-27711-0 springer.com/booksellers Computer Science 81

F. Klawonn, University of Applied Sciences Braun- J.P.C. Kleijnen, Tilburg University, The Netherlands A. Klenke, Johannes Gutenberg-Universität Mainz, Germany schweig/Wolfenbuettel, Germany Design and Analysis of Simulation Probability Theory Introduction to Computer Graphics Experiments A Comprehensive Course Using Java 2D and 3D

Simulation is a widely used methodology in all the Aimed primarily at graduate students and re- Computer graphics comprises the creation and rep- Applied Science disciplines. It provides a flexible, searchers, this text is a comprehensive course in resentation of simple graphical elements and im- powerful and intuitive tool for investigating how to modern probability theory and its measure-theoret- ages as well as modern techniques for virtual reali- design a process or system, and how to maximize its ical foundations. It covers a wide variety of topics, ty. In order to apply computer graphics techniques efficiency. Simulation's effectiveness depends greatly many of which are not usually found in introduc- correctly, a basic understanding of the fundamental on how well the simulation experiments are designed tory textbooks, such as: limit theorems for sums of concepts is required. This book provides an intro- and analyzed. Design and Analysis of Simulation random variables; martingales; percolation; Markov duction to the most important basic concepts cou- Experiments will focus on this crucial phase in the chains and electrical networks; construction of pling the technical background and theory immedi- overall process of applying simulation. The book will stochastic processes; Poisson point processes and in- ately with practical examples and applications. The include the best of both classic and modern methods finite divisibility; large deviation principles and sta- reader can follow up the theory and then literally see of simulation experimentation, and as a result, it will tistical physics; Brownian motion; and stochastic in- the theory at work in numerous example programs. provide a state-of-the-art treatment of the topic. This tegral and stochastic differential equations. The the- With only elementary knowledge of the program- book will be the standard reference book on the topic ory is developed rigorously and in a self-contained ming language Java, the reader will be able to create for both researchers and sophisticated practitioners way, with the chapters on measure theory interlaced his or her own images and animations immediately in the area, and it will be used as a textbook in cours- with the probabilistic chapters in order to display the using Java 2D and Java 3D. Written for second year es or seminars focusing on this topic. power of the abstract concepts in the world of prob- undergraduate and above students, this book will be ability theory. In addition, plenty of figures, comput- an essential tool for those studying computer science Features er simulations, biographic details of key mathemati- and computer engineering. A website for this book Jack Kleijnen is considered one of the world’s top cians, and a wealth of examples support and enliven includes programs with source code, exercises with authorities on simulation and its uses in a variety of the presentation. solutions and slides as teaching material. problem-solving domains. Professor Kleijnen has worked in the fields of operations research, manage- Features Features ment science, industrial engineering, mathematical A comprehensive and modern introduction to Provides theory and praxis in combination Focus- statistics, economics, nuclear engineering, comput- the most important fields of probability theory. A es on Java 3D (and 2D) Contains many easy to un- er science, and information systems. He has a thor- unique selection of topics, including many not usual- derstand example programs Additional exercises, so- ough and wide-ranging understanding of problems ly found in introductory texts. lutions, example programs, slides for lecturers and in these [..] links to select websites can be found on a comple- Contents mentary website for this book Contents Basic Measure Theory.- Independence.- Generat- Preface.- Introduction.- Black Box Metamodels.- ing Functions.- The Integral.- Moments and Laws Contents Low-Order Polynomial Regression.- Metamodels of Large Numbers.- Convergence Theorems.- Lp- Introduction.- Basic principles of two-dimensional and Designs: A Single Factor.- Low-Order Polyno- Spaces and Radon-Nikodym Theorem.- Condition- graphics.- Drawing lines and curves.- Areas, text and mial Models and Designs: Multiple Factors.- Low- al Expectations.- Martingales.- Optional Sampling colour.- Basic principles of three-dimensional graph- Order Polynomial Models and Screening Designs: Theorems.- Martingale Convergence Theorems and ics.- Modelling three-dimensional objects.- Visible Hundreds of Factors.- Kriging Metamodels.- Latin their Applications.- Backwards Martingales and Ex- surface determination.- Illumination and shading.- Hypercube Sampling (LHS) and other Space-Filling changeability.- Convergence of Measures.- Proba- Special effects and virtual reality.- Appendix: Use- Designs.- Cross-Validation of Metamodels.- Conclu- bility Measures on Product Spaces.- Characteristics ful links.- Appendix: Example programs.- Appendix: sions and Further Research. Functions and Central Limit Theorem.- Infinitely References to Java 2D classes and methods.- Ap- Divisible Distributions.- Markov Chains.- Conver- pendix: References to Java 3D classes and methods.- Fields of interest gence of Markov Chains.- Markov Chains and Elec- Bibliography.- Index Probability Theory and Stochastic Processes; Sta- trical Networks.- [..] tistical Theory and Methods; Mathematical Mod- Fields of interest eling and Industrial Mathematics; Operation Re- Fields of interest Computer Graphics; Computer Imaging, Vision, search/Decision Theory; Industrial and Production Probability Theory and Stochastic Processes; Statisti- Pattern Recognition and Graphics Engineering; Engineering Design cal Theory and Methods; Statistical Physics

Target groups Target groups Target groups Intermediate undergraduates Researchers and practitioners Advanced undergraduate and graduate students; Re- searchers Type of publication Type of publication Undergraduate textbook Monograph Type of publication Graduate/advanced undergraduate textbook Due February 2008 Due November 2007 Due December 2007 2008. Approx. 285 p. (Undergraduate Topics in Computer Sci- 2008. Approx. 416 p. (International Series in Operations Research ence) Softcover & Management Science, Vol. 111) Hardcover 2008. Approx. 625 p. (Universitext) Softcover

29,95 € 69,95 € 54,95 € ISBN 978-1-84628-847-0 ISBN 978-0-387-71812-5 ISBN 978-1-84800-047-6 82 Computer Science springer.com/booksellers

J. Knowles, University of Manchester, UK; D. Corne, Heriot-Watt Y. Kompatsiaris, Informatics and Telematics Institute, Ther- D. Konaté, Virginia Tech, Blacksburg, VA, USA (Ed.) University, Edinburgh, UK; K. Deb, Indian Institute of Technology, mi-Thessaloniki, Greece; P. Hobson, Motorola Laboratory, UK Kanpur, India (Eds.) (Eds.) Mathematical Modeling, Multiobjective Problem Solving Semantic Multimedia and Simulation, Visualization and e- from Nature Ontologies Learning

From Concepts to Applications Theory and Applications Proceedings of an International Workshop held at Rockefeller Foundation' s Bellagio Conference Center, Milan, Italy, 2006

Multiobjective problems involve several competing This book draws together experts from the multime- This book is a collection of articles written by some measures of solution quality, and multiobjective evo- dia, the knowledge and the integrated multi- of the most prominent leading applied mathemati- lutionary algorithms (MOEAs) and multiobjective media-knowledge domains to explore how knowl- cians, as well as articles from young and promising problem solving have become important topics of edge technologies can be exploited to create new scientists from Africa, Asia and Europe. The com- research in the evolutionary computation commu- multimedia applications, & how multimedia mon objective of these articles is to present an im- nity over the past 10 years. This is an advanced text technologies can provide new contexts for the use portant issue which is currently widely discussed in aimed at researchers and practitioners in the area of knowledge technologies. The step-by-step ap- scientific investigation with major human, economic of search and optimization. The book focuses on proach guides the reader from fundamental enabling or ecological implications. One main feature of the how MOEAs and related techniques can be used to technologies of ontologies, analysis and reasoning, series, which the current book exemplifies, is that solve problems, particularly in the disciplines of sci- through to applications which have hitherto had each article is as deep as an expert lecture but is also ence and engineering. Contributions by leading re- less attention such as personalisation of multime- self-contained, so that even isolated scientists with searchers show how the concepts of multiobjective dia content and personalised content adap- limited resources can profit greatly from it. Anoth- optimization can be used to reformulate and resolve tation. Thorough coverage of all relevant topics is er feature of this book is that each article is meant to problems in broad areas such as constrained opti- given, including ontologies for low level multime- present a collection of open questions which can fuel mization, coevolution, classification, inverse mod- dia feature representation, higher level multimedia undergraduate or graduate research activities even in elling and design. The book is distinguished from systems representations, application of multimedia smaller or more isolated scientific communities. other texts on MOEAs in that it is not primarily ontologies for visual analysis and finally us- about the algorithms, nor specific applications, but age of multimedia and knowledge technolo- Fields of interest about the concepts and processes involved in solv- gies for applications. Presenting a fundamental work Computational Mathematics and Numerical Anal- ing problems using a multiobjective approach. Each which can serve as a reference book for researchers ysis; Mathematical Modeling and Industrial Mathe- chapter [..] and graduate students going [..] matics; Visualization; Mathematics of Computing; Math. Appl. in Environmental Science; Game Theo- Contents Features ry/Mathematical Methods Introduction.- Fundamentals.- Connections to Na- Provides comprehensive treatment of multimedia ture.- Formulating a Problem.- Single-Objective ontologies' development & application from Target groups Problems.- Dealing with Many Objectives.- Applica- multiple perspectives, going beyond single applica- Research scientists, undergraduate and graduate stu- tions.- Conclusions.- MOEA: Triumph of Natural tions Presents a step-by-step approach taking the dents Computing.- References.- Index. reader from the fundamental enabling technologies of ontologies, analysis & reasoning, through Type of publication Fields of interest to applications which have hitherto had less atten- Proceedings Artificial Intelligence (incl. Robotics); Optimization; tion, such as personalisation of multimedia content Engineering Design; Theory of Computation & [..] Due December 2007 Target groups Contents Practitioners, researchers and graduate students in Introduction and overview.- Multimedia Ontolo- 2008. Approx. 400 p. Hardcover optimization, design, natural computing gies.- Low level.- High level ontological representa- tion and meta-ontologies.- Application specific on- 69,95 € Type of publication tologies.- Analysis and Reasoning.- Visual analysis ISBN 978-3-540-74338-5 Monograph and use of context.- Constraint reasoning.- Reason- ing applied to a specific domain.- Applications.- Per- Due December 2007 sonalised Summaries.- Content adaptation.- Medical or animal application.- Conclusion 2008. Approx. 300 p. (Natural Computing Series) Hardcover Fields of interest 64,95 € Information Systems Applications (incl.Internet); ISBN 978-3-540-72963-1 Multimedia Information Systems; Information Stor- age and Retrieval; Image Processing and Computer Vision; Pattern Recognition; Artificial Intelligence (incl. Robotics)

Target groups Researchers, Graduate students

Type of publication Contributed volume

Due June 2008

2008. Approx. 286p. Hardcover

84,95 € ISBN 978-1-84800-075-9 springer.com/booksellers Computer Science 83

S. Konishi, Kyushu University, Fukuoka, Japan; G. Kitagawa, The A. Kopra, mental images, Berlin, Germany A. Kornai, MetaCarta Inc., Cambridge MA, USA Institute of Statistical Mathematics, Tokyo, Japan Writing mental ray® Shaders Mathematical Linguistics Information Criteria and Statistical Modeling A Perceptual Introduction Mathematical Linguistics introduces the mathemati- cal foundations of linguistics to computer scientists, The current documentation of mental ray in Render- engineers, and mathematicians interested in natural The Akaike information criterion (AIC) derived as ing with mental ray and Programming mental ray is language processing. The book presents linguistics as an estimator of the Kullback-Leibler information dis- uniquely thorough in its description of mental ray's a cumulative body of knowledge from the ground up: crepancy provides a useful tool for evaluating sta- features and programmable extensibility. However, no prior knowledge of linguistics is assumed. Previ- tistical models, and numerous successful applica- with the increasing use of mental ray by artists and ous textbooks in this area concentrate on syntax and tions of the AIC have been reported in various fields programmers in visual effects and broadcast produc- semantics - this comprehensive volume covers an ex- of natural sciences, social sciences and engineering. tion, a different description of mental ray’s extensi- tremely rich array of topics also including phonology One of the main objectives of this book is to pro- bility is required, an approach that takes the aesthet- and morphology, probabilistic approaches, complex- vide comprehensive explanations of the concepts and ics of rendering into account. “Writing mental ray ity, learnability, and the analysis of speech and hand- derivations of the AIC and related criteria, includ- shaders” describes the varieties of shader program- writing. As the first textbook of its kind, this book is ing Schwarz’s Bayesian information criterion (BIC), ming from the point of view of increasing perceptual useful for those in information science (information together with a wide range of practical examples of complexity: from color, to the effects of light, to the retrieval and extraction, search engines) and in nat- model selection and evaluation criteria. A secondary manipulation of shape, to the output of the final im- ural language technologies (speech recognition, op- objective is to provide a theoretical basis for the anal- age. This is not a documentation organized around tical character recognition, HCI). Exercises suitable ysis and extension of information criteria via a sta- the structure of software, but rather based on our for the advanced reader are included, as well as sug- tistical functional approach. A generalized informa- perception of the visual world. Other features of the gestions for further reading and an extensive bibliog- tion criterion (GIC) and a bootstrap information cri- book are also designed for programmers in produc- raphy. terion are presented, which provide unified tools for tion. Many intermediate programmers work from modeling and model evaluation for a diverse range examples they use as templates for their own pro- Features of models, including various types of nonlinear mod- grams. This book includes many example [..] Aims to teach linguistics to the reader but presumes els and model estimation [..] only knowledge of mathematics at the undergraduate Features level The material was hitherto available only in the Features A tutorial introduction to mental ray shader pro- research literature Wide applicability in information With the development of modeling techniques, it has gramming Includes the full source code for 100 science (information retrieval, information extrac- been required to construct model selection criteria, shaders and illustrated with over 200 rendered scenes tion, search engines) and in natural language tech- relaxing the assumptions imposed AIC and BIC and diagrams Cross-references with the first two vol- nologies (speech recognition, OCR, HCI) umes of mental ray handbooks Contents Contents Concept of statistical modeling.- Statistical models.- Contents Introduction.- The Elements.- Phonology.- Mor- Information criterion.- Statistical modeling by AIC.- Introduction - Structure: The structure of the scene phology.- Syntax.- Semantics.- Complexity.- Linguis- Generalized information criterion GIC.- Statistical - The structure of a shader - Shaders in the scene - tic Pattern Recognition.- Speech and Handwriting.- modeling by GIC.- Theoretical development and Color: A single color - Color from orientation - Col- Simplicity.- Bibliography.- Index. asymptotic properties of the GIC.- Bootstrap infor- or from position - The transparency of a surface - mation criterion.- Bayesian information criteria.- Color from functions - The color of edges - Light: Fields of interest Various model evaluation criteria. Lights - Light on a surface - Shadows - Reflection - Language Translation and Linguistics; Applications Refraction - Light from other surfaces - Shape: Mod- Fields of interest of Mathematics; Signal,Image and Speech Process- ifying surface geometry - Modifying surface orienta- Statistical Theory and Methods; Data Mining and ing; Mathematical Logic and Formal Languages; tion - Creating geometric objects - Space: Environ- Knowledge Discovery; Probability and Statistics in Probability Theory and Stochastic Processes; Pattern ment - Atmosphere - Volume - Image: Changing the Computer Science; Simulation and Modeling; Com- Recognition lens - Rendering image components - Modifying the putational Biology/Bioinformatics; Econometrics final image - Appendices: [..] Target groups Target groups Graduates, advanced graduates, researchers, software Fields of interest Researchers engineers in natural language technology Computer Graphics; Computer-Aided Engineering Type of publication (CAD, CAE) and Design; Computer Appl. in Arts Type of publication Monograph and Humanities; Media Design Graduate/advanced undergraduate textbook Target groups Due December 2007 Due November 2007 Computer graphics students and researchers, CAD/ CAE software programmers, digital visual effects 2008. Approx. 290 p. (Springer Series in Statistics) Hardcover programmers and artists, feature animation design 2008. Approx. 305 p. (Advanced Information and Knowledge programmers and artists, designers and program- Processing) Hardcover 64,95 € mers of 3D modeling applications 76,95 € ISBN 978-0-387-71886-6 Type of publication ISBN 978-1-84628-985-9 Handbook

Due November 2007

2008. Approx. 600 p. 730 (156 colored) ill. (mental ray® Hand- books, Vol. 3) Softcover

129,95 € ISBN 978-3-211-48964-2 84 Computer Science springer.com/booksellers

G. Kortuem, Lancaster University, Lancaster, UK; J. Finney, Lan- M.R. Kosorok, University of North Carolina, Chapel Hill, NC, USA A.G. Kostianoy, Lomonosov State University, Moscow, caster University, Lancaster, UK; R. Lea, University of British Russia; A.N. Kosarev, Lomonosov Moscow State University, Columbia, BC, Canada; V. Sundramoorthy, Lancaster University, Moscow, Russia (Eds.) Lancaster, UK (Eds.) Introduction to Empirical Processes and Semiparametric Inference The Black Sea Environment Smart Sensing and Context

Second European Conference, EuroSSC 2007, Kendal, England, October 23-25, 2007, Proceedings This book provides a self-contained, linear, and uni- This book presents a systematic description of the fied introduction to empirical processes and semi- knowledge accumulated on the physical oceanogra- parametric inference. These powerful research tech- phy, marine chemistry and pollution, marine biolo- niques are surprisingly useful for developing meth- This book constitutes the refereed proceedings of the gy and geology, meteorology and hydrology of the ods of statistical inference for complex models and in Second European Conference on Smart Sensing and Black Sea. It presents the principal characteristic fea- understanding the properties of such methods. The Context, EuroSSC 2007, held in Kendal, England, tures of the environmental conditions of the sea and targeted audience includes statisticians, biostatisti- October 23-25, 2007. The 16 revised full papers and their changes in the second half of the 20th centu- cians, and other researchers with a background in one invited paper were carefully reviewed and select- ry. At present, the principal problems of the Black mathematical statistics who have an interest in learn- ed from over 51 submissions. The papers are orga- Sea are related to the estimation of the intensity of ing about and doing research in empirical process- nized in topical sections on Spatial and Motion Con- the chemical pollution of the sea and its impact upon es and semiparametric inference but who would like text, Human Behavior as Context, Context Frame- the biota. Special attention is given to the socioeco- to have a friendly and gradual introduction to the works and Platforms and Sensing Technologies and nomic, legal, and political issues in the Black Sea re- area. The book can be used either as a research ref- Case Studies. gion. This publication is based on numerous obser- erence or as a textbook. The level of the book is suit- vational data collected by the authors of the various Fields of interest able for a second year graduate course in statistics or chapters during sea expeditions, on the archive data Information Systems Applications (incl.Internet); biostatistics, provided the students have had a year of of several Russian and Ukrainian oceanographic in- Information Systems and Communication Service; graduate level mathematical statistics and a semester stitutions, as well as on a large body of scientific lit- Data Mining and Knowledge Discovery; Computer of probability.The book consists of three parts. The erature, mainly published in Russian editions. This Communication Networks; User Interfaces and Hu- first part is a concise overview of all of the main con- book is aimed at specialists concerned with research man Computer Interaction cepts covered in the [..] in the various fields of [..]

Target groups Features Features Researchers and professionals A self-contained, linear, and unified introduction to Presents in a systematic description the knowledge empirical processes and semiparametric inference accumulated on the physical oceanography, marine Type of publication Homework problems are also included at the end of chemistry and biology, and pollution of the Black Proceedings each chapter Sea. Based on numerous observational data of the authors, on archival data of several Russian oceano- Fields of interest graphic institutions and on the broad scientific liter- Due October 2007 Statistical Theory and Methods ature mainly published in Russian editions. Target groups 2007. X, 301 p. (Lecture Notes in Computer Science, Vol. 4793) Fields of interest Statisticians, researchers, grad students. Softcover Atmospheric Protection/Air Quality Control/Air 48,00 € Type of publication Pollution; Environmental Computing/Environmen- ISBN 978-3-540-75695-8 Monograph tal Modelling; Monitoring/Environmental Analy- sis/Environmental Ecotoxicology; Statistics for En- gineering, Physics, Computer Science, Chemistry & Due April 2008 Geosciences

2008. Approx. 490 p. (Springer Series in Statistics) Hardcover Target groups Scientists, engineers, graduate students in the field 69,30 € of environmental sciences, risk assessment and risk ISBN 978-0-387-74977-8 controlling, toxicology and ecology; decision-makers in government, industrial and regulatory bodies

Type of publication Reviews

Due November 2007

2008. Approx. 380 p. Also available online. (Water Pollution, Part 5Q) Hardcover

249,00 € ISBN 978-3-540-74291-3 springer.com/booksellers Computer Science 85

M. Kowalkiewicz, SAP Research Australia, Brisbane, Australia; M.E. D. Kragic, Royal Institute of Technology, Stockholm, Sweden; V. W. Kresse, Technical University Neubrandenburg, Germany; D.M. Orlowska, The University of Queensland, Brisbana, Australia; T. Kyrki, Lappeenranta University of Technology, Lappeenranta, Danko, Environmental Systems Research Institute, Wien, Austria Kaczmarek, Poznan University of Economics, Poznan, Poland; W. Finland (Eds.) (Eds.) Abramowicz, Poznan University of Economics, Poznan, Poland Lecture Notes in Electrical Eng. Vol Springer Handbook of Geographic Web Information Extraction and 13 Information Integration

Currently there is a gap between the research con- Computer science provides a powerful tool that was Currently, there exists an overburdening growth ducted in computer vision and robotics commu- virtually unknown three generations ago. Comput- in the number of reliable information sources on nities. There are many characteristics in common er science has changed the shape of many classical the Internet. At the same time, temporal and cogni- in computer vision research and vision research in domains. Often domains have become more simi- tive resources of human users are not changing. In robotics. Despite having these common interests, lar than before. On the other hand new applications an effort to curtail the information overload result- however, “pure” computer vision has seen significant have emerged that were technically not feasible with- ing from this conflict, recent research has attempt- theoretical and methodological advances during the out the support of a computer. Those developments ed to provide methods and tools for web content ex- last decade which many of the robotics researchers lead to new high-level domains. One of them is Ge- traction and aggregation. Success in these areas will are not fully aware of. On the other hand, the manip- ographic Information. Some of the classical fields of greatly enhance business processes, and provide in- ulation and control capabilities of robots as well as knowledge are geodesy (surveying), cartography, and formation seekers with new tools allowing them to the range of application areas have developed greatly. geography. Electronics have revolutionized geodetic reduce their time and cost involvement. This book In robotics, vision can not be considered an isolated methods. Cartography has faced the dominance of focuses on web content extraction and deep web da- component, but it is instead a part of a system result- the computer that results in simplified cartographic ta integration, and the methods and tools used, as ing in an action. Thus, in robotics the vision research products. All three fields make use of basic compo- well as analyzing the limitations of existing technol- must include consideration of the control of the sys- nents such as the Internet and databases. Geodesy ogy and solutions. This volume presents an accessi- tem, in other words, the entire perception-action may be interpreted as the input-component, cartog- ble, well-organized and comprehensive survey of this loop. This requires that a holistic system approach is raphy may be interpreted as the output-component, discipline. Professionals, researchers, and academics useful and could provide significant advances in this and geography may be interpreted as one of many involved in information technology will all find this application domain. Assembled here is a collection of application of Geographic Information. Fast and mo- book a timely and essential reference. some of the state of the [..] bile Internet access as well as a comprehensive [..]

Features Features Contents Extensive analysis of existing systems in Web Con- Demonstrates state of the art in applying computer Basics.- Computer Science.- Modelling, Conceptual tent Extraction and Deep Web Data Extraction A vision in robotics Discusses contrasting viewpoints Scheme Language.- Encoding.- Telecomunication.- comprehensive overview of the subject, both the- of computer vision vs robotics Provides current and Mathematics and Statistics.- Databases.- Hardware.- oretical and practical Presentation and discussion future challenges discussed from research perspec- Geometry.- Image Processing.- Data Mining, Knowl- of original content and data extraction methods, tive Covers vision considered as a component of an edge Discovery.- Geoinformatics.- Geographic Infor- designed to be used by non-specialist users (all ap- action generating intelligent system mation Systems.- Geodesy.- Data Capture.- 3D-GIS.- proaches to date present methods requiring a degree Spatial Data Infrastructures, Web-GIS.- Portrayal, in CS to be used) Contents Cartography.- Metadata, Data Quality.- Standards.- Part Based People Detection on A Mobile Robot.- Applications.- Annexes.- Contents Model-Based 3-D Pose Estimation and Feature Introduction.- Section I. Web Content Extraction: Tracking for Robot Assisted Surgery with Medical Fields of interest Information Extraction and Aggregation in Con- Imaging.- Reasoning and Vision.- Image-Based Vi- Geoinformation/Cartography; Information Sys- temporary Economy.- Web Content Extraction and sual Servoing with Extra Task Related Constraints tems and Communication Service; Computer Ap- Aggregation.- Practical Aspects of Content Aggre- in A General Framework for Sensor-Based Robot plications in Geosciences; Monitoring/Environ- gation.- Using XPath in Web Content Extraction.- Systems.- Early Reactive Grasping with Second Or- mental Analysis/Environmental Ecotoxicology; Sample Proof-of-concept Prototype of a Web Con- der 3D Feature Relations.- Interactive Perception: Appl.Mathematics/Computational Methods of Engi- tent Extraction System.- Empirical Analysis of Ro- Closing the Gap Between Action and Perception.- neering bustness of Content Extraction Systems.- Section Wald's Sequential Analysis for Time-Constrained II. Deep Web Data Extraction: Information Integra- Vision Problems.- Constant Time Sliding Window Target groups tion.- Deep Web in a Context of Information Inte- Filter SLAM as A Basis for Metric Visual Percep- Scientists at universities and in industry, Practition- gration.- A Method for Deep Web Information Inte- tion.- More Vision [..] ers, Libraries gration. Model of a Deep Web Information Integra- tion System.- [..] Fields of interest Type of publication Computer Imaging, Vision, Pattern Recognition and Handbook Fields of interest Graphics; Image Processing and Computer Vision; Information Systems Applications (incl.Internet); In- Automation and Robotics; Artificial Intelligence (in- Due March 2009 formation Storage and Retrieval; Database Manage- cl. Robotics) ment; Data Mining and Knowledge Discovery Target groups 2009. Approx. 1200 p. With DVD-ROM. Hardcover Target groups Researchers and professionals 249,00 € Professionals, researchers and academics in informa- ISBN 978-3-540-72678-4 tion technology Type of publication Monograph Type of publication Monograph Due April 2008

Due April 2008 2008. Approx. 260 p. (Lecture Notes Electrical Engineering, Vol. 13) Hardcover 2008. Approx. 255 p. (Web Information Systems Engineering and Internet Technologies Book Series, Vol. 5) Hardcover 77,00 € ISBN 978-0-387-75521-2 83,95 € ISBN 978-0-387-72769-1 86 Computer Science springer.com/booksellers

W. Kresse, Technical University Neubrandenburg, Germany; D.M. D. Krishnaswamy, Advanced Technology R&DQualcomm Inc., San D. Kroening, Computer Science, ETH, Zuerich, Switzerland; O. Danko, Environmental Systems Research Institute, Wien, Österre- Diego, USA; T. Pfeifer, Waterford Institute of Technology, Water- Strichman, Technion - Israel Institute of Technology, Haifa, Israel ich (Eds.) ford, Ireland; D. Raz, The Technion, Haifa, Israel (Eds.) Decision Procedures Springer Handbook of Geographic Real-Time Mobile Multimedia Information Services An Algorithmic Point of View

10th IFIP/IEEE International Conference on Management, of Multimedia and Mobile Networks and Services, MMNS 2007, A decision procedure is an algorithm that, given a San José, USA, October 31 - November 2, 2007, Proceedings Computer science provides a powerful tool that was decision problem, terminates with a yes/no answer. virtually unknown three generations ago. Comput- Here, the authors focus on deciding logics that are er science has changed the shape of many classical expressive enough to model real problems, and, on domains. Often domains have become more simi- This book constitutes the refereed proceedings of the the other hand, are still decidable. Specifically, the lar than before. On the other hand new applications 10th IFIP/IEEE International Conference on Man- book focuses on decision procedures for decidable have emerged that were technically not feasible with- agement of Multimedia and Mobile Networks and fragments of first-order logic that are commonly out the support of a computer. Those developments Services, MMNS 2007, held in San José, USA, Octo- used in automated verification, theorem-proving and lead to new high-level domains. One of them is Ge- ber 31 - November 2, 2007 in the course of the 3nd compiler optimization. The techniques described in ographic Information. Some of the classical fields of International Week on Management of Networks the book draw from fields such as graph theory, log- knowledge are geodesy (surveying), cartography, and and Services, Manweek 2007. The 14 revised full pa- ics and operations research, and are routinely used in geography. Electronics have revolutionized geodetic pers and 5 revised short papers presented were industry. The authors introduce the basic concepts, methods. Cartography has faced the dominance of carefully reviewed and selected from 46 submissions. and then, in separate chapters, study decision proce- the computer that results in simplified cartographic The papers are organized in topical sections on ser- dures for each of the following logics: proposition- products. All three fields make use of basic compo- vices and user experience, wireless and cellular net- al logic; equalities and uninterpreted functions; lin- nents such as the Internet and databases. Geodesy works, monitoring and control, multicast and IPTV ear arithmetic; bit vectors; arrays; pointer logic and may be interpreted as the input-component, cartog- as well as resource management. quantified formulas. They also study the problem of raphy may be interpreted as the output-component, deciding combined theories and dedicate a chapter and geography may be interpreted as one of many Fields of interest to the interplay between a SAT solver and a decision application of Geographic Information. Fast and mo- Computer Communication Networks; Multime- procedure for the [..] bile Internet access as well as a comprehensive [..] dia Information Systems; Information Storage and Retrieval; User Interfaces and Human Comput- Contents Contents er Interaction; Information Systems Applications Basic Concepts and Background.- Decision Basics.- Computer Science.- Modelling, Conceptual (incl.Internet); Communications Engineering, Net- Procedures for Propositional Logic.- Equalities and Scheme Language.- Encoding.- Telecomunication.- works Uninterpreted Functions.- Decision Procedures for Mathematics and Statistics.- Databases.- Hardware.- Equality Logic.- Linear Arithmetic.- Bit-Vectors.- Geometry.- Image Processing.- Data Mining, Knowl- Target groups Arrays.- Pointer Logic.- Quantified Formulas.- De- edge Discovery.- Geoinformatics.- Geographic Infor- Researchers and professionals ciding Combined Theories.- Propositional Encod- mation Systems.- Geodesy.- Data Capture.- 3D-GIS.- ings.- App. A, The SMT-LIB Initiative.- App. B, Pro- Spatial Data Infrastructures, Web-GIS.- Portrayal, Type of publication gramming a Decision Procedure Cartography.- Metadata, Data Quality.- Standards.- Proceedings Applications.- Annexes.- Fields of interest Due October 2007 Mathematical Logic and Formal Languages; Logics Fields of interest and Meanings of Programs; Theory of Computation; Geoinformation/Cartography; Information Sys- Software Engineering; Artificial Intelligence (incl. 2007. XII, 197 p. (Lecture Notes in Computer Science, Vol. 4787) tems and Communication Service; Computer Ap- Robotics) plications in Geosciences; Monitoring/Environ- Softcover mental Analysis/Environmental Ecotoxicology; 58,00 € Target groups Appl.Mathematics/Computational Methods of Engi- ISBN 978-3-540-75868-6 Graduate students, researchers neering Type of publication Target groups Graduate/advanced undergraduate textbook Scientists at universities and in industry, Practition- ers, Libraries Due February 2008 Type of publication Handbook 2008. Approx. 300 p. (Texts in Theoretical Computer Science. An EATCS Series) Hardcover

Due April 2009 59,95 € ISBN 978-3-540-74104-6 2009. eReference.

249,00 € ISBN 978-3-540-72680-7 springer.com/booksellers Computer Science 87

W. Krämer, Karlsruhe, Germany; U. Kulisch, R. Lohner, Karlsruhe, L.S. Kuchment, Russian Academy of Sciences, Moscow, Russia C.-C. Kuo, University of Southern Califronia, Los Angeles, CA, USA; Germany S.-H. Tsai, Mindtek, Inc., Kaohsiung City, Taiwan; L. Tadjpour, Uni- versity of Southern California, Glendale, CA, USA; Y.-H. Chang, Generation of River-Runoff University of Southern California, Los Angeles, CA, USA Numerical Toolbox for Verified Computing II Precoding Techniques for Digital The main idea of the book is to present the up-to- Advanced Numerical Problems Communication Systems date understanding of the main runoff generation processes in different physiographic conditions, to outline the developed physically based models of these processes, and to suggest the approaches to This book offers a comprehensive treatment on "pre- Fields of interest modeling of the runoff generation according to time- coding techniques for communication systems" to Computational Mathematics and Numerical Analy- space scales, practical hydrological problems and researchers, practical engineers and graduate stu- sis; Software Engineering/Programming and Operat- available geographic and hydrometeorological in- dents who are working in the fields of signal process- ing Systems formation. The book is based to a considerable ex- ing and communications. The book contains two tent on experience of the Russian school of experi- parts: fundamentals and system applications. The Type of publication mental and theoretical hydrology and own results of first part provides an overview of existing precoding Monograph the author and his collaborates. The physically based techniques. From this tutorial overview, readers can models of main processes of runoff generation is re- understand the evolution of precoding and the prin- Due November 2008 viewed including models of rainfall and snow inter- ciples of various precoding schemes. The sec- ception, snow cover formation and snowmelt, ver- ond part discusses the application of state-of- 2008. Approx. 370 pp. Hardcover tical heat and moisture transfer in the freezing and the-art precoding schemes to current and/or emerg- thawing soil, vertical movement of the soil moisture ing communication systems to combat impairments 59,81 € and evapotranspiration, overland, subsurface, and such as inter-symbol interference (ISI), multiaccess ISBN 978-3-540-60470-9 ground flow, water movement in river channels. The interference (MAI) and the Doppler effect. Those consideration of models contains describing numer- communication systems include: orthogonal fre- ical [..] quency division multiplexing (OFDM), multiuser OFDM, MC-CDMA, multi-input and multi-output Features (MIMO) and ultra wideband (UWB) radio systems. Specialist modelling of hydrological processes Hy- Finally, discussion on advanced topics and an exten- drological forecasting Researches the hydrological sive list of references [..] cycle and climate system Features Contents The first book focusing on modern precoding tech- Chapter 1  Runoff generation mechanisms niques for modern digital communications systems Chapter 2  Processes of snow cover forma- Includes tutorial and advanced materials to serve tion and snowmelt Chapter 3  Vertical water both beginners and experienced researchers Discuss- movement in the soil and evapotranspiration Chap- es the application of the precoding techniques to ex- ter 4  Horizontal movement of water in the isting and emerging communication systems river basin and in the river channel networks Chap- ter 5  Construction of the models of runoff Contents generation Chapter 6  Impacts of land use and Overview of Precoding Techniques.- Precoding climate change on runoff Chapter 7  Runoff Techniques for ISI Channels.- Precoding Techniques forecasting Chapter 8  Estimating the extreme for Multiple Access Channels.- Precoding Tech- floods characteristics niques for MIMO Channels.- Precoding Techniques for Non-Ideal Channel Information at Tx.- Precod- Fields of interest ing for OFDM Systems.- Precoding for MC-CDMA Math. Applications in Geosciences; Environmental Systems.- Precoding for UWB Systems.- Precoding Computing/Environmental Modelling; Waste Water for Next Generation MIMO Communication Sys- Technology / Water Pollution Control / Water Man- tems.- Conclusion and Future Research Directions. agement / Aquatic Pollution Fields of interest Target groups Communications Engineering, Networks; Coding Research workers, professionals, and graduate stu- and Information Theory; Computer Communica- dents in hydrology and water resources engineering. tion Networks; Signal,Image and Speech Processing; Computer Systems Organization and Communica- Type of publication tion Networks; Electronic and Computer Engineer- Monograph ing

Due June 2008 Target groups Researchers, practical engineers and graduate stu- dents in the fields of signal processing and commu- 2007. 300 p. (Water Science and Technology Library, Vol. 53) Hardcover nications

99,95 € Type of publication ISBN 978-1-4020-3965-2 Monograph

Due March 2008

2008. Approx. 500 p. Hardcover

79,95 € ISBN 978-0-387-71768-5 88 Computer Science springer.com/booksellers

M. Kurzynski, Wroclaw University of Technology, Wroclaw, S. Lahlou, EDF R&D, France (Ed.) M. Lang, National University of Ireland, Galway, Ireland; W. Wo- Poland; E. Puchala, Wroclaw University of Technology, Wroclaw, jtkowski, Boise State University, Boise, ID, USA; G. Wojtkowski, Poland; M. Wozniak, Wroclaw University of Technology, Wroclaw, Boise State University, Boise, ID, USA; S. Wrycza, University of Poland; A. Zolnierek, Wroclaw University of Technology, Wro- Designing User Friendly Gdansk, Sopot, Poland; J. Zupancic, University of Maribor, Preser- claw, Poland (Eds.) Augmented Work Environments nova, Slovenia (Eds.) Computer Recognition Systems 2 From Meeting Rooms to Digital Collaborative Spaces The Inter-Networked World

ISD - Theory, Practice, and Education

This book presents the results of the 5th Interna- Features tional Conference on Computer Recognition Sstems Gathers, summarises and puts into perspective ma- Information Systems Development (ISD) progresses CORES’07 held 22-25 October 2007 in Hotel Tum- terial from some of the most prominent teams who rapidly, continually creating new challenges for the ski, Wroclaw, Poland. It brings together original re- pioneered the domain of AE. Authors approach is professionals involved. New concepts, approaches search results in both methodological issues and dif- grounded in actual experience. They have designed and techniques of systems development emerge con- ferent application areas of pattern recognition. The and operated real augmented workspaces which are stantly in this field. Progress in ISD comes from re- contributions cover all topics in pattern recognition in daily use. This is a growing market - good practice search as well as from practice. This conference will including: Classification and interpretation of text, is not yet established, and building such augmented discuss issues pertaining to information systems de- video, voice; statistical, soft and structural methods rooms is not routine, so such contructions will in- velopment (ISD) in the inter-networked digital econ- of pattern recognition; image processing, analysis volve [..] omy. Participants will include researchers, both ex- and interpretation; machine learning; data and Web perienced and novice, from industry and academia, mining; knowledge-based decision support systems; Contents as well as students and practitioners. Themes will in- advanced signal processing methods or special hard- Augmented environments and design.- Towards a clude methods and approaches for ISD; ISD educa- ware architecture. global concept of collaborative space.- Cognitive at- tion; philosophical, ethical, and sociological aspects tractors and designing workspaces with users.- Co- Features of ISD; as well as specialized tracks such as: distribut- design approaches for early phases of augmented en- ed software development, ISD and knowledge man- Presents the latest results in computer recognition vironments.- Computer and software architecture systems, pattern recognition, machine learning, web agement, ISD and electronic business / electronic in AE.- Distributed cognition and visualisation.- De- government, ISD in public sector organizations, IOS. and data mining signing social architectures based on cooperative buildings, roomware, ambient displays and mobile Contents Features devices.- Ubiquitous working environments.- Pat- Part I Image Processing and Computer Vision.- Part Presents the latest and greatest concepts, approach- terns for augmented collaborative spaces.- Evaluat- II Features, Learning, and Clssifiers.- Part III Speech es, and techniques of systems development - a noto- ing cognitive and communicational dimensions of and Word Recognition.- Part IV Medical Applica- riously transitional field Illustrates the newest design professional activity.- Workspace.- Privacy design tions.- Part V Various Applications. and development in information systems, in applica- [..] tions engineering and reengineering, as well as issues Fields of interest concerned with teaching and learning in this field Fields of interest Appl.Mathematics/Computational Methods of Engi- Multimedia Information Systems; User Interfaces neering; Pattern Recognition; Artificial Intelligence Contents and Human Computer Interaction (incl. Robotics); Applications of Mathematics; Infor-  - Preface. -Methods and Approaches for ISD. mation Systems and Communication Service -ISD Education. -Philosophical, Ethical, and Socio- Target groups logical Aspects of ISD. -Distributed Software Devel- Academic, Students, Professionals involved in the Target groups opment. -ISD and Knowledge Management. -ISD CHI, CSCW, UBIcomp, Cobuild communities. Researchers, engineers, graduate students in pattern and Electronic Business. -ISD and Electronic Gov- ernment. - ISD in Public Sector Organiza- recognition, computational intelligence, computer Type of publication tions. -IOS. -Index. science and information engineering Reference work Type of publication Fields of interest Proceedings Due August 2008 Database Management; Information Storage and Retrieval; Information Systems; Computer Science, Due October 2007 2008. Approx. 295 p. (Computer Supported Cooperative Work) general; Software Engineering/Programming and Hardcover Operating Systems

2008. XVIII, 863 p. Also available online. (Advances in Soft Com- 69,95 € Target groups puting, Vol. 45) Softcover ISBN 978-1-84800-097-1 Researchers, students, and practitioners in the field of Information Systems Development. 229,00 € ISBN 978-3-540-75174-8 Type of publication Contributed volume

Due January 2008

2008. Approx. 600 p. Hardcover

ISBN 978-0-387-30403-8 springer.com/booksellers Computer Science 89

A.M. Langer, Columbia University, New York, NY, USA U. Langer, University of Linz, Austria; M. Discacciati, Ecole J. Lee, Evanston, IL, USA; R. Dice Polytechnique Fédérale de Lausanne, Switzerland; D. Keyes, Columbia University, NY, USA; O. Widlund, New York University, Analysis and Design of Information New York, NY, USA; W. Zulehner, University of Linz, Austria (Eds.) Beginning Perl 6

Systems From Novice to Professional Domain Decomposition Methods in Science and Engineering XVII In any software design project, the analysis stage – Perl 6, the long-awaited next release of one of the documenting and designing technical requirements world's most popular programming languages, is for the needs of users - is vital to the success of the coming to fruition after more than seven years. A This volume contains a selection of papers present- project. This book provides a thorough introduction complete redesign of its predecessor, Perl 6 repre- ed at the 17th International Conference on Domain and survey to all aspects of analysis. This edition pro- sents a massive rethinking of both language internals Decomposition Methods in Science and Engineering vides new features including: Additional chapters on and features, and will grant both the language devel- held at St. Wolfgang / Strobl, Austria, July 3 - 7, 2006. system Development Life Cycle and Data Element opers and users a level of unheralded flexibility and Domain decomposition is an active, interdisciplinary Naming Conventions and Standards; more cover- power. However, taking advantage of these new fea- research field concerned with the development, anal- age on converting logical models to physical mod- tures comes at the cost of a steep learning curve, par- ysis, and implementation of coupling and decou- els, how to generate DDL and testing database func- ticularly for those developers who have grown accus- pling strategies in mathematical and computation- tionalities; expansion of database section with con- tomed to programming using the longstanding Perl al models. Domain decomposition methods provide cepts such as denormalization, security and change concepts of previous versions. Beginning Perl 6 is the efficient tools for treating problems in all computa- control; developments on new design and technolo- first book to offer both newcomers to the language tional sciences. The reader will become familiar with gies, particularly in the area of web analysis and de- and seasoned developers alike the definitive resource the newest domain decomposition techniques and sign. A revised Web/Commerce chapter addresses to Perl, with special emphasis on the version 6 re- their use in the modelling and simulation of complex component middleware for complex systems design; lease. problems from different fields of application. new Case Studies. This book is a valuable resource Features and guide for all information systems students, prac- Fields of interest Perl 6 is one of the open source industry's most titioners and professionals who need an in-depth un- Computational Mathematics and Numerical Anal- awaited updates in years, having been under devel- derstanding of the principles of the analysis and [..] ysis; Computational Science and Engineering; Nu- opment for almost seven years. Readers will be clam- merical and Computational Methods; Numerical and Features oring for material upon the final release, presently Computational Methods in Engineering Offers a complex set of tools covering all types of scheduled for early Q2 of 2007 Beginning Perl 6 is systems, including legacy, transactional, database Target groups the first book to cover the Perl 6 release Technical and web/ecommerce topics, providing a wide range Computational scientists reviewed by prominent Perl community member of topics and integrating them within a common Richard Dice, who was among other things the con- method for the successful analyst/designer Presents Type of publication ference [..] a set of good practices that allow professionals to Proceedings adjust to the constraints and needs of any business Contents without adhering to any particular methodology of 1 Introducing Perl 6.- 2 First Steps in Perl.- 3 Due December 2007 systems design Scalars.- 4 Control Flow Constructs.- 5 Lists and Ar- rays.- 6 Hashes.- 7 Subroutines/ Functions.- 8 Reg- Contents 2008. Approx. 650 (Lecture Notes in Computational Science and ular Expressions.- 9 Files and Data.- 10 String Pro- Introduction.- System Development Life Cycle: Engineering, Vol. 60) Softcover cessing.- 11 Interfacing to the Operating System.- 12 Steps in Analysis and Design.- The User Interface.- References.- 13 Modules.- 14 Object-Oriented Perl.- 99,95 € Overview of Analysis Tools.- Process Based Tools.- 15 Introductions to CGI.- 16 Perl and DBI.- 17 In- ISBN 978-3-540-75198-4 Logic Data Modeling.- Web User Interface Tools.- troducing Parrot.- Appendix A: Exercise Solutions. Design Specification Tools.- CASE and Automated Techniques.- Object Oriented Techniques.- Inter- Fields of interest net/Intranet and Web Analysis.- Acceptance Test- Programming Languages, Compilers, Interpreters ing.- Business Process Re-Engineering.- Security and Change Control.- Creating a Detailed Require- Target groups ments Document.- Transactional Processing Systems Beginning to intermediate perl developers Design.- Case Study: the Rainforest Book Compa- ny Problem.- Case Study: The CGT Rental Service Type of publication Problem.- [..] Professional book

Fields of interest Due February 2008 Software Engineering; Information Systems Applica- tions (incl.Internet) Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Target groups Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Graduate students, practitioners Oman, Qatar, Palestine: Jordan Book Center

Type of publication Graduate/advanced undergraduate textbook 2008. Approx. 500 p. Softcover ISBN 978-1-59059-833-7 Due December 2007

2008. Approx. 400 p. 249 illus. Hardcover

59,95 € ISBN 978-1-84628-654-4 90 Computer Science springer.com/booksellers

J.A. Lee, Université Catholique de Louvain, Belgium; M. Verley- W. Lee, Georgia Institute of Technology, Atlanta, GA, USA; C. J.d. Leeuw, University of California, Los Angeles, California, USA; sen, Université Catholique de Louvain, Belgium Wang, US Army Research Office, Research Triangle Park, NC, E. Meijer, RAND Corporation, Santa Monica, CA, USA (Eds.) USA; D. Dagon, Georgia Institute of Technology, Atlanta, GA, USA (Eds.) Nonlinear Dimensionality Handbook of Multilevel Analysis Reduction Botnet Detection

Countering the Largest Security Threat Multilevel analysis is the statistical analysis of hier- archically and non-hierarchically nested data. The Methods of dimensionality reduction provide a way simplest example is clustered data, such as a sample to understand and visualize the structure of complex of students clustered within schools. Multilevel data data sets. Traditional methods like principal compo- Botnets have become the platform of choice for are especially prevalent in the social and behavioral nent analysis and classical metric multidimension- launching attacks and committing fraud on the In- sciences and in the bio-medical sciences. The mod- al scaling suffer from being based on linear models. ternet. A better understanding of Botnets will help to els used for this type of data are linear and nonlin- Until recently, very few methods were able to reduce coordinate and develop new technologies to counter ear regression models that account for observed and the data dimensionality in a nonlinear way. Howev- this serious security threat. Botnet Detection: Coun- unobserved heterogeneity at the various levels in the er, since the late nineties, many new methods have tering the Largest Security Threat, a contributed vol- data. This book presents the state of the art in multi- been developed and nonlinear dimensionality re- ume by world-class leaders in this field, is based on level analysis, with an emphasis on more advanced duction, also called manifold learning, has become a the June 2006 ARO workshop on Botnets. This edit- topics. These topics are discussed conceptually, an- hot topic. New advances that account for this rapid ed volume represents the state-of-the-art in research alyzed mathematically, and illustrated by empirical growth are, e.g. the use of graphs to represent the on Botnets. It provides botnet detection techniques examples. The authors of the chapters are the leading manifold topology, and the use of new metrics like and response strategies, as well as the latest results experts in the field. Given the omnipresence of mul- the geodesic distance. In addition, new optimiza- from leading academic, industry and government re- tilevel data in the social, behavioral, and biomedical tion schemes, based on kernel techniques and spec- searchers. Botnet Detection: Countering the Largest sciences, this book is useful for empirical researchers tral decomposition, have lead to spectral embedding, Security Threat is intended for researchers and prac- in these fields. Prior knowledge of multilevel analysis which encompasses many of the recently developed titioners in industry. This book is also appropriate as is not required, but a basic knowledge of regression methods. This book describes existing and advanced a secondary text or reference book for advanced-level [..] methods to reduce the dimensionality of numerical students in computer science.   databases. For each method, the description [..] Features Features Discusses complex data structures with a hierarchical Features -First book on Botnets — the #1 security threat -In- structure, e.g., pupils nested within schools Distin- Covers a wide range of methods to reduce the di- cludes Botnet detection techniques and response guished collection of contributors mensionality of data and presents a unifying point of strategies -Latest results from leading academic, in- dustry and government experts in security view Contents Introduction to multilevel analysis, Jan de Leeuw, Contents Contents Erik Meijer.- Bayesian multilevel analysis and High-dimensional data.- Characteristics of an analy- Preface.- Botnet Detection Based on Network Behav- MCMC, David Draper.- Diagnostic checks for multi- sis method.- Estimation of the intrinsic dimension.- ior.- Honeynet-based Botnet Scan Traffic Analysis.- level models, Tom A.B. Snijders, Johannes Berkhof.- Distance preservation.- Topology preservation.- Characterizing Bots’ Remote Control Behavior.- Au- Optimal designs for multilevel studies, Mirjam Mo- Method comparisons.- Conclusions. tomatically Identifying Trigger-based Behavior in Malware.- Towards Sound Detection of Virtual Ma- erbeek, Gerard J.P. Van Breukelen, Martijn P.F. Fields of interest chines.- Botnets and Proactive System Defense.- De- Berger.- Many small groups, Stephen W. Rauden- Probability and Statistics in Computer Science; Da- tecting Botnet Membership with DNSBL Counter- bush.- Multilevel models for ordinal and nominal ta Mining and Knowledge Discovery; Visualization; intelligence.- A Taxonomy of Botnet Structures.- In- variables, Donald Hedeker.- Multilevel and relat- Image Processing and Computer Vision; Pattern dex.   ed models for longitudinal data, Anders Skrondal, Recognition; Statistical Theory and Methods Sophia Rabe-Hesketh.- Non-hierarchical multilevel Fields of interest models, Jon Rasbash, William J. Browne.- Multilevel Target groups Systems and Data Security; Computer Communica- [..] Researchers, grad students tion Networks; Data Encryption; Information Sys- tems Applications (incl.Internet); Data Structures, Fields of interest Type of publication Cryptology and Information Theory; Computer Sys- Statistical Theory and Methods; Methodology of the Monograph tems Organization and Communication Networks Social Sciences; Psychometrics; Econometrics; Epi- demiology Due December 2007 Target groups Researchers, practitioners and advanced-level Target groups students in computer science Practitioners and researchers 2007. Approx. 300 p. (Information Science and Statistics) Hard- cover Type of publication Type of publication Monograph 64,95 € Contributed volume ISBN 978-0-387-39350-6 Due December 2007 Due December 2007

2008. Approx. p. 20 illus. (Advances in Information Security, Vol. 2008. Approx. 500 p. Hardcover 36) Hardcover 159,95 € 76,95 € ISBN 978-0-387-73183-4 ISBN 978-0-387-68766-7 springer.com/booksellers Computer Science 91

Z. Les, The Queen Jadwiga Research Institue of Understanding M. Lew, N. Sebe, Th.S. Huang, E.M. Bakker (Eds.) N. León-Rovira, ITESM, Mexico (Ed.) Technology, Toorak, VIC, Australia; M. Les, The Queen Jadwiga Research Institue of Understanding Technology, Toorak, VIC, Australia IEEE Workshop on Human Trends in Computer Aided Computer Interaction Innovation Shape Understanding System International Workshop, HCI 2007 Rio de Janeiro, Brazil, Octo- 2nd IFIP Working Conference on Computer Aided Innovation The First Steps toward the Visual Thinking Machines ber 20, 2007 Proceedings

This book presents the results of the research in one This book constitutes the refereed proceedings of the Features of the most complex and difficult areas of research, International Workshop on Human Computer In- Most up-to-date research on Computer Aided Inno- such as research in the areas of thinking and under- teraction, HCI 2007, held in Rio de Janeiro, Brazil, vation standing. This research that is carried out in the new- October 20, 2007. The 16 revised full papers present- Contents ly founded Queen Jadwiga Research Institute of Un- ed were carefully reviewed and selected from 113 Creative Tower Generated bu Computational Intel- derstanding is focused on research on the problem submissions. The topics include Affective detection ligence.- Research and Implementation of Product of visual understanding and visual thinking. Accord- and recognition, Smart interfaces, Human motion Functional Design Based on Effect.- Computer Aid- ing to our knowledge, this book is the first attempt tracking, Gesture recognition, Multimedia data mod- ed Patent Analysis.- Measuring Innovation in Mul- to investigate the complexity of the visual thinking eling and visualization, Multimodal event detection ti-Component Engineering Systems.- problems in the context of building the thinking ma- and recognition, Human motion and gesture recog- chine. We are aware how complex this problem is, nition, HCI issues in image/video retrieval, Learning in HCI, Input and interaction techniques, Perceptual Fields of interest however, we believe that the results of our research Computer Science, general will pave the way into the new way of thinking about user interfaces, Wearable and pervasive technologies in HCI and Intelligent Virtual Environments. designing the thinking machines and, especially, will Target groups supply the new scientific arguments about our hu- Fields of interest Researchers and practitioners in computer aided in- man nature. Researchers in area of artificial intel- User Interfaces and Human Computer Interaction; novation ligence do not pay sufficient attention into under- Computer Imaging, Vision, Pattern Recognition and standing/thinking problems. It was probably for that Type of publication Graphics; Information Systems and Communication reason that there was no proper representation to Proceedings Service; Multimedia Information Systems capture visual aspects of the [..] Target groups Due October 2007 Features Researchers and professionals Recent reports of shape understanding 2007. XII, 254 p. (IFIP International Federation for Information Type of publication Contents Processing, Vol. 250) Hardcover Proceedings Thinking, Visual Thinking and Shape Understand- ing.- Shape Classes.- Digital Objects, Image Trans- 108,00 € formations and Reasoning Process.- Categories.- Vi- Due October 2007 ISBN 978-0-387-75455-0 sual Thinking - Understanding. 2007. X, 157 p. (Lecture Notes in Computer Science, Vol. 4796) Fields of interest Softcover Appl.Mathematics/Computational Methods of Engi- neering; Artificial Intelligence (incl. Robotics) 42,00 € ISBN 978-3-540-75772-6 Target groups Engineers, researchers, and graduate students in computational intelligence

Type of publication Monograph

Due January 2008

2008. Approx. 390 p. (Studies in Computational Intelligence, Vol. 86) Hardcover

129,95 € ISBN 978-3-540-75768-9 92 Computer Science springer.com/booksellers

M. Li, University of Waterloo, ON, Canada; P.M.B. Vitányi, CWI, S.Z. Li, Chinese Academy of Sciences, Beijing, China (Ed.) S.Z. Li, Chinese Academy of Sciences, Beijing, China (Ed.) Amsterdam, The Netherlands Encyclopedia of Biometric Encyclopedia of Biometric An Introduction to Kolmogorov Recognition Recognition Complexity and Its Applications

Biometrics is automated methods of rec- Biometrics are automated methods of recogniz- "The book is outstanding and admirable in many re- ognizing a person based on physiological or be- ing a person based on physiological or behavioral spects. ... is necessary reading for all kinds of readers havioral characteristics. Among the features mea- characteristics. Among the features measured from undergraduate students to top authorities in sured are face, fingerprints, hand geometry, are face, fingerprints, hand geometry, hand- the field." Journal of Symbolic Logic Written by two handwriting, iris, retina, vein, and voice. With an writing, iris, retina, vein, and voice. With an A–Z experts in the field, this is the only comprehensive A–Z format, the comprehensive Encyclopedia of format, the comprehensive Encyclopedia of Biomet- and unified treatment of the central ideas and their Biometrics provides easy access to relevant infor- rics will provide easy access to relevant information applications of Kolmogorov complexity. The book mation on all aspects of biometrics for those seek- on all aspects of Biometrics for those seeking entry presents a thorough treatment of the subject with a ing entry into the broad field of biometrics. This into the broad field of Biometrics. The Encyclopedia wide range of illustrative applications. Such applica- Encyclopedia is composed of approximately will be composed of about 250 entries, covering bio- tions include the randomness of finite objects or in- 250 entries, covering biometrics modalities, systems metrics modalities, systems and applications. Each finite sequences, Martin-Loef tests for randomness, and applications. Each entry includes a definition, entry will include a definition, key words, list of syn- information theory, computational learning theo- key words, list of synonyms, list of related entries, onyms, list of related entries, illustration(s), applica- ry, the complexity of algorithms, and the thermody- illustration(s), applications, and a bibliography. Most tions, and a bibliography. Most entries will include namics of computing. It will be ideal for advanced entries include useful literature references providing useful literature references providing the reader with undergraduate students, graduate students, and re- the reader with a portal to more detailed informa- a portal to more detailed information. The style of searchers in computer science, mathematics, cogni- tion. The style of the entries is expository and tutori- the entries is expository and tutorial, making the en- tive sciences, philosophy, artificial intelligence, statis- al, making the encyclopedia a practical resource for cyclopedia a practical resource for experts in the field tics, and physics. The book is self-contained in that experts in the field as well as professionals in other as well as professionals in other fields. it contains the basic requirements from mathematics fields.   and computer science. Included [..] Features Features Although many books on biometrics-related Features Only comprehensive reference work on biometrics topics--none exist as a comprehensive refer- Develops Kolmogorov theory in detail and outlines that is currently available A-Z coverage of this com- ence work on Biometrics A-Z coverage of this com- the wide range of illustrative applications Presents plex subject area; easily accessible to professionals plex subject area makes this volume easily ac- recent, major results in the field; topics include, and researchers in all fields who are interested in a cessible to professionals and researchers in all fields Omega numbers, Kolmogorov-Loveland random- particular aspect of biometrics Targeted literature who are interested in a particular aspect of Biomet- ness, universal learning, communication complexity, references provide additional value for researchers rics Targeted literature references provide additional Kolmogorov's random graphs, time-limited univer- studying a topic in more depth Bibliographic entries value for researchers looking to study a topic in more sal distribution, Shannon information Introduces re- provide reader with portal to more detailed [..] [..] sults from prominent researchers in the field, such as those found [..] Contents Contents Editorial Board.- List of Contributors.- Preface.- A- Editorial Board.- List of Contributors.- Preface.- A-Z Contents Z entries with references.- General Issues.- Biomet- entries with references.- Index. Preliminaries.- Algorithmic Complexity.- Algo- rics.- Sensors and Devices.- Pattern Recognition.- rithmic Prefix Complexity.- Algorithmic Probabil- Data Fusion.- Performance Evaluation.- Modalities.- Fields of interest ity.- Inductive Reasoning.- The Incompressibility Face.- Fingerprint.- Iris.- Hand.- Vein.- Signature.- Biometrics; Pattern Recognition; Data Encryption; Method.- Resource-Bounded Complexity.- Physics, Speaker.- Gait.- Ear.- Other Modalities.- Keystroke, Computational Biology/Bioinformatics; Systems and Information, and Computation.- Shannon Informa- Lip Movement, EEG, Odor, Skull, Teeth, DNA.- Data Security; Computer Imaging, Vision, Pattern tion and Kolmogorov Complexity.- Information Dis- Sample Synthesis.- Systems and Applications.- Sys- Recognition and Graphics tance tem Design.- Security.- Applications.- Forensic Sci- ence.- Standardization.- Index. Target groups Fields of interest Research scientists and industry practitioners in a Coding and Information Theory; Algorithms; Theo- Fields of interest wide variety of fields for a broad array of applications ry of Computation; Pattern Recognition; Statistical Biometrics; Pattern Recognition; Data Encryption; Computer scientists and academics in other areas Theory and Methods Systems and Data Security; Computer Imaging, Vi- such as engineering, math, statistics, political science, sion, Pattern Recognition and Graphics management science, psychology, biomedicine Ad- Target groups vanced-level students interested in entering the field Advanced undergraduate and graduate students, re- Target groups of biometrics or working in related areas searchers in computer science, math, information Research scientists and industry practitioners in a theory, cognitive sciences, psychology, biology, lin- wide variety of fields for a broad array of applications Type of publication guistics, economy, learning theory Computer scientists and academics in other areas Encyclop(a)edia such as engineering, math, statistics, political science, Type of publication management science, psychology, biomedicine Ad- Due July 2009 Graduate/advanced undergraduate textbook vanced-level students interested in entering the field of biometrics or working in related areas 2009. eReference. Due August 2008 Type of publication 349,00 € Encyclop(a)edia Originally published in the series: Texts and Monographs in Com- ISBN 978-0-387-73003-5 puter Science Due June 2009 2008. Approx. 800 p. 41 illus. (Texts in Computer Science) Hard- cover 2009. Approx. 1000 p. Hardcover

66,95 € 349,00 € ISBN 978-0-387-33998-6 ISBN 978-0-387-73002-8 springer.com/booksellers Computer Science 93

Y. Li, Georgia State University, Atlanta, GA, USA; M.T. Thai, Uni- F. Liese, Universität Rostock, Germany; K.-J. Miescke, University of L. Linsen, Jacobs University Bremen, Germany; H. Hagen, TU versity of Florida, Gainesville, FL; W. Wu, University of Texas at Illinois at Chicago, IL, USA Kaiserslautern, Germany; B. Hamann, University of California, Dallas, Richardson, TX, USA (Eds.) Davis, USA (Eds.) Statistical Decision Theory Wireless Sensor Networks and Visualization in Medicine and Life Applications Estimation, Testing, and Selection Sciences

This monograph is written for advanced graduate Wireless sensor networks are currently being em- students, Ph.D. students, and researchers in mathe- Visualization technology is becoming increasingly ployed in a variety of applications ranging from matical statistics and decision theory. All major top- important for medical and biomedical data process- medical to military, and from home to industry. ics are introduced on a fairly elementary level and ing and analysis. This technology complements tra- Wireless Sensor Networks and Applications aims to then developed gradually to higher levels. The book ditional image processing methods as it allows sci- provide a reference tool for the increasing number of is self-contained as it provides full proofs, worked- entists to visually interact with large, high- resolu- scientists who depend upon sensor networks in some out examples, and problems. It can be used as a basis tion three-dimensional image data, for example. Fur- way. The topics covered include network design and for graduate courses, seminars, Ph.D. programs, self- ther, an ever increasing number of new data acquisi- modeling, network management, data management, studies, and as a reference book. The authors present tion methods are being used in medicine and the life security and applications. The topic covered in each a rigorous account of the concepts and a broad treat- sciences, in particular in genomics and proteomics. chapter is given expository but also scholarly treat- ment of the major results of classical finite sample This book discusses some of the latest visualization ment, covering the history of the topic, reviewing size decision theory and modern asymptotic decision techniques and systems for effective analysis of such state-of-the-art thinking relative to the topic, and theory. Highlights are systematic applications to the diverse, large, complex, and multi-source data. Ex- discussing currently unsolved problems of special in- fields of parameter estimation, testing hypotheses, perts from all over the world had been invited to par- terest. and selection of populations. With its broad coverage ticipate in a workshop held in July 2006 on the island of decision theory that includes results from other Rügen in Germany. About 40 participants presented Features more specialized books as well as new material, this state-of-the-art research on the topic. Research and Contains the most current techniques and advances book is one of a kind and fills the gap between stan- survey papers have been solicited and carefully refer- in sensor networks dard graduate texts in mathematical statistics and eed, resulting in this collection. The topics covered advanced monographs [..] include Segmentation and Feature Detection, Surface Contents Extraction, Volume [..] Contributing Authors.- Preface.- I. Network De- Features sign and Network Modelling.- 1. A Taxonomy-based Presents the main ideas of decision theory in an or- Features Approach to Design Large-scale Sensor Networks.- ganized, balanced, and mathematically rigorous The interaction between visualization and medicine 2. Algorithms for Robotic Deployment of WSN manner, while observing statistical relevance is one of the fastest expanding fields, both scientifi- in Adaptive Sampling Applications.- 3. A Scalable cally and commercially. Graph Model and Coordination Algorithms for Mo- Contents bile Sensor Networks.- II. Network Management.- Statistical models.- Tests in models with monotonic- Contents 4. Medium Access Control Protocols for Wireless ity properties.- Statistical decision theory.- Compar- Part I Surface Extraction Methods from Medical Sensor Networks.- 5. Topology Control for Wireless ison of models, reduction by sufficiency.- Invariant Imaging Data Towards Automatic Generation of Sensor Networks.- 6. Boundary Detection for Sen- statistical decision models.- Large sample approxi- 3D Models of Biological Objects Based on Serial sor Networks.- 7. TPSS: A Time-based Positioning mations of models and decisions.- Estimation.- Test- Sections.- Vincent Jasper Dercksen, Cornelia Brüß, Scheme for Sensor Networks with Short Range Bea- ing.- Selection. Detlev Stalling, Sabine Gubatz, Udo Seiffert, Hans- cons.- 8. Wakeup [..] Christian Hege.A Topological Approach to Quanti- Fields of interest tation of Rheumatoid Arthritis. - Hamish Carr, John Fields of interest Statistical Theory and Methods Ryan, Maria Joyce, Oliver Fitzgerald, Douglas Veale, Computer Communication Networks; Models Robin Gibney, Patrick Brennan.3D Visualization of and Principles; Information Systems Applications Target groups Vasculature: An Overview. - Bernhard Preim, Steffen (incl.Internet); Computer Appl. in Administrative Graduate students, researchers Oeltze.3D Surface Reconstruction from Endoscopic Data Processing Videos. - Arie Kaufman, Jianning Wang. Part [..] Type of publication Target groups Monograph Fields of interest Researchers and students in computer science, com- Visualization; Computer Graphics; Computer Appl. puter engineering, and applied mathematics Due December 2007 in Life Sciences; Mathematical Modeling and Indus- trial Mathematics; Image Processing and Computer Type of publication Vision; Computational Science and Engineering Contributed volume 2008. Approx. 694 p. (Springer Series in Statistics) Hardcover Target groups 69,95 € Due March 2008 Researchers, graduate students, and profession- ISBN 978-0-387-73193-3 als dealing with visualization and its application in medicine and life sciences 2008. XX, 444 p. 171 illus. (Signals and Communication Technol- ogy) Hardcover Type of publication 84,95 € Proceedings ISBN 978-0-387-49591-0 Due October 2007

2008. IX, 345 p. 162 illus., 35 in color in color appendix. (Mathe- matics and Visualization) Hardcover

79,95 € ISBN 978-3-540-72629-6 94 Computer Science springer.com/booksellers

J.S. Liu, Harvard University, Cambridge, MA, USA N.T. Longford, De Montford University, Leicester, UK R. Lover

Monte Carlo Strategies in Scientific Studying Human Populations Elementary Logic

Computing An Advanced Course in Statistics For Software Developers

This paperback edition is a reprint of the 2001 Studying Human Populations is a textbook for grad- The ability to reason correctly is critical to most as- Springer edition. This book provides a self-con- uate students and research workers in social statistics pects of computer science and to software develop- tained and up-to-date treatment of the Monte Carlo and related subject areas. It follows a novel curricu- ment in particular. Since logic is the discipline con- method and develops a common framework under lum developed around the basic statistical activities cerned with the general rules and criteria of correct which various Monte Carlo techniques can be "stan- of sampling, measurement and inference. Statistics is reasoning anyone involved with computer science dardized" and compared. Given the interdisciplinary defined broadly as making decisions in the presence and software development will benefit from studying nature of the topics and a moderate prerequisite for of uncertainty that arises as a consequence of limited logic and its applications to computing. Features: • the reader, this book should be of interest to a broad resources available for collecting information. A con- Covers elementary logic and its application to most audience of quantitative researchers such as com- necting link of the presented methods is the perspec- stages of software development • Discusses the appli- putational biologists, computer scientists, econome- tive of missing information, catering for a diverse cation of logic to the English language, as software tricians, engineers, probabilists, and statisticians. It class of problems that include nonresponse, imper- development begins usually with problems described can also be used as the textbook for a graduate-lev- fect measurement and causal inference. In principle, by end users in ordinary English • Emphasizes truth el course on Monte Carlo methods. Many problems any problem too complex for our limited analytical functional logic as well as quantificational logic • In- discussed in the alter chapters can be potential thesis toolkit could be converted to a tractable problem if cludes various examples and exercises to enable in- topics for masters’ or Ph.D. students in statistics or some additional information were available. Ingenu- dependent self-study This book provides a reader computer science departments. ity is called for in declaring such (missing) informa- friendly foundation and offers valuable insight in- tion constructively, but the universe of problems that to the topic, serving as a helpful reference for prac- Features we can address is wide open, not limited by a discrete titioners and advanced students involved with soft- The author is a leading researcher in a very active set of procedures. The monograph aims to prepare ware development. area of research Emphasis is on making these meth- the reader for [..] ods accessible to scientists who want to apply them Features Includes examples from artificial intelligence, com- Features Reveals usefulness of logic in software development putational biology, computer vision and chemistry Text for competent practitioners of statistics, not fu- through its applications The reader’s knowledge and ture statisticians Suitable as reference understanding can be assessed through numerous Contents examples and exercises Derived from teaching ma- Introduction and Examples.- Basic Principles: Re- Contents terial that has been proved to be clearly understand- jection, Weighting, and Others.- Theory of Se- Anova and Ordinary Regression.- Maximum Likeli- able quential Monte Carlo.- Sequential Monte Carlo hood Estimation.- Sampling Methods.- The Bayesian in Action.- Metropolis Algorithm and Be- Paradigm.- Incomplete Data.- Imperfect Measure- Contents yond.- The Gibbs Sampler.- Cluster Algo- ment.- Experiments and Observational Studies.- Part I: Language and Logical Form.- Atomic State- rithms for the Ising Model.- General Conditional Clinical Trials.- Random Coefficients.- Generalised ments.- Compound Statements.- Quantified State- Sampling.- Molecular Dynamics and Hybrid Monte Linear Models.- Longitudinal and Time-Series Anal- ments.- Expressing Arguments.- Defining Data Carlo.- Multilevel Sampling and Optimization Meth- ysis.- Meta-Analysis and Estimating Many Quanti- Structures.- Expressing Problem Specifications.- Ex- ods.- Population-Based Monte Carlo Methods.- ties. pressing Program Designs.- Part II: Material Truth.- Markov Chains and Their Convergence.- Truth for Statements with At Most One Connective.- Selected Theoretical Topics.- Basics in Probability Fields of interest Truth for Statements with Multiple Connectives.- and Statistics.- References.- Author Index.- Subject Statistical Theory and Methods; Epidemiology; Psy- Tracing Program Execution.-Part III: Truth Index.  chometrics; Biometrics; Simulation and Modeling; Functional Forms.- Truth Functional Properties Numeric Computing of Program Designs.- Quantified Forms.- Logical Fields of interest Equivalence.- Logical Implication and Validity.- Statistical Theory and Methods; Computational Target groups Rules of Inference.- Proof.- Algorithmic Unsolvabil- Mathematics and Numerical Analysis; Statistics for Graduate students, researchers ity [..] Business/Economics/Mathematical Finance/Insur- ance; Probability Theory and Stochastic Processes; Type of publication Fields of interest Mathematical Methods in Physics; Numerical and Graduate/advanced undergraduate textbook Logics and Meanings of Programs Computational Methods Due January 2008 Target groups Target groups Practitioners, Graduates, Advanced Undergraduates Researchers, graduate students 2008. XVI, 472 p. (Springer Texts in Statistics) Hardcover Type of publication Type of publication 62,95 € Professional book Monograph ISBN 978-0-387-98735-4 Due April 2008 Due February 2008

2008. Approx. 305 p. Softcover 2008. Approx. 360 p. (Springer Series in Statistics) Softcover 29,95 € 38,50 € ISBN 978-1-84800-081-0 ISBN 978-0-387-76369-9 springer.com/booksellers Computer Science 95

R. Lowen, University of Antwerp, Belgium; A. Verschoren, Univer- J. Löffler, Fraunhofer Institut, Sankt Augustin, Germany; M. Klann, O. Maimon, Tel-Aviv University, Ramat-Aviv, Israel; L. Rokach, sity of Antwerp, Belgium (Eds.) Fraunhofer Institut, Sankt Augustin, Germany (Eds.) Ben-Gurion University, Beer-Sheva, Israel (Eds.)

Foundations of Generic Mobile Response Soft Computing for Knowledge

Optimization, Volume 2: First International Workshop on Mobile Information Technol- Discovery and Data Mining Applications of Fuzzy Control, ogy, for Emergency Response, MobileResponse 2007, Sankt Augustin, Germany, February 22-23, 2007 Revised Selected Genetic Algorithms and Neural Papers Data mining is the science and technology of explor- Networks ing large and complex bodies of data in order to dis- cover useful patterns. It is extremely important be- This book constitutes the thoroughly refereed post- cause it enables modeling and knowledge extraction proceedings of the First International Workshop This is a comprehensive overview of the basics of from abundant data availability. Soft Computing on Mobile Information Technology for Emergency fuzzy control, which also brings together some re- for Knowledge Discovery and Data Mining intro- Response, MobileResponse 2007 held in Sankt Au- cent research results in soft computing, in particular duces soft computing methods extending the enve- gustin, Germany in February 2007. The 16 revised fuzzy logic using genetic algorithms and neural net- lope of problems that data mining can solve efficient- papers presented together with 1 kenote lecture were works. This book offers researchers not only a solid ly. It presents practical soft-computing approach- carefully reviewed and selected from 30 submissions. background but also a snapshot of the current state es in data mining. This edited volume by highly re- The papers are organized in topical sections on med- of the art in this field. garded authors, includes several contributors of ical services, team support, geospatial information, the 2005, Data Mining and Knowledge Discovery Features wearable computing, and communication technolo- Handbook.  This book was writ- Timeliness of the comprehensive overview of fuzzy gy. ten to provide investigators in the fields of informa- control Large body of authors, specialists in the field tion systems, engineering, computer science, statis- Fields of interest Articles with varied range of applications Specialist tics and management with a profound source for the Information Systems Applications (incl.Internet); In- up-to-date research articles + comprehensive intro- role of soft computing in data mining. Not only does formation Storage and Retrieval; Multimedia Infor- duction to the field in one and the same work this book feature illustrations of various applications mation Systems; Database Management; Computer including manufacturing, medical, banking, insur- Communication Networks; User Interfaces and Hu- Fields of interest ance and others, but also includes various real-world man Computer Interaction Genetics and Population Dynamics; Mathematics of case [..] Computing; Discrete Mathematics in Computer Sci- Target groups ence; Combinatorics; Optimization Features Researchers and professionals Illustrations of various applications including man- Target groups Type of publication ufacturing, medical, banking, insurance and oth- Researchers and professionals in soft computing, Proceedings ers Includes various real-world case studies with de- in particular in development of theory and applica- tailed results Edited by the highly-regarded editors of tions of fuzzy logic, genetic algorithms and neural the "Data Mining and Knowledge Discovery Hand- networks Due November 2007 book" (2005, Springer)

Type of publication 2008. Approx. 190 p. (Lecture Notes in Computer Science, Vol. Contents Contributed volume 4458) Softcover -Foundation and Capabilities.- Introduction to Data Mining.- Classification Methods.- Clustering Meth- Due October 2007 42,00 € ods.- Association Rules.- Feature Selection.- Soft ISBN 978-3-540-75667-5 Computing Methods.- Fuzzy Set and Fuzzy Logic.- Neural Networks.- Rough Set Theory.- Bayesian Net- 2008. X, 355 p. (Mathematical Modelling: Theory and Applica- works.- Evolutionary Algorithms.- Swarm Intelli- tions, Vol. 24) Hardcover gence.- Support Vector Machines.- Wavelets Meth- 69,95 € ods.- Neuro-fuzzy.- Applications.- Target Marketing ISBN 978-1-4020-6667-2 Applications.- Medicine Applications.- Manufactur- ing Applications.  

Fields of interest Database Management; Information Storage and Re- trieval; Pattern Recognition; Computer Communi- cation Networks; Information Systems Applications (incl.Internet)

Target groups Practitioners and researchers in the fields of infor- mation systems, engineering, computer science, statistics and management

Type of publication Contributed volume

Due November 2007

2008. Approx. 447 p. Hardcover

76,95 € ISBN 978-0-387-69934-9 96 Computer Science springer.com/booksellers

D. Makinson, London School of Economics, UK E. Malinowski, Universidad de Costa Rica, San Pedro, San José, I. Manolescu, INRIA Futurs, Orsay Cedex, France; Y. Papakon- Costa Rica; E. Zimanyi, Université Libre de Bruxelles, Brussels, Bel- stantinou, University of California, San Diego, CA, USA gium Sets, Logic and Maths for Querying XML with XQuery Computing Advanced Data Warehouse Design

From Conventional to Spatial and Temporal Applications Querying XML with XQuery introduces the new This book equips the student with essential intellec- standard, W3C XQuery Recommendation. XQuery tual tools that are needed from the very beginning emerges as the de-facto XML query language that of university studies in computing. These consist A data warehouse stores large volumes of historical will deliver the promise of XML in the application of abilities and skills - to pass from a concrete prob- data required for analytical purposes. This data is ex- integration and data integration fields. Simple com- lem to an abstract representation, reason with the tracted from operational databases; transformed in- plete examples introduce the essentials of XQuery to abstract structure coherently and usefully, and re- to a coherent whole using a multidimensional mod- enable the reader to grasp its essence. The authors turn with booty to the specific situation. The most el that includes measures, dimensions, and hierar- present complete cases with the use of XQuery in ap- basic and useful concepts needed come from the chies; and loaded into a data warehouse during the plication integration and information integration de- worlds of sets (with also their employment as rela- extraction-transformation-loading (ETL) process. ployments. This book also provides a crucial discus- tions & functions), structures (notably trees Malinowski and Zimányi explain in detail conven- sion of advanced topics of the language. Querying & graphs), & combinatorics (alias princi- tional data warehouse design, covering in particular XML with XQuery is designed for XML, database ples of counting, with their application in the world complex hierarchy modeling. Additionally, they ad- and Java developers, as well as advanced-level stu- of probability). Recurring in all these are 2 kinds of dress two innovative domains recently introduced dents in computer science. instrument of proof – logical (notably inference by to extend the capabilities of data warehouse systems, suppositions, reductio ad absurdum, & proof by namely the management of spatial and temporal in- Features cases), & mathematical (notably induction on formation. Their presentation covers different phas- Quick introduction to the powerful XQuery lan- the positive integers & on well-founded struc- es of the design process, such as requirements spec- guage: enables reader to write data filtering, transfor- tures). From this book the student can assimilate the ification, conceptual, logical, and physical design. mation and integration queries Thorough case-driv- basics of these worlds & set out on the paths of They include three different approaches for require- en guidance into syntax and semantics of the lan- computing with understanding & a [..] ments specification depending on whether users, op- guage of this relatively new standard erational data sources, or both are the driving force Features in the requirements gathering process, and they [..] Contents Only minimal background in mathematics necessary Preface.- Introduction.- The Essential Language Careful selection of material that is really needed Features Structures.- Typical Queries.- XQuery in Applica- by students in the first two years of their university Explains conventional data warehouse design in de- tion Integration Systems.- XQuery in Data Integra- life in Computer Science and Information Sciences tail Additionally addresses the management of spa- tion Systems.- XQuery in XML Databases.- XQuery Brings out the interplay between qualitative thinking tial and temporal information, needed for geographi- on Unstructured Documents.- Advanced XQuery.- and calculation Teaches the material as a language cal applications or for supply chain management All XQuery and Java.- Index. for thinking in, as much as knowledge to be gained design steps are illustrated using many real-world ex- amples Completed by sample implementations for Fields of interest Contents Microsoft's Analysis Services 2005 and Oracle 10g Database Management; Programming Languages, Before the Beginning.- Do I really need to know with the OLAP and the Spatial extensions Compilers, Interpreters; Information Storage and about this?.- Proving and disproving: Logical tech- Retrieval; Programming Techniques; Operating Sys- niques.- Proving and disproving: Mathematical tech- Contents tems; Software Engineering/Programming and Op- niques.- First Steps.- Flat set theory.- Families of Introduction.- Introduction to databases and data erating Systems sets.- Relations.- Functions.- Structures.- Order.- warehouses.- Conventional data warehouses.- Spa- Trees.- Graphs.- Logic.- Truth-functional connec- tial data warehouses.- Temporal data warehouses.- Target groups tives.- Quantifiers.- Counting.- The pigeonhole prin- Designing conventional data warehouses.- Design- XML, database and Java developers ciples.- The addition and multiplication rules.- Selec- ing spatial and temporal data warehouses.- Conclu- tion rules.- Probability.- The Kolmogorov axioms for sions and future work.- Formalization of the Mul- Type of publication finitely additive probability.- Combining combina- tiDim Model.- Graphical notations.- References.- Monograph torics and probability Glossary.- Index. Due December 2007 Fields of interest Fields of interest Discrete Mathematics in Computer Science; Mathe- Database Management; Geoinformation/Cartogra- matical Logic and Formal Languages; Symbolic and phy; Information Systems; Environmental Comput- 2007. Approx. 128 p. 30 illus. Hardcover Algebraic Manipulation; Probability and Statistics in ing/Environmental Modelling; Computer Applica- 54,95 € Computer Science; Computational Mathematics and tions in Geosciences; Information Systems Applica- ISBN 978-0-387-26933-7 Numerical Analysis tions (incl.Internet)

Target groups Target groups Undergraduate students Students, lecturers, (advanced) professionals

Type of publication Type of publication Undergraduate textbook Monograph

Due May 2008 Due January 2008

2008. Approx. 200 p. Also available online. (Undergraduate Top- 2008. Approx. 430 p. (Data-Centric Systems and Applications) ics in Computer Science) Softcover Hardcover

26,95 € 59,95 € ISBN 978-1-84628-844-9 ISBN 978-3-540-74404-7 springer.com/booksellers Computer Science 97

P. Maragos, National Technical University of Athens, Greece; A. D. Margolies (Ed.) S. Marinai, University of Florence, Italy; H. Fujisawa, University of Potamianos, Technical University of Crete, Greece; P. Gros, IN- Florence, Italy (Eds.) RIA / IRISA, Rennes, France (Eds.) The ANSI Common Lisp Reference Book Machine Learning in Document Multimodal Processing and Analysis and Recognition Interaction

Audio, Video, Text The ANSI Common Lisp Reference Book is the up- dated edition of the reference work on the Common The objective of Document Analysis and Recogni- Lisp Language. It contains descriptions of every AN- tion (DAR) is to recognize the text and graphical components of a document and to extract informa- Multimodal Processing and Interaction: Audio, SI Common Lisp operator, constant, variable, and tion. This book is a collection of research papers and Video and Text presents high quality, state-of-the-art class. Other specialized topics such as arguments state-of-the-art reviews by leading researchers all research ideas and results from theoretic, algorith- common to many operators, format directives, and over the world including pointers to challenges and mic and application viewpoints. This edited volume reader macros will also have their own description opportunities for future research directions. The contains contributions by leading experts in the ob- pages. In addition, there will be a number of essays main goals of the book are identification of good sequious scientific and technological field of multi- on specific topics in Common Lisp such as declara- practices for the use of learning strategies in DAR, media. This volume was developed from a four-year tions, forms, keywords, lambda expressions, path- identification of DAR tasks more appropriate for collaboration among research groups participating names, and streams as well as descriptions of stan- these techniques, and highlighting new learning al- in the European network of Excellence on Multime- dard extensions to Common Lisp (with examples gorithms that may be successfully applied to DAR. dia Understanding, Semantics, Computation and provided by Allegro CL). Each page will have a stan- learning (MUSCLE). Multimodal Processing and In- dard format, examples, and extensive cross-refer- ences to related pages. Features teraction: Audio, Video and Text specifically focus- Presents applications and learning algorithms for es on interaction with multimedia content with spe- Features Document Image Analysis and Recognition (DI- cial emphasis on multimodal interfaces for accessing The only reference manual designed for pro- AR) Identifies good practices for the use of learning multimedia information. Multimodal Processing and grammers actually using the Lisp language Easy-to- strategies in DIAR Interaction: Audio, Video and Text is designed for a use dictionary format Special essays on general top- professional audience composed of practitioners and ics provide introductions to aspects of the Common Contents researchers in industry. This book is also suitable for Lisp language that the reader may not be familiar Introduction to Document Analysis and Recogni- advanced-level students in computer science. with Every Common Lisp operator, variable, etc. is tion.- Structure Extraction in Printed Documents Using Neural Approaches.- Machine Learning for Features described with usage examples Completely updated for the full ANSI specifications     Reading Order Detection in Document Image Un- Emphasis on multimodal information processing as- derstanding.- Decision-Based Specification and pects of multimedia and cross-interaction of multi- Contents Comparison of Table Recognition Algorithms.- ple modalities Broad spectrum of novel perspectives, The book will be in a dictionary format, with each Machine Learning for Digital Document Process- analytic tools, algorithms, design practices and appli- page labeled either by the name of the object the ing: from Layout Analysis to Metadata Extraction.- cations in multimedia science and engineering page describes or by 'About XXX'. The 'About' pages Classification and Learning Methods for Character Recognition: Advances and Remaining Problems.- Contents are short essays on various topics associated with Combining Classifiers with Informational Confi- Preface.- Tutorial Review of State of the Art.- Cross- Common Lisp. As a result, the book will not be di- dence.- Self-Organizing Maps for Clustering in Doc- Modal Integration/Interaction for Performance Im- vided into chapters; although it is possible groups of ument Image Analysis.- [..] proving in Multimedia: State-of-the-Art Review.- pages will be separated from others. Human-Computer Interfaces for Multimedia Re- Fields of interest Fields of interest trieval: State of the Art.- New Research Directions: Programming Languages, Compilers, Interpreters Appl.Mathematics/Computational Methods of Engi- Integrated Multimedia Analysis And Recognition.- neering; Artificial Intelligence (incl. Robotics) Stochastic Models for Multimodal Video Analysis.- Target groups Adaptive Multimodal Fusion by Uncertainty Com- Intermediate to advanced Lisp programmers, Com- Target groups pensation with Application to Audio-Visual Speech puter Science students Researchers, engineers, graduate students in compu- Recognition.- Action Recognition in Multimedia tational intelligence and computer science Streams.- Surveillance Using Both Video and Au- Type of publication dio.- Movie Analysis with Emphasis to Dialogue De- Professional book Type of publication tections.- [..] Monograph

Fields of interest Due March 2008 Due January 2008 Multimedia Information Systems; Information Stor- age and Retrieval; Biometrics; Computer Graphics; Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Artificial Intelligence (incl. Robotics); Computer Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest 2008. Approx. 430 p. (Studies in Computational Intelligence, Vol. Communication Networks Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, 90) Hardcover Oman, Qatar, Palestine: Jordan Book Center Target groups 129,95 € ISBN 978-3-540-76279-9 Graduate-level students and researchers in computer 2008. Approx. 1000 p. Hardcover science 79,95 € Type of publication ISBN 978-1-59059-220-5 Contributed volume

Due February 2008

2008. Approx. 350 p. 20 illus. (Multimedia Systems and Applica- tions, Vol. 43) Hardcover

96,25 € ISBN 978-0-387-76315-6 98 Computer Science springer.com/booksellers

K. Markantonakis, Royal Holloway University of London, UK; K. E.S.J. Martens, KU Leuven, Belgium; G. Gielen, KU Leuven, Bel- F.P. Martins, Delaware; A. Kobylinska, Delaware Mayes, Royal Holloway University of London, UK (Eds.) gium Adobe Acrobat 8 Standard, Smart Cards, Tokens, Security and High-Level Modeling and Synthesis Professional, Connect and 3D Applications of Analog Integrated Systems

Unleash the power of Adobe Acrobat 8 and Acro- Smart Cards, Tokens, Security and Applications pro- Various approaches for finding optimal values for bat Connect 8 to communicate and collaborate with vides a broad overview of the many card systems and the parameters of analog cells, like op amps, have confidence. Whether you are a newbie in the PDF solutions that are in practical use today. This state- been investigated since the mid-1980s, and they have universe or an advanced Acrobat user, this book will of-the art work is written by contributing authors made their entrance in commercial applications. guide you through all the useful features of Acrobat who are active researchers and acknowledged ex- However, a larger impact on the performance is ex- 8 and Acrobat 8 Connect. You will learn to: - com- perts in their field. A single book cannot be found to pected if tools are developed which operate on a bine files into PDF documents or PDF packages, - match both the breadth and depth of content. This higher abstraction level and consider multiple archi- create and optimize PDF documents for office use, book combines a cross-discipline overview of smart tectural choices to realize a particular functionality. print production and interactive digital media, - col- cards, tokens and related security and applications “High-Level Modeling and Synthesis of Analog In- lect information for research and forms processing; plus a technical reference to support further research tegrated Systems” examines the opportunities, con- archive your work in future-savvy PDF/A files, - con- and study. A step-by-step approach educates the ditions, problems, solutions and systematic method- trol access to information, - edit and redact docu- reader in card types, production, operating systems, ologies for this new generation of analog CAD tools. ments, - connect into live sessions side-by-side with commercial applications, new technologies, securi- A new design paradigm is defined for high-level syn- colleagues in remote geographic locations, - collab- ty design, attacks, application development, deploy- thesis of AMS systems: the high-level design flow orate in online reviews, - preflight documents and ment and lifecycle management. By the end of the based on generic behavior. This design approach in- validate standards conformance, - ready documents book the reader should be able to play an educated volves a modeling strategy using generic behavioral for compliance with Section 508 of the Rehabilitation role in a smart card related project, even to program- models and a synthesis strategy leading to the explo- Act. Office users will find step-by-step instructions ming a card application. Smart Cards, Tokens, Secu- ration of a heterogeneous design space containing along with tips and tricks written in a clear and con- rity and Applications is designed for a professional different architectures. In “High-Level Modeling and cise language particularly useful for [..] audience of practitioners and researchers. Synthesis of Analog Integrated Systems”, two [..] Features Features Features Create and optimize PDF documents for office use, Broad range of cross-industry/discipline topics, One of the first books with systematic study of ana- print production and interactive digital media Com- authored by experienced industry experts and ap- log CAD tools for high-level synthesis Describes one plete help in handling PDF files and Acrobat Ad- plied to real-world problems Useful as a complete of the most time-efficient high-level simulation mod- dresses Windows and Mac users, especially Mac OS overview and as an in-depth reference; suitable for els for Delta-Sigma modulators Describes a unique X 10.5 and Windows Vista wide range of readers at different levels framework for modeling RF systems Describes one of the first synthesis algorithms to convert a func- Fields of interest Contents tional description into different architectures de- Media Design; Information Systems and Commu- Preface.- Introduction to Smart Cards.- Smart pending on the required performance nication Service; Information Systems Applications Cards.- Trusted Production Environment.- Oper- (incl.Internet) ating systems, Interoperability and Security.- SIM/ Contents USIM Cards-Security for Mobile Telephony.- Smart From the contents Preface. List of Figures. List of Ta- Type of publication Cards for Secure Banking and Finance.- Smart Cards bles. 1. Introduction. Part I Analog Design Method- Professional book in Satellite TV.- Advances in Smart Chips and To- ologies. 2. Foundations of Design Flows for AMS kens for Platform and Application Security.- Com- Systems. 3. Analog and Mixed-Signal Design Strate- Due April 2008 mon Criteria and Smart Cards.- Security Attacks, gies. Part II General Behavioral Modeling. 4. Time- Countermeasures and Testing for Smart Cards.- Ap- Domain Generic Behavioral Models. 5. Frequen- plication Development Environments for JAVA and cy-Domain Generic Behavioral Models. Part III Top- 2008. Approx. 1000 p. With DVD (X.media.publishing) Softcover SIM Toolkit.- OTA and Secure SIM Lifecycle Man- Down Heterogeneous Synthesis. 6. Top-Down Het- 39,95 € agement.- Index. erogeneous Optimization. 7. Conclusions. Symbols ISBN 978-3-540-49501-7 and Abbreviations. Index. Fields of interest Data Encryption; Systems and Data Security; Da- Fields of interest ta Structures, Cryptology and Information Theo- Circuits and Systems; Processor Architectures; Elec- ry; Computer Communication Networks; Comput- tronics and Microelectronics, Instrumentation er Systems Organization and Communication Net- works; Coding and Information Theory Target groups Graduate level students, professionals and re- Target groups searchers in the areas of analog circuit design and Practitioners, researchers and advanced-level stu- electronic design automation and developers of ana- dents in computer science log CAD tools

Type of publication Type of publication Contributed volume Monograph

Due January 2008 Due January 2008

2008. Approx. 300 p. Hardcover 2008. Approx. 280 p. (Analog Circuits and Signal Processing) Hardcover 68,55 € ISBN 978-0-387-72197-2 99,95 € ISBN 978-1-4020-6801-0 springer.com/booksellers Computer Science 99

T. Masuzawa, S. Tixeuil (Eds.) N. Maudet, S. Parsons, I. Rahwan (Eds.) R.V. Mayorga, University of Regina, Saskatchewan, Canada; L. Perlovsky, Air Force Research Laboratory, Hanscom, MA, USA (Eds.) Stabilization, Safety, and Security Argumentation in Multi-Agent of Distributed Systems Systems Toward Artificial Sapience

9th International Symposium, SSS 2007 Paris, France, Novem- Third International Workshop, ArgMAS 2006 Hakodate, Japan, Principles and Methods for Wise Systems ber 14-16, 2007 Proceedings May 8, 2006 Revised Selected and Invited Papers

Edited volume discusses artificial/computational This book constitutes the refereed proceedings of the Argumentation provides tools for designing, imple- sapience and sapient systems from a diverse set of 9th International Symposium on Stabilization, Safe- menting and analyzing sophisticated forms of inter- contributors Organised into seven sections so that ty, and Security of Distributed Systems, SSS 2007, action among rational agents. It has made a the reader is guided through the subject in a struc- held in Paris, France, November 14-16, 2007. The 27 solid contribution to the practice of multiagent dia- tured and comprehensive manner Concepts are for- regular papers presented together with the extended logues. Application domains include: legal disputes, malized and extended, as well as compared and dif- abstracts of 3 invited lectures were carefully reviewed business negotiation, labor disputes, team formation, ferentiated from their counterparts in the artificial and selected from 64 submissions. The papers ad- scientific inquiry, deliberative democracy, ontology intelligent and intelligence systems disciplines Ap- dress all aspects of self-stabilization, safety and se- reconciliation, risk analysis, scheduling, and logistics. plicability of developed concepts are illustrated thor- curity, recovery oriented systems and programing, This book constitutes the thoroughly refereed post- oughly This novel state-of-the-art research volume is from theoretical contributions, to reports of the actu- proceedings of the Third International Workshop the first to explore computational sapience and sapi- al experience of applying the principles of self-stabi- on Argumentation in Multi-Agent Systems held in ent (wise) systems Of utmost importance to all re- lization to static and dynamic systems. Hakodate, Japan, in May 2006 as an associated event searchers and graduate students in the field of AAMAS 2006, the main international conference Fields of interest on autonomous agents and multi-agent systems. The Features Computer Communication Networks; Special Pur- volume opens with an original state-of-the-art sur- First scientific literature to focus on computational pose and Application-Based Systems; Computation vey paper presenting the current research and offer- sapience and sapient (wise) systems by Abstract Devices; Algorithm Analysis and Prob- ing a comprehensive and up-to-date overview of this lem Complexity; Management of Computing and In- rapidly evolving area. The 11 revised articles that fol- Contents formation Systems low were carefully reviewed and selected from the Part 1: Intelligence and Sapience.- Can Creativity most significant workshop [..] Be Formalized? Peircean Reflections on the Role of Target groups Abduction in Human Intelligence.- On Plasticity, Researchers and professionals Fields of interest Complexity and Sapient Systems.- Sapience, Con- Artificial Intelligence (incl. Robotics); Computer sciousness and the Knowledge Instinct (Prolegome- Type of publication Communication Networks; User Interfaces and Hu- Proceedings na to a Physical Theory).- A Real-time Agent System man Computer Interaction; Language Translation Perspective of Meaning and Sapience.- Part2: Sapi- and Linguistics ent Agents.- Towards BDI Sapient Agents: Learn- Due November 2007 ing Intentionally.- Toward Wisdom in Procedural Target groups Reasoning: DBI not BDI.- Sapients Agents in a Sand- Researchers and professionals 2007. XIII, 409 p. (Lecture Notes in Computer Science, Vol. 4838) box.- Sapient Agents: Seven Approaches.- Part 3: Softcover Type of publication Paradigms for Sapient Systems/Agents.- A [..] Proceedings 56,00 € Fields of interest ISBN 978-3-540-76626-1 Artificial Intelligence (incl. Robotics); Computing Due October 2007 Methodologies

2007. XII, 211 p. Also available online. (Lecture Notes in Comput- Target groups er Science, Vol. 4766) Softcover Researchers, graduates

42,00 € Type of publication ISBN 978-3-540-75525-8 Contributed volume

Due December 2007

2008. Approx. 235 p. Hardcover

76,95 € ISBN 978-1-84628-998-9 100 Computer Science springer.com/booksellers

K. McArthur, StormTide Digital Studios, Edmonton, AB, Canada D. Medhi, J.M. Nogueira, T. Pfeifer, S.F. Wu (Eds.) A. Meisels, Ben-Gurion University, Beer-Sheva, Israel

Pro PHP IP Operations and Management Distributed Search by Constrained

Patterns, Frameworks, Testing and More 7th IEEE International Workshop, IPOM 2007 San José, USA, Agents October 31 - November 2, 2007 Proceedings Algorithms, Performance, Communication

Installed on more than 19 million domains (http:// www.php.net/usage.php), PHP is by far the world's This book constitutes the refereed proceedings of This book presents a comprehensive discussion on most popular Web scripting language. Its popular- the 7th IEEE International Workshop on IP Oper- the field of distributed constraints, its algorithms and ity is such that it's practically a default offering on ations and Management, IPOM 2007, held in San its active research areas. The well defined model of shared host Web hosting providers around the globe. José, USA, October 31 - November 2, 2007 in the distributed constraints satisfaction and optimization And with the forthcoming PHP 6 release, populari- course of the 3rd International Week on Manage- (DisCSPs/DisCOPs) can serve as the basis for the ty is sure to increase even further as the language's ment of Networks and Services, Manweek 2007. The design and investigation of distributed search algo- advanced features continue to catch the eye of en- 16 revised full papers and 5 revised short papers pre- rithms, of protocols and of negotiations and search. terprise developers. Pro PHP presents experienced sented were carefully reviewed and selected from 40 The book introduces distributed constraint satisfac- developers with a thorough guide to the language's submissions. The papers are organized in topical sec- tion and optimization problems and describes the key advanced features, focusing on both recent and tions on p2p and future internet, internet secutiry underlying model. Presenting a complete state of the emerging features and development trends. Among management, service management and provisioning, art in DisCSP and DisCOP research, the following the topics covered in the book are software develop- QoS management and multimedia as well as man- topics are explored: - Families of search algorithms ment patterns, the Standard PHP Library, the MVC agement for wireless networks. on DisCSPs and DisCOPs; - Distributed constraint software architecture as applied to PHP with spe- optimization; - Ordering Heuristics for DisCSP al- cial emphasis on the Zend Framework, and Ajax and Fields of interest gorithms; - Performance measures; - Impact of com- Web services. Computer Communication Networks; Information Systems Applications (incl.Internet); Management of munication quality on distributed search; - Privacy Features Computing and Information Systems; Multimedia issues; - Non exhaustive search algorithms on DisC- Thus far, Pro PHP is the only book to cover emerg- Information Systems; Information Storage and Re- SPs; - Applications of DisCSPs. This thorough expo- ing topics such as MVC as applied to PHP, the Zend trieval; Communications Engineering, Networks sition of the many elements of distributed search al- Framework, and Ajax With pattern-driven devel- gorithms for DisCSPs and DisCOPs will be [..] opment a common source of discussion in develop- Target groups Features er circles, Pro PHP devotes considerable time to in- Researchers and professionals Comprehensive treatment of the topic Presentation troducing PHP's advanced object-oriented features, Type of publication assumes no prior knowledge of constraints and/or with special emphasis on patterns Authored by noted Proceedings distributed constraints Current books in this area are PHP expert and Zend Framework contributor Kevin outdated McArthur Due October 2007 Contents Contents Introduction. Constraints Satisfaction Problems: Part I: OOP and Patterns: Interfaces and Abstract 2007. XII, 201 p. (Lecture Notes in Computer Science, Vol. 4786) CSPs.- Constraints Optimization Problems: COPs.- Classes; The Static Keyword; Patterns: Singleton and Softcover Distributed CSPs.- Asynchronous Backtracking Factory; Exceptions; OOP PHP6 [covering the top 8 (ABT).- Asynchronous Forward – Checking.- Con- or so changes]; Reflection.- Part II: Testing and Doc- 42,00 € current Dynamic Backtracking.- Distributed Order- umentation: PHPUnit2, .phpt, and XDebug; Doc- ISBN 978-3-540-75852-5 ing Heuristics.- Asynchronous Ordering Heuristics.- umentation.- Part IV: SPL [ The Standard PHP Li- Performance Measures for Distributed Search.- Ex- brary ]; An introduction to SPL; Understanding and perimental Evaluation of DisCSP Algorithms.- The Implementing Iterators; SPL File and Directory Han- Impact of Communication: Message Delays.- Mes- dling; Array Overloading [Indexers]; SPL Built-In sage Delays and DisCSP Search Algorithms.- Dis- Exception Base Classes.- Part V: Introducing MVC: tributed Constraint Optimization Problems (Dis- Model - View - Controller; Introducing the Zend COPs).- Asynchronous Search in DisCOPs.- Asyn- Framework; Advanced Framework Issues.- Part VI: chronous [..] [..] Fields of interest Fields of interest Information Storage and Retrieval; Artificial Intelli- Programming Languages, Compilers, Interpreters gence (incl. Robotics); Algorithm Analysis and Prob- Target groups lem Complexity Intermediate/expert web developers Target groups Type of publication Researchers, practitioners, graduates Professional book Type of publication Monograph Due April 2008 Due December 2007 Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, 2008. Approx. 230 p. (Advanced Information and Knowledge Oman, Qatar, Palestine: Jordan Book Center Processing) Hardcover 62,95 € 2008. Approx. 300 p. Softcover ISBN 978-1-84800-039-1 ISBN 978-1-59059-819-1 springer.com/booksellers Computer Science 101

A.J. Mendes, University of Coimbra, Portugal; I. Pereira, Polytech- T. Mens, University of Mons-Hainaut, Belgium; S. Demeyer, Uni- U. Meyer-Baese, Florida State University, Tallahassee, FL, USA nic Institute of Leiria, Portugal; R. Costa, Polytechnic Institute of versity of Antwerp, Belgium (Eds.) Leiria, Portugal (Eds.) Digital Signal Processing with Field Software Evolution Computers and Education: Towards Programmable Gate Arrays Educational Change and Innovation Software has become omnipresent and vital in our Field-Programmable Gate Arrays (FPGAs) are revo- information-based society, so all software produc- lutionizing digital signal processing as novel FPGA ers should assume responsibility for its reliability. This volume contains a selection of papers covering families are replacing ASICs and PDSPs for front- While "reliable" originally assumed implementations the latest research and experiences on the application end digital signal processing algorithms. So the effi- that were effective and mainly error-free, addition- of Information and Communication Technologies cient implementation of these algorithms is critical al issues like adaptability and maintainability have in the field of Education. Areas covered include: De- and is the main goal of this book. It starts with an gained equal importance recently. For example, the sign, development and evaluation of innovative ed- overview of today's FPGA technology, devices, and 2004 ACM/IEEE Software Engineering Curriculum ucational environments - Web based courses, tools tools for designing state-of-the-art DSP systems. A Guidelines list software evolution as one of ten key and resources - ICT in special education - Collab- case study in the first chapter is the basis for more areas of software engineering education. Mens and orative learning - Distance learning supported by than 40 design examples throughout. The following Demeyer, both international authorities in the field ICTechnologies - E-Learning in Higher Education chapters deal with computer arithmetic concepts, of software evolution, together with the invited con- - Innovative experiments using ICT in educational theory and the implementation of FIR and IIR fil- tributors, focus on novel trends in software evolu- context - Methodologies for ICT use in educational ters, multirate digital signal processing systems, DFT tion research and its relations with other emerging context - Social aspects of the utilization of ICT in and FFT algorithms, advanced algorithms with high disciplines such as model-driven software engineer- education - Educational applications of ubiquitous future potential, and adaptive filters. Each chapter ing, service-oriented software development, and as- computing. An important book for researchers and contains exercises. The VERILOG source code and pect-oriented software development. They do not re- practitioners in e-learning, computer-based educa- a glossary are given in the appendices, while the ac- strict themselves to the evolution of source code but tion, educational software, distributed learning, life- companying CD-ROM contains the examples in also address the evolution of other, equally impor- long learning and open and distance learning; as well VHDL and Verilog code as well as the newest Altera tant software artifacts such as databases [..] as developers and users of educational software and "Quartus II web edition" software. This edition has computer-mediated educational tools. Contents [..] 1) Introduction and Roadmap: History and Chal- Contents Contents lenges of Software Evolution (Tom Mens)   Applications of Adaptive Hypermedia in Education.- Computer Arithmetic.- Finite Impulse Response Part I: Understanding and Analysing Software Evo- Protocols of Coordination and Structured Com- (FIR) Digital Filtres.- Infinite Impulse Response lution 2) Identifying and Removing Software Clones munication in Synchronous CSCL Environments.- (IIR) Digital Filtres.- Multirate Signal Processing.- (Rainer Koschke) - 3) Analyzing Software Repos- Components of an EML Proposal for Collabora- Fourier Transforms.- Advanced Topics.- Adaptive itories to understand Software Evolution (Marco tive Learning Modeling.- Analysis of Engaged On- Filtres.- Microprocessor Design. line Collaborative Discourse: A Methodological Ap- D'Ambros et.al.) - 4) Predicting Bugs from Histo- proach.- Adding Constraints to a Virtual Course Us- ry (Thomas Zimmermann et.al.)   Part II: Fields of interest ing a Formal Approach to the Interactions in Collab- Reengineering of Legacy Systems 5) Object-Ori- Signal,Image and Speech Processing; Computer orative Learning.- An experiment in collaborative ented Reengineering (Serge Demeyer) - 6) Migra- Hardware; Input/Output and Data Communica- writing.- The ‘contract’ as a pedagogical tool in e- tion of Legacy Information Systems (Jean-Luc Hain- tions; Electronics and Microelectronics, Instrumen- Learning.- Development of a personalized e-learning aut et.al.) - 7) Architectural Transformations: From tation experience based on IMS standard technologies.- e- Legacy to Three-Tier [..] QUAL: [..] Target groups Fields of interest R&D engineers, students, researchers in digital Fields of interest Software Engineering; Management of Computing signal processing and circuitry Computers and Education; User Interfaces and Hu- and Information Systems; Information Systems Ap- man Computer Interaction plications (incl.Internet) Type of publication Graduate/advanced undergraduate textbook Target groups Target groups Researchers, Libraries, Graduate Students Researchers; practitioners; lecturers; teachers; Due October 2007 Type of publication Type of publication Contributed volume Monograph Originally published as a monograph

Due December 2007 Due January 2008 2008. XX, 774 p. 359 illus. (Signals and Communication Technol- ogy) Hardcover 2008. Approx. 340 p. Hardcover 2008. Approx. 294 p. Hardcover 79,95 € ISBN 978-3-540-72612-8 99,95 € 64,95 € ISBN 978-1-84628-928-6 ISBN 978-3-540-76439-7 102 Computer Science springer.com/booksellers

S. Meyers, Carmel, IN, USA A.A. Minai, University of Cincinnati, OH, USA; Y. Bar-Yam, New S.K. Mishra, G.B. Pant University of Agriculture & Technology, England Complex Systems Institute, Cambridge; USA (Eds.) Pantnagar, India; S. Wang, Chinese Academy of Sciences, Beijing, China; K.K. Lai, City University of Hong Kong, Hong Kong SAR MAC OS X Leopard Unifying Themes in Complex Beyond the Manual Systems V-Invex Functions and Vector Optimization Vol IV: Proceedings of the Fourth International Conference on While this book does not assume a background on Complex Systems the Mac, it assumes computer experience and is V-INVEX FUNCTIONS AND VECTOR OPTI- written to keep the reader on the edge of their seat. MIZATION summarizes and synthesizes an aspect Learning as much as you can as fast as you can is the In June of 2002, over 500 professors, students and of research work that has been done in the area of goal of the book. Emphasis is given to topics that are researchers met in Boston, Massachusetts for the Generalized Convexity over the past several decades. not treated well in online forums; that need deep but Fourth International Conference on Complex Sys- Specifically, the book focuses on V-invex functions clear explanations. So topics like scripting, web cre- tems. The attendees represented a remarkably di- in vector optimization that have grown out of the ation, networking and programming are tackled ag- verse collection of fields: biology, ecology, physics, work of Jeyakumar and Mond in the 1990’s. V-invex gressively. engineering, computer science, economics, psychol- functions are areas in which there has been much in- ogy and sociology, The goal of the conference was to terest because it allows researchers and practitioners Features encourage cross-fertilization between the many dis- to address and provide better solutions to problems The fastest overview of basics you will find anywhere ciplines represented and to deepen understanding of that are nonlinear, multi-objective, fractional, and The focus is on giving detail on the topics people will the properties common to all complex systems. This continuous in nature. Hence, v-invex functions have really want to know about An excellent section on volume contains 43 papers selected from the more permitted work on a whole new class of vector opti- scripting, so that you can go to work on your Mac than 200 presented at the conference. Topics include: mization applications. There has been considerable Interoperability issues and networking are a major cellular automata, neurology, evolution, comput- related work on vector optimization by some high- part of the book Creating and managing web sites er science, network dynamics, and urban planning. ly distinguished researchers including Kuhn, Tuck- is another major topic A basic introduction to pro- About NECSI: For over 10 years, The New England er, Geoffrion, Mangasarian, Von Neuman, Schaiible, gramming for beginners is also included Complex Systems Institute (NECSI) has been instru- Ziemba, etc. The authors will integrate this related mental in the development of complex systems sci- Contents research into the book and demonstrate the wide ence and its applications. NECSI conducts research, Introduction.- Getting to Know Leopard.- What’s context from which the area has grown and contin- education, knowledge dissemination, and communi- New in Leopard.- Interface Basics.- Menu Bar.- The ues to grow. ty development around the world for the promotion Dock.- The Desktop.- The Finder.- The File Sys- of the study [..] tem.- Users and "Home" Folders.- System Folder.- Features The book is a well-synthesized, accessible, and us- Library Folders.- Applications Folder.- Hidden Fold- Contents able treatment of the area for students, researchers ers.- Nifty Leopard Features.- Finding Anything Introduction.- Part I: Methods.- Part II: Models.- and practitioners in OR, optimization, applied math- with Spotlight.- Dashboard Widgets.- Customizing Part III Applications. and Administering Leopard.- Configuring System ematics, and engineering, and their work related to Preferences.-Personal Preferences.- Hardware Pref- Fields of interest a wide range of problems which including financial erences.- Networking Preferences.- System Prefer- Nonlinear Dynamics, Complex Systems, Chaos, institutions, logistics, transportation, traffic manage- ences.- Security.- Utilities and Maintenance.- Back- Neural Networks; Artificial Intelligence (incl. ment, etc. Throughout the optimization community, up and Recovery.- Time Machine.- Communications Robotics); Operation Research/Decision Theory; there is considerable interest in V-invex methods [..] and [..] Game Theory, Economics, Social and Behav. Sci- Contents ences Fields of interest Preface.- General Introduction.- V-Invexity In Non- Operating Systems Target groups linear Multiobjective Programming.- Multiobjec- researchers. tive Fractional Programming.- Multiobjective Non- Target groups smooth Programming.- Composite Multiobjective Intermediate Users of the Mac with possible Type of publication Nonsmooth Programming.- Continuous-Time Pro- PC experience. This book will push the user but the Monograph gramming.- References.- Index. basics are there. People that want to get into depth Fields of interest without the usual dwelling on simple procedures. Due October 2007 Admins and PC users with a good background in Optimization; Calculus of Variations and Optimal computers that have an interest in the Mac for per- Control; Optimization; Operation Research/Decision haps inter-op reasons or who are simply bailing out Jointly published with NECSI Theory; Operations Research, Mathematical Pro- of the PC market. gramming; Technology Management; Mathematical 2007. Approx. 400 p. Hardcover Modeling and Industrial Mathematics Type of publication Professional book 129,95 € Target groups ISBN 978-3-540-73848-0 Graduate students and researchers in applied math- ematics, optimization, OR and statistics - also prac- Due December 2007 titioners in financial institutes, logistics, transporta- tion and traffic management Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Type of publication Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Monograph Oman, Qatar, Palestine: Jordan Book Center Due November 2007 2008. Approx. 600p. Softcover

ISBN 978-1-59059-837-5 2008. Approx. 200 p. (Springer Optimization and Its Applications, Vol. 14) Hardcover

69,95 € ISBN 978-0-387-75445-1 springer.com/booksellers Computer Science 103

A. Miyaji, Japan Advanced Institute of Science and Technology, U. Monatanari, University of Pisa, Italy; D. Sannella, University of B. Moon, University of Arizona, AZ, USA; P.R. Rao, University of Ishikawa, Japan; H. Kikuchi, Tokai University, Kanagawa, Japan; K. Edinburgh, UK; R. Bruni, University of Pisa, Italy (Eds.) Missouri-Kansas City, Missouri, USA Rannenberg, Goethe University Frankfurt, Germany (Eds.) Trustworthy Global Computing XML Indexing and Pattern Matching Advances in Information and Second Symposium, TGC 2006, Lucca, Italy, November 7-9, Computer Security 2006, Revised Selected Papers Second International Workshop on Security, IWSEC 2007, XML Indexing and Pattern Matching introduces is- Nara, Japan, October 29-31, 2007, Proceedings sues and challenges in XML indexing and pattern matching. Since extensible markup language XML This book constitutes the thoroughly refereed post- emerged as a new standard for information repre- proceedings of the Second Symposium on Trustwor- sentation and exchange on the Internet, the prob- thy Global Computing, TGC 2006, held in Lucca, This book constitutes the refereed proceedings of the lem of storing, indexing and querying XML docu- Italy, in November 2006. The 14 revised papers pre- Second International Workshop on Security, IWSEC ments has been among the major issues of database sented together with 2 keynote lectures were careful- 2007, held in Nara, Japan, October 29-31, 2007. The research. As the relationships between elements in ly reviewed and selected from 32 submissions. The 30 revised full papers presented were carefully re- an XML document are defined by nested structures, papers are organized in topical sections on types to viewed and selected from 112 submissions. The pa- XML documents are often modeled as trees whose discipline interactions, calculi for distributed sys- pers are organized in topical sections on Software nodes are labeled with tags. Queries are typically for- tems, flexible modeling, algorithms and systems for and Multimedia security, Public-key cryptography, mulated to retrieve documents by specifying both global computing, as well as security, anonymity and Network security, E-commerce and Voting, Operat- their structures and values in the XPath and XQuery type safety. The book starts off with activity reviews ing systems, Security and Information management, languages. This book also describes state-of-the-art of four FP6 programmes of the European Union: Ae- Anonymity and Privacy and Digital signatures, Hash techniques and provides solutions to the problems olus, Mobius, Sensoria, and Catnets. function and Protocol. that are raised in real-world applications. XML In- dexing and Pattern Matching is structured for re- Fields of interest Fields of interest search scientists and practitioners in industry. The Systems and Data Security; Operating Systems; Man- Software Engineering; Computer Communication book is also suitable for advanced-level students in agement of Computing and Information Systems; Networks; Programming Techniques; Systems and computer science. Computers and Society; Computer Communication Data Security; Programming Languages, Compilers, Interpreters; Logics and Meanings of Programs Networks; Algorithm Analysis and Problem Com- Features plexity Target groups Solves problems encountered in real-world applica- tions Includes fundamental topics and the latest re- Target groups Researchers and professionals search developments in XML and pattern matching Researchers and professionals Type of publication Contents Type of publication Proceedings Preface.- Introduction.- Data and Storage Mod- Proceedings els.- Indexing by Structural Summary.- Labeling Due October 2007 Schemes.- Twig Join Processing.- Sequencing the Due October 2007 Twigs.- XML Filtering.- Index. 2007. X, 339 p. (Lecture Notes in Computer Science, Vol. 4661) Softcover 2007. XIII, 460 p. (Lecture Notes in Computer Science, Vol. 4752) Fields of interest Softcover Database Management; Pattern Recognition; Infor- 52,00 € mation Storage and Retrieval; Information Systems 60,00 € ISBN 978-3-540-75333-9 Applications (incl.Internet); Programming Tech- ISBN 978-3-540-75650-7 niques; Computer Communication Networks

Target groups Research scientists, research libraries, advanced-level students in computer science

Type of publication Monograph

Due April 2008

2008. Approx. 150 p. 20 illus. (Advances in Database Systems, Vol. 40) Hardcover

76,95 € ISBN 978-0-387-30938-5 104 Computer Science springer.com/booksellers

A. Moreno, J. Pavón, Universidad Complutense, Madrid, Spain R. Moreno Díaz, Universidad de Las Palmas de Gran Canaria, L. Moroney, Microsoft; R. Pars, J. Grieb, Long Island, NY, USA (Eds.) Spain; F. Pichler, Johannes Kepler University Linz, Austria; A. Quesada Arencibia, Universidad de Las Palmas de Gran Canaria, Spain (Eds.) Foundations of ASP.NET AJAX Issues in Multi-Agent Systems

The AgentCities.ES Experience Computer Aided Systems Theory - EUROCAST 2007 ASP.NET AJAX (formerly code-named ‘Atlas’) will provide a unified set of development tools within Vi- sual Studio for rapid AJAX application development. The agent paradigm has been a subject of research 11th International Conference on Computer Aided Systems Theory, Las Palmas de Gran Canaria, Spain, February 12-16, For the first time AJAX applications can be devel- for the last years, and the purpose of this book is to 2007, Revised Selected Papers oped seamlessly in conjunction with their support- present current status of this technology by looking ing technologies of ASP.NET, SQL Server and Vi- at its application in different domains, such as elec- sual Studio. This is a break-through that is going to tronic markets, e-tourism, ambience intelligence, have enormous impact on the development world and complex system analysis. It starts by discussing This book constitutes the thoroughly refereed post- – as the success of the first edition of this book has software engineering issues for the development of proceedings of the 11th International Conference on shown. Written by the author and technical review- multi-agent systems, how much it costs to build a Computer Aided Systems Theory, EUROCAST 2007, er of Apress’ successful Foundations of Atlas and multi-agent system, and which methods and tools held in Las Palmas de Gran Canaria, Spain in Febru- Foundations of WPF titles, this book gives readers a are currently available. Next chapters present some ary 2007. The 144 revised full papers presented were deep and detailed grounding in how ASP.NET AJAX of the most relevant aspects that are considered for carefully reviewed and selected for inclusion in the works. It takes readers swiftly through the first prin- the development of multi-agent systems: ubiquitous book. The papers are organized in topical sections cipals of AJAX, and deep into the heart of the tech- computing, learning and planning, trust and secu- on formal approaches, Computation and Simulation nology. By the end of the book readers will know ev- rity, electronic institutions and swarm intelligence. in Modelling Biological Systems, Intelligent Infor- erything that they need to confidently produce cut- Last chapters focus on concrete applications of phys- mation Processing, Computers in Education, Grid ting-edge ASP.NET AJAX applications swiftly and ical agents and e-tourism applications, to illustrate Computing, Applied Formal Verification, Cellular professionally. This book will be based on the final how to integrate the previously discussed aspects. Automata, Computer Vision, Heuristic Problem full release candidate of ASP.NET AJAX as it is [..] The book is written by researchers with experience Solving, Signal Processing Architectures, Robotics and Robotic Soccer, Cybercars and Intelligent Vehi- in technology transfer, and therefore it is oriented to Features cles and Artificial Intelligence Components. practice. One of the first books to cover the final release and Visual Studio integration of this exiting and wide- Features Fields of interest ly-anticipated new web development technology Presents current status of research and application in Simulation and Modeling; Pattern Recognition; from Microsoft Covers the topic from the ground different domains Software engineering issues for the Computer-Aided Engineering (CAD, CAE) and De- up and in great detail. Readers will find everything development of multi-agent systems Gives some of sign; Artificial Intelligence (incl. Robotics); Logics that they need to know within these pages Written the most relevant aspects that are considered for the and Meanings of Programs; Processor Architectures by Laurence Moroney, an ASP.NET AJAX insider, development of multi-agent systems Target groups Microsoft employee, and author of our successful Contents Researchers and professionals Foundations of [..] Introduction.- Agent Oriented Software Engineer- Contents ing.- Ubiquitous computing, mobile environments.- Type of publication Introducing Ajax.- Part #1: The ASP.NET AJAX Cognitive abilities in agents.- Trust and security.- Proceedings 1.0 Release.- ASP.NET AJAX: Taking Ajax to the Physical agents.- Artificial social intelligence in MAS: next level.- ASP.NET AJAX: Making Client- from swarms to electronic institutions.- Agent appli- Due November 2007 side JavaScript easier.- Introducing Client-side con- cations in Tourism. trols.- Using Client-side controls.- Introducing Serv- 2007. Approx. 1220 p. (Lecture Notes in Computer Science, Vol. er Controls.- Using Server Controls.- Part 2: Integra- Fields of interest 4739) Softcover Computer Systems Organization and Communica- tion with Visual Studio 'Orcas'.- Data-binding with- tion Networks; Artificial Intelligence (incl. Robotics); 100,00 € in ASP.NET AJAX.- Using the ASP.NET Toolkit.- Software Engineering/Programming and Operating ISBN 978-3-540-75866-2 Mapping with ASP.NET AJAX.- Building a Sample Systems Application.

Target groups Fields of interest Researchers, computer scientists, IT managers, and Programming Techniques students Target groups Type of publication Intermediate to Advanced ASP.NET Develop- Monograph ers and Migrating web developers from elsewhere. Type of publication Due December 2007 Professional book

2008. Approx. 236 p. (Whitestein Series in Software Agent Tech- Due November 2007 nologies and Autonomic Computing) Softcover

39,90 € Distribution rights for Hongkong, Taiwan, RepKor, Singapore, ISBN 978-3-7643-8542-2 Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center

2007. Approx. 300p. Softcover

ISBN 978-1-59059-828-3 springer.com/booksellers Computer Science 105

C.N. Morris, Harvard University, Cambridge, MA, USA; R. Tibshi- H. Mortveit, Virginia Polytechnic Institute and State University, T. Munakata, Cleveland State University, Cleveland, OH, USA rani, Stanford University, Stanford, CA, USA (Eds.) Blacksburg, VA, USA; C. Reidys, Nankai University, Tianjin, China Fundamentals of the New Artificial Selected Papers of Bradley Efron An Introduction to Sequential Intelligence Dynamical Systems Neural, Evolutionary, Fuzzy and More A collection of journal articles by reknowned statisti- cian Bradley Efron. Sequential Dynamical Systems (SDS) are a class of discrete dynamical systems which significantly gen- This significantly updated 2nd edition thoroughly Features covers the most essential & widely employed Collects the most important papers of Bradley Efron eralize many aspects of systems such as cellular au- tomata, and provide a framework for studying dy- material pertaining to neural networks, genetic al- in one place Adds comments by Efron and other im- gorithms, fuzzy systems, rough sets, & chaos. portant statisticians namical processes over graphs. This text is the first to provide a comprehensive introduction to SDS. Driv- The exposition reveals the core principles, concepts, & technologies in a concise & accessible, Fields of interest en by numerous examples and thought-provoking easy-to-understand manner, & as a result, pre- Statistical Theory and Methods problems, the presentation offers good foundational material on finite discrete dynamical systems which requisites are minimal. Topics & features: Re- Target groups leads systematically to an introduction of SDS. Tech- tains the well-received features of the first edition, Statisticians niques from combinatorics, algebra and graph theo- yet clarifies & expands on the topic Features ry are used to study a broad range of topics, includ- completely new material on simulated annealing, Type of publication ing reversibility, the structure of fixed points and pe- Boltzmann machines, & extended fuzzy if-then Monograph riodic orbits, equivalence, morphisms and reduction. rules tables [NEW] Emphasizes the real-world appli- Unlike other books that concentrate on determining cations derived from this important area of comput- er science Provides easy-to-comprehend descriptions Due June 2008 the structure of various networks, this book investi- gates the dynamics over these networks by focusing & algorithms Integrates all material, yet allows on how the underlying graph structure influences the each chapter to be used or studied independently 2008. Approx. 500 p. (Perspectives in Statistics) Hardcover properties of the associated dynamical system. This This invaluable text & reference is ideal for up- book is aimed at graduate students [..] per-level undergraduates & graduates studying 76,25 € artificial intelligence, soft computing, [..] ISBN 978-0-387-75691-2 Features First graduate textbook on Sequential Dynamical Features Systems Details seminal SDS research toward a gen- No other books emphasize technical fundamentals of eral theory of discrete computer simulations, with newer AI areas New sections, such as that on Boltz- applications developed in government labs Versatile mann Machines, contain easy-to-understand de- interdisciplinary textbook relevant to applied mathe- scriptions and algorithms, following the features on maticians and computer scientists alike the original edition

Contents Contents Preface.- What is a Sequential Dynamical System?- A Introduction.- Neural Networks: Fundamentals and Comparative Study.- Graphs, Groups, and Dynam- the Backpropagation Model.- Neural Networks: Oth- ical Systems.- Sequential Dynamical Systems over er Models.- Genetic Algorithms and Evolutionary Permutations.- Phase-Space Structure of SDS and Computing.- Fuzzy Systems.- Rough Sets.- Chaos Special Systems.- Graphs, Groups, and SDS.- Com- Fields of interest binatorics of Sequential Dynamical Systems over Artificial Intelligence (incl. Robotics); Data Mining Words.- Outlook.- References.- Index. and Knowledge Discovery; Pattern Recognition Fields of interest Target groups Dynamical Systems and Ergodic Theory; Simulation Advanced undergraduates, Graduates and Modeling; Applications of Mathematics; Dis- crete Mathematics in Computer Science Type of publication Undergraduate textbook Target groups Graduate students and researchers in discrete math- ematics, dynamical systems theory, theoretical com- Due December 2007 puter science, specifically computer simulation and network theory and phenomena 2007. Approx. 250 p. (Texts in Computer Science) Hardcover

Type of publication 54,95 € Graduate/advanced undergraduate textbook ISBN 978-1-84628-838-8

Due November 2007

2008. XVI, 248 p. 20 illus. (Universitext) Softcover

46,95 € ISBN 978-0-387-30654-4 106 Computer Science springer.com/booksellers

T. Möller, Simon Fraser University, Burnaby, BC, Canada; B. W.E. Nagel, Dresden University of Technology, Germany; W. S. Nair, Southern Methodist University, Dallas, TX, USA; M. Hamann, University of California, Davis, USA; R. Russell, Simon Jäger, University of Heidelberg, Germany; M. Resch, University of Marchetti, Southern Methodist University, Dallas, TX, USA; J. Fraser University, Burnaby, BC, Canada (Eds.) Stuttgart, Germany (Eds.) Hopkinson, Information and Infrastructure Technologies, Hern- don, VA, USA Mathematical Foundations of High Performance Computing in Scientific Visualization, Computer Science and Engineering ' 07 Enterprise Security Compliance v. Competence Graphics, and Massive Data Transactions of the High Performance Computing Center, Exploration Stuttgart (HLRS) 2007

This book examines dual perspectives of enterprise security, compliance and business continuity, and This book presents the state-of-the-art in simulation Scientific Visualization is one of the most active and offers a pathway to their convergence. Irrespec- on supercomputers. Leading researchers present re- exciting areas of Mathematics and Computing Sci- tive of their sizes, companies are forced to be com- sults achieved on systems of the Stuttgart High Per- ence, and indeed one which is only beginning to ma- plaint to various security standards, to maintain their formance Computing Center (HLRS) for the year ture. Current visualization algorithms break down good standings with government agencies as well as 2007. The reports cover all fields of computation- for very large data sets. While present approaches clients. There is enormous overlap and contradic- al science and engineering, ranging from CFD and use multi-resolution ideas, future data sizes will not tions across the standards and one size does not fit computational physics and chemistry to computer be handled that way. New algorithms based on so- all. The book will provide a comparative discussion science, with a special emphasis on industrially rel- phisticated mathematical modeling techniques must on popular standards and suggest the suitability and evant applications. Presenting results for both vec- be devised which will permit the extraction of high- requirements for various segments in industry and tor-based and microprocessor-based systems, the level topological structures that can be visualized. government. Further, the book will highlight widely book makes it possible to compare the performance For these reasons a workshop was organized at the existent "compliance paralysis" and analyze its etiolo- levels and usability of various architectures. As the Banff International Research Station, focused specifi- gy. While compliance is necessary, the big question is HLRS operates the largest NEC SX-8 vector system cally on mathematical issues. A primary objective of whether it is sufficient to ensure business continuity, in the world, this book gives an excellent insight into the workshop was to gather together a diverse set of often the answer is no. Finally, the book will delin- the potential of such systems. The book further cov- researchers in the mathematical areas relevant to the eate a 7 step process to achieve both compliance and ers the main methods in high performance comput- recent advances in order to discuss the research chal- business continuity as repeatable enterprise charac- ing. Its outstanding results in achieving the highest lenges facing this field in the next several years. The teristics. performance for production codes are of particular workshop was organized into five different thrusts: interest for both scientists and engineers. The book > - Topology and Discrete Methods > - Signal Features comes with a wealth of coloured illustrations and ta- and Geometry Processing > [..] Examines enterprise security, compliance and busi- bles. ness continuity, and offers a pathway to their conver- Fields of interest gence. Provides a comparative discussion on popu- Fields of interest Computational Mathematics and Numerical Analy- lar standards and suggest the suitability and require- Computational Mathematics and Numerical Anal- sis; Mathematics of Computing; Computational Sci- ments for various segments in industry and govern- ysis; Theoretical and Computational Chemistry; ence and Engineering ment. Highlights widely existent "compliance paraly- Mathematics of Computing; Mathematical and sis" and analyze its etiology. Delineates a 7-step pro- Computational Physics Target groups cess to achieve both compliance and business conti- Researchers, lecturers, and graduate students in sci- Target groups nuity [..] entific visualization. Computational scientists Contents Type of publication Type of publication Introduction.- Regulatory Environment.- Standards Proceedings Proceedings Associated with Security Processes.- Five Steps to Se- curity. Due October 2008 Due November 2007 Fields of interest Communications Engineering, Networks; Manage- 2008. Approx. 400 p. (Mathematics and Visualization) Hardcover 2008. Approx. 700 p. Hardcover ment of Computing and Information Systems; Com- 89,95 € puter Communication Networks; Performance and 99,95 € ISBN 978-3-540-25076-0 Reliability; Electronic and Computer Engineering; ISBN 978-3-540-74738-3 Computer Systems Organization and Communica- tion Networks

Target groups Professionals responsible for corporate operations or corporate security Senior executives who want guid- ance establishing, measuring, and monitoring the se- curity profile of external organizations on which they depend, such as suppliers, service providers, or man- ufacturers and developers. Security consultants and Auditors as well as students in an introductory grad- uate course in security process or enterprise security. Researchers engaged in development and revamping of security standards [..]

Type of publication Professional book

Due May 2008

2008. Approx. 250 p. Hardcover

30,80 € ISBN 978-0-387-74434-6 springer.com/booksellers Computer Science 107

K. Namjoshi, T. Yoneda, T. Higashino, Y. Okamura (Eds.) C. Nehaniv, University of Hertfordshire, Hatfield, UK; K. Dauten- K. Newton, Magenic Technologies, Lynwood, IL, USA hahn, University of Hertfordshire, Hatfield, UK Automated Technology for The Definitive Guide to the Verification and Analysis Artificial Life Fundamentals Microsoft Enterprise Library The Simulation and Synthesis of Living Systems 5th International Symposium, ATVA 2007 Tokyo, Japan, Octo- ber 22-25, 2007 Proceedings The Definitive Guide to the Microsoft Enterprise This book is written to be used as a textbook by uni- Library introduces one of the most exciting and versity students for courses in Artificial Intelligence, popular .NET-oriented initiatives; the Enterprise This book constitutes the refereed proceedings of the Artificial Life, Evolutionary Computation, Cogni- Application Library, which offers nine classes of 5th International Symposium on Automated Tech- tive Science, Biology, and other courses which ad- reusable code used to solve a variety of common nology for Verification and Analysis, ATVA 2007, dress issues of modelling and synthesising life-like problem spaces. These problems cover a number held in Tokyo, Japan, October 22-25, 2007. The 29 agents. The book gives a comprehensive overview of of topics, including configuration, data access, ex- revised full papers presented together with 7 short the research field in terms of theory and techniques, ception management, caching, application up- papers were carefully reviewed and selected from 88 so that students can acquire skills necessary to apply dates, UI separation, asynchronous invocation, log- submissions. The papers address theoretical methods techniques of AL. The field Artificial Life is strongly ging, security, and XML-based information aggre- to achieve correct software or hardware systems, in- interdisciplinary. Although the book is focused on gation. Author Keenan Newton, a senior consul- cluding both functional and non functional aspects; realisations of Artificial Life in Computer Science tant for noted Microsoft Partner Magenic (http:// as well as applications of theory in engineering meth- and Artificial Intelligence and Adaptive Systems, www.magenic.com/), begins with an introduction to ods and particular domains and handling of practical when necessary, background from relevant fields like the challenges faced by today’s developers, explain- problems occurring in tools. biology and robotics will be provided. ing the conditions which brought about the creation Fields of interest of this initiative. Following an overview of the Enter- Fields of interest Logics and Meanings of Programs; Information Sys- prise Application Library, subsequent chapters are Artificial Intelligence (incl. Robotics); Computing tems and Communication Service; Computer Com- devoted to detailed introductions to each block, con- Methodologies munication Networks; Special Purpose and Applica- cluding with an overview of the framework available for creating custom application blocks. tion-Based Systems; Software Engineering; Program- Type of publication ming Languages, Compilers, Interpreters Graduate/advanced undergraduate textbook Features Target groups The first book to introduce all ten of the enterprise Researchers and professionals Due January 2008 application blocks, which have been recently updated for .NET 2.0 Build .NET applications faster and more efficiently by taking advantage of readily available Type of publication 2008. Approx. 400 p. Hardcover Proceedings code developed and released by Microsoft's Patterns 45,95 € and Practices group (http://msdn.microsoft.com/ Due October 2007 ISBN 978-3-540-00119-5 practices/) Basing all examples on a theme project involving the development of a point-of-sale [..]

2007. XIV, 566 p. (Lecture Notes in Computer Science, Vol. 4762) Contents Softcover Enterprise Application Architectures.- Introduc- ing the Enterprise Library.- Design of Enterprise Li- 68,00 € brary.- Configuration Application Block.- Data Ac- ISBN 978-3-540-75595-1 cess Application Block.- Caching Application Block.- Exception Handling Application Block.- Logging and Instrumentation Application Block.- Cryptography Application Block.- Security Application Block.- Of- fline Application Block.- Composite UI Application Block.- Creating a Custom Application Block.

Fields of interest Software Engineering

Target groups Intermediate Microsoft .NET developers

Type of publication Professional book

Due December 2007

Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center

2008. Approx. 460 p. Hardcover

ISBN 978-1-59059-655-5 108 Computer Science springer.com/booksellers

M. Nikravesh, University of California, Berkeley, CA, USA; J. M. Nikravesh, University of California, Berkeley, CA, USA; J. E.M. Noam, Columbia Institute for Tele-Information, New York, Kacprzyk, Polish Academy of Sciences, Warsaw, Poland; L.A. Kacprzyk, Polish Academy of Sciences, Warsaw, Poland; L.A. New York, USA; L.M. Pupillo, Telecom Italia, Roma, Italy (Eds.) Zadeh, University of California, Berkeley, CA, USA (Eds.) Zadeh, University of California, Berkeley, CA, USA (Eds.) Peer-to-Peer Video Forging New Frontiers: Fuzzy Forging New Frontiers: Fuzzy The Economics, Policy, and Culture of Today's New Mass Medi- Pioneers I Pioneers II um

The 2005 BISC International Special Event- The 2005 BISC International Special Event- Peer-to-Peer (P2P) networks are comprised of equal BISCSE’05 “Forging the frontiers” was held in the BISCSE’05 “Forging the frontiers” was held in the “nodes” that function as both clients and servers, as University of California, Berkeley, “Where fuzzy log- University of California, Berkeley, “Where fuzzy log- opposed to systems in which data and information ic began”, from November 3-6, 2005. The successful ic began”, from November 3-6, 2005. The successful are managed through centralized servers. The impli- applications of fuzzy logic and it’s rapid growth sug- applications of fuzzy logic and it’s rapid growth sug- cations of this architecture go far beyond the techno- gest that the impact of fuzzy logic will be felt increas- gest that the impact of fuzzy logic will be felt increas- logical realm; the ability of individuals to share dig- ingly in coming years. Fuzzy logic is likely to play an ingly in coming years. Fuzzy logic is likely to play an ital content files, including audio and video mate- especially important role in science and engineering, especially important role in science and engineering, rial, in real time, facilitates communication and, at but eventually its influence may extend much far- but eventually its influence may extend much far- a deeper cultural level, promotes community with- ther. In many ways, fuzzy logic represents a signifi- ther. In many ways, fuzzy logic represents a signifi- out hierarchy or strict control. As Eli Noam, Loren- cant paradigm shift in the aims of computing - a shift cant paradigm shift in the aims of computing - a shift zo Pupillo, and their colleagues demonstrate in this which reflects the fact that the human mind, unlike which reflects the fact that the human mind, unlike timely and incisive volume, P2P has permeated all present day computers, possesses a remarkable abil- present day computers, possesses a remarkable abil- facets of society, from YouTube and music down- ity to store and process information which is perva- ity to store and process information which is perva- loading experiments on college campuses to interna- sively imprecise, uncertain and lacking in categoric- sively imprecise, uncertain and lacking in categoric- tional policy debates over intellectual property rights. ity. The chapters of the book are evolved from pre- ity. The chapters of the book are evolved from pre- Peer-to-Peer Video is the first book to apply eco- sentations made by selected participants at the meet- sentations made by selected participants at the meet- nomic principles to analyze and understand the P2P ing and organized in two books. The papers include ing and organized in two books. The papers include phenomenon, considering such topics as “consumer reports from the different front of soft computing in reports from the different front of soft computing in demand and the commons” and “file sharing and the various industries and address [..] various industries and address [..] copyright crisis.” Moreover, the authors, [..]

Features Features Features Wraps up the state of the art of fuzziness Includes Wraps up the state of the art of fuzziness Includes Hot topic: P2P video is at the nexus of technology, contributions by all the leading scientists in fuzziness contributions by all the leading scientists in fuzziness media, culture, politics, economics, law, and busi- ness today First comprehensive treatment of the top- Contents Contents ic: coverage from multiple points of view, with nu- From the contents Web Intelligence, World Knowl- From the contents Morphic Computing: Quantum merous contemporary examples Combines incisive edge and Fuzzy Logic.- Summarization of Time Se- and Fields.- Decision-Based Query and Question- analysis with discussion of practical implications for ries via Computing with Words and Perceptions.- naire Systems.- Qualitative Possibility Theory in In- business, media/communications management, and Evolution of Fuzzy Logic: From Intelligent Systems formation Processing.- Fuzzy Modeling of Nonlin- intellectual property law Expert contributors on the and Computation to Human Mind.- Pioneers of ear Stochastic Systems by Learning from Examples.- front [..] Vagueness, Haziness, and Fuzziness in the 20th Cen- Conceptual Soft-Computing Based Web Search: FIS- tury.- Selected Results of the Global Survey on Re- CRM, FISS Metasearcher and GUMSe Architecture.- Contents search, Instruction and Development Work with Mediative Fuzzy Logic: A New Approach for Contra- The Economics of User Generated Content and P2P: Fuzzy Systems.- Fuzzy Models and Interpolation.- dictory Knowledge Management.- Fuzzy Cognitive The Commons as the Enabler of Commerce.- Peer- Computing with Antonyms.- Morphic Computing: Maps Structure for Medical Decision Support Sys- to-Peer Media File Sharing: From Copyright Cri- Concept and Foundation.- A Nonlinear Functional tems.- Fuzzy-Neuro Systems for Local and Person- sis to Market?.- The Economics of Peer-to-Peer.- Analytic Framework for Modeling and Processing alized Modeling.- Dynamic Simulation of a Supply The Implications of Video P2P on Network Us- Fuzzy Sets.- [..] Chain with and [..] age.- Peer-to-Peer Video File Sharing: What Can We Learn From Consumer Behavior?.-  Col- Fields of interest Fields of interest lege Students: The Rationale for P2P Video File Shar- Appl.Mathematics/Computational Methods of Engi- Appl.Mathematics/Computational Methods of Engi- ing.- Peer-to-Peer and User-Generated Content: neering; Artificial Intelligence (incl. Robotics) neering; Artificial Intelligence (incl. Robotics) Flash in the Pan or the Arrival of a New Storytelling Paradigm?.- A Survival Analysis of Albums on Rank- Target groups Target groups ing Charts.- Compulsory Licensing vs. Private Nego- Engineers, researchers, and students in fuzziness Engineers, researchers, and students in fuzziness tiations in [..] Type of publication Type of publication Fields of interest Monograph Monograph Media Management; Media Law; Economic Policy; Technology Management Due October 2007 Due October 2007 Target groups 2007. XV, 475 p., 200 illus. (Studies in Fuzziness and Soft Comput- 2007. XVI, 433p.with 177 illus. (Studies in Fuzziness and Soft Professors, researchers, and students of media/com- ing, Vol. 217) Hardcover Computing, Vol. 218) Hardcover munications management, technology, policy, pop- ular culture/current events, intellectual proper- 129,95 € 129,95 € ty/copyright, and economics; professionals ISBN 978-3-540-73181-8 ISBN 978-3-540-73184-9 and consultants in media/communications and relat- ed industries; policymakers and economists special- izing in media, communications, and technology is- sues

Type of publication Collected works

Due March 2008 springer.com/booksellers Computer Science 109

2008. 40 illus. Hardcover

38,50 € ISBN 978-0-387-76449-8 springer.com/booksellers Computer Science 110

S. O'Neill, University of Dundee, UK G. O'Regan, Cork, Ireland I. Oakley, S. Brewster (Eds.)

Interactive Media: The Semiotics of A Brief History of Computing Haptic and Audio Interaction Embodied Interaction Design

Second International Workshop, HAID 2007 Seoul, South Ko- This book provides an introduction into the key top- rea, November 29-30, 2007 Proceedings ics in the history of computing in an easy-to-fol- The author discusses the existing theoretical ap- low and concise manner. It covers significant areas proaches of semiotically informed research in HCI, and events in the field from the beginnings of com- what is useful and the limitations. He proposes a rad- putation 3000B.C. through to the present day. Fea- This book constitutes the refereed proceedings of the ical rethink to this approach through a re-evaluation tures Offers detailed information on major figures Second International Workshop on Haptic and Au- of important semiotic concepts and applied semiotic in computing, such as Boole, Babbage, Shannon , dio Interaction Design, HAID 2007 held in Seoul, methods. Using a semiotic model of interaction he Turing & Von Neumann Includes a history of South Korea, in November 2007. The 12 revised full explores this concept through several studies that programming languages, including syntax & se- papers presented together with 2 invited talks were help to develop his argument. He concludes that this mantics Presents a history of software engineering carefully reviewed and selected for inclusion in the semiotics of interaction is more appropriate than Discusses the progress of artificial intelligence, with book. The papers are organized in topical sections on other versions because it focuses on the characteris- extension to some of the key disciplines in this field, tactile displays, communication and games, accessi- tics of interactive media as they are experienced and such as philosophy, psychology, linguistics, neural bility and navigation, as well as design. the way in which users make sense of them rather networks & cybernetic Examines the history of than thinking about interface design or usability is- the Internet revolution, World Wide Web & Fields of interest sues. Dot Com Bubble Shows the evolution of a number of User Interfaces and Human Computer Interaction; Information Storage and Retrieval; Information Sys- Features technology companies such as IBM, Motorola & tems Applications (incl.Internet); Computers and Offers a different view of interaction from that of Microsoft Focusing on the fundamental areas in the Society; Computers and Education most HCI experts. computing field, this clearly written & broad- ranging text will catch the attention [..] Target groups Contents Researchers and professionals Section 1.- Introduction.- Medium, Mediation and Features Offers a comprehensive account of the history of Interactive Media.- Approaching Interaction.- Af- Type of publication computing Traces the beginnings of computation fordance: A Case of Confusion.- Section 2.- Semi- Proceedings otic Theory.- Semiotics and Screen Based Interac- 3000 B.C. through to modern times Includes helpful tion.- Study 1: Comparing Interactions with Old pedagogical elements such as exercises and chapter Due November 2007 and New Media.- Semiotics and Interactive Environ- summaries Does not require studies in computer sci- ments.- Study 2: Comparing Real and Virtual Envi- ence in order to be understood and appreciated ronments.- Section 3.- Being-with-Media.- Embod- 2007. XIV, 145 p. Also available online. (Lecture Notes in Comput- Contents ied Semiotics.- Interactive Media Design.- Conclu- er Science, Vol. 4813) Softcover From the Contents: Early Civilisations.- The Babylo- sion.- References nians.- The Egyptians.- The Greeks.- The Romans.- 42,00 € Fields of interest Foundations.- Boole.- Babbage.- Formalism.- Tur- ISBN 978-3-540-76701-5 Multimedia Information Systems; User Interfaces ing.- Shannon.- Von Neumann.- Hermann Zuse.- and Human Computer Interaction; Media Design Computer Programming Languages.- Object-ori- ented Languages.- Functional Programming Lan- Target groups guages.- Logic Programming Languages.- Syntax and Researchers in Semiotics or HCI Semantics.- Software Engineering.- What is Software Engineering?.- Early Software Engineering.- Soft- Type of publication ware Engineering Mathematics.- Formal Methods.- Monograph Software Inspections and Testing.- Artificial Intelli- gence and Expert Systems.- Descartes.- Philosophy Due June 2008 and AI.- [..] Fields of interest 2008. Approx. 250 p. Softcover History of Computing; Popular Science in Mathe- matics/Natural Science/Technology; History of Sci- 59,95 € ence ISBN 978-1-84800-035-3 Target groups Undergraduates, Graduates, General readers

Type of publication Undergraduate textbook

Due April 2008

2008. Approx. 250 p. Hardcover

22,95 € ISBN 978-1-84800-083-4 springer.com/booksellers Computer Science 111

M.R. Ogiela, AGH University, Krakow, Poland; R. Tadeusiewicz, J.A. Onieva, University of Malaga, Spain; J. Lopez, University of L. Orozco-Barbosa, Universidad de Castilla-La Mancha, Spain; T. AGH University, Krakow, Poland Malaga, Spain; J. Zhou, Institute for Infocomm Research , Singa- Olivares, Universidad de Castilla-La Mancha, Spain; R. Casado, pore Universidad de Castilla-La Mancha, Spain; A. Bermúdez, Universi- dad de Castilla-La Mancha, Spain (Eds.) Modern Computational Intelligence Secure Multi-Party Non- Methods for the Interpretation of Wireless Sensor and Actor Networks Medical Images Repudiation Protocols and Applications IFIP WG 6.8 First International Conference on Wireless Sensor and Actor Networks, WSAN'07, Albacete, Spain, September 24-26, 2007 A detailed description of up-to-date methods used for computer processing and interpretation of med- Research oriented non-repudiation protocols have ical images is given. The scope of the book include been active since the beginning of this millennium. images acquisition, storing with compression, pro- It is time to take a step forward and realize Features cessing, analysis, recognition and also its automatic that in many applications there are more than two "Most up-to-date research on wireless communica- understanding In introduction general overview of entities. Secure Multi-Party Non-Repudiation Pro- tions" the computer vision methods designed for medical tocols and Applications supports this statement. images is presented. Next sources of medical images This volume provides state of the art Contents are presented with their general characteristics. Both in non-repudiation protocols and gives insight of its Localized Movement Control for Fault Tolerance of traditional (like X-ray) and very modern (like PET) applicability to e-commerce applications. This pro- Mobile Robot Network.- An Action Activated and sources of medical images are presented. The main fessional book organizes the existing scant literature Self Powered Wireless Forest Fire Detector.- Mod- emphasis is placed on such properties of medical im- regarding non-repudiation protocols with multiple el Checking Wirelss Sensor Network Security Pro- ages given by particular medical imaging methods entities participation. It provides the reader with suf- tocols: TinySec + LEAP.- Eva;luating Energy Con- which are important form the point of view of its ficient grounds to understand the non-repudiation sumption of Proactive and Reacitve Routing Proto- computer processing, analysis and recognition. The property and its applicability to real applications. Se- cols in a MANET.- Wireless Sensor Network Local- consecutive parts of the book describe compression cure Multi-Party Non-Repudiation Protocols and ization using Hexagonal Intersection.- A Hardware and processing methods, including many methods Applications is essential for professional audiences Accelerated Implementation of the IEEE 802.15.3 developed by authors especially for medical images. with in-depth knowledge of information security MAC Protocol.- After parts describing analysis and recognition of and a basic knowledge of applied cryptography. This medical images come most important part, in which book is also suitable as an advanced-level text or ref- Fields of interest [..] erence book for students in computer science. Computer Systems Organization and Communica- tion Networks Features Features Examines the processing, analyzing, classifying, rec- Security professionals will find this book very useful Target groups ognizing and automatically interpreting medical im- in the design of secure applications with multiple en- Researchers and practitioners of wireless communi- ages tities, helping them to envisage the basics of multi- cations. party non-repudiation. Useful as an advanced lev- Contents el text book for students or researchers, who wish to Type of publication Sources of medical images and their general char- understand the non-repudiation service and mech- Proceedings acteristics.- Compressing medical images and stor- anisms in the presence of an undefined number of ing them in medical databases.- Preprocessing med- players.   Due October 2007 ical images and their overall enhancement.- Algo- Contents rithms and methods for the goal-oriented process- 2007. XIV, 240 p. (IFIP International Federation for Information ing of medical images.- Pattern recognition, cluster- -Preface.- Introduction.- Introduction to E-com- Processing, Vol. 248) Hardcover ing and classification applied to selected medical im- merce.- Multi-party Non-Repudiation Protocols: ages.- Automatic understanding of medical images Analysis.- New Design Approaches for MNR.- Mul- 108,00 € as a new paradigm for advanced computer aiding of ti-Party Non-Repudiation and Its Applications.- Sce- ISBN 978-0-387-74898-6 medical investigations.- Image understanding meth- narios Supported by MNR Services.- Index. ods applied to medical diagnostics. Fields of interest Fields of interest Systems and Data Security; Computer Communica- Appl.Mathematics/Computational Methods of Engi- tion Networks; Data Encryption; Information Sys- neering; Artificial Intelligence (incl. Robotics) tems Applications (incl.Internet); Computer Systems Organization and Communication Networks; Data Target groups Structures, Cryptology and Information Theory Engineers, researchers, and students in computation- al intelligence and medical technology Target groups Professional; secondary:  textbook Type of publication Monograph Type of publication Monograph Due January 2008 Due May 2008

2008. Approx. 210 p. (Studies in Computational Intelligence, Vol. 84) Hardcover 2008. Approx. 200 p. (Advances in Information Security, Vol. 38) Hardcover 99,95 € ISBN 978-3-540-75399-5 92,40 € ISBN 978-0-387-75629-5 112 Computer Science springer.com/booksellers

M. Orshansky, University of Texas at Austin, Austin, TX, USA; S. P. Pandya, California State University, Fullerton, CA, USA M. Papadopouli, University of North Carolina, Chapel Hill, NC, Nassif, IBM, Austin, TX, USA; D. Boning, MIT, Cambridge, MA, USA USA; H. Schulzrinne, Columbia University, NY, USA TCP/IP: Vulnerabilities and Design for Manufacturability and Solutions Peer-to-Peer Computing for Mobile Statistical Design Networks

A Constructive Approach Information Discovery and Dissemination “TCP/IP Vulnerabilities and Solutions” is writ- ten as a practical guide for networking engineers that demonstrates the vulnerabilities in the TCP/ Design for Manufacturability and Statistical Design: Wireless devices are becoming smaller, more us- IP protocols and offers hands-on solutions and A Constructive Approach provides a thorough treat- er-friendly and more pervasive. Peer-to-Peer Com- workarounds for these vulnerabilities. The book be- ment of the causes of variability, methods for statisti- puting for Mobile Networks: Information Discov- gins with a discussion of the principles and design of cal data characterization, and techniques for model- ery and Dissemination discusses research results on TCP/IP Protocols from the data networks perspec- ing, analysis, and optimization of integrated circuits data dissemination in mobile networks and peer- tive and continues with a detailed look at the vulner- to improve yield. The objective of the constructive to-peer systems for mobile devices. An important abilities thus introduced in the network design pro- approach developed in this book is to formulate a research challenge within this book is to accelerate cess and concludes with advanced level experiments consistent set of methods and principles necessary the data availability and enhance the dissemination that show how these vulnerabilities can be easily ex- for rigorous statistical design and design for manu- and discovery of information when mobile hosts face ploited and offers practical hands-on solutions. facturability from device physics to large-scale circuit changes in the availability of bandwidth and loss of optimization. The segments of the book are devoted, Features connectivity to the Internet. The main focus of this respectively, to understanding the causes of variabil- Demonstrates the vulnerabilities of a network using book is a novel resource-sharing mechanism for mo- ity; design of test structures for variability characteri- hands-on practical examples Introduces the reader bile devices, which introduces a new paradigm of in- zation; statistically rigorous data analysis; techniques to hacking techniques that are used and how these formation-sharing cooperation among mobile de- of design for manufacturability in lithography and in techniques can be used to exploit the network. Shows vices not necessarily connected to the internet. Peer- chemical mechanical polishing; statistical simulation, how to perform a network penetration and vulnera- to-Peer Computing for Mobile Networks: Informa- analysis, and optimization techniques for improving bility assessment and repair critical security holes in tion Discovery and Dissemination is designed for re- parametric yield. Design for Manufacturability and the network searchers and practitioners in industry. The book is Statistical Design: A Constructive Approach [..] also suitable for advanced-level students in computer Contents science and electrical engineering. Features Introduction: IDS and IPS.- NOS.- Protocols.- IDS Unified Treatment of Data Collection, Modeling, Tools- Network Monitoring.- Host and Network Features and Statistical CAD Covers From Fabrication to De- IDS.- Network Penetration and Vulnerability Assess- Introduces a resource sharing mechanism, includ- sign to CAD Deals With the Extraction of Fab Infor- ment.- Signatures.- Honeypots.- Report Logging.- ing architecture, set of protocols and implementation mation into distrubutions for analysis Circuit Struc- Report Generation and Preparation.- Audit. that enables mobile devices to share resources to en- tures and Techniques to Reduce On-Chip Variabili- hance data availability and access Presents exciting ty Using CAD for the Analysis and Optimization of Fields of interest research challenges on peer-to-peer systems, loca- Timing and Power Computer Communication Networks; Communica- tion-dependent applications, and mobile computing tions Engineering, Networks; Input/Output and Data Contents Communications Contents Introduction.- Part I: Sources of Variability.- Front Preface.- Introduction.- System Architecture for In- End Variability.- Back End Variability.- Environ- Target groups formation Sharing.- Performance Evaluation of In- mental Variability.- Part II: Variability Characteriza- Libraries, computer engineers, network engineers, formation Dissemination.- Analysis of Data Dissem- tion and Analysis.- Test Structures for Variability.- computer scientists ination.- Evaluating the Spatial Locality in Wireless Statistical Foundations of Data Analysis and Mod- Networks.- Network Connection Sharing in Wireless eling.- Part III: Design Techniques for Systematic Type of publication LANs.- Future Work.- Index. Manufacturability Problems.- Lithography Enhance- Professional book ment Techniques.- Ensuring Interconnect Planarity.- Fields of interest Computer Communication Networks; Information Part IV: Statistical Circuit Design.- Statistical Circuit Due August 2008 Analysis.- Statistical Static Timing Analysis.- Leakage Systems Applications (incl.Internet); Computer Sys- Variability and Joint Parametric Yield.- Parametric tems Organization and Communication Networks; Yield [..] 2008. Approx. 500 p. Hardcover Communications Engineering, Networks; Multi- media Information Systems; e-business and e-com- Fields of interest 76,25 € merce Circuits and Systems; Computer-Aided Engineering ISBN 978-0-387-47328-4 (CAD, CAE) and Design; Electronic and Computer Target groups Engineering Researchers and practitioners in industry

Target groups Type of publication Circuit Designers, CAD engineers, researchers, grad- Monograph uate students Due December 2007 Type of publication Monograph 2008. Approx. 160 p. 30 illus. Hardcover

Due November 2007 64,95 € ISBN 978-0-387-24427-3 2008. Approx. 336 p. (Series on Integrated Circuits and Systems) Hardcover

99,95 € ISBN 978-0-387-30928-6 springer.com/booksellers Computer Science 113

P.J. Papajorgji, University of Florida, Gainesville, FL, USA; P.M. P.M. Pardalos, University of Florida, Gainesville, FL, USA; V. Yat- 69,30 € Pardalos, University of Florida, Gainesville, FL, USA (Eds.) senko, NASU, Kyiv, Ukraine ISBN 978-0-387-73668-6 Advances in Modeling Agricultural Optimization and Control of Systems Bilinear Systems

Theory, Algorithms, and Applications

This book presents an up-to-date review of advances in the mathematical modeling of agricultural sys- The purpose of this book is to acquaint the read- tems. It covers a broad spectrum of problems and er with the developments in bilinear systems the- applications based on internet and communications ory and its applications. Bilinear systems technology, as well as methodological approaches can be used to represent a wide range of physical, based on the integration of different simulation and chemical, biological, and social systems, as well data management tools. Using real-world cases, each as manufacturing processes, which cannot be ef- chapter presents a detailed solution of a problem in a fectively modeled under the assumption of lin- particular field. This book demonstrates that regard- earity. This book provides a unified approach for less of the nature of the problem and the application the identification and control of nonlinear com- domain, modeling is a central and important activity plex objects that can be transformed into bi- in the process of developing agricultural systems. Re- linear systems, with a focus on the control searchers and graduate students in the fields of agri- of open physical processes functioning in a non- culture and environmental studies will benefit from equilibrium mode.  A wide class of this book. It will also serve as an excellent reference non-linear control systems can be approximat- for managers, team leaders, developers and model- ed using novel algorithms motivated by bilinear ers of agricultural and environmental systems and models. The goal of this book is to describe researchers in the applied computation field. new methods, heuristics, and optimality criteria Features with less demanding computational Presents an up-to-date review of advances in the complexity than exact criteria that re- mathematical modeling of agricultural systems Cov- sult in robust adaptive algorithms. Emphasis is ers a broad spectrum of problems and applications placed on three primary disciplines [..] based on internet and communications technology Features Uses methodological approaches based on the inte- Covers developments in bilinear systems the- gration of different simulation and data management ory Focuses on the control of open physical tools Provides detailed solutions of real-world prob- processes functioning in a non-equilibrium mode lems Emphasis is on three primary disciplines: Contents modern differential geometry, control of dynamical Introduction.- Business Modelling of Networked systems, and optimization theory Includes applica- Supply Chain Systems in Agriculture.- Modelling tions to the fields of quantum and molecular External Information Needs of Agri-Food Business computing, control of physical processes, biophysics, Networks.- Rural Development Through Input-Out- [..] put Modelling.- Web Services, a Renewal of Deci- Contents sion Support Systems in Agricultural?- Modelling Preface.- Acknowledgments.- Introduction.- Sys- Traceability Information and Data in the Agri-Food tem-Theoretical Description of Open Physical Pro- Chain.- The Model Driven Architecture (MDA) Ap- cesses.- Control of Bilinear Systems.- Bilinear Sys- proach: A Framework for Developing Complex Agri- tems and Nonlinear Estimation Theory.- Control of cultural Systems.- An MDA Approach to Crop Simu- Dynamical Processes and Geometrical Structures.- lation Models.- Mechanistic Virtual Modelling: Cou- Superconducting Levitation and Bilinear Systems.- pling a Plant Simulation Model with a Three-Dimen- Optimization and Control of Quantum-Mechanical sional Simulation [..] Processes.- Modeling and Global Optimization in Fields of interest Biomolecular Systems.- Modeling and Analysis of Bi- Computational Science and Engineering; Simulation linear Systems.- References.- Index. and Modeling; Environmental Computing/Environ- Fields of interest mental Modelling; Computer Appl. in Life Sciences; Optimization; Systems Theory, Control; Calculus Information Systems; Software Engineering of Variations and Optimal Control; Optimization; Target groups Vibration, Dynamical Systems, Control; Quantum Researchers and modelers of agricultural and envi- Computing, Information and Physics; Automation ronmental systems, software developers in agricul- and Robotics ture, researchers in applied computation; managers Target groups and team leaders in agriculture. Graduate students, researchers, and specialists en- Type of publication gaged in the fields of quantum and molecular com- Contributed volume puting, control of physical processes, biophysics, su- perconducting magnetism, and physical information science Due May 2008 Type of publication 2008. Approx. 310 p. (Springer Optimization and Its Applications, Monograph Preliminary entry 160) Hardcover Due March 2008 ISBN 978-0-387-75180-1

2008. XXII, 394 p. 40 illus. (Springer Optimization and Its Applica- tions, Vol. 11) Hardcover 114 Computer Science springer.com/booksellers

C. Parent, University of Lausanne, Switzerland; K.-D. Schewe, A.P. Parkes A. Paschke, Technical University Dresden, Germany; Y. Biletskiy, Massey University, New Zealand; V.C. Storey, Georgia State Uni- University of New Brunswick, Fredericton, NB, Canada (Eds.) versity, GA, USA; B. Thalheim, University of Kiel, Germany (Eds.) A Concise Introduction to Languages, Machines and Logic Advances in Rule Interchange and Conceptual Modeling - ER 2007 Applications 26th International Conference on Conceptual Modeling, Auck- land, New Zealand, November 5-9, 2007, Proceedings International Symposium, RuleML 2007, Orlando, Florida, Oc- A Concise Introduction to Languages, Machines tober 25-26, 2007, Proceedings and Logic provides an accessible introduction to three key topics within computer science: formal lan- This book constitutes the refereed proceedings of the guages, abstract machines and formal logic. Written This book constitutes the refereed proceedings of 26th International Conference on Conceptual Mod- in an easy-to-read, informal style, this textbook as- the International RuleML Symposium on Rule In- eling, ER 2007, held in Auckland, New Zealand, in sumes only a basic knowledge of programming on terchange and Applications, RuleML 2007, held in November 2007. The 37 revised full papers present- the part of the reader. The approach is deliberately Orlando, Florida, October 25-26, 2007. The 9 re- ed together with 3 keynote lectures were carefully re- non-mathematical, and features: • Clear explanations vised full papers presented together with 2 invited viewed and selected from 167 submissions. The pa- of formal notation and jargon • Extensive use of ex- papers, 9 short papers and 3 demo papers were care- pers are organized in topical sections on data ware- amples to illustrate algorithms and proofs • Pictori- fully reviewed and selected from 41 submissions. housing and data mining, design methodologies and al representations of key concepts • Chapter open- The papers are organized in topical sections on Busi- tools, information and database integration, infor- ing overviews providing an introduction and guid- ness Process, Policy and IT Service Management and mation modelling concepts and ontologies, integrity ance to each topic • End-of-chapter exercises and so- Modeling, Rule Languages and Interchange Stan- constraints, logical foundations of conceptual mod- lutions • Offers an intuitive approach to the topics dards, Business Rules, Rule Engines and Applica- elling, patterns and conceptual meta-modelling, re- This reader-friendly textbook has been written with tions, RuleML-2007 Challenge, Rules, Reasoning, quirements elicitation, reuse and reengineering, se- undergraduates in mind and will be suitable for use and Ontologies and Reaction Rules and Rule Appli- mi-structured data and XML, as well as Web infor- on course covering formal languages, formal logic, cations. mation systems and XML. computability and automata theory. It will also make an excellent supplementary text for courses on algo- Fields of interest Fields of interest rithm complexity and compilers. Information Systems and Communication Service; Database Management; Information Systems Ap- Data Mining and Knowledge Discovery; Models and plications (incl.Internet); Mathematical Logic and Features Principles; Software Engineering; Logics and Mean- Formal Languages; Artificial Intelligence (incl. The author follows the successful formula of his first ings of Programs Robotics); Models and Principles; Software Engi- book on this subject, this time making the topics neering more accessible and providing an excellent founda- Target groups tion for undergraduates Uses an intuitive approach Researchers and professionals Target groups Contains many pedagogical elements, such as exer- Researchers and professionals cises, solutions and chapter summaries Type of publication Proceedings Type of publication Contents Proceedings From the Contents: Languages.- Elements of For- Due October 2007 mal Languages.- Phrase Structure Grammars and the Due October 2007 Chomsky Hierarchy.- A Type 0 Grammar: Compu- tation as Symbol Manipulation.- Syntax, Semantics 2007. XI, 243 p. (Lecture Notes in Computer Science, Vol. 4824) Softcover 2008. XVI, 616 p. (Lecture Notes in Computer Science, Vol. 4801) and Ambiguity.- Derivation Trees.- Parsing.- Reg- Softcover ular Languages and Finite State Recognisers.- Reg- 45,00 € ular Grammars.- Minimal FSRs.- Observations on ISBN 978-3-540-75974-4 72,00 € Regular Grammars and Languages.- Context Free ISBN 978-3-540-75562-3 Languages and Pushdown Recognisers.- Changing G without Changing L(G).- Important Features of Reg- ular and Context Free Languages.- Closure Proper- ties of Languages.- Computation.- A "Computer" for Languages and [..]

Fields of interest Mathematical Logic and Formal Languages; Compu- tation by Abstract Devices; Theory of Computation; Computational Mathematics and Numerical Analy- sis

Target groups Undergraduates  

Type of publication Graduate/advanced undergraduate textbook

Due August 2008

2008. Approx. 305 p. (Undergraduate Topics in Computer Sci- ence) Softcover

26,95 € ISBN 978-1-84800-120-6 springer.com/booksellers Computer Science 115

M. Pechoucek, Czech Technical University, Praha, Czech Republic; M. Pedridis, Stratum Management Ltd, UK; T. Allen, Nottingham J. Pejas, Szczecin University of Technology, Poland; K. Saeed, Bia- S.G. Thompson, BT, Research and Venturing, Suffolk, UK; H. Voos, Trent University, Nottingham, UK; M. Petridis, Greenwich Univer- lystok Technical University, Poland (Eds.) Hochschule Ravensburg-Weingarten, Germany (Eds.) sity, London, UK (Eds.) Advances in Information Processing Defense Industry Applications of Applications and Innovations in and Protection Autonomous Agents and Multi- Intelligent Systems XV

Agent Systems Proceedings of AI-2007, the Twenty-seventh SGAI Internation- al Conference on Innovative Techniques and Applications of This book contains a selection of the best papers giv- Artificial Intelligence en at the Advanced Computer Systems Conference In all modern military doctrines the mission effec- in October 2006 in Poland. The book is partitioned tiveness shall be dramatically increased by the robust into four topical areas: The Artificial Intelligence sec- networking of all forces, sharing of information and The papers in this volume are the refereed applica- tion includes papers on Humatronics, Fuzzy Logic, distributed intelligent information processing, gen- tion papers presented at AI-2007, the Twenty-sev- Robotics, Cell, Genetic and Probabilistic Algorithms, erating situational awareness and providing decision enth SGAI International Conference on Innovative Incomplete Data and Similarity Relations, and Fast support. In addition, these principles also offer an ef- Techniques and Applications of Artificial Intelli- Neural Networks. The Computer Security and Safe- fective way to improve security systems that support gence, held in Cambridge in December 2007. The ty section covers a wide range of issues, from Error the fight against terrorists and organized crime. In- papers present new and innovative developments in Detection in Block Ciphers to Visual Cryptography telligent Agents are a key technology to realize such the field, divided into sections on Synthesis and Pre- Methods. The Image Analysis, Graphics and Bio- modern defence and security systems and are there- diction, Scheduling and Search, Diagnosis and Mon- metrics section deals with the extraction of meaning- fore increasingly investigated by researchers and itoring, Classification and Design, and Analysis and ful information from images as well as methods for practioners in that field. Papers in this book describe Evaluation. This is the fifteenth volume in the Appli- uniquely recognizing humans based upon intrinsic work in the development of command and control cations and Innovations series. The series serves as a physical or behavioral traits. The Computer Simula- systems, military communications systems, informa- key reference on the use of AI Technology to enable tion and Data Analysis section concerns computer tion systems, surveillance systems, autonomous ve- organisations to solve complex problems and gain programs that attempt to simulate an abstract mod- hicles, simulators and HCI. The collection provides significant business benefits. The Technical Stream el of a particular system and transform data with the an overview of the most significant work being per- papers are published as a companion volume under aim of extracting useful information and facilitating formed by the leading workers in this area. It pro- the title Research and Development in Intelligent conclusions. vides a single reference point for the state of the art Systems XXIV. Features in the field at the moment. Contents Combines the very latest research from both Com- Features From the Contents:Best Application Paper: On a puter Science and Industrial Management, focusing Overview of the most significant work being per- Novel ACO-Estimator and its Application to the on Biometrics and Information Technology Security formed by the leading workers in this area for the Target Motion Analysis Problem.- Medical Systems: Covers wide range of topics in well-organized topical first time Valuable decision support for planners and Clinical Practice Guidelines: a Case Study of Com- areas strategists Broad nature of the application domain bining OWL-S, OWL, and SWRL.- Explaining Medi- Contents is matched by the diversity of techniques used in the cal Model Exceptions in ISOR.- HCI & Natural Humatronics and RT-Middleware.- The Grouping papers Language Systems: CALMsystem A Conversational Agent for learner Modelling.-Imaging & Sens- of Valuations in Probabilistic Algorithms.- Hybrid Contents ing Systems: Automated Tool For Diagnosis of Si- Diagnosis Approaches.- Networked Robots Personal Nexus: Self-organising Agent-based P2P Middleware nus Analysis CT Scans.- Intensity-Based Image Reg- Tastes Acquisition and Sharing.- Reduction of Rules for Battlespace Support.- Information-Based Control istration Using Multiple Distributed Agents.-Deci- of a Fuzzy Model Response for Fuzzy Inputs.- Multi- of Distributed Sensor Networks.- Managing Intelli- sion Support Systems: Police Forensic Science Per- ple Error Detection in Substitution Blocks for Block gence Resources Using Semantic Matchmaking and formance Indicators [..] Ciphers.- Automatic Parallelization Method of En- Argumentation.- AGENTFLY: Multi-Agent Tech- cryption Algorithms.- Covert Channel for Improv- nology Deployment in Free Flight Air Traffic Con- Fields of interest ing VOIP Security.- Cryptanalysis of Chaotic Prod- trol.- Controlling Teams of Uninhabited Air Vehi- Artificial Intelligence (incl. Robotics) uct Cipher.- Image Pre-classification for Biometrics cles.- Simulating Fighter Pilots.- MAS Combat Sim- Identification Systems.- New Experiments on Word ulation.- Using Multiagent Teams to Improve the Target groups Recognition Without Segmentation.- Reliability [..] Training of Incident. Researchers, Practitioners, Undergraduates/Post- graduates, Academics Fields of interest Fields of interest Coding and Information Theory; Data Structures, Artificial Intelligence (incl. Robotics); Comput- Type of publication Cryptology and Information Theory; Systems and ers and Society; Information Systems Applica- Proceedings Data Security tions (incl.Internet); Special Purpose and Applica- Target groups tion-Based Systems; Computer Appl. in Social and Due January 2008 Researchers in the fields of computer security and Behavioral Sciences biometrics, as well as information processing and 2008. Approx. 360 p. Softcover Target groups operations professionals Planners, strategists and software professionals 119,00 € Type of publication working in defence and/or security industries, orga- ISBN 978-1-84800-085-8 Proceedings nizations, ministries and departments, as well as aca- demics and students of computer science Due November 2007 Type of publication Collected works 2007. XIV, 460 p. Hardcover

Due December 2007 129,95 € ISBN 978-0-387-73136-0

2008. Approx. 180 p. (Whitestein Series in Software Agent Tech- nologies and Autonomic Computing) Softcover

34,90 € ISBN 978-3-7643-8570-5 116 Computer Science springer.com/booksellers

P. Perner, IBal, Leipzig, Germany; O. Salvetti, ISTI-CNR, Pisa, Italy P. Perner, Institute of Computer Vision and Applied Computer A. Perrig, Carnegie Mellon University, Pittsburgh, PA, USA; K. (Eds.) Sciences IBaI, Leipzig, Germany (Ed.) Levitt, University of California, Davis, CA, USA; C. Wang, Army Re- search Office, Research Triangle Park, NC, USA; R. Poovendran, University of Washington, Seattle, WA, USA (Eds.) Advances in Mass Data Analysis of Case-Based Reasoning on Images Signals and Images in Medicine, and Signals Securing Wireless Sensor Networks Biotechnology and Chemistry

International Conference, MDA 2007, Leipzig, Germany, July 18, 2007, Selected Papers This book is the first edited book that deals with the We need to provide secure sensor network protocols special topic of signals and images within Case-Based of the utmost reliability and resilience to attacks. Se- Reasoning (CBR). Signal-interpreting systems are curity, robustness and accuracy are three systemic becoming increasingly popular in medical, industri- parameters that must be achieved. Apart from these, This book constitutes the refereed proceedings of the al, ecological, biotechnological and many other ap- due to the resource-constrained nature of the sensor International Conference on Mass Data Analysis of plications. Existing statistical and knowledge-based devices, the solutions to be obtained must also be re- Signals and Images in Medicine, Biotechnology and techniques lack robustness, accuracy and flexibility. source-efficient. Securing Wireless Sensor Networks Chemistry, MDA 2007, held in Leipzig, Germany, New strategies are needed that can adapt to chang- is based on the 2006 ARO-NSF-Cylab special work- July 18, 2007. The topics include techniques and de- ing environmental conditions, signal variation, user shop on WSN (Wireless Sensor Networks) Securi- velopments of signal and image producing proce- needs and process requirements. Introducing CBR ty and Privacy. This edited volume presents and dis- dures, object matching and object tracking in micro- strategies into signal-interpreting systems can satisfy cusses fundamental problems and solutions in secur- scopic and video microscopic images, 1D, 2D and 3D these requirements. CBR can be used to control the ing wireless sensor networks. Designed for industry shape analysis, description and feature extraction of signal-processing process in all phases of a signal-in- practitioners and researchers, Securing Wireless Sen- texture, structure and location, image segmentation terpreting system to derive information of the high- sor Networks is also suitable for advanced-level stu- algorithms, parallelization of image analysis and se- est possible quality. Beyond this CBR offers different dents in computer science and electrical engineering. mantic tagging of images from life science applica- learning capabilities, for all phases of a signal-inter- tions. preting system, that satisfy different needs during the Features development process of a signal-interpreting system. Presents latest research on securing wireless sensor Fields of interest The structure of the book is divided into a theoretical networks Computer Imaging, Vision, Pattern Recognition and part and [..] Graphics; Image Processing and Computer Vision; Contents Computational Biology/Bioinformatics; Data Mining Features Preface.- Data Privacy in Ad hoc Networks .- Paris: and Knowledge Discovery First edited book that deals with the special topic of A Framework for Privacy Augmented Relaying of signals and images within Case-Based Reasoning Information from Sensors.- Sensor Networking, In- Target groups (CBR) frastructure Security, and the Issue of Privacy.- WSN Researchers and professionals Key Management.- ShortPK: A Short-Term Public Contents Key Scheme for Broadcast Authentication in Sen- Type of publication Theory.- Introduction to Case-Based Reasoning.- Proceedings sor Networks.- WSN Broadcast Authentication.- A Similarity.- Learning Distance Functions for Su- Canonical Framework for Assignment Processes.- pervised Similarity Assessment.- Induction of sim- WSN Architecture.- A New Adaptive Self-healing Due November 2007 ilarity measures for case based reasoning through Architecture for Protecting Against and Adapting separable data transformations.- Graph Matching.- to Security Attacks in Wireless Sensor Networks.- 2007. X, 176 p. (Lecture Notes in Computer Science, Vol. 4826) Memory Structures and Organization in Case-Based Emergent Properties in Sensor Networks: A Security Softcover Reasoning.- Learning a Statistical Model for Perfor- [..] mance Prediction in Case-Based Reasoning.- Appli- 42,00 € cations.- A CBP agent for monitoring the ocean CO2 Fields of interest ISBN 978-3-540-76299-7 exchange rate.- Classification and Identification of Data Encryption; Data Structures, Cryptology and Significant Information in Sensor Signals in Medical Information Theory; Computer Communication Applications.- Prototypes and Case-Based [..] Networks; Database Management; Computer Sys- tems Organization and Communication Networks Fields of interest Appl.Mathematics/Computational Methods of Engi- Target groups neering; Multimedia Information Systems; Artificial Professionals Intelligence (incl. Robotics); Computer Imaging, Vi- sion, Pattern Recognition and Graphics Type of publication Contributed volume Target groups Researchers, engineers, graduate students in compu- Due November 2007 tational intelligence, image processing, signal pro- cessing 2008. Approx. 300 p. (Advances in Information Security, Vol. 41) Type of publication Hardcover Monograph 76,25 € ISBN 978-0-387-71038-9 Due October 2007

2008. X, 436 p. 132 illus. (Studies in Computational Intelligence, Vol. 73) Hardcover

129,95 € ISBN 978-3-540-73178-8 springer.com/booksellers Computer Science 117

C. Petrie, Stanford University, Stanford, CA, USA; H. Lausen, Uni- M. Pollefeys, University of North Carolina - Chapel Hill, Chapel G. Pour, San Jose State University, CA, USA; K. Corker, San Jose versity of Innsbruck, Austria; M. Zaremba, University of Inns- Hill, NC, USA; D. Nister, University of Kentucky, Lexington, KY, State University, CA, USA bruck, Austria; T. Margaria-Steffen, University of Potsdam, Ger- USA many (Eds.) Pervasive Network 3-D Modeling from Images Semantic Web Services Challenge Communications

Results from the First Year Towards a Human-Centric Communications and Computing World The book explains how 3-D models can be obtained from images acquired with a hand-held camera and describes the different components required to build Service-Oriented Computing is one of the most an automatic system for this purpose. The approach Pervasive computing (a.k.a. human-centric comput- promising software engineering trends for future dis- is based on advanced automatic techniques that ing) is emerging as the next-generation computing. tributed systems. Currently there are many different avoid camera calibration and a-priori scene knowl- Today’s distributed and mobile computing’s goal approaches to semantic web service descriptions and edge. Examples are presented from architecture, ar- of anytime, anywhere connectivity will be extended many frameworks built around them. Yet a common chaeology, and planetary exploration. Basic knowl- to the pervasive network computing’s goal of all the understanding, evaluation scheme, and test bed to edge of 3-D computer graphics and geometry and time, everywhere connectivity. It envisions comput- compare and classify these frameworks in terms of some knowledge of 3-D modeling from images are ing environments focusing on humans rather than their abilities and shortcomings, is still missing. Se- desirable. Topics: *automatic feature matching *in- machines. Highlights include: - Key concepts and mantic Web Services Challenge is an edited volume terest-point extraction and matching *projective re- fundamentals of pervasive software for human-cen- that develops this common understanding of the var- construction, self-calibration *dense matching *3-D tric computing and its multi-disciplinary nature - ious technologies intended to facilitate the automa- modeling Application of the theoretical concepts to real-world tion of mediation, choreography and discovery for situations to develop pervasive software solutions - Web Services using semantic annotations. Seman- Contents Examples in a variety of application domains - Tech- tic Web Services Challenge is designed for a profes- * Introduction * Projective geometry * Camera-mod- nical and non-technical challenges, issues, standards, sional audience composed of practitioners and re- el and multiple-viewgeometry * Relating images and state-of-the-art software technologies This book searchers in industry. Professionals can use this book * Structure and motion * Self-calibration *Dense- is suitable for self-study by software and IT profes- to evaluate SWS technology for their potential prac- depth estimation * Modeling * Results sionals, particularly software engineering practition- tical use. The book is also suitable for advanced-level ers and researchers, software architects and design- students in computer science. Fields of interest er, interface designers and evaluators, and IT appli- Computer Graphics; Image Processing and Comput- cation engineers and managers who are [..] Features er Vision; Pattern Recognition Explores trade-offs among existing approaches Re- Features veals strengths and weaknesses of proposed ap- Target groups Comprehensive coverage of pervasive computing In- proaches, as well as which aspects of the problem are Practitioners Researchers Professionals cludes mobile computing and software engineering not yet covered Introduces software engineering ap- Integrates aspects of HCI into pervasive computing proach to evaluating semantic web services Type of publication Manual Contents Contents Introducing Pervasive Computing.- Multi-Disci- Introduction.- Service-Oriented Computing.- Se- Due January 2009 plinary Nature of Pervasive Computing.- Introduc- mantic Web Services.- Semantic Web Challenges.- ing Pervasive Software.- Context-Awareness.- Loca- Programming the Semantic Web.- Index. 2009. Approx. 330 pp. 75 illus. With CD-ROM. Hardcover tion-Awareness.- Seamless Mobility.- Software Agent Fields of interest Components.- Human Performance Interfaces.- In- Information Systems Applications (incl.Internet); ISBN 978-0-387-95356-4 tegration Processes.- Wearable.- Pervasive Software Information Systems and Communication Service; Design.- Pervasive Software Architecture.- Pervasive Database Management; e-business and e-commerce; Software Technologies and Standards.- The Road Multimedia Information Systems; Software Engi- Ahead.- Appendix A Glossary.- Appendix B Applica- neering tion Domains of Pervasive Computing.- Appendix C Main Research Themes and Projects.- Appendix D Target groups References. Industry practitioners, research scientists Fields of interest Type of publication Software Engineering; Communications Engineer- Contributed volume ing, Networks; User Interfaces and Human Com- puter Interaction; Information Systems Applications Due March 2008 (incl.Internet); Computer Applications Target groups 2008. Approx. 300 p. (Semantic Web and Beyond, Vol. 8) Hard- Software and IT professionals, graduate students tak- cover ing courses in software engineering for pervasive hu- man-centric computing, software architecture for 76,25 € pervasive computing, human-computer interaction, ISBN 978-0-387-72495-9 and human factors engineering

Type of publication Monograph

Due February 2009

2006. Approx. 400 p. Hardcover

66,95 € ISBN 978-0-387-25480-7 118 Computer Science springer.com/booksellers

B. Prasad, Florida A & M University, Tallahassee, FL, USA; S.R.M. M. Prokopenko, CSIRO, Commonwealth Scientific & Industrial S. Pupolin, University of Padova, Italy (Ed.) Prasanna, Indian Institute of Technolgy, Guwahati, India (Eds.) Research Organisation, North Ryde, NSW, Australia (Ed.) Wireless Communications Speech, Audio, Image and Advances in Applied Self- Biomedical Signal Processing using organizing Systems 2007 CNIT Thyrrenian Symposium Neural Networks Wireless Communications: 2007 CNIT Thyrrheni- Self-organization is a multi-faceted phenomenon, an Symposium compiles the papers presented at the present in many fields, operating at multiple scales, Humans are remarkable in processing speech, audio, 2007 Thyrrenian International Workshop on Dig- and performs diverse roles. This book focuses on the image and some biomedical signals. Artificial neu- ital Communication held in Italy in September of state of the practice of self-organizing systems. The ral networks are proved to be successful in perform- 2007. The papers represent the new aspects of wire- case studies described illustrate the richness of the ing several cognitive, industrial and scientific tasks. less communication systems that approach the chal- topic, and also provide guidance to the intricate ar- This peer reviewed book presents some recent ad- lenge of moving towards multimedia communica- eas. The book begins with more established fields vances and surveys on the applications of artificial tions and IP technology. The various aspects covered of traffic management, electricity trading markets, neural networks in the areas of speech, audio, image are: Creating a secure wireless network for IP Ensur- and structural health monitoring, building up to- and biomedical signal processing. It consists of 18 ing Quality of Service (QoS) for the heterogeneous wards robotic teams, solving challenging tasks and chapters prepared by some reputed researchers and wireless networks Collecting data for several applica- deployed in tough environments. The second half practitioners around the globe. tions with one network The book is organized into of the book follows with a deeper look into the mi- five sessions that cover different topics. The five ses- Features cro-level, and considers interactions between agents. sions are "4G Wireless Systems", "Ad-Hoc and Cel- Presents advances and surveys on the applications These interactions lead towards self-organizing di- lular Networks", "Security and Applications in Wire- of artificial neural networks in the areas of speech, agnostics and visualization, reaction-diffusion com- less Networks", "QoS and Efficiency in Multimedia audio, image, and biomedical signal processing putation, self-assembly of nano-structures, and even- Heterogeneous Wireless Networks", and "Wireless tually to artificial life. Demonstrating the practical Sensor Networks". Wireless Communications: 2007 Contents relevance and applicability of self-organization, this CNIT Thyrrhenian Symposium is an up-to-date crit- From the contents Information Theoretic Feature book will be of interest to advanced students and re- ical analysis of the state-of-the-art in each of the five Selection and Projection .- Recognition of Tones in searchers in a wide range of fields. areas [..] Yoruba Speech: Experiments with Artificial Neural Networks.- Emotion Recognition from Speech using Features Features Multi-Classifier Systems and RBF-Ensembles.- Mod- Focuses on the state of the practice of self-organiz- Focuses on the importance and development of wire- eling Supra-segmental Features of Syllables using ing systems Considers several novel applications, less communications Neural Networks.- Objective Speech Quality Eval- extending the range of applicability of self-organiz- uation Using an Adaptive Neuro-Fuzzy Network.- ing systems Practical case studies examine successful Contents A Novel Approach to Language Identification Us- applications of self-organization, identify essential Session 1 - 4G Wireless Systems.- Spatial Detec- ing Modified Polynomial Networks.- Speech/Non- causes for the successes, and propose guiding princi- tion and Multistage Decoding for LST-MLC MIMO speech Classification in Hearing Aids Driven by Tai- ples for future developments Systems.- Iterative (turbo) Joint Rate and Data De- lored Neural Networks.- Audio Signal Processing.- tection in Coded CDMA Networks.- Hybrid ARQ Contents [..] Based on Rateless Coding for UTRAN LTE Wireless Part I: Introduction.- Design versus Self-organiza- Systems.- On the Performance of Transmit Antenna Fields of interest tion.- Foundations and Formalizations of Self-Or- Selection with OSTBC in Ricean MIMO Channels.- Appl.Mathematics/Computational Methods of Engi- ganization.- Part II: Distributed Management and A Packet Detection Algorithm for the UWB Stan- neering; Artificial Intelligence (incl. Robotics) Control.- Self-organizing Traffic Lights: A Realis- dard ECMA 368.- Low-Rate Predictive Feedback for tic Simulation.- A Self-organizing Sensing System the OFDM MIMO Broadcasting Channel.- Session 2 Target groups for Structural Health Monitoring of Aerospace Ve- - Ad-Hoc and Cellular Networks.- Interferer Nulling Engineers, researchers and graduate students in hicles.- Decentralized Decision Making for Mul- Based on Neighborhood Communication Patterns.- computer science, computer engineering, and signal ti-Agent Systems.- Learning Mutation Strategies for On the Beneficial [..] processing Evolution and Adaptation of a Simulated Snakebot.- Self-Organization as Phase Transition in Decentral- Fields of interest Type of publication ized Groups of Robots.- Distributed Control of Mi- Communications Engineering, Networks; Computer Monograph croscopic Robots in Biomedical Applications.- Part Communication Networks; Signal,Image and Speech [..] Processing; Electronics and Microelectronics, Instru- Due January 2008 mentation Fields of interest Artificial Intelligence (incl. Robotics); Pattern Recog- Target groups 2008. Approx. 420 p. (Studies in Computational Intelligence, Vol. nition; Simulation and Modeling; Theory of Compu- Libraries and researchers in Wireless Communica- 83) Hardcover tation; Computer Systems Organization and Com- tions 129,95 € munication Networks; Coding and Information The- ISBN 978-3-540-75397-1 ory Type of publication Proceedings Target groups Researchers, advanced students Due December 2007 Type of publication Contributed volume 2008. Approx. 550 p. (Signals and Communication Technology) Hardcover

Due November 2007 114,95 € ISBN 978-0-387-73824-6 2008. Approx. 400 p. (Advanced Information and Knowledge Processing) Hardcover

84,95 € ISBN 978-1-84628-981-1 springer.com/booksellers Computer Science 119

Z. Qin, Tsinghua University, Beijing, China Z. Qin, Tsinghua University, Beijing, China; J.-K. Xing, Tsinghua V. Raja, University of Warwick, Coventry, UK; K.J. Fernandes, Uni- University, Beijing, China; X. Zheng, Tsinghua University, Beijing, versity of York, UK (Eds.) China Introduction to E-commerce Reverse Engineering Software Architecture An Industrial Perspective Part of the new series Tsinghua University Texts, this book gives a brief introduction to the founda- tions and key aspects of e-commerce, and Part of the new series, Advanced Topics in Science This edited collection of essays from world-leading focuses on the latest developments in the and Technology in China, this book aims to intro- academic and industrial authors yields insight into e-commerce industry. Practical case studies of- duce the theoretical foundations, various sub-fields, all aspects of reverse engineering: The methods of re- fer a useful reference for dealing with various is- current research, and practical methods of software verse engineering analysis are covered, with special sues in e-commerce. Content will be in- architecture. Readers can acquire basic knowledge of emphasis on the investigation of surface and inter- troduced from theory to application, and software architecture, including why software archi- nal structures.- Frequently-used hardware and soft- from technology to management. Dr. Zheng tecture is necessary, how we can describe a system’s ware are assessed and advice given on the most suit- Qin is currently Director of the architecture with formal language, what architecture able choice of system.- Rapid prototyping is intro- E-Commerce Institute of Xi’an Jiao- styles are popular in practice, and how we can apply duced and its relationship with successful reverse en- tong University. He received his PhD software architecture to the development of systems. gineering is discussed.- Importantly, legal matters from Northwestern Polytechnical University. Case studies, data, illustrations, and other materials released within the past 5 years will be used to show surrounding reverse engineering are addressed as are Features the latest developments in software architecture. Dr. other barriers to the adoption of these techniques. Offers practical case studies for reference Deals with Qin Zheng is doctoral mentor of the computer sci- Applications of reverse engineering in automotive, technology as well as management Focuses on ence and technology departments at Tsinghua and aerospace, and medical engineering are reported in the latest developments in e-commerce Xi’an Jiaotong Universities. He has been Associate depth. Reverse Engineering is a "must have" title for Dean of the School of Software, Tsinghua Universi- anyone working with advanced modern manufactur- Contents ty, and Chair of the Institute of E-commerce, Xi’an ing technologies, either with a view to researching Chapter 1 Basics of E-commerce.- Chapter 2 Strate- Jiaotong University. He has been a visiting scholar at and improving them further or to making their com- gies of E-commerce.- Chapter 3 Supporting Tech- several universities in [..] pany leaner and more agile in a competitive manu- niques of E-commerce.- Chapter 4 Payment Tech- facturing marketplace. niques of E-commerce.- Chapter 5 Security Tech- Features niques of E-commerce.- Chapter 6 E-commerce and Comprehensively describes and discusses topics of Features Laws.- Chapter 7 E-commerce and Taxation.- Chap- software architecture Introduces the latest develop- Offers the manufacturing engineer expert guidance ter 8 On-line Enterprise Management.- Chapter 9 ments in software architecture using the newest sup- on how to use reverse engineering to best compet- Architecture and System Design of E-commerce.- plementary materials Concentrates on both theory itive advantage Gives the student and researcher Chapter 10 Gateway Website Design.- Chapter 11 and practice a complete review of the state of the art in reverse Computer System Integration and E-commerce.- engineering Covers the important legal questions Chapter 12 E-commerce and International Trade.- Contents raised by the process of deconstructing already-man- Chapter 13 Network Psychology.- Chapter 14 Case 1: What is software architecture.- 2: Basic software ufactured objects Study of E-commerce.- architecture concepts.- 3: Common architectural styles.- 4: Study case: applications of architectural Contents Fields of interest styles in J2EE.- 5: Formal description and methods.- Introduction to Reverse Engineering.- Methodolo- e-business and e-commerce; Technology Manage- 6: Design principles with software architecture.- 7: gies and Techniques for Reverse Engineering: The ment; Information Systems Software architecture in practice.- 8: Software archi- Potential for Automation with 3D Laser Scanners.- tectural IDE.- 9: Conclusion and expectation. Reverse Engineering: Hardware and Software.- Se- Target groups lecting a Reverse Engineering System.- Introduction Graduate and advanced un- Fields of interest to Rapid Prototyping.- Relationship between Reverse dergraduate students in Software Engineering Engineering and Rapid Prototyping.- Reverse Engi- business, information technology man- neering Applications in the Automotive Industry.- agement, and computer science. Target groups Reverse Engineering Applications in the Aerospace Students, and professionals in software engineering Industry.- Reverse Engineering Applications in the Type of publication and software architecture Medical Industry.- Legal Aspects of Reverse Engi- Monograph neering.- Barriers to Adopting Reverse Engineering. Type of publication Monograph Fields of interest Due March 2008 Manufacturing, Machines, Tools; Computer-Aid- Due November 2007 ed Engineering (CAD, CAE) and Design; Engineer- No sales rights in Mainland China ing Design; Automotive and Aerospace Engineering; Biomedical Engineering; Industrial and Production Distribution rights in China: Zhejiang University Press Jointly published with Tsinghua University Press Engineering

Jointly published with Zhejiang University Press Target groups 2008. Approx. 180 p. (Tsinghua University Texts) Hardcover Researchers in manufacturing interested in reverse engineering and rapid prototyping; industry-based 119,95 € 2008. Approx. 400 p. (Advanced Topics in Science and Technolo- practitioners working in computer-aided design and ISBN 978-3-540-49644-1 gy in China ) Hardcover manufacture or in the automotive, aerospace and 129,95 € medical engineering industries ISBN 978-3-540-74342-2 Type of publication Contributed volume

Due December 2007

2008. Approx. 230 p. 135 illus. (Springer Series in Advanced Man- ufacturing) Hardcover

99,95 € 120 Computer Science springer.com/booksellers

ISBN 978-1-84628-855-5 A.R. Rao, Purdue University, West Lafayette, IN, USA; V.V. Srinivas, Indian Institute of Science, Bangalore, India

Regionalization of Watersheds

An Approach Based on Cluster Analysis

Design of water control structures; reservoir man- agement, economic evaluation of flood protection projects, land use planning and management, flood insurance assessment, and other projects rely on knowledge of magnitude and frequency of floods. Often, estimation of floods is not easy because of lack of flood records at the target sites. Regional flood fre- quency analysis (RFFA) alleviates this problem by utilizing flood records pooled from other watersheds, which are similar to the watershed of the target site in flood characteristics. Clustering techniques are used to identify group(s) of watersheds which have similar flood characteristics. This book is a compre- hensive reference on how to use these techniques for RFFA and is the first of its kind. It provides a de- tailed account of several recently developed cluster- ing techniques, including those based on fuzzy set theory and artificial neural networks. It also docu- ments research findings on application of clustering techniques to RFFA that remain [..]

Features The only book on this topic Summarizes and illus- trates the research in this topic Brings out the bene- fits of regionalization Delineates the problems which need to be addressed in this research topic

Contents From the contents I. Introduction.- II. Regionaliza- tion by Hybrid Cluster Analysis.- III. Regionalization by Fuzzy Cluster Analysis.- IV. Regionalization by Using Artificial Neural Networks (ANN).- V. Effect of Regionalization on Flood Frequency Analysis.- VI. Concluding Remarks.

Fields of interest Hydrogeology; Statistics for Engineering, Physics, Computer Science, Chemistry & Geosciences; Civ- il Engineering; Pattern Recognition; Landscape/Re- gional and Municipal Planning

Target groups Researchers in stochastic hydrology; practitioners in hydrology; graduate students

Type of publication Monograph

Due April 2008

2008. Approx. 235 p. 40 illus. (Water Science and Technology Li- brary, Vol. 58) Hardcover

99,95 € ISBN 978-1-4020-6851-5 springer.com/booksellers Computer Science 121

C.R. Rao, Pennsylvania State University, University Park, PA, USA; N.K. Ratha, IBM Thomas J. Watson Research Center, Hawthorne, F. Redmill, London, UK; T. Anderson, University of Newcastle up- H. Toutenburg, University of Munich, Germany; Shalabh, Univer- NY, USA; V. Govindaraju, University of Buffalo, NY, USA (Eds.) on Tyne, UK (Eds.) sity of Munich, Germany; C. Heumann Advances in Biometrics Proceeding of the Sixteenth Safety- Linear Models and Generalizations Sensors, Algorithms and Systems critical Systems Symposium, Least Squares and Alternatives February 2008

Biometrics technology continues to stride forward This book provides an up-to-date account of the the- with its wider acceptance and its perceived need in This book contains the invited papers presented at ory and applications of linear models. It can be used various new security facets of modern society. Bio- the Sixteenth annual Safety-critical Systems Sympo- as a text for courses in statistics at the graduate level metrics is being required to meet the growing chal- sium, held in February 2008 in the UK. This volume as well as an accompanying text for other courses in lenges of identity management. While biometrics presents a broad spectrum of major safety issues and which linear models play a part. The authors present finds use in all diverse applications, the research the papers included cover a broad spectrum of issues a unified theory of inference from linear models and challenges continue to grow as the user community affecting safety and bring together topics that are of its generalizations with minimal assumptions, not expects a fully automatic system to cover the whole the utmost importance in current safety thinking. only through least squares theory, but also using al- universal population with almost no errors. Recent Papers provide a combination of extensive industrial ternative methods of estimation and testing based advances in biometrics include new developments in experience and academic research. The state-of-the- on convex loss functions and general estimating sensors, modalities and algorithms. As new sensors art contributions will appeal to practitioners and re- equations. Some of the highlights include: sensitivity are designed, newer challenges emerge in the algo- searchers alike, as well as to postgraduates. analysis and model selection, analysis of incomplete rithms for accurate recognition. New modalities have data, analysis of categorical data based on a unified been discovered in addition to the fusion of existing Features presentation of generalized linear models including modalities to improve accuracy and wider coverage. Proceedings of SSS 2008 GEE- and full likelihood methods for correlated re- Written for researchers, advanced students and prac- sponse, an extensive appendix on matrix theory, use- titioners to use as a handbook, this volume captures Fields of interest ful to researchers in econometrics, engineering and the very latest state-of-the-art research contributions Software Engineering; System Performance and optimization theory. For this third edition the text from leading international researchers in the field. Evaluation has been extensively revised and contains the latest developments in [..] Features Target groups Contributions from set of renowned active interna- Managers in industry, Researchers, Postgraduate stu- Features tional researchers Selection of topics has been based dents Essential text for graduate statistics courses and on the novelty and advances made in these areas, courses where linear models play a part Presents ad- capturing the key developments Type of publication vanced research results and gives an overview of gen- Proceedings eralizations New edition has been extensivley revised Contents and contains the latest results in the area From the contents Multispectral Fingerprint Image Due March 2008 Acquisition.- Touchless fingerprinting Technology.- Contents Ultrasonic Sensors for Capturing Livescan of Finger- 1. Introduction.- 2. The Simple Linear Regression print Biometrics.- Palm Vein Authentication.- Finger 2008. Approx. 270 p. Softcover Model.- 3. The Multiple Linear Regression Model.- Vein Authentication Technology and financial Ap- 79,95 € 4. The Generalized Linear Regression Model.- 5. Ex- plications.- Iris Recognition in Less Constrained En- ISBN 978-1-84800-099-5 act and Stochastic Linear Restrictions.- 6. Prediction vironments.- Ocular Biometrics: Simultaneous Cap- Problems in the Generalized Regression Model.- 7. ture and Analysis of the Retina and iris.- Voice-based Sensitivity Analysis.- 8. Analysis of Incomplete Data Speaker Recognition Combining Acoustic and Stylis- Sets.- 9. Robust Regression.- 10. Models for Categor- tic Features.- Function-based On-line Signature Ver- ical Response Variables.- Fitting Smooth Functions.- ification.- Writer Identification and Verification.- Appendix A: Matrix Algebra. Improved Iris Recognition Using [..]

Fields of interest Fields of interest Statistical Theory and Methods; Game Theo- Biometrics; Pattern Recognition; Image Processing ry/Mathematical Methods; Probability Theory and and Computer Vision; Multimedia Information Sys- Stochastic Processes; Probability and Statistics in tems Computer Science; Operation Research/Decision Theory Target groups Researchers, practitioners, advanced students Target groups Researchers, graduate students Type of publication Contributed volume Type of publication Graduate/advanced undergraduate textbook Due November 2007

Due October 2007 2008. Approx. 500 p. Hardcover

2008. XIX, 570 p. 26 illus. (Springer Series in Statistics) Hardcover 62,95 € ISBN 978-1-84628-920-0 89,95 € ISBN 978-3-540-74226-5 122 Computer Science springer.com/booksellers

G. Rempala, University of Louisville, KY, USA; J. Wesolowski, Po- M. Resch, University of Stuttgart, Germany; S. Roller, Universi- R. Riolo, University of Michigan, Ann Arbor, MI, USA; T. Soule, litechnika Warszawska, Waarszawa, Poland ty of Stuttgart, Germany; P. Lammers, University of Stuttgart, University of Idaho, Moscow, ID, USA; B. Worzel, Genetics Germany; T. Furui, NEC Corporation, Tokyo, Japan; M. Galle, NEC Squared, Ann Arbor, MI, USA (Eds.) High Performance Europe GmbH, Düsseldorf, Germany; W. Bez, Symmetric Functionals on Random NEC High Performance Europe GmbH, Düsseldorf, Germany Matrices and Random Matching (Eds.) Genetic Programming Theory and Practice V Problems High Performance Computing on Vector Systems 2007 Genetic Programming Theory and Practice V was This book presents the current state of the art of the developed from the fifth workshop at the Universi- mathematical theory of symmetric functionals on ty of Michigan’s Center for the Study of Complex random matrices with emphasis on its connection The book presents the state-of-the-art in high perfor- Systems to facilitate the exchange of ideas and infor- with the statistical non-parametric estimation theory. mance computing and simulation on modern super- mation related to the rapidly advancing field of Ge- The book provides a thorough, detailed description computer architectures. It covers trends in hardware netic Programming (GP). Contributions from the of the approach of symmetric function decomposi- and software development in general and specifical- foremost international researchers and practitioners tions to the asymptotic theory of symmetric func- ly the future of vector-based systems and heteroge- in the GP arena examine the similarities and differ- tionals, including the classical theory of U-statistics. neous architectures. The application contributions ences between theoretical and empirical results on It also presents applications of the theory to inves- cover computational fluid dynamics, fluid-structure real-world problems. The text explores the synergy tigating complex biological systems like sequence interaction, physics, chemistry, astrophysics, and cli- between theory and practice, producing a compre- alignment, sequencing, SNP (single nucleotide poly- mate research. Innovative fields like coupled mul- hensive view of the state of the art in GP application. morphism) detection, and DNA microarrays, as ti-physics or multi-scale simulations are presented. The work covers applications of GP to a wide vari- well as some stochastic networks models. An initial All papers were chosen from presentations given at ety of domains, including bioinformatics, symbolic overview of the field of symmetric random functions the fifth Teraflop Workshop held in November 2006 regression for system modeling, financial modeling, makes this book a useful introduction for newcomers at Tohoku University, Japan, and the sixth Teraflop circuit design and robot controllers. This volume is to the field. Workshop held in March 2007 at the Stuttgart High a unique and indispensable tool for academics, re- Performance Computing Center (HLRS), Germany. Features searchers and industry professionals involved in GP, Thorough, detailed description of the approach of Fields of interest evolutionary computation, machine learning and ar- symmetric function decompositions to the asymp- Computational Science and Engineering; Processor tificial intelligence. totic theory of symmetric functionals, including the Architectures; Computer Applications in Chemistry; Features classical theory of U-statistics Organized by lectures Numerical and Computational Methods Discusses hurdles in solving large-scale applica- Hot topic Target groups tions Describes techniques including fitness and age Contents Computational scientists layered populations, code reuse through caching, Basic Concepts.- Properties of P-statistics.- Asymp- archives and libraries, Pareto optimization, pre- and totics for Random Permanents.- Weak Convergence Type of publication post-processing, the use of expert knowledge and of Permanent Processes.- Weak Convergence of P- Proceedings information-theoretic fitness measures Address- statistics.- Permanent Designs and Related Topics.- es practical methods for choosing between tech- niques for improving GP performance and to evolve Products of Partial Sums and Wishart Determinants. Due October 2007 trustable solutions Fields of interest Applications of Mathematics; Statistical Theory and 2008. XIV, 267 p. Hardcover Contents Methods; Communications Engineering, Networks Contributing Authors.- Preface.- Foreword.- Genet- 79,95 € ic Programming: Theory and Practice.- Better So- ISBN 978-3-540-74383-5 Target groups lutions Faster: Soft Evolution of Robust Regression Graduate students, researchers and practitioners Models in Pareto Genetic Programming.- Manip- working with problems revolving around statistical ulation of Convergence in Evolutionary Systems.- testing and estimation in complex environments Large-Scale, Time-Constrained Symbolic Regres- sion-Classification.- Solving Complex Problems in Type of publication Human Genetics Using Genetic Programming.- To- Monograph wards an Information Theoretic Framework for Ge- netic Programming.- Investigating Problem Hard- Due December 2007 ness in Real Life Applications.- Improving the Scala- bility of Generative Representations for Open-Ended Design.- [..] 2008. Approx. 220 p. (The IMA Volumes in Mathematics and its Applications, Vol. 147) Hardcover Fields of interest Computing Methodologies; Artificial Intelligence 62,95 € (incl. Robotics); Theory of Computation; Algorithm ISBN 978-0-387-75145-0 Analysis and Problem Complexity; Programming Techniques

Target groups Researchers, practitioners and students of Genetic Programming, including industry technical staffs, technical consultants and business entrepreneurs

Type of publication Contributed volume

Due February 2008

2008. Approx. 300 p. (Genetic and Evolutionary Computation) Hardcover

84,95 € springer.com/booksellers Computer Science 123

ISBN 978-0-387-76307-1 J.J. Romero, University of La Coruña, Spain; P. Machado, Universi- A.M. Ronchi, Politechnico di Milano, Italia ty of Coimbra, Portugal (Eds.) eCulture The Art of Artificial Evolution Cultural Content in the Digital Age A Handbook on Evolutionary Art and Music

Do virtual museums really provide added value to While improvements in computer performance end-users, or do they just contribute to the abun- are dramatically changing the computer-generated dance of images? Does the World Wide Web save art industry, scientists in natural computing have endangered cultural heritage, or does it foster a soci- teamed up with artists to examine how bioinspired ety with less variety? How can information technol- systems can influence art, technology and even aes- ogy help to preserve the diversity of cultures in our thetic appreciation. This comprehensive book gives fast-changing world? These are the questions that an up-to-date survey of the relevant bioinspired are raised and answered in this book, the result of a computing research fields – such as evolutionary long path across the digital heritage landscape. Alfre- computation, artificial life, swarm intelligence and do M. Ronchi, Secretary of the EC MEDICI Coop- ant colony algorithms – and examines applications eration Framework, gives a broad overview of eCul- in art, music and design. The editors and contribu- ture and digital heritage. His presentation is divid- tors are researchers and artists with deep experience ed into three main sections: the first one devoted to of the related science, tools and applications, and the the main issues and general guidelines, the second to book includes overviews of historical developments technological fundamentals and the main solutions, and future perspectives. The book will be of inter- and the third to applications and services, including est to computer scientists and artists engaged with a wide range of case studies. Starting from the basics natural computing techniques applied to art, music the reader will be introduced to virtual museums is- and design. The accompanying DVD contains image, sues and achievements, cataloguing, digitizing, pub- video and music samples, as well as source code and lishing, and sustainable [..] demonstrations, providing a good starting point for [..] Contents Chapter 1: The role of content and the general back- Features round.- Chapter 2: General Technological Frame- Apart from conference proceedings, there is no up- work.- Chapter 3: Exploitation, applications and ser- to-date title dealing with the full range of bioin- vices. spired techniques in art and music, and these editors are uniquely well qualified to assemble the best au- Fields of interest thor team for this subject, having chaired the EVO- Cultural Heritage; Information Systems Applications MUSART workshop at the largest European natural (incl.Internet); Library Science; Computer Applica- computing event for the last 3 years (EuroGP 2004, tions; Computers and Society EuroGP 2005 and EuroGP 2006; [..] Target groups Contents Researchers and professionals in "memory institu- Part I - Fundamentals.- Introduction.- Evolutionary ions", digital libraries, digital preservation, e-content Music.- Evolutionary Art.- Historical Perspective.- management; librarians Part II - Evolutionary Music.- Interactive Evolution- ary Music.- Cellular Automata, Artificial Life and Type of publication Music.- Self-organised Music.- Part III - Evolution- Monograph ary Art, Video and Design.- Interactive Evolutionary Art.- Electric Sheep.- Creative Evolutionary Design Due December 2007 Tools.- Part IV - Artistic Perspectives.- Artists and Artificial Music.- Action Painting and Evolution.- 2008. Approx. 410 p. Hardcover Evolving Virtual Ecosystems.- Part V - Future Per- spectives.- Coevolutionary Art.- Evolutionary Art 89,95 € and Hybrid Societies.- [..] ISBN 978-3-540-75273-8 Fields of interest Computer Appl. in Arts and Humanities; ARTS; Ar- tificial Intelligence (incl. Robotics); Theory of Com- putation; Computer-Aided Engineering (CAD, CAE) and Design

Target groups Researchers, lecturers, students

Type of publication Monograph

Due November 2007

2008. Approx. 450 p. (Natural Computing Series) Hardcover

84,95 € ISBN 978-3-540-72876-4 124 Computer Science springer.com/booksellers

J.A. Rose, The University of Tokyo, Japan; M.G. Negoita, Welling- B. Rosenhahn, Max-Planck Institute, Saarbrücken, Germany; R. G. Rossi, Universidad Nacional de La Plata, Argentina; O. Pastor, ton Institute of Technology, Wellington, New Zealand Klette, The University of Auckland, New Zealand; D. Metaxas, Rut- University of Technology, Valencia, Spain; D. Schwabe, PUC-Rio, gers University, NJ, USA (Eds.) Brazil; L. Olsina, National University of La Pampa, Argentina (Eds.) Advances in Computational Intelligence and Bioinformatics Human Motion Web Engineering: Modelling and Understanding, Modelling, Capture and Animation Implementing Web Applications

Features The study of human motion dates back more than “Web Engineering: Modelling and Implementing presents novel insights and applications of computa- 2000 years. With the event of information technolo- Web Applications” presents the state of the art ap- tional intelligence to multimedia processing, cellular gy, new areas have been added to this field. Research proaches for obtaining a correct and complete Web nonlinear networks and hardware implementation using computer vision and computer graphics con- software product from conceptual schemas, repre- tributes to a transformation of biomechanics into a sented via well-known design notations. Describing Fields of interest discipline that now applies computing technology mature and consolidated approaches to developing Appl.Mathematics/Computational Methods of En- throughout; on the other hand, computer vision and complex applications, this edited volume is divided gineering; Artificial Intelligence (incl. Robotics); Ap- computer graphics also benefit from defining goals into three parts and covers the challenges web appli- plications of Mathematics; Computer Imaging, Vi- aimed at solving problems in biomechanics. Besides cation developers face; design issues for web applica- sion, Pattern Recognition and Graphics; Multimedia interactions, all three areas also developed their own tions; and how to measure and evaluate web applica- Information Systems inherent research dynamics towards studying hu- tions in a consistent way. With contributions from man motion. Researchers from all three of these ar- leading researchers in the field this book will appeal Target groups eas have contributed to this book to promote the to researchers and students as well as to software en- Researchers, Engineers, Graduate Students in Com- establishment of human motion research as a mul- gineers, software architects and business analysts. putational Intelligence, IT, Computer Science, Elec- ti-facetted discipline and to improve the exchange of tronics and Information Engineering ideas and concepts between these three areas. Some Features chapters review the state of the art whilst others re- Explains how to obtain a complete and correct soft- Type of publication ware product from an object-oriented conceptual Monograph port on leading edge research results, with applica- tions in medicine, sport science, cinematography and schema robotics. Due May 2008 Contents Features Part 1: Introduction.- Web Application Develop- ment: Challenges and the Role of Web Engineer- 2008. Approx. 200 p. (Studies in Computational Intelligence, Pre- First book which informs about recent progress in liminary entry 103) Hardcover biomechanics, computer vision and computer graph- ing.- The Web as an Application Platform.- Part 2: ics – all in one volume Carefully written reviews Overview of Design Issue for Web Applications De- 89,95 € as well as detailed reports on recent progress in re- velopment.- Applying the OOWS Model Driven Ap- ISBN 978-3-540-29392-7 search Interesting demonstrations of recent applica- proach for Developing Web Applications.- Modeling tions of human motion studies Web Applications with OOHDM.- UML-Based Web Engineering: An Approach Based on Standards.- Contents Designing MultiChannel Web Applications as Di- From the contents 1 Understanding Human Mo- alogue Systems: The IDM Approach.- Designing tion: A Historic Review, R. Klette, C. Tee.- Part I 2D Web Applications with WebML and WebRATIO.- tracking. 2 The Role of Manifold Learning in Hu- HERA.- WSDM: Web Semantics Design Method.- man Motion Analysis, A. Elgammal, Chan-Su Lee. An Overview of Model-Driven Web [..] 3 Recognition of Action as a Bayesian Parameter Estimation Problem over Time, V. Kruger. 4 The Fields of interest William Harvey Code: Mathematical Analysis of User Interfaces and Human Computer Interaction Optical Flow Computation for Cardiac Motion, Y. Target groups Kameda, A. Imiya. 5 Detection and Tracking of Hu- Software engineers and software architects mans in Single View Sequences Using 2D Articu- lated Model, F. Kort, V. Hlavd!.- Part II Learning. 6 Type of publication Combining Discrete and Continuous 3D Trackers, Monograph C. Tsechpenakis, D. [..]

Fields of interest Due November 2007 Computer Imaging, Vision, Pattern Recognition and Graphics; Image Processing and Computer Vision; 2007. Approx. 460 p. 169 illus. (Human-Computer Interaction Human Physiology; Sports Medicine Series) Hardcover

Target groups 92,95 € Researchers or students in biomechanics, computer ISBN 978-1-84628-922-4 vision or computer graphics (in a general sense, not only those working immediately on human motion), people applying results of human motion research in their disciplines, and a general audience interested in progress in science

Type of publication Contributed volume

Due October 2007

2008. X, 636 pp (Computational Imaging and Vision, Vol. 36) Hardcover

74,95 € ISBN 978-1-4020-6692-4 springer.com/booksellers Computer Science 125

F. Rothlauf, University of Mainz, Germany L. Rueda, Universidad de Concepcion Chile, Chile; D. Mery, Ponti- M. Ruminer, Magenic Technologies, Marshfield, MA, USA ficia Universidad Catolica, Chile; J. Kittler, Surrey University, UK (Eds.) Application and Adaptation of Team Foundation Server Recipes

Heuristic Optimization Methods Progress in Pattern Recognition, A Problem-Solution Approach Image Analysis and Applications

Many books describe the application of 12th Iberoamerican Congress on Pattern Recognition, CIARP Team Foundation Server is a Microsoft product that 2007,Valpariso, Chile, November 13-16, 2007, Proceedings heuristic optimization methods to a wide variety of integrates the most critical aspects of software de- optimization problems. However, the process of de- velopment - version control, item tracking, and re- veloping an efficient optimization method for the porting – together into a single, secure collaboration specific problem at hand seems to be considered a platform. This means that teams only have one place "black art", the domain of optimization specialists. Fields of interest to look when working on software products, rather This book focuses on the practitioner and demon- Pattern Recognition; Image Processing and Com- than a collection of disparate systems and sources of strates how to apply heuristic optimization methods. puter Vision; Artificial Intelligence (incl. Robotics); data. The single most important feature and unique It breaks down the art of designing efficient opti- Computer Imaging, Vision, Pattern Recognition and aspect of this book will be its approach of providing mization methods into engineering tasks, and exam- Graphics recipes for quick customization and installation of ines how to build successful applications of heuristic TFS. Many very smart people can become very baf- optimization methods. In so doing the reader learns Target groups fled or completely unable to install the product suc- how to properly model the problem, choose the op- Researchers and professionals cessfully within their environment. timization method, adapt that method to the proper- ties of the specific problem, and, finally, implement Type of publication Features the method. This book will benefit practitioners in Proceedings Other books provide only a cursory discussion on the field of planning and optimization; researchers the implementation of software processes using TFS who deal with heuristic optimization in information Due October 2007 A pragmatic and practical book on how to actually systems, operations research, and computer science; use the tool The recipes are a unique approach to the and students in related fields. The reader should [..] 2007. XXI, 969 p. (Lecture Notes in Computer Science, Vol. 4756) subject Softcover Features Contents First book to offer a systematic theory of how to ap- 90,00 € Installation.- Recipes For Broken Installs.- Set- ply and adapt heuristic optimization methods. ISBN 978-3-540-76724-4 up Recipes.- Build Team Project.- Subscription Recipes.- Recipes For Customizing A Team Process Contents Template.- Work Item Tracking Recipes.- Check-in Introduction.- Optimization Problems.- Optimiza- Policy Recipes.- Build Recipes.- Project Management tion Methods.- Design of Modern Heuristics.- Mod- Recipes.- Recipes for the Data Tier.- Recipes for the ern Heuristics for the Optimal Communication Proxy Server Setup. Spanning Tree Problem.- Modern Heuristics for Automated Programming.- Summary and Conclu- Fields of interest sions.- References.- Nomenclature.- Glossary.- Index Programming Techniques; Programming Languages, Compilers, Interpreters Fields of interest Artificial Intelligence (incl. Robotics); Optimization; Target groups Operation Research/Decision Theory; Theory of Intermediate-Advanced project managers, develop- Computation ment managers, lead developers, and consultants

Target groups Type of publication Researchers, practitioners, students Professional book

Type of publication Due April 2008 Monograph

Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Due February 2008 Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, 2008. Approx. 290 p. (Natural Computing Series) Hardcover Oman, Qatar, Palestine: Jordan Book Center

59,95 € 2008. Approx. 605 p. Softcover ISBN 978-3-540-72961-7 ISBN 978-1-59059-742-2 126 Computer Science springer.com/booksellers

L. Rutkowski, Technical University of Czestochowa, Poland V. Saligrama, Boston University, Boston, MA, USA (Ed.) D. Salomon, California State University, Northridge, CA, USA

Computational Intelligence Networked Sensing Information A Concise Introduction to Data

Methods and Techniques and Control Compression

This book focuses on various techniques of com- Recent advances in sensor and computing technolo- Compression is an option naturally selected when putational intelligence, both single ones and those gies provide the impetus for deploying distributed faced with problems of high costs or restricted which form hybrid methods. Those techniques are sensing systems. Distributed networks are envisioned space. This book offers readers a succinct and read- today commonly applied issues of artificial intelli- to provide real-time information in such diverse ap- er-friendly foundation to the most important topics gence, e.g. to process speech and natural language, plications as building safety, environmental monitor- in the field of data compression. Divided into two build expert systems and robots. The first part of the ing, power systems, manufacturing as well as military parts, Part I presents the basic approaches to data book presents methods of knowledge representation and space applications. While significant research compression and describes a few popular techniques using different techniques, namely the rough sets, and development effort over the last decade in sen- and methods that are commonly used to compress type-1 fuzzy sets and type-2 fuzzy sets. Next various sor development, physical layer transmission and data. The reader discovers essential concepts, such neural network architectures are presented and their networking infrastructure has laid the initial ground- as variable-length and prefix codes, statistical distri- learning algorithms are derived. Moreover, the fam- work for practical deployment, realization of such bution and run-length codes. Part II concentrates on ily of evolutionary algorithms is discussed, in par- distributed sensing systems is still in its infancy. The advanced techniques, such as arithmetic coding, or- ticular the classical genetic algorithm, evolutionary principle challenges from a systems-level perspective thogonal transforms, subband transforms and Bur- strategies and genetic programming, including con- arise due to the difficulty in realizing the objectives rows-Wheeler transform. Complete and clear, this nections between these techniques and neural net- of inferencing and control tasks for a distributed dy- book will be the perfect reference for advanced un- works and fuzzy systems. In the last part of the book, namical environment through an underlying pow- dergraduates in computer science and requires a various methods of data partitioning and algorithms er/bandwidth constrained ad-hoc networked infras- minimum of mathematics. An author-maintained of automatic data clustering are given and new neu- tructure. The main challenge can be summarized as website provides readers with errata and auxiliary ro-fuzzy architectures are studied and compared. follows: How to make decisions under uncertainty, material. which arises from spatially [..] Features Features Self-contained, easy accessible and comprehensive Features The author is experienced and has authored the very textbook for graduate students and researchers in Presents research on informational and mathemati- successful Data Compression: The Complete Guide, computational intelligence Well-organized mod- cal aspects of networked sensing systems Facilitates Fourth Edition Clear, reader-friendly style The re- ern approach to methods and techniques of intelli- collaboration between the different research areas quired level of mathematics is minimal Specifical- gent calculations including examples and exercises and interdisciplinary research on distributed sens- ly written for undergraduates, to cover foundations in each chapter Includes a preface by Jacek Zurada, ing systems Brings together internationally reputed of Data Compression An author-maintained web- president of IEEE Computational Intelligence Soci- researchers from different communities, focused on site, containing errata and auxiliary material comple- ety Rich and well structured compendium of infor- the common theme of distributed sensing, inferenc- ments the book mation about [..] ing, and control over networks Contents Contents Contents Preface.- Part I: Basic Concepts.- Introduc- Introduction.- Selected issues of artificial intelli- Introduction.- Blind Localization: Blind Calibration tion.- Approaches to Compression.- Huffman cod- gence.- Methods of knowledge representation using of Networks of Sensors.- Sparse Multidimensional ing.- Dictionary methods.- Part II: Advanced Tech- rough sets.- Methods of knowledge representation Scaling for Blind Tracking in Sensor Networks.- Dis- niques.- Arithmetic Coding.- Image Compression.- using type-1 fuzzy sets.- Methods of knowledge rep- tributed Computation with Communication Con- Audio Compression.- Other Methods.- Bibliogra- resentation using type-2 fuzzy sets.- Neural networks straints: Error Exponents for Decentralized Detec- phy.- Glossary.- Solutions to Puzzles.- Answers to and their learning algorithms.- Evolutionary algo- tion in Tree Networks.- Function Computation in Exercises.- Index. rithms.- Data clustering methods.- Neuro-fuzzy sys- Wireless Sensor Networks.- Network Coding for tems of Mamdani, logical and Takagi-Sugeno type.- Distributed Storage in Wireless Networks.- Rate Fields of interest Flexible neuro-fuzzy systems. Constrained Field Reconstruction: Distributed Field Data Structures, Cryptology and Information Theory Estimation with One-bit Sensors.- On the Number Fields of interest of Bits to Encode the Outputs of Densely Deployed Target groups Appl.Mathematics/Computational Methods of En- Sensors.- Separation Theorems And Partial Order- Undergraduates gineering; Artificial Intelligence (incl. Robotics); ings for [..] Type of publication Applications of Mathematics; Automation and Undergraduate textbook Robotics; Operation Research/Decision Theory Fields of interest Communications Engineering, Networks; Computer Target groups Communication Networks; Computer Systems Or- Due February 2008 Graduate students and researchers in computational ganization and Communication Networks; Informa- intelligence, electrical engineering, computer science, tion Systems Applications (incl.Internet); Circuits 2008. Approx. 328 p. Also available online. (Undergraduate Top- automation and robotics, mechatronics, or telecom- and Systems; Signal,Image and Speech Processing ics in Computer Science) Softcover munication Target groups 29,95 € Type of publication Researchers, graduate students, professionals ISBN 978-1-84800-071-1 Graduate/advanced undergraduate textbook Type of publication Due February 2008 Monograph

Due November 2007 Published by arrangement with Polish Scientific Publishers PWN Translated from the Polish: Metody I techniki sztucznej in- teligencji, 2005, PWN publishers., ISBN 83-01-14529-3 2008. Approx. 300 p. Hardcover

99,95 € 2008. Approx. 525 p. Hardcover ISBN 978-0-387-68843-5 69,95 € ISBN 978-3-540-76287-4 springer.com/booksellers Computer Science 127

D. Salomon, California State University, Northridge, CA, USA F.J. Samaniego, University of California at Davis, CA, USA J.T. Sample, Stennis Space Center, MS, USA; K. Shaw, Stennis Space Center, MS, USA; S. Tu, University of New Orleans, LA, USA; M. Abdelguerfi, University of New Orleans, LA, USA (Eds.) Variable-length Codes for Data System Signatures and their Compression Applications in Engineering Geospatial Services and Reliability Applications for the Internet

Most data compression methods that are based on variable-length codes employ the Huffman or Since the introduction of system signatures in Fran- Golomb codes. However, there are a large number of The use of geospatial technologies has become ubiq- cisco Samaniego’s 1985 paper, the properties of this less-known codes that have useful properties - such uitous since the leading Internet vendors delivered a technical concept have been examined, tested and as those containing certain bit patterns, or which are number of popular map websites. Today, businesses proven in a wide variety of systems applications. robust - and these can be useful. This book brings are either migrating location-specific capabilities in- Based on the practical and research success in build- this large set of codes to the attention of workers in to their information systems, or expanding existing ing reliability into systems with system signatures, the field and of students of computer science. David Geospatial Information Systems (GIS) implemen- this is the first book treatment of the approach. It is, Salomon’s crystal clear style of writing and presen- tation into enterprise-wide solutions. As enterprise therefore, the purpose of this book to provide guid- tation, which has been familiar to readers for many information systems evolve toward service-orient- ance on how reliability problems might be struc- years now allows easy access to the topic. Readers are ed architecture (SOA), geospatial technologies also tured, modeled and solved. Over the past ten years only required to have a general familiarity with com- evolve along the same lines. Geospatial Services and the broad applicability of system signatures has be- puter methods and essentially an understanding of Applications for the Internet covers a wide spectrum come apparent and the tool’s utility in coherent the representation of data in bits and files. Comput- of techniques, model methodologies and theories on systems and communications networks firmly es- er scientists, electrical engineers and students major- development and applications of GIS relative to the tablished. The book compared actual system life- ing in computer science or electrical engineering will internet. The world's experts in this emerging field times where the tool has been and has not been used. find this volume an invaluable resource, as will those present examples and case studies for location-based These comparisons - which have been done over the readers in various physical sciences and mathemat- services, coastal restoration, urban planning, battle- years - demonstrate the practical, feasible and fruitful ics. field planning, rehearsal environmental analysis and use of the tool in building reliable systems. Finally, assessment. Features new results and future directions for system signa- Comprehensively discusses the codes, not the com- tures are also explored. Features pression algorithms (the latter are available in many Includes business process services, and integration of Features books, but the codes themselves are normally men- GIS into global enterprise information systems and Based on both practical and research success in tioned in the literature just in passing) Requires a service architectures Includes information on Global building reliability into systems with system signa- minimum of mathematics, this book is geared to- Earth Observation System of Systems (GEOSS), and tures Provides guidance on how reliability problems ward the general educated reader, not toward spe- the Federal Earth Observation Missions (FedEo) Pi- can be structured, modeled and solved Compares ac- cialists Readers can find errata and auxiliary materi- lot program, essential for the workflow and decision tual system lifetimes using or omitting the tool al on the author’s website regularly maintained and support system of Homeland Security program updated Contents Contents Introduction.- Background on coherent systems.- Contents Preface.- Introduction.- Design and implementation System signatures.- Application of signatures to clo- From the contents.- Codes, Fixed- and Vari- of geographical search engines and Web services.- sure and preservation results on system lifetimes.- able-Length.- Prefix Codes.- VLCs, Entropy, and Re- Design and implementation of the semantic geospa- Further signature-based analyses of system life- dundancy.- Universal Codes.- The Kraft-MacMil- tial Web.- Design of and experiments on distributed times.- Applications of signatures in network relia- lan Inequality.- Tunstall Code.- Schalkwijk’s Cod- spatial/spatiotemporal databases.- Experiences with bility.- Applications of signatures in reliability eco- ing.- Tjalkens-Willems V-to-B Coding.- Phased-In and performance evaluation of large-scale GIS Web nomics.- Summary and discussion. Codes.- Redundancy Feedback (RF) Coding.- Re- servers.- Experiences with Web registry services for GIS.- Lessons of interoperability and standards for cursive Phased-In codes.- Self-Delimiting Codes.- Fields of interest GIS Web services.- Index. Huffman Coding.- VLCs for Integers.- Start-Step- Quality Control, Reliability, Safety and Risk; Statis- Stop Codes.- Start/Stop Codes.- Elias Codes.- Lev- tics for Engineering, Physics, Computer Science, Fields of interest enstein Code.- Even Rodeh Code.- Punctured Elias Chemistry & Geosciences; Probability Theory and Computer Applications in Geosciences; Database Codes.- Other Prefix Codes.- Ternary Comma Stochastic Processes; Operation Research/Decision Management; Data Mining and Knowledge Code.- Location Based Encoding (LBE).- Stout Theory; Systems Theory, Control Discovery; Information Systems Applications Codes.- Yamamoto’s Recursive [..] (incl.Internet); Computer Graphics Target groups Fields of interest Professors and graduate students, practitioners Target groups Coding and Information Theory; Data Storage Rep- Professional and advanced-level textbook resentation; Data Encryption; Image Processing and Type of publication Computer Vision; Signal,Image and Speech Process- Monograph Type of publication ing Contributed volume Due October 2007 Target groups Researchers, advanced undergraduates, graduates Due February 2008 2007. Approx. 200 p. (International Series in Operations Research & Management Science, Vol. 110) Hardcover Type of publication 2008. Approx. 250 p. Hardcover Monograph 74,95 € 76,95 € ISBN 978-0-387-71796-8 Due November 2007 ISBN 978-0-387-74673-9

2008. XII, 196 p. 42 illus. Softcover

44,95 € ISBN 978-1-84628-958-3 128 Computer Science springer.com/booksellers

M. Sarfraz, King Fahad University of Petroleum and Minerals, Y. Sawano, University of the Sacred Heart, Tokyo, Japan; T. M. Schellekens, University College Cork, Ireland Dhahran, Saudi Arabia Ohsako, Former Senior Programme/Research Specialist at UN- ESCO (Eds.) A Modular Calculus for the Average Interactive Curve Modeling Media Literacy as a Tool for Lifelong Cost of Data Structuring with Applications to Computer Graphics, Vision and Image Processing Learning Efficiency-Oriented Programming in MOQA A Comparative Study

This book covers Curve Modeling with solutions to The main time measure currently used for re- real life problems relating to Computer Graphics, al-time languages (worst-case time) is well-known In learning societies, citizens are increasingly re- Vision, Image Processing, Geometric Modeling and not to be modular in general, which makes aver- quired to develop the competence to acquire the nec- CAD/CAM. Chapters deal with basic concepts, curve age-case analysis notoriously difficult, involving a essary knowledge, skills and qualifications in order design techniques and their use to various applica- variety of techniques which typically do not allow to adapt to increasingly knowledge-based economies tions and a wide range of problems with their auto- for automation.  This book introduces the and societies. One of the major aims of governments mated solutions through computers. The book aims first programming language for which average-case is the improvement of media literacy among citizens to stimulate views and provide a source where the time analysis of its programs is guaranteed to be of all ages. People are encouraged to evaluate and an- reader can find the latest developments in the field modular.  The book includes sample programs alyze information supplied by different types of me- including a variety of techniques, applications, and and sample derivations of the average-case time of dia in order not to become passive receivers of in- systems necessary for solving real life problems. "In- these programs to illustrate this radically different formation. Educators must respond to this need for teractive Curve Modeling with Application to Com- approach to average-case timing. The book media literacy and develop programs for lifelong ed- puter Graphics, Vision and Image Processing" pro- presets a single foundation for Average-Case Analy- ucation and learning. Media education constitutes vides an invaluable resource, which focuses on in- sis, based on the notion of Random Structure Preser- an important part of lifelong education and learning terdisciplinary methods and affiliates up-to-date vation, and solves several well-known open problems for active citizenship at all levels. The effectiveness methodologies - An extremely useful book for un- discussed by Knuth. of media education is determined by several factors: dergraduate senior students as well as graduate stu- equal accessibility to media and information for dif- Features dents, practitioners and researchers in the areas of ferent socio-economic and cultural groups, the in- A novel foundation is provided for this classical area Computer Science, Engineering, and other computa- corporation and satisfaction of the diversified needs of computing.  As opposed to a series of meth- tional sciences. and motivations of these groups in using and apply- ods which need to match the algorithm under con- Features ing the technologies, and a [..] sideration, a new uniform foundation is provided No such other up-to-date book exists Provides a which is semi-automatable and which provides a sin- Features class of practical solutions to real life and multidisci- gle approach to analyze all algorithms from a wide Views media literacy and media education from plinary problems class.  No practical average-case timing tools the perspective of lifelong learning Compar- are currently available — the author's research Contents ative studies of nine countries Covers both policies [..] Introduction.- Weighted Nu Splines.- Rational Cu- and practices bic Spline with Shape Control.- Rational Sigma Contents Contents Splines.- Linear, Conic and Rational Cubic Splines.- Bridging Semantics and Complexity.- The MO- Preface,- Acknowledgements,- Contents,- Part 1: In- Shape Preserving Rational Interpolation for Planar QA Programming Language.- Implications for Re- troduction: 1.The methodology and Challenges of Curves.- Visualization of Shaped Data by Rational al-Time Languages and Automated Average-Case the study: Yukiko Sawano,- 2. International Agenda Cubic Spline.- Visualization of Shaped Data by Cu- Analysis.- Basic sorting Algorithms.- Composition- on Lifelong Learning in the Information Age: Toshio bic Spline Interpolation.- Approximation with B- ality as a Key to Software Timing.- Random Struc- Ohsako,- Part 2: Media Literacy and A Media Edu- Splines Curves.- Spiral Curves.- Corner Detection tures.- Series-Parallel MOQA Data Structures.- Ex- cation in Japan: 3. Media Literacy for the Lifelong for Curve Segmentation.- Linear Capture of Dig- amples of MOQA Programs.- Compositional De- Learning Society in Japan: Yukiko Sawano et al,- 4 ital Curves.- Digital Outline Capture with Cubic termination of Average Time.- Examples of Aver- Development and Directions of Media Literacy Ini- Curves.- Computer-Aided Reverse Engineering us- age-Case Analysis in MOQA tiatives in Japan: Midori Suzuki,- 5: Educational Ser- ing Evolutionary Heuristics on NURBS.- Multireso- vices for Children in the Digital Age: from the Stand- Fields of interest lution [..] point of a Public Service Broadcaster: Sachiko Ko- Programming Languages, Compilers, Interpreters; Fields of interest daira,- Part 3: Country Case Studies [..] Algorithm Analysis and Problem Complexity; Per- Computer Graphics; Image Processing and Comput- formance and Reliability Fields of interest er Vision; Pattern Recognition; Computer-Aided En- Education & Society; Computers and Education; Ed- Target groups gineering (CAD, CAE) and Design ucational Policy; Comparative Education; Learning Researchers and students interested in real-time pro- Target groups & Instruction gramming, programming language semantics and al- Advanced undergraduates, graduates, professionals gorithm analysis. Target groups Type of publication Graduate students and academics specializing in Type of publication Graduate/advanced undergraduate textbook comparative education and media education, as well Monograph as policy makers in charge of IT and media policy. Due March 2008 Due November 2007 Type of publication Contributed volume 2007. Approx. 325 p. Hardcover 2008. Approx. 250 p. Hardcover Due January 2008 74,95 € 76,25 € ISBN 978-1-84628-870-8 ISBN 978-0-387-73383-8 2008. Approx 200 p. Hardcover

115,00 € ISBN 978-1-4020-6555-2 springer.com/booksellers Computer Science 129

O. Scherzer, University of Innsbruck, Innsbruck, Austria; M. Gras- B. Schiele, TU Darmstadt, Germany; A.K. Dey, Carnegie Mellon F. Schilder, Thomson Corp., Eagan, MN, USA; G. Katz, Universi- mair, University of Innsbruck, Innsbruck, Austria; H. Grossauer, University, Pittsburgh, PA, USA; H. Gellersen, Lancaster Univer- ty of Osnabrück, Germany; J. Pustejovsky, Brandeis University, University of Innsbruck, Innsbruck, Austria; M. Haltmeier, Univer- sity, UK; B. De Ruyter, Philips Research Europe, Eindhoven, The Waltham, MA, USA (Eds.) sity of Innsbruck, Innsbruck, Austria; F. Lenzen, University of Inns- Netherlands; M. Tscheligi, University of Salzburg, Austria; R. bruck, Innsbruck, Austria Wichert, Fraunhofer-IGD, Darmstadt, Germany; E. Aerts, Phlips Research Europe, Eindhoven, The Netherlands; A. Buchmann, TU Annotating, Extracting and Darmstadt, Germany (Eds.) Variational Methods in Imaging Reasoning about Time and Events Ambient Intelligence International Seminar, Dagstuhl Castle, Germany, April 20-15, 2005, Revised Papers Several mathematical methods find wide applications First European Conference, AmI 2007, Darmstadt, Germany, in imagining science. This book focuses on variation- November 7-10, 2007, Proceedings al methods in imaging. Key topics: Introduces varia- This state-of-the-art survey comprises a selection of tional methods with motivation from deterministic, the material presented at the International Dagstuhl geometric and stochastic point of view Presents case This book constitutes the refereed proceedings of Seminar on Annotating, Extracting and Reason- examples in imaging to illustrate the use of variation- the First European Conference on Ambient Intelli- ing about Time and Events, held in Dagstuhl Cas- al methods e.g. denoising, thermoacoustics, comput- gence, AmI 2007, held in Darmstadt, Germany, in tle, Germany, in April 2005. The seminar centered erized tomography Link between noncovex calcu- November 2007. The 17 revised full papers present- around an emerging de facto standard for time and lus of variations, morphological analysis and level ed together with 5 research reports were carefully re- event annotation: TimeML. The 9 papers included set methods is discussed Analyses variational meth- viewed and selected from 48 submissions. The pa- in the book constitute the thoroughly cross-reviewed ods containing classical analysis of variational meth- pers are organized in topical sections on mobility and revised versions of selected summaries and find- ods, modern analysis such as G-norm properties and and sensing, applications of AmI, activity and loca- ings presented and discussed at the seminar. The pa- nonconvex calculus of variations Many numerical tion sensing, AmI and artificial intelligence, AmI pers feature current research and discuss open prob- examples accompany the theory throughout the text. middleware and infrastructure, and interaction with lems concerning annotation, temporal reasoning, This book is geared towards graduate students and the environment. The book is rounded off by a sec- and event identification. The main concern is with researchers in applied mathematics. It could serve as tion on case studies and lessons learned, presenting the determination of the effectivity of the TimeML a main text for graduate courses in image processing a high level selection of current research reports and language for consistent annotation, the determina- or as a supplemental text for courses  on regu- papers that reflect the most important activities of tion of the usefulness of such annotations for further larization and inverse problems. Researchers in the current ambient intelligence research. processing, and the question as to which modifica- area of imaging science will also [..] tions should be applied to the standard to improve Fields of interest its convenience in applications such as question-an- Features Information Systems Applications (incl.Internet); swering and information retrieval. Includes an insert with color images  Computer Communication Networks; Operating Numerical examples accompany the theory Ad- Systems; User Interfaces and Human Computer Fields of interest ditional material and images available on the Interaction; Artificial Intelligence (incl. Robotics); Artificial Intelligence (incl. Robotics); Data Mining website  Systematic presentation Computers and Society and Knowledge Discovery; Information Storage and Retrieval; Document Preparation and Text Process- Contents Target groups ing; Mathematical Logic and Formal Languages Introduction and history of variational methods for Researchers and professionals imaging.- Case examples of imaging.- Motivation Target groups of regularization techniques.- Quadratic regulariza- Type of publication Researchers and professionals tion for linear imaging.- Quadratic regularization for Proceedings nonlinear imaging.- Nonquadratic regularization: Type of publication Rudin Osher Fatemi model and others.- Mod- Due October 2007 Proceedings ern analysis of regularization techniques.- Noncon- vex regularization: Analysis of calculus of variations.- Due October 2007 Regularization for functionals involving discontinu- 2007. XV, 375 p. (Lecture Notes in Computer Science, Vol. 4794) Softcover ous operators.- Relation between nonconvex regular- ization and level methods.- Summary and compari- 2007. VII, 141 p. Also available online. (Lecture Notes in Comput- 52,00 € er Science, Vol. 4795) Softcover son of the techniques. ISBN 978-3-540-76651-3 38,00 € Fields of interest ISBN 978-3-540-75988-1 Calculus of Variations and Optimal Control; Opti- mization; Image Processing and Computer Vision; Mathematical Modeling and Industrial Mathematics; Imaging / Radiology

Target groups Graduate students, researchers

Type of publication Monograph

Due May 2008

2008. Approx. 255 p. Hardcover

ISBN 978-0-387-30931-6 130 Computer Science springer.com/booksellers

K. Schmidt, Frankfurt, Germany K. Schmidt, IT University of Copenhagen M. Schumacher, Av. du Grammont, Lausanne, Switzerland; H. He- lin, TeliaSonera, Finland; H. Schuldt, Universität Basel, Switzer- land (Eds.) High Performance Computing Cooperative Work and Coordinative

History, Concepts, and Implementation Practices CASCOM: Intelligent Service Contributions to the Conceptual Foundations of Computer Coordination in the Semantic Web Supported Cooperative Work High Performance Computing (HPC) is the area of supercomputers, the fastest and best systems of their This book presents the design, implementation and time. Most supercomputers are used to solve scien- Information technology has been used in organisa- validation of a value-added supportive infrastructure tific problems, be it weather forecasting, simulation tional settings and for organisational purposes such for Semantic Web based business application ser- of car crashes or wind tunnels, modeling of proteins as accounting, for a half century, but IT is now in- vices across mobile and fixed networks, applied to an in bio-chemical research, or for simulation of atom- creasingly being used for the purposes of mediating emergency healthcare application. This infrastruc- bomb tests. The book deals with systems that are in and regulating complex activities in which multi- ture has been realized by the CASCOM European re- practical use for such application areas. In the first ple professional users are involved, such as in facto- search project. For end users, the CASCOM frame- part, the history of supercomputers is described, and ries, hospitals, architectural offices, and so on.  work provides seamless access to semantic Web ser- it is shown which properties and trends will remain The economic importance of such coordination sys- vices anytime, anywhere, by using any mobile com- in the future. The second part describes all aspects tems is enormous but their design often inadequate. puting device. For service providers, CASCOM offers of High Performance Computing, from chip tech- The problem is that our understanding of the co- an innovative development platform for intelligent nology over computer and cluster architecture, up ordinative practices for which these systems and mobile business application services in the Se- to software, algorithms, and applications. The third are developed is deficient, leaving systems develop- mantic Web. part explores the practice of HPC planning: system ers and software engineers to base their designs on selection, benchmarks, acceptance tests, and imple- commonsensical requirements analyses.  The Features mentation of HPC environments. Finally, the book research reflected in this book addresses these very Inter-disciplinary combination of technologies is closes with an outlook on current trends and visions problems.  It is a collection of articles which presented Innovative research results and techniques like Grid Computing. establish a conceptual foundation for the research Design and implementation of context-aware agents area of Computer-Supported Cooperative Work. Features Contents Introduction and overview to the field of High Per- Features From the contents Innovative research results and formance Computing (HPC) Generic HPC architec- Brings together both classic and less well known techniques for context-aware, agent-based business ture is explained and introduced in detail For practi- articles on the phenomena of cooperative application service coordination and secure provi- tioners who want to build and use HPC systems work and coordinative practices - providing critical sion in open P2P service environments.- Design and elements of the conceptual foundation of CSCW. implementation of context-aware agents using these Contents techniques, and basic co-ordination infrastructure 1. History.- History of Computing.- Development Contents services.- Service coordination architecture and spec- of Supercomputers and Clusters.- Seymor Cray, Am- Cooperative work and coordinative practices: a ifications, and guidelines for using and developing dahl and others.- 2. Architecture, Chips, Clusters and progress report.- The texts: genealogical data and various context-aware business application services Nodes.- HPC Application Stack.- Chip Development credits.- Riding a tiger, or Computer-Supported Co- in nomadic computing environments.- A prototypi- Past and Future.- Cluster Systems.- Operating Sys- operative Work.- Taking CSCW seriously: Support- cally implemented service coordination demonstra- tems.- 3. Software Aspects.- Introduction into High ing articulation work.- Modes and mechanisms of tor for an emergency healthcare use [..] Performance Programming.-Optimization.- Paral- interaction in cooperative work.- The organisation lelization Concepts.- Fortran and c as Programming of cooperative work.- Coordination mechanisms.- Fields of interest Languages.-OpenMP and MPI for Parallelization.- Of maps and scripts.- Taking the distributed na- Information Systems and Communication Service Amdahl's Law.- 4. Practise (how to configure and ture of cooperative work seriously.- The critical role purchase).- Benchmarks.- System Configuration.- of workplace studies in CSCW.- The problem with Target groups Purchasing. 'awareness'.- Remarks on the complexity of coopera- Academics, researchers and practitioners tive work.- Ordering systems.- Working within a [..] Fields of interest Type of publication Software Engineering/Programming and Operating Fields of interest Proceedings Systems; Programming Techniques; System Perfor- Information Systems and Communication Service; mance and Evaluation; Computer Systems Organiza- Models and Principles; Database Management; In- Due March 2008 tion and Communication Networks; Operating Sys- formation Storage and Retrieval; User Interfaces and tems Human Computer Interaction; Computer Applica- tions 2008. Approx. 250 p. (Whitestein Series in Software Agent Tech- Target groups nologies and Autonomic Computing) Softcover IT-planners, IT-managers, system architects, system Target groups administrators, system developers 39,90 € Rsearchers; Lecturers; Graduates ISBN 978-3-7643-8574-3 Type of publication Type of publication Professional book Reference work

Due July 2008 Due May 2008

2008. Approx. 350 p. 80 illus. Hardcover 2008. Approx. 470 p. (Computer Supported Cooperative Work) Hardcover 49,95 € ISBN 978-3-540-45121-1 79,95 € ISBN 978-1-84800-067-4 springer.com/booksellers Computer Science 131

J. Scott, UK; S. Spendolini, UK

Pro Oracle Application Express

Application Express, or APEX as it is called, is one of the most innovative products to come out of Oracle in years. APEX is an application development frame- work for developing database-backed applications. It’s easy enough to get started in that power users can quit storing data in random spreadsheets and instead centralize their data in the powerful, Oracle Database. Developers using APEX can go further by leveraging the full power and flexibility of Oracle’s database engine. APEX’s power, ease-of-use, and in- tegration with the database have led to a phenomenal take-up of the product. Many people use APEX, and there is strong demand for advanced information on using it. Pro Oracle APEX assumes that readers al- ready know the rudiments of using APEX. The book tackles the harder problem of showing readers how to take full advantage of the APEX framework. As with any framework, there are right and wrong ways to do things, and there are "blind-alleys" that are best avoided. Pro Oracle APEX gives [..]

Features Coauthored by one of APEX’s original creators Pro- vides deep coverage of enterprise-level development topics that other books ignore or gloss over Cov- ers advanced topics essential for building large sys- tems Concentrates directly on Application Express development, without wasting the reader’s time on side-topics that they already know, or that are best learned from other books

Contents Development best practices.- Migration.- Authen- tication.- Conditions and Authorisations.- Data se- curity.- Layout and Navigation.- Reports and Chart- ing.- Ajax and Web services.- File Storage (Uploads and Downloads).- Printing and Exporting.- Cus- tomizing Themes and Templates.- Localisation Is- sues.- Integration with LDAP and SSO.- Perfor- mance and Scalability.- Production Issues.- Ap- pendix A - Sample code.- Appendix B - Online re- sources.- Appendix C - References.

Fields of interest Software Engineering/Programming and Operating Systems

Target groups Beginner - intermediate developers and power users who are already familiar with the basic concepts of Oracle Application Express and want to use it to accomplish real world business requirements and database administrators who want to use APEX to manage their environments, or who otherwise wish to develop small, ad hoc applications

Type of publication Professional book

Due January 2008

Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center

2008. Approx. 500 p. Softcover

ISBN 978-1-59059-827-6 springer.com/booksellers Computer Science 132

A. Seffah, Concordia University, Montreal, Canada; E. Metzker, E. Setton, -Packard Laboratories, Palo Alto, CA, USA; B. Girod, J.C. Setubal, VA. Bioinformatics Institute, Blacksburg, VA; N. Fran- Software Technology Reserach Centre, Daimler Chrysler, Ger- Stanford University, Stanford, CA, USA co de Almeida, Jr., UFMS, Campo Grande, Brazil many Peer-to-Peer Video Streaming Introduction to Bioinformatics Adoption-centric Usability Using Bacterial Genomics Engineering

Systematic Deployment, Assessment and Improvement of Us- Peer-to-Peer Video Streaming describes novel solu- tions to enhance video quality, increase robustness ability Methods Measurement in Software Engineering Introduction to Bioinformatics for Bacterial Ge- to errors, and reduce end-to-end latency in video nomics introduces bioinformatics techniques and streaming systems. This book will be of use to both programming using bacterial genomics as the main academics and professionals as it presents thorough application area. This advanced-level text book in- Where should usability techniques & HCD coverage and solutions for current issues with Video troduces the student to both bioinformatics and bac- knowledge be considered in the existing software Streaming and Peer-to-Peer architectures. Key Fea- terial genomics, with one topic motivating the oth- development lifecycle to maximize benefits gained tures: Provides overview of today’s state-of-the art er and vice versa. The strategy of this text is from SE & HCD approaches? This book pro- video streaming technology; Presents adaptive video to lead the reader to a series of progressive- vides an integrative answer while proposing a sys- coding and streaming techniques for performance ly more complex steps in the analysis of a bacterial tematic approach for the adoption, assessment enhancement of conventional client-server systems genome, introducing new bioinformatics techniques & deployment of usability engineering methods and P2P multicast; Focus on throughput-limited en- at each step. Introduction to Bioinformatics for Bac- within software development teams. The proposed vironments where congestion often hampers interac- terial Genomics includes three classes of exercises: 1) approach, called adoption-centric usability engineer- tivity and fast response times; Results derived from theoretical exercises; 2) tool-development program- ing (ACUE), provides a process to capture usability experiments carried out over large-scale simulated ming exercises; 3) genome analysis exercises. This engineering methods together with a context profile. peer networks; Detailed appendix incorporates vari- book helps the student be as technology-indepen- The context profile encodes human factors that con- ous additional experiments. tributed to acceptance or rejection of usability meth- dent as possible, concentrating on basic concepts, ods in past projects. This context-sensitive descrip- Features ideas, biological and mathematical problems, and tion of usability engineering is called a USEPack (Us- Novel solutions which enhance video quality, in- techniques to solve them. After reading this text, the ability Engineering Experience Package). Written crease robustness to errors and reduce end-to-end la- student will develop an essential "toolkit" for genome for software developers, managers, educators & tency in video streaming systems   analysis. The results of applying this [..] graduates from Academia & Industry, this book Features provides a complete, step-by-step approach for cost- Contents -First text book to present hands-on approach to effective integration of usability engineering meth- Video Compression.- Video Streaming.- Multicast teach bioinformatics using bacterial genomics as the ods in the [..] Architectures.- Peer-to-Peer Systems.- Video Encod- ing for Throughput-Limited Paths.- Congestion-Dis- platform -Includes algorithm design, algorithm im- Features tortion Optimized Scheduling.- Protocol Descrip- plementation, and application on real data -Will help Proposes a proven approach for integrating usabili- tion.- Experimental Protocol Evaluation.- Video improve programming skills of life science students ty methods within software engineering, with an ex- Streaming Protocol.- Peer-to-Peer CoDiO Schedul- and introduce mathematical sciences students to ge- plicit methodology. Borne out of a collaboration be- ing.- Experimental Results. nomics   tween Colombia University and Daimler-Chrysler Contents Competition touches on need for integration, but Fields of interest -Preface.- Introduction.- Step 1: Genome Bioin- does not have same explicit method. Computer Communication Networks; Computer Systems Organization and Communication Net- formatics Basics.- Step 2: Finding Protein-Coding Contents works Genes.- Step 3: Finding RNA Genes.- Step 4: Phy- Section 1: About Usability and it’s Place in Soft- logeny.- Step 5: Gene Annotation.- Step 6: Compara- ware Engineering Practices.- Usability in Software Target groups tive Genomics.- Odds and Ends.- Complete Genome Engineering: Obstacles and Pitfalls in the Adop- Academics and engineers in the field of streaming Analysis.- Final Topics.- Bibliography/References.- tion Path.- Usability Engineering Methods Pletho- media and.or P2P – for example, professionals in Index.     ra: An Overview.- Usability Engineering Methods high tech companies such as HP, IBM, Apple, Yahoo, Fields of interest as an Adoption Problem.- Section 2: The Adop- Google, etc. Computational Biology/Bioinformatics; Pattern tion-Centric Usability Engineering.- ACUE Funda- Recognition; Computer Applications in Chemistry; mentals and Principles.- ACUE Architecture and Type of publication Bioinformatics; Biomedicine general Components.- How Efective is ACUE? An Evalu- Monograph ation Benchmark.- Section 3: Operationalization Target groups and Tools Support.- Put it into Practice: The ProUse Due November 2007 Text Book Primarily: Advanced-Level Students Sec- Tool.- How ProUse Works? Overall Validation.- Sec- ondary: Professionals/Practitioners and Researchers tion IV: ACUE in [..] 2008. Approx. 150 p. Hardcover  

Fields of interest 76,95 € Type of publication Software Engineering; User Interfaces and Human ISBN 978-0-387-74114-7 Professional book Computer Interaction

Target groups Due December 2009 Software engineers and managers, HCI and usability professionals, Researchers, lecturers, graduates 2010. Approx. 400 p. 20 illus. Hardcover

Type of publication 53,15 € Professional book ISBN 978-0-387-76708-6

Due March 2008

2008. Approx. 450 p. Hardcover

95,00 € ISBN 978-1-84800-018-6 springer.com/booksellers Computer Science 133

Z. Shao, Yale University, New Haven, CT, USA (Ed.) Y. Shapira, Technion—Israel Institute of Technology, Haifa, Israel S. Shekhar, University of Minnesota, Minneapolis, MN, USA; H. Xiong, Rutgers University, Newark, NJ, USA (Eds.) Programming Languages and Matrix-Based Multigrid Encyclopedia of GIS Systems Theory and Applications 5th Asian Symposium, APLAS 2007, Singapore, November 28- December 1, 2007, Proceedings The Encyclopedia of GIS features a comprehensive, This book introduces and analyzes the multigrid ap- authoritative treatment of this subject matter, with a proach for the numerical solution of large sparse lin- simple A-Z format providing easy access to the field. This book constitutes the refereed proceedings of ear systems arising from the discretization of elliptic Authored and peer-reviewed by world experts, the the 5th Asian Symposium on Programming Lan- partial differential equations. Special attention is giv- entries explain the key software, data sets, and pro- guages and Systems, APLAS 2007, held in Singapore, en to the powerful matrix-based-multigrid approach, cesses used by geographers and computational sci- in November/December 2007. The 25 revised full which is particularly useful for problems with vari- entists. Nearly 200 topics include major overviews papers presented together with 3 invited talks were able coefficients and nonsymmetric and indefinite such as Geoinformatics, Spatial Cognition, and Loca- carefully reviewed and selected from 84 submissions. problems. This approach applies not only to model tion-Based Services. Short entries, cross-referenced The symposium addresses all issues in programming problems on rectangular grids but also to more re- to related larger entries, define specif- languages and systems - ranging from foundational alistic applications with complicated grids and do- ic terms and concepts such as the Global Position- to practical issues. The papers focus on topics such mains and discontinuous coefficients. Matrix-Based ing System, Digital Elevation/Terrain Model, and Re- as semantics, logics, foundational theory, type sys- Multigrid can be used as a textbook in courses in nu- mote Sensing. Larger entries include key citations to tems, language design, program analysis, optimiza- merical analysis, numerical linear algebra, and nu- the literature, and (online) internal hyperlinks to def- tion, transformation, software security, safety, veri- merical PDEs at the advanced undergraduate and initional entries and current standards. Published as fication, compiler systems, interpreters, abstract ma- graduate levels in computer science, math, and ap- a print volume with abundant black and white art, chines, domain-specific languages and systems, as plied math departments. The theory is written in the Encyclopedia of GIS will be available simultane- well as programming tools and environments. simple algebraic terms and therefore requires prelim- ously as an XML online reference with hyperlinked inary knowledge in basic linear algebra and calculus citations, cross-references, four-color art, links to Fields of interest only. Because it is self contained and includes useful web-based maps, and other [..] Programming Languages, Compilers, Interpreters; exercises, the book is also suitable [..] Software Engineering; Logics and Meanings of Pro- Features grams; Operating Systems; Programming Tech- Features Editor-in-Chief is leader in field, with name recog- niques; Mathematical Logic and Formal Languages Second edition is a much improved version of the nition as EiC of top journal (Geoinformatica) Top- book, with more explanation included for the non- quality editorial board, both scientifically and geo- Target groups expert graphically diverse – ensures balanced coverage A- Researchers and professionals Z organization allows easy, intuitive access for new- Contents comers to field Includes coverage of GIS standards in List of Figures.- List of Tables.- Preface.- Part I. Con- Type of publication development by ISO Proceedings cepts and Preliminaries.- 1. The Multilevel–Multi- scale Approach.- 2. Preliminaries.- Part II. PDEs and Contents Due November 2007 Their Discretization.- 3. Finite Differences and Vol- From the contents Preface.- Active Database umes.- 4. Finite Elements.- Part III. Numerical Solu- Technology.- Computational Geometry.- Crit- tion of Linear Systems.- 5. Iterative Linear-System ical Evaluation of Standards Proposals.- Data 2007. XI, 431 p. (Lecture Notes in Computer Science, Vol. 4807) Solvers.- 6. The Multigrid Iteration.- Part IV. Multi- Softcover Semantics and Models.- Geoinformatics.- grid for Structured Grids.- 7. Automatic Multigrid.- Geoprivacy.- Geosecurity.-Geospatial Data Version- 56,00 € 8. Applications in Image Processing.- 9. Black-Box ing.- Graphical Aspects.- Human Spatial Reasoning.- ISBN 978-3-540-76636-0 Multigrid.- 10. The Indefinite Helmholtz Equation.- Image Databases.- Interoperability and Standards.- 11. Matrix-Based Semicoarsening.- Part V. Multigrid Languages for Metadata Management.- Management for [..] of Raster and Vector Data.- Middleware Architec- tures.- Practical Approaches from Computational Fields of interest Geometry.- Real-Time Spatio-Temporal Databases.- Computational Mathematics and Numerical Analy- Spatial Aspects of Bioinformatics.- Spatial Aspects of sis; Numeric Computing; Applications of Mathemat- Mobile Computing.- [..] ics; Numerical and Computational Methods in Engi- neering; Mathematics of Computing; Numerical and Fields of interest Computational Methods Database Management; Information Storage and Retrieval; Computer Applications in Geosciences; Target groups Geoinformation/Cartography; Statistics for Social Advanced undergraduate and graduate students in Science, Education, Public Policy, and Law; Math. computer science, math, and applied math depart- Appl. in Environmental Science ments; researchers, engineers, and others interested in the numerical solution of partial differential equa- Target groups tions Research scientists and advanced-level students in computer science and geography Type of publication Graduate/advanced undergraduate textbook Type of publication Encyclop(a)edia Due February 2008 Due January 2008 2008. XXII, 320 p. (Numerical Methods and Algorithms, Vol. 2) Hardcover 2008. Approx. 1200 p. Hardcover 54,95 € 309,00 € ISBN 978-0-387-49764-8 ISBN 978-0-387-30858-6 134 Computer Science springer.com/booksellers

S. Shekhar, University of Minnesota, Minneapolis, MN, USA; H. C.A. Shoniregun, University of East London, UK; S. Crosier, Uni- F. Shull, Fraunhofer Center for Experimental Software Engineer- Xiong, Rutgers University, Newark, NJ, USA (Eds.) versity of East London, UK ing, College Park, MD, USA; J. Singer, National Research Council Institute for Information Technology, Ottawa, ON, Canada; D.I.K. Sjøberg (Eds.) Encyclopedia of GIS Securing Biometrics Applications Guide to Advanced Empirical Software Engineering The Encyclopedia of GIS features an alphabetical- Biometrics is becoming increasingly common in es- ly arranged comprehensive and authoritative treat- tablishments that require high security such as state ment of this subject matter. Authored by world ex- security and financial sectors. The increased threat perts and peer-reviewed for accuracy and currency, to national security by terrorists has led to the explo- This book gathers chapters from some of the top the entries explain the key software, data sets, and sive popularity of biometrics. A number of biometric international empirical software engineering re- processes used by geographers and computational devices are now available to capture biometric mea- searchers focusing on the practical knowledge nec- scientists. Nearly 200 topics include major overviews, surements such as fingerprints, palm, retinal scans, essary for conducting, reporting and using empiri- such as Geoinformatics, Spatial Cognition, and Lo- keystroke, voice recognition and facial scanning. cal methods in software engineering. Topics and fea- cation-Based Services. Short entries define specific However, the accuracy of these measurements varies, tures include: - Guidance on how to design, conduct terms and concepts, such as the Global Positioning which has a direct relevance on the levels of securi- and report empirical studies; - Information across System, Digital Elevation/Terrain Model, and Re- ty they offer. With the need to combat the problems a range of techniques, methods and qualitative and mote Sensing. Larger entries include key citations related to identify theft and other security issues, so- quantitative issues, to help build a toolkit that can be to the literature, and (online) internal hyperlinks to ciety will have to compromise between security and applicable to the diversity of software development definitional entries and current standards. The refer- personal freedoms. Securing Biometrics Applications contexts that exist; - Material with concrete software ence will be published as a print volume with abun- investigates and identifies key impacts of biometric engineering examples. Organised into 4 parts; the dant black and white art, and simultaneously as an security applications, while discovering opportuni- first 2 parts describe techniques usable for data col- XML online reference with hyperlinked citations, ties and challenges presented by the biometric tech- lection and analysis. The third provides techniques cross-references, four-color art, links to web-based nologies available. for constructing a "body of knowledge" out of indi- maps, and other interactive features. vidual studies, and a final section tackles topics relat- Features ed to empirical study. Written for graduates as well Features -Includes new biometric applications to help secure as researchers and practising software engineers in- First available Encyclopedia on GIS available to the security features in computer systems, passports, terested in empirical methods, this book will prove public in print or electronically Includes standards identity cards, credit cards and entry to government an invaluable reference. not yet published departments -Proposes the first biometric measures regarding information based on a national ID card Features Contents or centralized passport database system   To-date there has been no advanced material geared From the contents Preface.- Active Database Tech- towards new researchers and graduates – this book nology.- Computational Geometry.- Critical Evalu- Contents fills this gap Offers an extensive toolkit of techniques, ation of Standards Proposals.- Data Semantics and Preface.- Introduction and overview.- Biometric methods and qualitative and quantitative issues for Models.- Geoinformatics.- Geoprivacy.- Geosecu- Measurements.- Applications of Biometrics.- Meth- tackling a diversity of software development con- rity.-Geospatial Data Versioning.- Graphical As- ods and methodology.- Results and SCSBA Model.- texts Offers guidance on the common difficulties and pects.- Human Spatial Reasoning.- Image Databas- Discussion.- Conclusions and recommendations.- challenges encountered in the field, presenting con- es.- Interoperability and Standards.- Languages for Glossary.- Endnotes.- References.- Bibliography.- In- crete software engineering examples Metadata Management.- Management of Raster and dex. Vector Data.- Middleware Architectures.- Practical Contents Approaches from Computational Geometry.- Re- Fields of interest Editors Introduction.- Section 1: Research Meth- al-Time Spatio-Temporal Databases.- Spatial Aspects Biometrics; Image Processing and Computer Vision; ods and Techniques.- Software engineering da- of Bioinformatics.- Spatial Aspects of Mobile Com- Data Encryption; Data Structures, Cryptology and ta collection techniques in the field.- Qualitative puting.- [..] Information Theory; User Interfaces and Human Methods.- Personal Opinion Surveys.- The Focus Computer Interaction; Multimedia Information Sys- Group Method as an Empirical Tool in Software En- Fields of interest tems gineering.- Simulation Methods.- Section 2: Prac- Database Management; Information Storage and tical Foundations.- Statistical Methods and Mea- Target groups Retrieval; Computer Applications in Geosciences; surement.- Missing data in software engineering.- Practitioners and researchers in industry Geoinformation/Cartography; Statistics for Social Reporting Experiments in Software Engineering.- Science, Education, Public Policy, and Law; Math. A practical guide to ethical research involving hu- Appl. in Environmental Science Type of publication Monograph mans.- The Management of University-Industry Collaborations Involving Empirical Studies of Soft- Target groups ware [..] Research scientists and graduate-level students in Due December 2007 computer science and geography Fields of interest Software Engineering; Software Engineering/Pro- Type of publication 2008. Approx. 203 p. Hardcover gramming and Operating Systems; System Perfor- Encyclop(a)edia 76,95 € mance and Evaluation; User Interfaces and Human ISBN 978-0-387-69932-5 Computer Interaction; Management of Computing Due January 2008 and Information Systems

2008. Online version Target groups Graduates, researchers, practitioners 309,00 € ISBN 978-0-387-35973-1 Type of publication Contributed volume

Due December 2007

2008. Approx. 350 p. Hardcover

76,95 € ISBN 978-1-84800-043-8 springer.com/booksellers Computer Science 135

P. Siarry, Université de Paris, France; Z. Michalewicz, University of B. Siciliano, Naples, Italy; O. Khatib, Stanford, CA, USA (Eds.) B. Siciliano, Università degli Studi di Napoli Federico II, Naples, Adelaide, SA, Australia (Eds.) Italy; O. Khatib, Stanford University, Stanford, CA, USA (Eds.) Springer Handbook of Robotics Advances in Metaheuristics for Hard Springer Handbook of Robotics Optimization

Features Robotics is undergoing a major transformation in Research and Application-oriented handbook on one scope and dimension. Starting from a predominantly Many advances have been made recently in meta- of the hottest topics in science and technology. The industrial focus, robotics has been rapidly expanding heuristic methods, from theory to applications. The right book at the right time edited by two interna- into the challenges of unstructured environments. editors, both leading experts in this field, have as- tionally renowned experts. Includes all the relevant The "Springer Handbook of Robotics" incorporates sembled a team of researchers to contribute 21 chap- developments and applications of robotics. Ideal re- these new developments and therefore basically dif- ters organized into parts on simulated annealing, source not only for experts but also for people new to fers from other handbooks of robotics focusing on tabu search, ant colony algorithms, general-purpose this growing field such as computer scientists, medi- industrial applications. It presents a widespread and studies of evolutionary algorithms, applications of cal doctors, engineers, etc. well-structured coverage from the foundations of evolutionary algorithms, and various metaheuris- robotics, through the consolidated methodologies tics. The book gathers contributions related to the Contents and technologies, up to the new emerging applica- following topics: theoretical developments in meta- Introduction to Robotics (Bruno Siciliano, Ous- tion areas of robotics. The handbook is an ideal re- heuristics; adaptation of discrete metaheuristics to sama Khatib)Part A: Robotics Foundations (David source for robotics experts but also for people new to continuous optimization; performance comparisons Orin)Kinematics.- Dynamics.- Mechanisms and this expanding field such as engineers, medical doc- of metaheuristics; cooperative methods combining Actuation.- Sensing and Estimation.- Motion Plan- tors, computer scientists, designers; edited by two in- different approaches; parallel and distributed meta- ning.- Motion Control.- Force Control.- Robotic ternationally renowned experts. Bruno Siciliano is heuristics for multiobjective optimization; software Systems Architectures and Programming.- AI Rea- Professor of Control and Robotics at University of implementations; and real-world applications. This soning Methods for RoboticsPart B: Robot Struc- Naples, President-Elect and Distinguished Lecturer book is suitable for practitioners, researchers and tures (Frank Park)Performance Evaluation and De- of the IEEE Robotics and Automation Society, and graduate students in disciplines such as optimiza- sign Criteria.- Redundant Manipulators.- Parallel he is on the board of the European Robotics [..] tion, heuristics, operations research, and natural Mechanisms and Robots.- Robots with Flexible Ele- computing. ments.- Model Identification.- Robot Hand.- Legged Features Robots.- Wheeled Robots.- Micro/Nano RobotsPart Research and Application-oriented handbook on one Fields of interest C: Sensing and [..] of the hottest topics in science and technology. The Artificial Intelligence (incl. Robotics); Optimization; right book at the right time edited by two interna- Operations Research, Mathematical Programming; Fields of interest tionally renowned experts. Includes all the relevant Engineering Design; Theory of Computation Automation and Robotics; Artificial Intelligence (in- developments and applications of robotics. Ideal re- cl. Robotics); Computer Applications; Numerical Target groups source not only for experts but also for people new to and Computational Methods in Engineering; Elec- Researchers and graduate students in computer sci- this growing field such as computer scientists, medi- tronic and Computer Engineering ence and fields related to optimization (operations cal doctors, engineers, etc. research, mathematics) Target groups Contents Researchers and Students at Universities Type of publication Part A Robotics Foundations.- Part B Robot Struc- and Mechanical and Electrical Engineers in Monograph tures.- Part C Sensing and Perception.- Part D Ma- Industry and Goverment Labs. nipulation and Interfaces.- Part E Mobile and Dis- tributed Robotics.- Part F Field, Service and Inter- Due November 2007 Type of publication vention Robotics.- Part G Human-Centered and Handbook Life-Like Robotics 2007. Approx. 510 p. (Natural Computing Series) Hardcover Due May 2008 Fields of interest 74,95 € Automation and Robotics; Artificial Intelligence (in- ISBN 978-3-540-72959-4 cl. Robotics); Computer Applications; Numerical 2008. eReference. and Computational Methods in Engineering; Elec- 249,00 € tronic and Computer Engineering ISBN 978-3-540-30301-5 Target groups Researchers and students at universities and me- chanical and electrical engineers in industry and gov- ermental laboratories

Type of publication Handbook

Due May 2008

2008. Approx. 1500 p. 800 illus. in color. Hardcover

249,00 € ISBN 978-3-540-23957-4 136 Computer Science springer.com/booksellers

J. Simmons, Monarch Network Architects, Holmdel, NJ, USA A. Simon, University of Kent, UK A. Singh, SafeNet Infotech Pvt. Ltd., Noida, India (Ed.)

Introduction to Optical Network Value-Range Analysis of C Programs Vulnerability Analysis and Defense Design and Planning for the Internet

Value-Range Analysis of C Programs describes a static analysis for detecting buffer overflows. A buffer Telecommunications carriers have begun to upgrade Vulnerability analysis, also known as vulnerability overflow in a C program occurs when input is read their networks with state-of-the-art optical equip- assessment, is a process that defines, identifies, and into a memory buffer whose length exceeds that of ment, referred to as optical-bypass technology. The classifies the security holes (vulnerabilities) in a com- the buffer. Overflows usually lead to crashes and may ramifications of this technology are manifold, affect- puter, network, or an application. In addition, vul- even enable a malicious person to gain control over a ing the architecture, operation, and economics of nerability analysis can forecast the effectiveness of computer system. They are recognised as one of the the network, all of which are covered in this book. proposed countermeasures and evaluate their actu- most widespread forms of computer vulnerability. The book is oriented towards practical implementa- al effectiveness after they are put into use. Vulnera- Based on the analysis of a standard mail-forwarding tion in metro and backbone networks, taking advan- bility Analysis and Defense for the Internet provides program, necessary refinements of the basic analysis tage of the author’s extensive experience with actu- packet captures, flow charts and psuedo code, which are examined, thereby paving the way for an analysis al commercial equipment and carrier networks. The enable a user to identify if an application/protocol that is precise enough to prove the absence of buffer book starts with an overview of optical networking, is vulnerable. If an application is vulnerable, then a overflows in legacy C code. including an introduction to state-of-the-art optical user will be able to understand the complexity, and networks. The second chapter covers legacy optical Features the theory behind the vulnerability. This edited vol- equipment and the new optical-bypass technology, Complete formal specification of a static analysis of ume also includes case studies where latest exploits with an emphasis on the architectural impact of the a real-world programming language New techniques are discussed. equipment. For example, the discussion covers how to soundly handle the wrapping of integers, overlap- Features the various types of equipment affect the economics ping memory accesses and pointer arithmetic, Includes detail vulnerabilities in an application and and flexibility of the network. One of the challenges thereby providing an analysis of C that is faithful to how the vulnerability affects the software Provides of optical-bypass technology is that it requires so- the bit-level phisticated algorithms in order to operate [..] a source code for effective signatures to prevent vul- Contents nerabilities Features From the Contents: Value Range Analysis.- Contents Addresses the need for a very pragmatic approach to Analysing C.- A Semantics for C.- Core C.- Related HTTP Protocol Vulnerability Analysis.- SMTP / deploying stateof-the-art optical networking equip- Work.- Abstracting Soundly.- Abstract State Space.- POP/IMAP Vulnerability Analysis.- LDAP Vulnera- ment in metro and backbone networks through an Points-To Analysis.- Numeric Domains.- Taming bility Analysis.- SNMP Vulnerability Analysis.- DNS architectural, algorithmic, and economic approach to Casting and Wrapping.- A Language Featuring Fi- Protocol.- FTP Protocol.- TFTP Protocol.- Wireless optical networking. Focuses on real-world networks nite Integer Arithmetic.- Implicit Wrapping of Poly- Security.- Malware Analysis.- Spyware. because it is written from the perspective of someone hedral Variables.- Explicit Wrapping of Polyhedral who has extensive experience with commercial state- Variables.- An Abstract Semantics for SubC.- Dis- Fields of interest of-the-art networking technology.  Provides cussion.- Overlapping Memory Accesses and Point- [..] Systems and Data Security; Computer Communica- ers.- Memory as a Set of Fields.- Mixing Values and tion Networks; Data Encryption; Information Sys- Pointers.- Abstraction Relation.- Abstract Seman- Contents tems Applications (incl.Internet); Computer Systems tics.- Ensuring Efficiency.- Planar Polyhedra.- Oper- Introduction to Optical Networks.- Optical Network Organization and Communication Networks; Data ations [..] Elements.- Routing Algorithms.- Regeneration.- Structures, Cryptology and Information Theory Wavelength Assignment.- Grooming.- Optical Pro- Fields of interest tection.- Economic Studies. Target groups Logics and Meanings of Programs; Software Engi- Practitioners, researchers, advanced-level students neering; Numeric Computing Fields of interest Communications Engineering, Networks; Computer Type of publication Target groups Contributed volume Communication Networks; Microwaves, RF and Op- Researchers and PhD Students tical Engineering; Signal,Image and Speech Process- ing Type of publication Due January 2008 Monograph Target groups 2008. Approx. 250 p. (Advances in Information Security, Vol. 40) Professionals in the telecommunications in- Hardcover dustry, as well as graduate students or senior-level Due April 2008 undergraduate students. 76,25 € 2008. Approx. 250 p. Hardcover ISBN 978-0-387-74389-9 Type of publication Monograph 79,95 € ISBN 978-1-84800-016-2 Due May 2008

2008. Approx. 300 p. (Optical Networks) Hardcover

76,25 € ISBN 978-0-387-76475-7 springer.com/booksellers Computer Science 137

S.N. Sivanandam, PSG College of Technology, Coimbatore, India; S.S. Skiena, State University of New York, Stony Brook, NY, USA A. Soares, Instituto Superior Técnico, Lisbon, Portugal; M.J. S.N. Deepa, PSG College of Technology, Coimbatore, India Pereira, Instituto Superior Técnico, Lisbon, Portugal; R. Dimi- trakopoulos, McGill University, Montreal, Canada (Eds.) The Algorithm Design Manual Introduction to Genetic Algorithms geoENV VI – Geostatistics for Environmental Applications The mathematical analysis of algorithms uses a va- The book contains basic concepts, several appli- riety of topics from discrete math--combinatorial cations of Genetic Algorithms and solved Genetic analysis, congruences, generating functions, graph Problems using MATLAB software and C/C++. The theory, and other tools. They are essential for anyone This volume contains ca. 40 selected full-text con- salient features of the book include - detailed expla- to learn and programatically use and analyze com- tributions from the Sixth European Conference nation of Genetic Algorithm concepts, - numerous putational structures (i.e., algorithms). This new ad- on Geostatistics for Environmental Applications, Genetic Algorithm Optimization Problems, - study vanced text/reference presents a general computa- geoENV IV, held in Rhodes, Greece. October 25-26, on various types of Genetic Algorithms, - implemen- tional approach to discrete math. It will also serve as 2006. The objective of the editors was to compile tation of Optimization problem using C and C++, - a brief manual to the accompanying combinatorial a set of papers from which the reader could per- simulated solutions for Genetic Algorithm problems program, 'combinatorics.' [proposal attached] ceive how geostatistics is applied within the environ- using MATLAB 7.0, - brief description on the basics mental sciences. A few selected theoretical contri- of Genetic Programming, - application case studies Contents butions are also included. Audience: After six edi- on Genetic Algorithm on emerging fields. 1.Preliminaries; 2.Sums; 3.Integer Functions; 4.Num- tions the geoENV Congress Series has established ber Theory; 5.Binomial Coefficients; 6.Special Num- itself as a 'must' to all scientists working in the field Features bers; 7.Generating Functions; 8.Discrete Probability; of geostatistics for environmental applications. Each Basic introduction to Genetic Algorithms contains 9.Graphy Theory geoENV congress covers the developments which basic concepts, several applications of Genetic Al- have occurred during the preceding two years, but gorithms and solved Genetic Problems using MAT- Fields of interest always with a highly applied focus. It is precisely this LAB software and C/C++ Written for a wide range Discrete Mathematics in Computer Science; Mathe- focus on the applications to environmental sciences of readers, who wishes to learn the basic concepts of matics of Computing; Combinatorics which makes the geoENV volumes unique and of Genetic Algorithms Starters can understand the con- great interest and practical value to geostatisticians cepts with a minimal effort Target groups Advanced undergraduates Practitioners Beginning working both in academia and in industry. Contents grads n/a Fields of interest Evolutionary Computation.- Genetic Algorithms.- Math. Applications in Geosciences; Environmental Terminologies and Operators of Genetic Algorithm.- Type of publication Computing/Environmental Modelling; Statistics for Advanced Operators and Techniques in Genetic Al- Graduate/advanced undergraduate textbook Engineering, Physics, Computer Science, Chemistry gorithm.- Classification of Genetic Algorithm.- Ge- & Geosciences; Math. Appl. in Environmental Sci- netic Programming.- Genetic Algorithm Optimiza- Due September 2008 ence tion Problems.- Genetic Algorithm Implementation using Matlab.- Genetic Algorithm Optimization in 2008. Approx. 735 p. 75 illus. Hardcover Target groups C/C++.- Applications of Genetic Algorithms. Researchers, scientists, professionals, institutes, li- 52,00 € braries, graduate students of Geosciences, Geostatis- Fields of interest ISBN 978-1-84800-069-8 tics, Spatial Statistics, Environmental Science and Appl.Mathematics/Computational Methods of Engi- Engineering, Ecology, Oceanography, Climatology, neering; Artificial Intelligence (incl. Robotics) Hydrology, Soil and Forestry Science Target groups Type of publication Graduate students, researchers in evolutionary com- Monograph putation, and genetic algorithms; readers, who wish to learn the basic concepts of genetic algorithms Due January 2008 Type of publication Monograph 2008. XX, 506 p. 200 illus. (Quantitative Geology and Geostatis- tics, Vol. 15) Hardcover Due October 2007 149,95 € ISBN 978-1-4020-6447-0 2008. XIX,442 p.193 illus Hardcover

69,95 € ISBN 978-3-540-73189-4 138 Computer Science springer.com/booksellers

A. Spink, Brisbane, QLD, Australia; M. Zimmer, New York Universi- E. Stefanakis, Harokopio University, Athens, Greece S. Sumathi, PSG College of Technology, Coimbatore, India; T. ty, NY, USA (Eds.) Hamsapriya, PSG College of Technology, Coimbatore, India; P. Surekha, PSG College of Technology, Coimbatore, India Geographic Databases and GIS Web Search Evolutionary Intelligence Multidisciplinary Perspectives  The author highlights the technological as- An Introduction to Theory and Applications with Matlab pects of GIS. Specifically, it focuses on its database and database management system. The method- Web search engines have emerged as one of the ologies for modeling and handling geographic da- dominant technologies of modern life, leaving few This book gives a good introduction to evolution- ta are described while commercial packages are aspects of our everyday activities untouched. Search ary computation for those who are first entering the presented.  engines are not just indispensable tools for finding field and are looking for insight into the underlying mechanisms behind them. Emphasizing the scientif- and accessing information online, but have become Contents ic and machine learning applications of genetic algo- a defining component of the human condition and   1) Geographic Data and Geographic rithms instead of applications to optimization and can be conceptualized as a complex behavior embed- Information Systems  The nature of geo- engineering, the book could serve well in an actual ded within an individual's everyday social, cultur- graphic data; Information system; Geographic course on adaptive algorithms. The authors include al, political, and information-seeking activities. This Informatioan Systems;   2) Database Sys- excellent problem sets, these being divided up into book investigates Web search from the non-techni- tems Technology Database systems; Database sys- "thought exercises" and "computer exercises" in ge- cal perspective, bringing together chapters that rep- tems design; Advanced database systems netic algorithm. Practical use of genetic algorithms resent a range of multidisciplinary theories, mod- design; Data structure and algorithms   demands an understanding of how to implement els, and ideas about Web searching. They examine 3) Geographic Database Systems Technology them, and the authors do so in the last two chap- the various roles and impacts of Web searching on Representation of geographic data; Geographic data ters of the book by giving the applications in various the social, cultural, political, legal, and informational models; Geographic data analysis operations; Com- fields. This book also outlines some ideas on when spheres of our lives, such as the impact on individu- putational geometry; Spatial data structure; Execut- genetic algorithms and genetic programming should als, social groups, modern and postmodern ways of ing geographic operations; Commercial geographic be used, and this is useful since a newcomer to the knowing, and public and private life. By critically ex- database systems; Current [..] amining the issues, theories, and formations arising field may be tempted to view a genetic algorithm as from, and surrounding, Web searching, Web [..] Fields of interest merely a fancy Monte Carlo simulation. The most Geoinformation/Cartography; Environmental Com- difficult part of using a genetic algorithm is [..] Contents puting/Environmental Modelling; Math. Applica- Features 1) Introduction (Spink, Zimmer).- Part I: Social, Cul- tions in Geosciences; Information Systems Applica- Basic Introduction to Evolutionary Computation tural, and Philosophical Perspectives - 2) Through tions (incl.Internet); Computer Appl. in Life Sciences the Google Goggles: Sociopolitical Bias in Search Contains basic concepts, several applications of Evo- Engine Design (Diaz) - 3) Reconsidering the Rhi- Target groups lutionary Computation and solved Problems using zome: A Textual Analysis of Web Search Engines  Researchers, scientists, libraries, advanced MATLAB software and C/C++ Written for a wide as Gatekeepers of the Internet (Hess) - 4) Exploring students, (Geosciences, Geoinformation/Geo- range of readers, who wishes to learn the basic con- Gendered Notions: Gender, Job Hunting, and Web matics, Information Systems, Cartography, Geogra- cepts of Evolutionary and Genetic Algorithms A Searches (Martey) - 5) Searching Ethics: The Role phy, Environmental Sciences) starter can understand the concepts with a minimal of Search Engines in the Construction and Distribu- effort tion of Knowledge (Hinman) - 6) The Gaze of the Type of publication Perfect Search Engine: Google as an Infrastructure of Monograph Contents Dataveillance (Zimmer).- Part II: [..] Introduction to Evolutionary Computation.- Evolu- tionary Algorithms.- Genetic Algorithms with Mat- Due December 2008 Fields of interest lab.- Genetic Programming Concepts.- Parallel Ge- Information Systems Applications (incl.Internet); netic Algorithms.- Applications of Evolutionary Al- Social Sciences; Library Science; Computers and So- 2008. Approx. 400 p. Hardcover gorithms.- Applications of Genetic Algorithms.- Ge- ciety netic Programming Applications.- Applications of 119,95 € Parallel Genetic Algorithm.- Assembling DNA Frag- Target groups ISBN 978-3-540-22491-4 ments with a Distributed Genetic Algorithm. Information scientists, computer scientists, librari- ans, library science researchers Fields of interest Appl.Mathematics/Computational Methods of Engi- Type of publication neering; Artificial Intelligence (incl. Robotics) Monograph Target groups Due January 2008 Graduate students, researchers in evolutionary com- putation, genetic algorithms, wide range of readers, who wishes to learn the basic concepts and state of 2008. Approx. 440 p. (Information Science and Knowledge Man- the art of EC agement, Vol. 14) Hardcover Type of publication 89,95 € Monograph ISBN 978-3-540-75828-0

Due January 2008

2008. Approx. 660 p. Hardcover

99,95 € ISBN 978-3-540-75158-8 springer.com/booksellers Computer Science 139

C. Sun, CSIRO, North Ryde, NSW, Australia W. Susilo, Engineering University of Wollongong, Australia; J.K. E. Swartzlander, University of Texas at Austin, TX, USA; C. Liu, Institute for Infocomm Research; Y. Mu, Engineering Univer- Lemonds, AMD (Eds.) sity of Wollongong, Australia (Eds.) Fast Algorithms for Stereo Matching Computer Arithmetic: A Complete Provable Security Reference First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 Proceedings An ongoing effort is being made in the field of com- puter vision to refine algorithms for optimal/bet- This is a collection of the key papers in floating-point ter performance, which can mean reliability and in- arithmetic. The focus is on hardware implementa- creased computational speed. This is highly impor- This book constitutes the refereed proceedings of tion using VLSI circuits. Although some of the pa- tant given that vision problems are much larger than the First International Conference on Provable Secu- pers are written by academics, many are by people ever before. One way to satisfy part of the demand rity, ProvSec 2007, held in Wollongong, Australia, from industry describing real chips. This compre- is to design more efficient and clever algorithms October 31 - November 2, 2007. The 10 revised full hensive book will combine collected papers from that optimize computations in an existing proces- papers presented together with 7 short papers were two previously published volumes into one accessi- sor, rather than require expanded processor perfor- carefully reviewed and selected from 51 submissions. ble reference. Key Features: Book is a thorough com- mance. Such fast algorithms are becoming increas- The papers are organized in topical sections on Au- pellation of the most influential papers in Computer ingly important for tele-reality, interactive media thentication, Asymmetric Encryption, Signature, Arithmetic; Combines obscure yet important papers and visual servoing applications. This book presents Protocol and Proving Technique, Authentication into one easily accessible volume; Newest edition in some fast and reliable algorithms for dense stereo and Symmetric Encryption, Signature and Asymmet- established series from Earl Swartzlander, a top ex- matching and optical-flow estimations using a gen- ric Encryption. pert in the field of Computer Arithmetic. eral language, such as C, rather than dedicated hard- Fields of interest ware implementation. "Dense" in this instance means Features Systems and Data Security; Data Structures, Cryp- performing stereo matching for every point on the Book is a thorough compellation of the most influ- tology and Information Theory; Data Encryption; e- image rather than just matching features such as ential papers in Computer Arithmetic Combines business and e-commerce; Legal Aspects of Comput- points, lines or regions. Techniques described are: obscure yet important papers into one easily acces- ing fast algorithms for similarity measure, use of [..] sible volume Newest edition in established series from Earl Swartzlander, a top expert in the field of Target groups Contents Computer Arithmetic Thorough treatment of Float- Researchers and professionals Introduction.- Stereo vision.- Fast calculation of sim- ing-Point Arithmetic ilarity measures.- Rectangular subregioning.- Mul- Type of publication Contents ti-resolution Scheme.- Fast stereo matching.- Stereo Proceedings matching using 3-D surface.- Stereo matching using N/A warping.- Panoramic stereo matching.- Fast optical Fields of interest flow.- Discussions on reliability and speed.- Applica- Due October 2007 Processor Architectures; Circuits and Systems; Ap- tions. plications of Mathematics 2007. X, 237 p. (Lecture Notes in Computer Science, Vol. 4784) Fields of interest Softcover Target groups Pattern Recognition; Image Processing and Comput- Engineers that design processors in industry and er Vision; Simulation and Modeling 42,00 € ISBN 978-3-540-75669-9 graduate students in computer engineering or com- Target groups puter science Professionals, Researchers Type of publication Type of publication Collection of essays Manual Due February 2008 Due March 2008 2008. Approx. 1100 p. Hardcover 2007. Approx. 290 pp. 70 illus. Hardcover 192,50 € 44,95 € ISBN 978-0-387-74883-2 ISBN 978-0-387-95424-0 140 Computer Science springer.com/booksellers

A. Syropoulos, Democritus University of Thrace, Xanthi, Greece D. Thalmann, EPFL VRlab, Lausanne, Switzerland; S.R. Musse, R.F. Tichy, Technical University Vienna, Graz, Austria; H.P. Schlick- Pontifícia Universidade Católica do Rio Grande do Sul, Brazil ewei, Phillipps-University, Marburg, Germany; K. Schmidt, Uni- versity of Vienna, Austria (Eds.) Hypercomputation Crowd Simulation Computing Beyond the Church-Turing Barrier Diophantine Approximation

Festschrift for Wolfgang Schmidt There has been a growing interest in crowd simula- Hypercomputation is a relatively new theory of com- tion particularly in the commercial sector where it putation that is about computing methods and de- is used in security, defence, entertainment and the This volume contains 21 research and survey papers vices that transcend the so-called Church-Turing movie industry. This field is now reaching maturity on recent developments in the field of diophantine thesis. This book will provide a thorough descrip- and there is a need for a book that focuses entirely approximation. This includes contributions to Wolf- tion of the field of hypercomputation covering all at- on methods and techniques for crowd simulation, gang Schmidt's subspace theorem and its applica- tempts at devising conceptual hypermachines and this book fills that gap. The topics covered include: tions to diophantine equations and to the study of all new promising computational paradigms that Modelling of populations, Virtual Human Anima- linear recurring sequences. The articles are either in may eventually lead to the construction of a hyper- tion, Behavioural Animation of Crowds, Crowd Ren- the spirit of more classical diophantine analysis or machine. Readers of this book will get a deeper un- dering, Populated Environments. derstanding of what computability is and why the of geometric or combinatorial flavour. Several arti- Church-Turing thesis poses an arbitrary limit to Features cles deal with estimates for the number of solutions what can be actually computed. Hypercomputing First book to focus entirely on methods and tech- of diophantine equations as well as with congruences is in and of itself quite a novel idea and as such the niques for crowd simulation Crowd simulation is in and polynomials. Furthermore, the volume contains book will be interesting in its own right. The most demand in many applications including, security, de- transcendence results for special functions and con- important features of the book, however, will be the fence, entertainment and the movie industry tributions to metric diophantine approximation and thorough description of the various attempts of hy- discrepancy theory. The articles are based on lectures percomputation: from trial-and-error machines to Contents given at a conference at the Erwin Schrödinger-Insti- the exploration of the human mind, if we treat it as a Introduction.- State of the Art.- Modeling of Popula- tute (Vienna, 2003), where many leading experts in computing device. tions.- Virtual Human Animations.- Behavioral An- the field of diophantine approxiamtion participated. imation of Crowds.- Relating Real Crowds with Vir- Features tual Crowds.- Crowd Rendering.- Populated envi- Features Deals exclusively with the topic and presents the ronments.- Applications: Case Studies.- References. Current information on important branches of dio- whole field Provides a deeper understanding of what phantine approximation from leading experts in the computability is and why the Church-Turing thesis Fields of interest field Diverse methods are presented The influence of poses an arbitrary limit to what can be actually com- Computer Graphics; Image Processing and Comput- diophantine approximation in other fields, e.g. com- puted Describes the various attempts at hypercom- er Vision; Simulation and Modeling; Pattern Recog- binatorial geometry, game theory putation: from trial-and-error machines to the ex- nition Fields of interest ploration of the human mind, if treated as a comput- Algebra; Computational Mathematics and Numeri- ing device Target groups PhD candidates, undergraduate/postgraduate stu- cal Analysis; Number Theory Contents dents interested in crowd simulation Target groups Preface.- Introduction.- On the Church-Turing The- Researchers and graduate students sis.- Early Hypercomputers.- Infinite Time Turing Type of publication Monograph Machines.- Interactive Computing.- Hyperminds.- Type of publication Computing Real Numbers.- Relativistic and Proceedings Quantum Hypercomputation.- Natural Com- Due November 2007 putation and Hypercomputation.- Appendix A. In- teractability and Hypercomputation.- Appendix B.- Due February 2008 2007. Approx. 270 p. Hardcover Socio-Economical Implications.- Appendix C. A Précis of Topology and Differential Geometry.- Bib- 74,95 € 2008. Approx. 430 p. (Developments in Mathematics, Vol. 16) liography.- People Index.- Subject Index. ISBN 978-1-84628-824-1 Hardcover Fields of interest 99,95 € Theory of Computation; Algorithm Analysis and ISBN 978-3-211-74279-2 Problem Complexity; Computation by Abstract De- vices; Coding and Information Theory

Target groups Researchers, engineers, and professionals in Com- puter Science, Mathematics and Physics

Type of publication Monograph

Due May 2008

2008. XVI, 216 p. 14 illus. Hardcover

59,95 € ISBN 978-0-387-30886-9 springer.com/booksellers Computer Science 141

H. Toriya, Lattice Technology, Co. Ltd., Tokyo, Japan P. Traynor, Penn State University, University Park, PA, USA; P. Mc- A. Troelsen, Minneapolis, MN, USA Daniel, Penn State University, University Park, PA, USA; Th. La Porta, Penn State University, University Park, PA, USA 3D Manufacturing Innovation Pro VB 2008 and the .NET 3.5

Revolutionary Change in Japanese Manufacturing with Digital Security and Telecommunications Platform Data Networks

.NET 3.5 is Microsoft’s largest development soft- 3D design is now a key technology for effective col- ware launch since .NET 2.0 and (unlike .NET 3.0) laboration between manufacturing companies. Since Telecommunications networks are a critical compo- completely replaces all previous .NET versions. A the introduction of light-weight 3D data technolo- nent of the economic and social infrastructures in new version of Visual Studio – Visual Studio ‘Or- gy, “post-3D CAD/CAM/CAE data” is now compat- which we live. Each day, more than two billion peo- cas’ is being created for the new Framework togeth- ible for use across manufacturing, sales and market- ple across the globe rely upon these systems, as their er with new versions of both the Visual Basic and ing processes. The successful use of 3D data through- primary means of connecting to the world around C# languages. This book deals with this new Visu- out such processes has become indispensable for them Given the significant focus on securing critical al Basic language. The book provides developers the competitive strength of companies in the man- infrastructure in recent years, Security and Telecom- with a complete treatise on the new technology- ufacturing industry. For a company to survive and munications Networks creates a starting place for explaining the importance of all the new features win in the manufacturing industry, it must not on- new researchers in the field of secure telecommuni- (lambda expressions, LINQ, ASP.NET AJAX, WPF ly accumulate light-weight 3D data, but also share cations networks. This volume not only discusses everywhere).and how they integrate into the frame- this information within the company and with re- emerging threats, along with system vulnerability, work of the previous .NET versions. It is a compre- lated companies, and train key personnel in the use but also presents the open questions posited by net- hensively revised and updated version of author’s of this data. 3D Manufacturing Innovation intro- work evolution and defense mechanisms. Security award winning previous titles. duces the best practices developed by Toyota, Sony, and Telecommunications Networks is designed for a Nikon, Casio and other pioneers in the global engi- professional audience composed of practitioners and Features neering scene, providing the reader with invaluable researchers in industry. This book is also suitable as The first book to deal with his important new tech- tips for manufacturing innovation. 3D Manufactur- a secondary text for graduate-level students in com- nology in detail Written by a proven and award ing Innovation is a valuable guide for corporate IT puter science and electrical engineering. winning .NET author that has been following the managers, consultants and professionals involved in technology release cycle since it’s inception Covers Features CAD/CAM/CAE, as [..] not just the details of VB 9.0 with .NET 3.5 but also First book to discuss securing current and next gen- the technology’s integration with previous versions Features eration telecommunications networks by the secu- of .NET and ancillary technologies Introduces the best practises of global companies for rity community Telecommunications networks are the use of light-weight 3D CAD/CAM/CAE data part of national critical infrastructure – one of the Contents few systems not previously subject to external securi- Introducing VB and the .NET Platform.- The Phi- Contents ty scrutiny and review losophy of .NET.- Building VB Applications.- VB Adoption of IT by Manufacturing Industry to En- Programming Fundamentals.- VB Programming hance Competitive Strength.- The Trend Towards Contents Constructs, Part I.- VB Programming Constructs, the Use of Lightweight 3D Data.- SONY: Ideas on Preface.- Introduction .- Network Architecture and Part II.- Defining Encapsulated Class Types.- In- Expanding Lightweight 3D Data to Company-wide Security Overview.- Taxonomy of Telecommuni- heritance and Polymorphism.- Structured Excep- Use.- Surfacing Effects of the Use of Lightweight cations Vulnerabilities.- SMS Attacks.- SMS Attack tion Handling.- Understanding Object Lifetime.- 3D Data.- TOYOTA: Design Review in Body De- Mitigation Techniques.- Attacks on Cellular Data Advanced Object Oriented Constructs.- Working sign.- NIKON: The Use of 3D Data as a Commu- Systems.- Open Problems and Future Directions.- with Interfaces.- Delegates and Events.- Advanced nication Pipe.- YAMAGATA CASIO: Digital Engi- Index. VB Programming Constructs.- Collections, Gener- neering Practiced at Die and Mold Plant and Trans- ics and Nullable Data Types.- Functional Program- Fields of interest fer of Technological Information.- ALPINE PRECI- ming Constructs.- Introducing LINQ.- Program- Systems and Data Security; Computer Communi- SION: Report-less and Drawing-less in Mold-Mak- ming with .NET Assemblies.- [..] cation Networks; Data Encryption; Data Structures, ing.- TOKAI RIKA: Visualization of Product Infor- Cryptology and Information Theory; Computer Sys- mation; Mold-making Using 3D Work [..] Fields of interest tems Organization and Communication Networks Programming Techniques Fields of interest Target groups Manufacturing, Machines, Tools; Computer-Aided Target groups Professionals Engineering (CAD, CAE) and Design; Engineering New .NET developers , intermediate to advanced starting their careers with the Design; Industrial Design (Industriedesign); Produc- Type of publication most current version of the technology. and .NET 2.0 tion/Logistics Professional book developers trading up to .NET 3.5 Target groups Corporate IT managers responsible for relating man- Due December 2007 Type of publication ufacturing process by employing different digital en- Professional book gineering tools like CAD, CAE, CAT, and PDM; all 2008. Approx. 350 p. (Advances in Information Security, Vol. 54) professionals involved in the manufacturing of prod- Hardcover Due January 2008 ucts; IT consultants; vendors of digital engineering software 76,25 € ISBN 978-0-387-72441-6 Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Type of publication Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Monograph Oman, Qatar, Palestine: Jordan Book Center

Due March 2008 2008. Approx. 1000 p. Hardcover

Originally published in Japanese by Nikkei Business Publications, ISBN 978-1-59059-822-1 2006

2008. Approx. 300 p. Hardcover

92,95 € ISBN 978-1-84800-037-7 springer.com/booksellers Computer Science 142

W. Truszkowski, NASA Goddard Space Flight Center, USA; L. Hal- M.-H. Tsou, San Diego University, California, USA H. Tsubaki, University of Tsukuba, Japan; K. Nishina, Nagoya In- lock, NASA Goddard Space Flight Center, USA; C. Rouff, Science sutitute of Technology, Nagoya, Japan; S. Yamada, University of Applications International Corporation; J. Karlin, Viable Systems, Tsukuba, Japan (Eds.) Inc. USA; J. Rash, University of Maryland, Baltimore County, USA; Designing Web Map Services and M. Hinchey, NASA Goddard Space Flight Center, USA; R. Sterritt, University of Ulster, UK (Eds.) Network-based Cybercartography The Grammar of Technology Development Autonomous and Autonomic This book provides a comprehensive intro- Systems duction of web map services including online map design principles, theories of cybercartography, var- This book includes one keynote lecture and four- With Applications to NASA Intelligent Spacecraft Operations teen selected papers that describe a general guideline and Exploration Systems ious real-world mapping applications, and the relat- ed Web GIS technologies. The goal of this book is and supporting concepts/tools of technology devel- to provide a practical learning guide to cartograph- opment as a grammar. Recent advances of scientif- ic graduate students and GIS/Cartography ic and engineering environments require new disci- This book provides an in-depth discussion of au- professionals who are interested in developing web plines, tools and concepts. For example, advances of tonomous and autonomic systems, their interdepen- mapping applications. Recent developments of net- computer simulation require new approaches of sta- dencies, differences and similarities. Current and work-based cybercartography has created a strong tistical techniques to utilize computer simulation ef- pending issues in these evermore increasingly im- interest and academic research emphasis in the area ficiently for technology development. The included portant subjects are highlighted and discussed. Con- of web mapping. This book provides a systematic papers in this book are focusing on new approach- cepts, ideas and experiences are explored in relation overview and step-by-step training modules for GIS/ es based on these practical requirements.The editors to real-life NASA systems in spacecraft control and Cartography professionals. are sure that these selected papers contribute acceler- in the exploration domain. ating the technology development by an application Features of the grammar of technology shown in this book. Features The first comprehensive and coherent learning guide Unique combination of spacecraft, autonomous and that provides a systematic overview and step-by-step Fields of interest autonomic systems training modules for professionals and students in Appl.Mathematics/Computational Methods of Engi- web map services. Balanced view between the tech- neering; Statistics for Engineering, Physics, Comput- Contents nology-oriented and skill trainings and the theory - er Science, Chemistry & Geosciences From the Contents: Part I Background.- Introduc- oruented map design emphasis.  Suitable for tion.- Direction of New Space Mission.- Overview of Type of publication course use (senior undergraduate/graduate) for GIS/ Flight and Ground Software.- Flight vs. Ground Im- Proceedings Cartography plementation.- Flight Autonomy Evolution.- Current Levels of Flight Automation/Autonomy.-Ground Contents Due December 2007 Autonomy Evolution.- Agents for Ground Auton- 1. Introduction to Web Mapping Design.- 2. The De- omy.- Part II Technology.- Core Technologies for velopment of Network-based Cybercartography.- 3. 2008. Approx. 250 p. 100 illus. Hardcover Developing Autonomous and Autonomic Systems.- Getting Started with Web Mapping Tools.- 4. The Reasoning with Partial Information.- Agent-based Design Principles of Web Mapping.- 5. The Tech- ISBN 978-4-431-75231-8 Spacecraft Autonomy Design Concepts.- Flight Soft- nologies of Web Mapping.- 6. Evaluation and Main- ware Backbone Concept.- Cooperative Autonomy.- tenance of Web Map Services.- 7. On-line Mapping Need for Cooperative Autonomy in Space Missions.- Case Study.- 8. Mobile Mapping.- 9. Future Direc- Expectations of [..] tions and Conclusion

Fields of interest Fields of interest Artificial Intelligence (incl. Robotics); Simulation Geoinformation/Cartography; Media Design; Mul- and Modeling; Extraterrestrial Physics, Space Sci- timedia Information Systems; Information Systems ences Applications (incl.Internet); Computer Applications in Geosciences; Landscape/Regional and Municipal Target groups Planning NASA employees and Contractors / Researchers Target groups Type of publication Professional cartographers; senior Monograph undergraduate and graduate students in Ge- ography and GIS fields; researchers and lecturers in Due April 2008 these fields

2008. Approx. 316 p. (NASA Monographs in Systems and Soft- Type of publication ware Engineering) Hardcover Monograph

76,95 € Due November 2007 ISBN 978-1-84628-232-4

2008. Approx. 300 p. (Advances in Geographic Information Sci- ence , Vol. 3) Hardcover

129,95 € ISBN 978-3-540-74856-4 springer.com/booksellers Computer Science 143

P. Tuyls, Philips Research, Eindhoven, The Netherlands; B. Sko- S.P. Vadhan, Harvard University, Cambridge, MA, USA S. Vassiliadis, Delft University of Technology, The Netherlands; D. ric, Philips Research, Eindhoven, The Netherlands; T. Kevenaar, Soudris, Democritus University of Thrace, Greece (Eds.) Philips Research, Eindhoven, The Netherlands (Eds.) A Study of Statistical Zero- Knowledge Proofs Fine- and Coarse-Grain Security with Noisy Data Reconfigurable Computing Private Biometrics, Secure Key Storage and Anti-Counterfeit- ing Zero-knowledge interactive proofs play a central role in the design and study of cryptographic pro- Fine- and Coarse-Grain Reconfigurable Comput- tocols and are rich objects for complexity-theoret- ing gives the basic concepts and building blocks for Noisy data appear very naturally in applications ic study. Statistical zero-knowledge (SZK) proofs the design of Fine- (or FPGA) and Coarse-Grain Re- where the authentication is based on physical identi- achieve strong information-theoretic "security", and configurable Architectures. Recently-developed in- fiers. This book provides a self-contained overview can provide a clean test bed for the study of more tegrated architecture design and software-support- of the techniques and applications of security based general notions that incorporate computational se- ed design flow of FPGA and coarse-grain reconfig- on noisy data. It covers both the theory of authenti- curity. This monograph is a revised and extended urable architecture are also described. The book is cation based on noisy data and shows it in practice as version of the author's PhD thesis, the winning the- accompanied by an interactive CD which include a key tool for prevention of counterfeiting. Biomet- sis of the 2000 ACM Doctoral Dissertation Compe- case studies and lab projects for the design of FPGA rics and physical unclonable functions are discussed tition. It is a comprehensive investigation of statisti- and Coarse-grain architectures based on the Euro- extensively. Key new technologies discussed include: cal zero-knowledge (SZK) proofs. It begins by show- pean funded projects AMDREL and MOLEN, re- -Algorithms to derive secure keys form noisy data ing that SZK has two natural complete problems, and spectively. Part I consists of two extensive surveys of in particular from Physical Unclonable Functions then uses these complete problems to address a wide FPGA and Coarse-Grain Reconfigurable Architec- and Biometrics, - also the theory which proves that variety of fundamental questions about SZK. It also tures. In Part II, case studies, innovative research re- those algorithms are secure is made accessible; Prac- includes a chapter that surveys recent developments sults about reconfigurable architectures and design tical Implementations of the above mentioned algo- in the area, in particular how the results and tech- frameworks from three projects AMDREL, MOLEN rithms; - Techniques that give insight in the securi- niques of this thesis have been extended to compu- and ADRES and DRESC, and, a new classification ty of those systems in practice; An overview and de- tational zero-knowledge proofs and arguments. The according to microcoded architectural criteria are tailed description of new applications that become presentation offers clarity and intuition, assuming described. Fine- and Coarse-Grain Reconfigurable possible by using these new algorithms. This book [..] Computing is an essential reference for researchers can serve as a starting point for PhD students enter- and professionals and can be [..] ing the field and will also benefit [..] Features The author won the ACM Doctoral Dissertation Features Features Award (2000) for the best Ph.D. thesis in Electri- With Reconfigurable Computing becoming increas- A state-of-the-art survey into the theory and practice cal Engineering & Computer Science, and this ingly important to Design Engineers as well as Com- of new technologies in the field of security based on book is based on that Ph.D. puter Scientists, this book discusses all aspects of the noisy data Provides a comprehensive overview of the topic and contains industrial and academic contribu- theory of extracting cryptographic keys from noisy Contents tions Includes modeling software data Describes applications in the field of biometrics, Introduction.- Definitions.- Complete Problems.- secure key storage, and anti-counterfeiting Applications of the Complete Problems.- Private Contents Coins vs. Public Coins.- Coping with Cheating Ver- Introduction. Part I. 1: A Survey of Fine-Grain Re- Contents ifiers.- Noninteractive SZK.- Subsequent Work and configurable Architectures and CAD tools. 2: A Sur- Preface (Bart Preneel).- Introduction.- Part I: Theo- Conclusions.- App. A, Chernoff Bounds.- App. B, vey of Coarse-Grain Reconfigurable Architectures ry of Security with Noisy Data.- Unbreakable Keys Hashing Lemmas.- References and CAD tools.- Part II: Case Studies. 3: AMDREL: from Random Noise.- Fuzzy Commitment.- A Com- A Novel Low-Energy FPGA Architecture and Sup- munication-Theretical View on Secret Extraction.- Fields of interest porting CAD Tool Design Flow. 4: A coarse-grain Fuzzy Extractors.- Robust and Reuseable Fuzzy Ex- Data Structures, Cryptology and Information Theo- dynamically reconfigurable system and compilation tractors.- Fuzzy Identities and Attribute-Based En- ry; Coding and Information Theory; Theory of Com- framework. 5: Polymorphic Instruction Set Comput- cryption.- Unconditionally Secure Multi-Party Com- putation; Computation by Abstract Devices; Algo- ers. 6: ADRES and DRESC: Architecture And Com- putation from Noisy Resources.- Computationally rithm Analysis and Problem Complexity; Mathemat- piler For Coarse-Grain Reconfigurable Processors. 7: Secure Authentication with Noisy Data.- Part II: Ap- ics of Computing A Taxonomy of Field-Programmable Custom Com- plications of Security with Noisy Data.- Privacy en- puting Machines: An architectural approach. hancements for Inexact Biometric Templates.- Pro- Target groups tection of Biometric Information.- On the Amount Academic researchers, graduate students Fields of interest of [..] Circuits and Systems; Software Engineering/Pro- Type of publication gramming and Operating Systems; Electronics and Fields of interest Monograph Microelectronics, Instrumentation; Computer Sys- Biometrics; Data Structures, Cryptology and Infor- tems Organization and Communication Networks; mation Theory; Data Encryption; Algorithm Analy- Due April 2008 Computer Hardware sis and Problem Complexity Target groups Target groups 2008. Approx. 200 p. (Information Security and Cryptography) Undergraduate graduate students in electrical and/ Hardcover PhD students, professionals or computer engineering, physics (with electron- 49,95 € ics/VLSI design activities), graduate students: MSc Type of publication ISBN 978-3-540-71373-9 programmes in electrical and computer eng., or digi- Contributed volume tal/VLSI design, embedded systems design, PhD stu- dents in VLSI design, low power design, digital de- Due November 2007 sign, embedded hardware design, system-on-chip design, IP components design, logic design/synthe- 2007. Approx. 355 p. Hardcover sis, transistor-level design, processor design, high- speed arithmetic processors, and [..] 76,95 € ISBN 978-1-84628-983-5 Type of publication Monograph

Due October 2007 144 Computer Science springer.com/booksellers

D.P. Vidyarthi, Jawaharlal Nehru University, New Delhi, India; B.K. J.A. Vince, Bournemouth University, UK 2008. Approx. 400 p. Hardcover Sarker, University of New Brunswick, Fredericton, Canada; A.K. Tripathi, Banaras Hindu University, Varanasi, India; L.T. Yang, St. 89,95 € Francis Xavier University, Antigonish, Canada Geometric Algebra for Computer ISBN 978-1-4020-6504-0 Graphics Scheduling in Distributed Computing Systems Geometric algebra (a Clifford Algebra) has been ap- Analysis, Design & Models plied to different branches of physics for a long time but is now being adopted by the computer graphics community and is providing exciting new ways of Scheduling in Distributed Computing Systems: solving 3D geometric problems. John Vince (author Analysis, Design and Models intends to inculcate of numerous books including ‘Geometry for Com- the innovative ideas for the scheduling aspect. Al- puter Graphics’ and ‘Vector Analysis for Comput- though the models in this book have been designed er Graphics’) has tackled this complex subject in his for distributed systems, the same information is ap- usual inimitable style, and provided an accessible plicable for any type of system (i.e., where distribut- and very readable introduction. As well as putting ed processing is required). Scheduling in Distribut- geometric algebra into its historical context, John ed Computing Systems: Analysis, Design and Mod- tackles complex numbers and quaternions; the na- els will dramatically improve the design and man- ture of wedge product and geometric product; reflec- agement of the processes for industry profession- tions and rotations (showing how geometric algebra als. This book deals exclusively with the scheduling can offer a powerful way of describing orientations aspect, which finds little space in other distributed of objects and virtual cameras); and how to imple- operating system books. Scheduling in Distributed ment lines, planes, volumes and intersections. Intro- Computing Systems: Analysis, Design and Models is ductory chapters also look at algebraic axioms, vec- structured for a professional audience composed of tor algebra and geometric conventions and the book researchers and practitioners in industry. This book closes with a chapter on how the algebra is applied to is also suitable as a reference for graduate-level stu- [..] dents in management sciences, and computer science for distributed computing system classes. Features Filled with lots of clear examples and very well illus- Features trated, this compact book provides an excellent in- Includes the scheduling aspect of distributed com- troduction to geometric algebra for computer graph- puting systems, which is a necessary activity for job ics. planning and processing First book that exclusively deals with the scheduling aspect of distributing com- Contents puting systems Introduction.- Elementary Algebra.- Complex Al- gebra.- Vector Algebra.- Quaternion Algebra.- Geo- Contents metric Conventions.- History of Geometric Algebra.- Preface.- Introduction.- An Overview of a Distribut- The Geometric Product.- Reflections and Rotations.- ed Computing System.- Scheduling Problem.- Load Representing Lines and Surfaces.- Geometric Alge- Balancing in Dcs.- Earlier Task Allocation Mod- bra in Computer Graphics.-Programming Implica- els.- Load Balancing Task Allocation (Lbta).- GA tions.- Conclusion Based Task Allocation Models.- Allocation of Multi- ple Tasks in Dcs.- Other Approaches for Task Allo- Fields of interest cation.- Scheduling in Computational Grids.- Con- Computer Graphics cluding Remarks. Type of publication Fields of interest Graduate/advanced undergraduate textbook Computer Communication Networks; Operating Systems; Computer Systems Organization and Com- Due March 2008 munication Networks; Input/Output and Data Com- munications; System Performance and Evaluation; 2008. Approx. 250 p. Hardcover Information Systems and Communication Service 69,95 € Target groups ISBN 978-1-84628-996-5 Professionals and researchers and graduate-level stu- dents

Type of publication Monograph

Due November 2007

2008. Approx. 300 p. Hardcover

96,25 € ISBN 978-0-387-74480-3 springer.com/booksellers Computer Science 145

F. Vonta, University of Cyprus, Nicosia, Cyprus; M. Nikulin, Uni- A. Voss, University of Manchester, UK; M. Hartswood, University C. Voudouris, BT Group plc, UK; G. Owusu, BT Group plc, UK; R. versité Victor Segalen Bordeaux 2, Bordeaux, France; N. Limnios, of Edinburgh, UK; K. Ho, University of Edinburgh, UK; R. Procter, Dorne, BT Group plc, UK; D. Lesaint, BT Group plc, UK Université de Technologie de Compiègne, Compiègne, France; C. University of Manchester, UK; M. Rouncefield, University of Lan- Huber-Carol, Université Paris V, Paris, France (Eds.) caster, UK; R. Slack, University of Bangor, UK; M. Buscher, Univer- sity of Lancaster, UK (Eds.) Service Chain Management

Statistical Models and Methods for Technology Innovation for the Service Business Biomedical and Technical Systems Configuring User-Designer Relations Service chain management enables service organisa- Interdisciplinary Perspectives tions to improve customer satisfaction and reduce An outgrowth of the "International Confer- operational costs through intelligent and optimised ence on Statistical Models for Biomedical and Tech- forecasting, planning and scheduling of the service nical Systems," this book is comprised of contribu- ‘User-designer relations’ concerns the sorts of work- chain, and its associated resources such as people, tions from renowned experts, demonstrating the ing relationships that arise between developers and networks and other assets. The area is quite broad, significance of current research on theory, meth- end users of IT products - the different ways design- covering field force and workforce automation, net- ods, and applications of the field. The contributions, ers of IT products seek to engage with users, and work and asset planning and also aspects of , cus- which deal with the mathematical aspects of survival the ways users seek to influence product design. It is tomer relationship management, human resources analysis and reliability as well as other topics, are a through the shifting patterns of these relations that systems and enterprise resource planning. Further- careful selection of invited and contributed chapters, IT products are realised. Although it has general- more, it addresses the key challenge of how all these reflecting recent developments in the following ar- ly been accepted that achieving better user-design- technologies and systems are integrated into and eas: applications in epidemiology; probabilistic and er relations will improve the quality of IT products, also linkages between these elements in a cohesive statistical models and methods in reliability; models there has been little consensus on how this might be ICT blueprint which can be successfully applied to and methods in survival analysis, longevity, aging, achieved. This book aims to deepen our understand- different service businesses. In this book, Christos and degradation; accelerated life models; quality of ing of the relationships between users and designers Voudouris and his groupgroup together with experts life; new statistical challenges in genomics. The book both as they emerge in the wild and as a consequence from industry and academia present the latest inno- will be useful to a broad interdisciplinary readership of our attempts to intervene. Through a series of case vations and technologies used to manage the opera- of researchers and practitioners in applied probabil- studies the book juxtaposes in-depth explorations tions of a service company. The viewpoints present- ity and statistics, industrial statistics, biomedicine, of different perspectives and approaches to thinking ed are, based on the BT experience and on associated biostatistics, and engineering.   about - and doing - user-designer relations, consid- [..] Features ering important implications for design and comput- Features Real-world applications to epidemiology, aging, sur- er science more generally. Covers all aspects from strategic strategic and tactical vival analysis, and modeling in the biosciences and Contents planning to day-to-day operational scheduling and medicine Chapters deal primarily with the mathe- Introduction.- Participatory Design: Issues and ap- resource management Describes both technologies matical aspects of survival analysis and reliability proaches in dynamic constellations of use, design and systems for automating and optimising service Features a careful selection of invited and contribut- and research.- Design as and for Collaboration: mak- operations Based on latest research as well as practi- ed papers Demonstrates the significance of current ing sense of and supporting practical action.- Us- cal experience from BT, one of the largest European research on the theory, methods, and applications of er-Designer Relations in Techology Production.- A service providers Offers best practice advice s and the field Accessible to a broad interdisciplinary [..] Break From Novelty: Persistence and effects of struc- describes hands-on techniques and methods [..] Contents tural tensions in designer-user relations.- Lessons Contents Preface.- Cox Models, Analyses, and Extensions.- Learnt in Providing Product Designers with Us- 1) Defining and Understanding Service Chain Man- Reliability Theory: Degradation Models.- Inferen- er-Participatory Interaction Design Tools.- Practical- agement - 2) Customer Service: Emerging Require- tial Analysis.- Analysis of Censored Data.- Quality of ities of Participation.- Participant Intervention ments and Trends.- Part 1: Resource Planning.- 3) Life.- Inference for Processes.- Designs.- Measures of and Tangible Mediating Tools.- Global Software and Strategic Resource Planning - 4) Forecasting and De- Divergence, Model Selection, and Survival Models.- its Provenance.- Bottom-Up, [..] mand Planning - 5) Tactical Resource Planning and New Statistical Challenges.- Index. Fields of interest Deployment - 6) Network Planning for Telecom and Fields of interest User Interfaces and Human Computer Interaction Utilities.- Part 2: Reservation Management and Re- Statistics for Life Sciences, Medicine, Health Sci- source Scheduling.- 7) Reservation Management and Target groups ences; Statistical Theory and Methods; Mathemati- Resource CRM - 8) Demand Pricing and Revenue Researchers; Advanced students in human-computer cal Modeling and Industrial Mathematics; Probabili- Management - 9) Personnel Shift and Scheduling interaction, computer supported co-operative work, ty Theory and Stochastic Processes; Applications of Rostering - 10) Work Allocation and Scheduling - social studies of work, organisations and technology, Mathematics 11) People and Attendance Management.- Part 3: computer system developers. Process, [..] Target groups Type of publication researchers and practitioners in applied probability Fields of interest Reference work and statistics, industrial statistics, biomedicine, bio- Information Systems; Organization/Planning; Infor- statistics, and engineering mation Systems Applications (incl.Internet); Man- Due April 2008 agement of Computing and Information Systems; Type of publication Management; Computer Appl. in Administrative Data Processing Contributed volume 2008. Approx. 200 p. (Computer Supported Cooperative Work) Hardcover Target groups Due March 2008 49,00 € Professionals, students of business information sys- ISBN 978-1-84628-924-8 tems and business administration 2008. Approx. 600 p. 55 illus. (Statistics for Industry and Technol- ogy) Hardcover Type of publication Professional book 109,00 € ISBN 978-0-8176-4464-2 Due December 2007

2008. Approx. 340 p. Hardcover

49,95 € ISBN 978-3-540-75503-6 146 Computer Science springer.com/booksellers

Z. Wadia, White Plains, NY, USA; M. Marinschek, Irian, White S. Wagon, Macalester College, St. Paul, MN, USA M. Wallace, University of Indianapolis, Athens, Greece; M. An- Plains, NY, USA; Th. Spiegl, Irian, White Plains, NY, USA gelides, Brunel University, Uxbridge, UK; P. Mylonas, University of Indianapolis, Athens, Greece (Eds.) Mathematica in Action The Definitive Guide to Apache MyFaces and Facelets Advances in Semantic Media Adaptation and Personalization With the third edition of his popular Mathemati- ca in Action, award-winning author Stan Wagon The Definitive Guide to Apache MyFaces and Ajax guides readers through the important changes that covers the open source agile lightweight Apache My- have been made to Mathematica 6.0. To uti- Faces project, expected to be the most popular open lize the more sophisticated graphics capabilities of Contents source implementation of JavaServer Faces (JSF), a 6.0, Wagon has significantly expanded the chapters Dynamic Linking of Web Resources -- Customisa- standard Java Web framework specification and im- on surfaces and the parametric plotting of surfaces. tion and Personalisation.- A Multi-Purpose Ontol- plementation originally put forth by Sun. This book The chapter on differential equations now includes ogy-Based Approach for Personalised Content Fil- also covers and includes the use of Ajax using the material from VisualDSolve, built into Mathematica tering and Retrieval.- Analysing the Behaviour of popular Dojo framework. This is an ideal reference 6.0. Like previous editions, this is not only an intro- Students in Learning Management Systems with Re- for professional Java and Web developers looking to duction to Mathematica 6.0, but also a tour of mod- spect to Learning Styles.- Improving Image Retrieval develop real world Java-based Web applications as it ern mathematics by one of the field’s most gifted ex- Using Semantic Resources.- Implementing an In- focuses less on theory and more on aspects such as positors. Wagon explores some of the most impor- ternet image search service based on the AJAX web scalability, design, optimization and configurability. tant areas of modern mathematics with new chapters programming techniques.- A Rule-based Adaption on optimization, including algebraic and numerical Model for Ontology-based Personalization.- Man- Features optimization, and linear and integer programming. agement and Processing of Personalized \\Annota- First and only book on the open source lightweight Connections are also made to computer science with tions in Image Retrieval Systems.- An Incremental Apache MyFaces project written by a MyFaces co- new material on graphs and networks.   All Framework for [..] founder and its users. It will be the definitive, au- Mathematica code is included on a CD, saving stu- thoritative book on MyFaces This is an untapped dents hours of typing.   Wagon is the author of Fields of interest market, for what likely will be most popular open nine [..] Appl.Mathematics/Computational Methods of Engi- source JSF implementation in the world right now! neering; Artificial Intelligence (incl. Robotics) Covers the popular Dojo Ajax framework) Features - Utilizes  the enhanced graphics capabili- Target groups Contents ties of Mathematica 6.0, with expanded chapters on Engineers, researchers, and graduate students in MyFaces and JSF.- MyFaces Underlying Architec- surfaces and the parametric plotting of surfaces - Computational Intelligence and Computer Science ture.- Your First MyFaces Components.- Apache New chapters on optimization, graphs, and Type of publication MyFaces is JSF++.- Migrating from Struts to My- networks introduces material of current interest with Monograph Faces.- AJAX and Web 2.0 Integration (using Dojo).- connections to programming and computer science MyFaces and SOA (using Backing Bean).- MyFaces - CD containing all Mathematica code saves stu- and Persistence (using Hibernate and EJB 3).- My- dents hours of typing - 16 pages of color illustrations Due December 2007 Faces Component Design and Performance Consid- - Clearly [..] erations. 2008. Approx. 360 p. (Studies in Computational Intelligence, Vol. Contents 93) Hardcover Fields of interest Preface.- A Brief Introduction.- Plotting.- Prime Programming Techniques; Programming Languages, Numbers.- Rolling Wheels.- Surfaces.- The Cantor 129,95 € Compilers, Interpreters Set, Real and Complex.- The Quadratic Map.- The ISBN 978-3-540-76359-8 Recursive Turtle.- Parametric Plotting of Surfaces.- Target groups Penrose Tiles.- Fractals, Ferns, and Julia Sets.- Cus- Intermediate to advanced Java programmers and tom Curves.- Solving Equations.- Differential Equa- web developers tions.- Public-Key Encryption.- Egyptian Fractions.- The Ancient and Modern Euclidean Algorithm.- Type of publication Imaginary Primes and Prime Imaginaries.- Certify- Professional book ing Primality.- Check Digits and the Pentagon.- New Directions for pi.- Rearrangement of Series.- Com- Due March 2008 putational Geometry.- Coloring Planar Maps [..]

Fields of interest Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Computational Mathematics and Numerical Analy- Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, sis; Mathematical Software; Visualization; Applica- Oman, Qatar, Palestine: Jordan Book Center tions of Mathematics

Target groups 2008. Approx. 350 p. Softcover Undergraduate and graduate students in mathemat- ics, the physical and biological sciences, and engi- 34,95 € neering. ISBN 978-1-59059-737-8 Type of publication Graduate/advanced undergraduate textbook

Due March 2009

2009. Approx. 680 p. Softcover

46,20 € ISBN 978-0-387-75366-9 springer.com/booksellers Computer Science 147

W. Wang, HuaZhong Normal University, China; Y. Li, HuaZhong W. Wang, HuaZhong Normal University, China; Y. Li, HuaZhong S. Webster, London, UK; S. McSharry, Toronto, Canada; T. Yard Normal University, China; Z. Duan, HuaZhong Normal University, Normal University, China; Z. Duan, HuaZhong Normal University, China; L. Yan, HuaZhong Normal University, China; H. Li, Turku China; L. Yan, HuaZhong Normal University, China; H. Li, Turku School of Economics, Finland; X. Yang, HuaZhong Normal Uni- School of Economics, Finland; X. Yang, HuaZhong Normal Uni- Foundation Actionscript 3.0 with versity, China (Eds.) versity, China (Eds.) Flash CS3 and Flex Integration and Innovation Orient Integration and Innovation Orient to E-Society Volume 1 to E-Society Volume 2 ActionScript 3.0 is the new version of the Flash scripting language, and with it comes a lot of new 7th IFIP International Conference on e-Business, e-Services, 7th IFIP International Conference on e-Business, e-Services, and e-Society (I3E2007), October 10-12, Wuhan, China and e-Society (I3E2007), October 10-12, Wuhan, China things to learn. In addition, you can also make use of it through Flash CS3, through Flex 2 and 3, or even through open source tools. Fortunately, we've cre- ated this book to teach this new language to both International Federation for Information Process- International Federation for Information Process- aspiring ActionScript developers, and experienced ing The IFIP series publishes state-of-the-art results ing The IFIP series publishes state-of-the-art results ActionScript developers who want to upgrade their in the sciences and technologies of information and in the sciences and technologies of information and knowledge to the new version. It doesn't aim to be an communication. The scope of the series includes: communication. The scope of the series includes: exhaustive reference, focusing on essential real world foundations of computer science; software theory foundations of computer science; software theory techniques to enable them to get up and running and practice; education; computer applications in and practice; education; computer applications in quicker. In addition, we cover how to use Action- technology; communication systems; systems mod- technology; communication systems; systems mod- Script 3.0 through both Flash CS3 and Flex 2/3 (open eling and optimization; information systems; com- eling and optimization; information systems; com- source ActionScript developers should also be able puters and society; computer systems technology; puters and society; computer systems technology; to make use of the book.) As well as countless prac- security and protection in information processing security and protection in information processing tical examples, reference sections are also included systems; artificial intelligence; and human-comput- systems; artificial intelligence; and human-comput- at the back of the book allowing the reader to easily er interaction. Proceedings and post-proceedings of er interaction. Proceedings and post-proceedings of look up syntax. No previous ActionScript knowledge referred international conferences in computer sci- referred international conferences in computer sci- is assumed, although it would be beneficial. ence and interdisciplinary fields are featured. These ence and interdisciplinary fields are featured. These results often precede journal publication and repre- results often precede journal publication and repre- Features sent the most current research. The principal aim of sent the most current research. The principal aim of Teaches the essentials of ActionScript 3 development the IFIP series is to encourage education and the dis- the IFIP series is to encourage education and the dis- using Flash CS3 or Flex 2 No previous Action- semination and exchange of information about all semination and exchange of information about all Script knowledge is assumed Includes reference sec- aspects of computing. For more information about aspects of computing. For more information about tions at the back of the book for easy syntax lookup the 300 other books in the IFIP series, please visit [..] the 300 other books in the IFIP series, please visit [..] Contents Features Features Getting Started with ActionScript 3.0.- ActionScript “Most up-to-date book from the I3E conference se- “Most up-to-date book from the I3E conference se- 3.0 Fundamentals.- Objects and Classes.-Working ries” ries” with the Display.- Creating Vector Graphics with the Drawing API.- User interaction and more with Fields of interest Fields of interest events.- Video.- Sound.- Using Components.- Regu- Computer Science, general Computer Science, general lar Expressions.- XML and Web Services.- final case study.- Introducing Flex.- The Flex 2 Framework.- A Target groups Target groups complete Flex application.- Appendices. Researchers and practitioners of e-business, e-ser- Researchers and practitioners of e-business, e-ser- vices, and the e-society vices, and the e-society Fields of interest Programming Techniques Type of publication Type of publication Proceedings Proceedings Target groups Beginner to Intermediate aspiring Flash developers Due November 2007 Due November 2007 and designers who want to learn ActionScript Devel- opment and experienced Flash developers and de- signers who want to learn the new version of Action- 2007. Approx. 687 p. (IFIP International Federation for Informa- 2007. Approx. 625 p. (IFIP International Federation for Informa- tion Processing, Vol. 251) Hardcover tion Processing, Vol. 252) Hardcover Script

148,00 € 148,00 € Type of publication ISBN 978-0-387-75465-9 ISBN 978-0-387-75493-2 Professional book

Due January 2008

Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Oman, Qatar, Palestine: Jordan Book Center

2008. Approx. 450p. Softcover

ISBN 978-1-59059-815-3 148 Computer Science springer.com/booksellers

R. Wegerif, University of Exeter, Devon, UK P. Wellin, California State University, Sonoma, CA, USA; T. Gayley J.H.D.M. Westerink, Philips Research, Eindhoven, The Nether- lands; M. Ouwerkerk, Philips Research, Eindhoven, The Nether- lands; T.J.M. Overbeek, Philips Research, Eindhoven, The Nether- Dialogic Education and Technology Computer Simulations with lands; W.F. Pasveer, Philips Research, Eindhoven, The Nether- lands; B. de Ruyter, Philips Research, Eindhoven, The Netherlands Expanding the Space of Learning Mathematica and Java (Eds.)

Probing Experience Dialogic Education and Technology is about using The first edition of Computer Simulations with new technology to draw people into the kind of di- Mathematica drew on the capabilities of Mathemat- From academic research to commercial propositions alogues which take them beyond themselves into ica to prototype algorithms & to write code in learning, thinking and creativity. The program of re- a variety of programming styles, choosing the ap- propriate style for the problem at hand. Today, run- search reported in this book reveals key character- This book adheres to the vision that in the future ning very large simulations in Mathematics is quite istics of learning dialogues and demonstrates ways compelling user experiences will be key differen- feasible, within an order of magnitude of complied in which computers and networks can deepen, en- tiating benefits of products and services. Evaluat- C and Fortran code. This new edition takes advan- rich and expand such dialogues. A dialogic perspec- ing the user experience plays a central role, not on- tage of these features & includes the follow- tive is developed drawing upon recent work in com- ly during the design process, but also during regu- ing significant additions: • Java has become a com- munications theory, psychology, computer science lar usage: for instance a video recorder that recom- monly used tool for working with scientific applica- and philosophy. This perspective foregrounds the mends TV programs that fit your current mood, a tions. This book fully incorporates Java programs to creative space opened up by authentic dialogues. product that measures your current level of relax- run the simulations that are described & imple- Whereas studies of computer-supported collabora- ation and produces advice on how to balance your mented in the book. • This is one of the first books tive learning have tended to see dialogue as a means life, or a module that alerts a factory operator when to describe & take advantage of Mathematica to the end of knowledge construction the dialogic he is getting drowsy. Such systems are required to 6, which contains a fantastic array of new visualiza- perspective taken by this book sees dialogue as an assess and interpret user experiences (almost) in re- tion functions & dynamic interactive graphics end in itself - in fact moving learners into the space al-time, and that is exactly what this book is about. machinery. • Several websites are maintained with of dialogue is described as the core aim of education. How to achieve this? What are potential applications Mathematica notebooks, C source code & com- The central argument of the book is that there is a of psychophysiological measurements? Are real-time piled C Binaries for various platforms. A minimal convergence between this dialogic perspective in ed- assessments based on monitoring of user behavior background [..] ucation [..] possible? If so, which elements are critical? Are be- havioral aspects important? Which technology can Features Features be used? How important are intra-individual differ- Focuses on development of theory and empirical re- One of the first books to describe and take advantage ences? What can we learn from products already on search Reports a coherent program, exploring the di- of Mathematica 6, which contains a fantastic array of [..] alogic perspective of the use of technology in edu- new visualization functions and dynamic interactive graphics machinery Contains visualizations of the cation Encompasses a wide range of ages and uses, Features many simulations written in Mathematica and Java, including: software to promote spoken reasoning in the first book to combine academic and business with the Java simulations appearing on a website for young children, studies of computer tools to support viewpoints on measuring user experiences for prod- the book Fully incorporates Java programs to run the induction into argumentation, and accounts of the uct development creative reflective communities of practice on line simulations The new edition takes full [..] Contents Contents Contents Foreword; Introduction: Probing Experience; Expe- Probabilistic Systems.- The Random Walk.- The Computers and Teaching Thinking.- Computers and rience in Products;Part I: Probing in order to Quan- Self-avoiding Walk.- Accretion.- Kinetic Growth Dialogic Reason in the Classroom.- Situating Gener- tify1: How was the experience for you just now? In- Models.- Percolation Clustering.- Ising Model.- Co- al Thinking and Learning Skills.- Creating and Sus- quiring about people’s affective product judgements. evolution Model.- Cellular Automata Systems.- The taining an Online Community of Enquiry.- Dialec- 2: Atmosphere metrics: development of a tool to Game of Life.- Self-organized Critical Systems.- The tic and Dialogic Perspectives on the Role of Technol- quantify experienced atmosphere. 3: In Search of the Q2R Ising Model.- Excitable Media.- Traffic.- For- ogy.- Dialogic Reason and Creativity Around and X-factor to develop experience measurement tools. est Fires.- Cellular Automata and Complexity.- Ap- Through Computers.- Tools for Induction into Ar- 4: Probing Experiences: logs, traces, self-report and a pendices.- Mathematica Programming.- Java.- Java gument.- Reflective Communities Online.- Research- sense of wonder. 5: Objective emotional assessment Source Code ing Dialogue with Technology.- Technology and En- of industrial products. 6: Measuring experiences in lightenment. Fields of interest gaming and TV applications: investigating the added value of a multi-view [..] Fields of interest Simulation and Modeling; Mathematical Methods in Physics; Numerical and Computational Methods; Educational Technology; Computers and Education; Fields of interest Computer Science, general; Algorithms Education & Society User Interfaces and Human Computer Interaction; Input/Output and Data Communications; Theory of Target groups Target groups Computation; Artificial Intelligence (incl. Robotics) Academics and post-graduate researchers working Undergraduates, graduates, researchers in the area of educational technology and computer- Target groups supported collaborative learning, an area that com- Type of publication Graduate/advanced undergraduate textbook Scientists and researchers in psychophysiology, psy- bines the fields of education, computer science and chometrics, and product evaluation and design; aca- psychology demic ad corporate libraries Due July 2008 Type of publication Type of publication Monograph 2008. Approx. 320 p. Hardcover Contributed volume

Due November 2007 54,95 € Due October 2007 ISBN 978-1-84628-287-4

2007. Approx. 350 p. (Computer-Supported Collaborative Learn- 2007. Approx. 240 p. (Philips Research Book Series, Vol. 8) Hard- ing Series, Vol. 7) Hardcover cover

99,95 € 89,95 € ISBN 978-0-387-71140-9 ISBN 978-1-4020-6592-7 springer.com/booksellers Computer Science 149

M. Whitehorn, University College Worcester, UK; R. Zare, M. M. Whitehorn, University College of Worcester, UK; B. Marklyn, R. Whitrow, London Metropolitan University, UK Pazusmansky Seattle, WA, USA OpenGL Graphics Through Problem solving for MDX for SQL Inside Relational Databases with Applications Server 2005 Examples in SQL Server

OpenGL Graphics Through Applications is a practi- The first two editions of Inside Relational Databas- cal introduction to Computer Graphics with an em- Fields of interest es have both been best sellers. These new editions phasis on understanding through practice. Through- Database Management; Models and Principles will also cover the relational database model but will out the book, theory is followed by implementation use different engines to illustrate the model. In do- using C / C++ and complete programs are provided Type of publication ing so, readers will be able to apply the model using on the Springer website. A procedural approach has Professional book their preferred database engine. Initially three ver- been taken to algorithmic development while taking sions are planned starting with Access, SQL Server an object oriented approach when building artefacts Due September 2008 and my SQL. The books show just how simple and from simple objects. The book covers a range of top- useful databases can be. No prior knowledge is re- ics including: • image processing • artefact construc- 2008. Approx. 350 p. With CD-ROM. Softcover quired i.e. real world examples show how to manage tion • introductory animation • texturing • curves data efficiently. A significant amount of new material surfaces and patterns Robert Whitrow has taught ISBN 978-1-84628-395-6 is included in the core of the book and particular em- computing courses from first year undergraduate to phasis is given to showing how to make a database postgraduate MSc at a range of different institutions. run faster and more efficiently. Features Features Concise text which includes worked examples from A reader-friendly explanation of the relational model theory to code implementation and it's importance to database designers and devel- opers, tailored to suit SQL users. Contents Getting Started.- Image File Formats.- Image Pro- Fields of interest cessing.- Transformations.- Viewing and Projection.- Database Management; Models and Principles Light and Colour.- Texture Mapping.- Objects to Artefacts.- Curves Surfaces and Patterns.- Appen- Target groups dices.- References, Index Undergraduate students, practitioners - database users. Fields of interest Computer Graphics; Computer Imaging, Vision, Type of publication Pattern Recognition and Graphics Professional book Target groups Due September 2008 Second/Final year undergraduates in computing, en- gineering or mathematics

2006. Approx. 350 p. Softcover Type of publication Undergraduate textbook 39,95 € ISBN 978-1-84628-393-2 Due February 2008

2008. Approx. 365 p. 130 illus., 80 in color. Softcover

46,95 € ISBN 978-1-84800-022-3 150 Computer Science springer.com/booksellers

Y. Wilks, The University of Sheffield, UK C.P. Williams, Pasadena, CA, USA D. Wright, Trilateral Research & Consulting, London, UK; S. Gutwirth, Vrije Universiteit Brussel, Belgium; M. Friedewald, Fraunhofer Institute for Systems and Innovation Research (ISI), Machine Translation Explorations in Quantum Karlsruhe, Germany; E. Vildjiounaite, VTT Electronics, Oulu, Fin- land; Y. Punie, Institute for Prospective Technological Studies Its Scope and Limits Computing (IPTS), European Commission, DG JRC, Seville, Spain (Eds.)

Safeguards in a World of Ambient Machine Translation (MT) is both an engineering By the year 2020, the basic memory components of Intelligence technology and a measure of all things to do with a computer will be the size of individual atoms. At languages and computers—whenever a new theo- such scales, the current theory of computation will ry of language or linguistics is offered, an important become invalid. A new field called "quantum com- criteria for its success is whether or not it will im- puting" is emerging that is reinventing the founda- This book is a warning. It aims to warn policy-mak- prove machine translation. This book presents a his- tions of computer science in a way that is consistent ers, industry, academia, civil society organisations, tory of machine translation (MT) from the point of with quantum physics. Remarkably, this new theory the media and the public about the threats and vul- view of a major writer and innovator in the subject. predicts that quantum computers can perform cer- nerabilities facing our privacy, identity, trust, secu- It describes and contrasts a range of approaches to tain tasks breathtakingly faster than classical com- rity and inclusion in the rapidly approaching world the challenges and problems of this remarkable tech- puters, and can accomplish mind-boggling feats such of ambient intelligence (AmI). In the near future, nology by means of a combination of historic pa- as teleporting information, breaking supposedly "un- every manufactured product – our clothes, money, pers along with commentaries to update their signifi- breakable" codes, generating true random numbers, appliances, the paint on our walls, the carpets on cance, both at the time of their writing and now. This and communicating with messages that betray the our floors, our cars, everything – will be embedded volume chronicles the evolution of conflicting ap- presence of eavesdropping. This book explains these with intelligence, networks of tiny sensors and ac- proaches to MT towards a somewhat skeptical con- developments in simple terms, and describes key tuators, which some have termed "smart dust". The sensus on future progress. Also included is a discus- technological hurdles that must be overcome in or- AmI world is not far off. We already have surveil- sion of the most recent developments in the field der to make quantum computers a reality. It draws lance systems, biometrics, personal communicators, and prospects for the future, which have been much upon the very latest research and uses executable machine learning and more. AmI will provide per- changed by the arrival of the World Wide Web. software simulations to help explain the material and sonalised services – and know more about us – on allow the reader to experiment with the ideas behind a scale dwarfing anything hitherto available. In the Features [..] AmI vision, ubiquitous computing, communications Comprehensive look at MT technology from the per- and interfaces converge and adapt to the user. AmI Contents spective of a participant in its history and develop- promises greater user-friendliness in an environment Includes a CD-ROM comprised of Mathematica ment Details the deep differences and struggles be- capable of recognising and responding to the [..] tween rival groups on how best to do MT Presents a notebooks for performing presentations in the book. worldwide perspective covering historical and con- Contents: 1) Computer Technology meets Quantum Features temporary systems in Europe, the US and Japan Reality; 2) The Capabilities of Computing Machin- The first attempt ever at a comprehensive analysis Considers MT as a fundamental part of Artificial In- ery; 3) The Dynamics of Quantum Computers; 4) of the threats and vulnerabilities of an Ambient In- telligence and the ultimate test-bed for all computa- Extracting Answers from Quantum Computers; 5) telligence (AmI) future Contains well-crafted, realis- tional linguistics Breaking Unbreakable Codes; 6) True Randomness; tic scenarios that vividly demonstrate the pitfalls and 7) Quantum Cryptography; 8) Quantum Teleporta- threats of an AmI-world Deals with AmI imagina- Contents tion; 9) Errors in Quantum Computers; 10) Error tively through vigorous analysis and the sketching of Introduction: the state of play in 2004.- The origins Correction; 11)The Reality of Quantum Computers different various, and makes very important recom- of MT and its relationship to artificial intelligence.- mendations that will be the subject of debate and [..] An artificial intelligence approach to MT.- It works, Fields of interest but how far can it go: Evaluating the SYSTRAN MT Programming Techniques; Software Engineering; Contents system?- MT Present: Where am I coming from: The Quantum Computing, Information and Physics Foreword by Emile Aarts Foreword by Gary Marx issue of directionality in MT.- Interlinguas for MT Preface An Executive Summary for Hasty Readers Target groups and natural languages.- Stone soup and the French Introduction The Brave New World of Ambient In- Advanced CS/physics/Engr Professionals CS/ Room: the statistical approach to MT at IBM.- The telligence Dark Scenarios Threats and Vulnerabilities physics/Engr Computer Designers role of linguistic knowledge resources in Japanese Safeguards Recommendations for Stakeholders Con- MT.- The automatic acquisition of lexicons for an Type of publication clusions References List of Contributors MT system.- MT future: Senses and texts.- Sense Graduate/advanced undergraduate textbook projection.- Lexical tuning.- [..] Fields of interest Information Systems Applications (incl.Internet); Fields of interest Due July 2008 Computers and Society; Legal Aspects of Comput- Language Translation and Linguistics; History of ing; R & D/Technology Policy; Personal Computing Computing; Artificial Intelligence (incl. Robotics); 2008. Approx. 365 p. 78 illus. (Texts in Computer Science) Hard- Information Storage and Retrieval; Probability and cover Target groups Statistics in Computer Science Scholars and researchers in the field of ambient intel- 45,00 € ligence (AmI) and Ubicomp; researchers, students, Target groups ISBN 978-1-84628-886-9 policy-makers and others who are involved in tech- General public, particularly computer scientists and nology studies, information science, regulatory pol- students, interested in the progress of science and icy, law, and a wide range of social-science disci- technology plines, such as sociology, economics, political science (and its branches of policy studies and governance) Type of publication Monograph Type of publication Contributed volume Due March 2008 Due December 2007 2008. Approx. 250 p. Hardcover 2008. Approx. 300 p. (The International Library of Ethics, Law and 96,25 € Technology , Vol. 1) Hardcover ISBN 978-0-387-72773-8 114,95 € ISBN 978-1-4020-6661-0 springer.com/booksellers Computer Science 151

L. Xu, Old Dominion University, USA; A.M. Tjoa, Vienna University L. Xu, Old Dominion University, USA; A.M. Tjoa, Vienna University H. Yadava, Sunnyvale, CA, USA of Technology, Austria; S. Chaudhry, Villanova University, USA of Technology, Austria; S. Chaudhry, Villanova University, USA (Eds.) (Eds.) The Berkeley DB Book Research and Practical Issues of Research and Practical Issues of Enterprise Information Systems II Enterprise Information Systems II The Berkeley DB Book is intended to be a practical Volume 2 Volume 1 guide to the intricacies of Berkeley DB; an in-depth analysis of the complex design issues which are of- IFIP TC 8 WG 8.9 International Conference on Research and IFIP TC 8 WG 8.9 International Conference on Research and ten covered in terse footnotes in the dense Berkeley Practical Issues of Enterprise Information Systems (CONENIS Practical Issues of Enterprise Information Systems (CONENIS 2007), October 14-16, 2007, Beijing, China 2007), October 14-16, 2007, Beijing, China DB reference manual. It explains the technology at a higher level and also covers the internals with gen- erous code and design examples. Berkeley DB is be- coming the database of choice for appliance makers Research and Practical Issues of Enterprise Informa- and for in memory cache of large scale applications Features tion Systems II, Volume 1 presents work from the like search engines and high traffic web sites. As a Newest volume in the CONFENIS conference series IFIP TC 8 WG 8.9 International Conference on the tool for developers, Berkeley DB is so flexible that it Research and Practical Issues of Enterprise Informa- is difficult to understand the implications of differ- Contents tion Systems (CONFENIS 2007).Enterprise informa- ent design choices. In this book you will get to see a SOA-Based Telecom Product Management Sys- tion systems (EIS) have become increasingly popu- developer’s perspective on various intriguing design tem Framework.- Automated Promotion Machine: lar over the last 15 years. EIS integrate and support issues in Berkeley DB based applications and you will Emerging IS for the Retail Industry in China.- Per- business processes across functional boundaries in a understand those design options and be able to de- sonalized Trip Information for E-Tourism Recom- supply chain environment. In recent years, more and cide which ones to choose under which condition. mendation System Based on Bayes Theorem.- Anal- more enterprises world-wide have adopted EIS such ysis of Mobile Commerce Value Chain.- An Inter- as Enterprise Resource Planning (ERP) for running Features est-Oriented Network Evolution Mechanism for On- their businesses. Previously, information systems It will be a complete reference for Berkeley DB Will line Communities.- An Integrated System Design such as CAD, CAM, MRPII and CRM were widely be endorsed by and include a foreword by Margo for Telecom Operators’ Investment Management.- A used for partial functional integration within a busi- Seltzer, one of the original co-creators of Berkeley Memory Based Model for Knowledge Organization ness organization. With global operation, global sup- DB It will explain through extensive code examples and Sharing in Knowledge Grid.- A Methodology for ply chain, and fierce competition in place, there is a the various design issues that the developers come Domain Ontology Construction Based on Chinese need for suitable EIS such as ERP, E-Business or E- across while using Berkeley DB It will explain how Technology Documents.- The Survey [..] Commerce systems to integrate extended enterprises Berkeley DB is different from relational database in a supply chain environment with the objective of management systems and under what circumstances Fields of interest achieving efficiency, competency, and [..] it will [..] Information Systems Applications (incl.Internet) Features Contents Target groups Newest volume in the CONFENIS conference series Introduction.- What does it take to build an appli- Researchers and practioners in enterprise informa- cation on top of Berkeley DB.- Berkeley DB Prod- tion systems Contents ucts, Compilation, and Installation.- Building A A Hybrid Approach for Business Process Verifica- Type of publication Simple Data Store using Berkeley DB.- Advanced tion.- Grid-Based Information Aggregation Archi- Proceedings Data Stores.- Advanced operations.- A Real world tecture for Supply Chain Coordination.- What is Data Store.-Replication.- Distributed Transac- Business Process Management: A Two Stage Litera- tions and Data Distribution Strategies.- Berkeley Due October 2007 ture Review of an Emerging Field.- Grid-VirtuE: A DB Utilities, Database Tuning, and Troubleshoot- Layered Architecture for Grid Virtual Enterprises.- ing.- Berkeley DB new features.- Berkeley DB in Ap- 2008. LXV, 800 p. (IFIP International Federation for Information Value Network Positioning of Expected Winners: pliances and the future.- Berkeley DB C API ref- Processing, Vol. 255) Hardcover Analysis of the Top Software Business Start-ups.- A erence.- Berkeley DB C++ API reference.- Review on the Relationship Between New Variables Berkeley DB Java API reference. 198,00 € and Classical TAM Structure.- A Study on Self-adap- ISBN 978-0-387-76311-8 tive Heterogeneous Data Integration Systems.- De- Fields of interest sign and Implementation of Enterprise Spatial Data Data Storage Representation [..] Target groups Fields of interest Beginner and intermediate application developers. Information Systems Applications (incl.Internet) Type of publication Target groups Professional book Researchers and practioners in enterprise informa- tion systems Due November 2007 Type of publication Proceedings Distribution rights for Hongkong, Taiwan, RepKor, Singapore, Malays, Thail, Indone, Philip, Vietn, Brunei, Myan: Transquest Publishers Pte Ltd. For Israel: Com.Books Ltd. For Jordan, Irak, Due November 2007 Oman, Qatar, Palestine: Jordan Book Center

2008. LXV, 806 p. (IFIP International Federation for Information 2008. 464 p. Hardcover Processing, Vol. 254) Hardcover ISBN 978-1-59059-672-2 198,00 € ISBN 978-0-387-75901-2 152 Computer Science springer.com/booksellers

R. Yager, Iona University, New York, NY, USA; L. Liu, University of Akron, Copley, OH, USA (Eds.)

Classic Works of the Dempster- Shafer Theory of Belief Functions

This book brings together a collection of classic re- search papers on the Dempster-Shafer theory of be- lief functions. This book will serve as the authorita- tive reference in the field of evidential reasoning and an important archival reference in a wide range of areas including uncertainty reasoning in artificial intelligence and decision making in economics, en- gineering, and management. The carefully selected contributions are grouped into seven sections, in- cluding conceptual foundations, theoretical perspec- tives, theoretical extensions, alternative interpreta- tions, and applications to artificial intelligence, de- cision-making, and statistical inferences. The book also includes a foreword by Dempster and Shafer reflecting the development of the theory in the last forty years, and an introduction describing the ba- sic elements of the theory and how each paper con- tributes to the field.

Features Collects the key original contributions that are wide- ly recognized in the field of Dempster-Shafer The- ory of Belief functions Authoritative reference in the field of evidential reasoning and an important archival reference in a wide range of areas includ- ing uncertainty reasoning in artificial intelligence and decision making in economics, engineering, and management

Contents From the contents: Classic Works of the Demp- ster-Shafer Theory of Belief Functions: An Introduc- tion.- New Methods for Reasoning toward Posteri- or Distributions based on Sample Data (1966).- Up- per and Lower Probability Induced by a Multivalued Mapping (1967).- A Generalization of Bayesian In- ference (1968).- On Random Sets and Belief Func- tions (1978) .- Non-additive Probabilities in the Work of Bernoulli and Lambert (1978) .- Allocations of Probability (1978).- Computational Methods for a Mathematical Theory of Evidence (1981).- Construc- tive Probability (1981).- Belief Functions and [..]

Fields of interest Appl.Mathematics/Computational Methods of Engi- neering; Artificial Intelligence (incl. Robotics); Game Theory, Economics, Social and Behav. Sciences; Eco- nomic Theory

Target groups Researchers, engineers, graduate students in fuzzy logic, artificial intelligence, expert systems, computer science, statistics, economics, and management

Type of publication Monograph

Due January 2008

2007. Approx. 625 p. (Studies in Fuzziness and Soft Computing, Vol. 219) Hardcover

169,95 € ISBN 978-3-540-25381-5 springer.com/booksellers Computer Science 153

Y. Yagi, Osaka University, Japan; S.B. Kang, Microsoft Research, Y. Yagi, Osaka University, Japan; S.B. Kang, Microsoft Research, S.Y. Yan, University of Bedfordshire, UK & MIT, USA USA; I.S. Kweon, KAIST, Korea; H. Zha, Peking University, China USA; I.S. Kweon, KAIST, Korea; H. Zha, Peking University, China (Eds.) (Eds.) Cryptanalytic Attacks on RSA Computer Vision -- ACCV 2007 Computer Vision - ACCV 2007

8th Asian Conference on Computer Vision, Tokyo, Japan, 8th Asian Conference on Computer Vision, Tokyo, Japan, RSA is the first workable and practicable public-key November 18-22, 2007, Proceedings, Part I November 18-22, 2007, Proceedings, Part II cryptographic system, based on the use of large prime numbers. It is also the most popular and wide- ly-used cryptographic system in today's digital world, The two volume set LNCS 4843 and LNCS 4844 con- The two volume set LNCS 4843 and LNCS 4844 con- for which its three inventors Rivest, Shamir and stitutes the refereed proceedings of the 8th Asian stitutes the refereed proceedings of the 8th Asian Adleman received the year 2002 Turing Award, the Conference on Computer Vision, ACCV 2007, held Conference on Computer Vision, ACCV 2007, held equivalent Nobel Prize in Computer Science. Crypt- in Tokyo, Japan, in November 2007. The 46 revised in Tokyo, Japan, in November 2007. The 46 revised analytic Attacks on RSA covers almost all major full papers, 3 planary and invited talks, and 130 re- full papers, 3 planary and invited talks, and 130 re- known cryptanalytic attacks and defenses of the RSA vised poster papers of the two volumes were careful- vised poster papers of the two volumes were careful- cryptographic system and its variants. Since RSA de- ly reviewed and seleceted from 551 submissions. The ly reviewed and seleceted from 551 submissions. The pends heavily on computational complexity theo- papers of this volume are organized in topical sec- papers of this volume are organized in topical sec- ry and number theory, background information on tions on shape and texture, fitting, calbration, detec- tions on shape and texture, fitting, calbration, detec- complexity theory and number theory is present- tion, image and video processing, applications, face tion, image and video processing, applications, face ed first. This is followed by an account of the RSA and gesture, tracking, camera networks, face/ges- and gesture, tracking, camera networks, face/ges- cryptographic system and its variants. Cryptanalytic ture/action detection and recognition, learning, mo- ture/action detection and recognition, learning, mo- Attacks on RSA is designed for a professional audi- tion and tracking, retrival and search, human pose tion and tracking, retrival and search, human pose ence of practitioners and researchers in industry and estimation, matching, face/gesture/action detection estimation, matching, face/gesture/action detection academia and as a reference or secondary text for ad- and recognition, low level vision and phtometory, and recognition, low level vision and phtometory, vanced level students in computer science, applied motion and tracking, human detection, and segmen- motion and tracking, human detection, and segmen- mathematics, electrical & communica- tation. tation. tion [..]

Fields of interest Fields of interest Features Computer Imaging, Vision, Pattern Recognition and Computer Imaging, Vision, Pattern Recognition and First book available that covers cryptanalytic attacks Graphics; Pattern Recognition; Image Processing Graphics; Pattern Recognition; Image Processing on RSA exclusively Presents useful guidelines for and Computer Vision; Artificial Intelligence (incl. and Computer Vision; Artificial Intelligence (incl. proper use of RSA in information security Robotics); Biometrics; Algorithm Analysis and Prob- Robotics); Biometrics; Algorithm Analysis and Prob- lem Complexity lem Complexity Contents -Preface.- Notations.- Computational/Mathemati- Target groups Target groups cal Preliminaries.- RSA Public-Key Cryptography.- Researchers and professionals Researchers and professionals Integer Factorization Attacks.- Discrete Logarithm Attacks .- Quantum Computing Attacks.- Simple El- Type of publication Type of publication ementary Attacks.- Exponent Attacks.- Secret Ex- Proceedings Proceedings ponent Attacks.- Side-channel Attacks.- The Road Ahead.- Bibliography.- Index.   Due October 2007 Due October 2007 Fields of interest Data Encryption; Data Structures, Cryptology and 2007. XXVIII, 969 p. (Lecture Notes in Computer Science, Vol. 2007. XXVIII, 915 p. (Lecture Notes in Computer Science, Vol. Information Theory; Systems and Data Security; 4843) Softcover 4844) Softcover Coding and Information Theory; Data Structures; 93,00 € 93,00 € Computer Communication Networks ISBN 978-3-540-76385-7 ISBN 978-3-540-76389-5 Target groups Professionals, practitioners and researchers

Type of publication Monograph

Due December 2007

2008. Approx. 257 p. 20 illus. Hardcover

69,30 € ISBN 978-0-387-48741-0 154 Computer Science springer.com/booksellers

A. Yang, University of New South Wales, Canberra, NSW, Aus- T. Yu, Memorial University of Newfoundland, St. Johns, Canada; G.P. Zarri, University Paris IV-Sorbonne, France tralia; Y. Shan, Australia National University, Canberra, NSW, Aus- D. Davis, NuTech Solutions, Newbury, MA, USA; C. Baydar, Com- tralia; L.T. Bui, University of New South Wales, Canberra, NSW, Score Networks Inc., Chicago, IL, USA; R. Roy, Cranfield University, Australia (Eds.) Cranfield, UK (Eds.) Representation and Management of Narrative Information Success in Evolutionary Evolutionary Computation in Theoretical Principles and Implementation Computation Practice

A big amount of important, ‘economically relevant’ Darwinian evolutionary theory is one of the most This book is loaded with examples in which comput- information, is buried within the huge mass of mul- important theories in human history for it has er scientists and engineers have used evolutionary timedia documents that correspond to some form of equipped us with a valuable tool to understand the computation - programs that mimic natural evolu- ‘narrative’ description. Due to the ubiquity of these amazing world around us. There can be little sur- tion - to solve real problems. They aren’t abstract, ‘narrative’ resources, being able to represent in a prise, therefore, that Evolutionary Computation mathematically intensive papers, but accounts of general, accurate, & effective way their semantic (EC), inspired by natural evolution, has been so suc- solving important problems, including tips from the content – i.e., their key ‘meaning’ – is then both con- cessful in providing high quality solutions in a large authors on how to avoid common pitfalls, maximize ceptually relevant & economically important. In number of domains as diverse as engineering and fi- the effectiveness and efficiency of the search process, this book, we present the main properties of NKRL nance. EC includes a number of techniques, such as and many other practical suggestions. Some of the (‘Narrative Knowledge Representation Language’), Genetic Algorithms, Genetic Programming, Evolu- authors have already won “Humies” - Human Com- a language expressly designed for representing, in a tion Strategy and Evolutionary Programming, which petitive Results Awards - for the work described in standardised way, the ‘meaning’ of complex multi- have been used in a diverse range of highly success- this book. I highly recommend it as a highly concen- media narrative documents. NKRL is a fully imple- ful applications. This book brings together some of trated source of good problem-solving approaches mented language/environment. The software exists these EC applications in fields including electron- that are applicable to many real-world problems. in two versions, an ORACLE-supported version and ics, telecommunications, health, bioinformatics, sup- a file-oriented one. Written from a multidisciplinary ply chain and other engineering domains, to give the Features perspective, this exhaustive description of NKRL audience, including both EC researchers and prac- Everything about evolutionary computation in prac- & of the associated knowledge representation titioners, a glimpse of this exciting rapidly-evolving tice principles will be an invaluable source of reference field. for practitioners, researchers & graduates. Contents Features An Introduction to Evolutionary Computation in Features Reports recent research results on evolutionary com- Practice.- Design for Product Embedded Disassem- No other (working) system fully devoted to the ‘in- putation in practice bly.- Multi-Level Decomposition for Tractability in telligent’ representation & management of ‘nar- Structural Design Optimization.- Representing the rative’ documents exists Relates the results of a con- Contents Change-Free Form Deformation for Evolutionary crete work that has lasted about ten years & has Part I Theory.- Adaptation of a Success Story in GAs: Design Optimization.- Evolving Microstructured produced a fully implemented system (a complete Estimation-of-Distribution Algorithms for Tree- Optical Fibres.- Making Interactive Evolutionary environment) realized in Java 2: it is not yet another based Optimization Problems.- The Automated De- Graphic Design Practical.- Optimization of Store theoretical discussion about the best way of dealing sign of Artificial Neural Networks Using Evolution- Performance using Personalized Pricing.- A Com- with narratives Takes a multidisciplinary perspective ary Computation.- A Versatile Surrogate-Assisted putational Intelligence Approach to Railway Track Memetic Algorithm for Optimization of Computa- Intervention Planning.- A Co-Evolutionary Fuzzy Contents tionally.- Expensive Functions and its Engineering System for Reservoir Well Logs Interpretation.- Re- Introduction.- The Knowledge Representation Applications.- Data Mining and Intelligent Multi source [..] Principles.- The Inferential Structures of NKRL.- Agent Technologies in Medical Informatics.- Part II Conclusion.- Glossary.- Index.- Appendix A: De- Applications.- Evolving Trading Rules.- A hybrid ge- Fields of interest scription of the NKRL ‘ontology of concepts’.- Ap- netic algorithm for the protein folding problem us- Appl.Mathematics/Computational Methods of Engi- pendix B: Description of the NKRL ‘ontology of ing the 2D-HP lattice model.- Optimal Management neering; Artificial Intelligence (incl. Robotics) events’ (ontology templates, HTemp).- Appendix C: [..] General survey of the software solutions used to im- Target groups plement the NKRL general environment Fields of interest Engineers, researchers, and graduate students in Appl.Mathematics/Computational Methods of Engi- computational intelligence evolutionary computa- Fields of interest neering; Artificial Intelligence (incl. Robotics) tion Multimedia Information Systems

Target groups Type of publication Target groups Engineers, researchers, and graduate students in Monograph Practitioners, Researchers, Graduates computational intelligence, computer science and evolutionary computation Due January 2008 Type of publication Monograph Type of publication Monograph 2008. Approx. 320 p. (Studies in Computational Intelligence, Vol. 88) Hardcover Due March 2008

Due January 2008 129,95 € 2008. Approx. 350 p. (Advanced Information and Knowledge ISBN 978-3-540-75770-2 Processing) Hardcover 2008. Approx. 350 p. (Studies in Computational Intelligence, Vol. 92) Hardcover 74,95 € ISBN 978-1-84800-077-3 129,95 € ISBN 978-3-540-76285-0 springer.com/booksellers Computer Science 155

J. Zhang, University Wisconsin, Milwaukee, WI, USA A. Zhigljavsky, Cardiff University, Cardiff, UK; A. Zilinskas, Institute S.K. Zhou, W.-Y. Zhao, X. Tang, S. Gong (Eds.) of Mathematics and Informatics, Vilnius, Lithuania Visualization for Information Analysis and Modelling of Faces and Retrieval Stochastic Global Optimization Gestures

Third International Workshop, AMFG 2007 Rio de Janeiro, Brazil, October 20, 2007 Proceedings This book presents the main methodological and The amount of digitized information available on the theoretical developments in stochastic global op- Internet, in digital libraries, and other forms of infor- timization. The extensive text is divided into four mation systems grows at an exponential rate, while chapters; the topics include the basic principles and This book constitutes the refereed proceedings of becoming more complex and more dynamic. As a methods of global random search, statistical infer- the Third International Workshop on Analysis and consequence, information organization, information ence in random search, Markovian and popula- Modelling of Faces and Gestures, AMFG 2007, held retrieval and the presentation of retrieval results have tion-based random search methods, methods based in Rio de Janeiro, Brazil, in October 2007 within the become more and more difficult. Information visual- on statistical models of multimodal functions and scope of ICCV 2007, the International Conference ization offers a unique method to reveal hidden pat- principles of rational decisions theory. Key features: on Computer Vision. The 8 revised full papers pre- terns and contextual information in a visual presen- Inspires readers to explore various stochastic meth- sented together with 13 revised poster papers were tation and allows users to seek information in an in- ods of global optimization by clearly explaining the carefully reviewed and selected from 55 submissions. tuitive way. Jin Zhang provides a systematic expla- main methodological principles and features of the The papers review the status of recognition, analysis nation of the latest advancements in information re- methods; Includes a comprehensive study of proba- and modeling of face, gesture, activity, and behavior. trieval visualization from both theoretical and prac- bilistic and statistical models underlying the stochas- Topics addressed include feature representation, 3D tical perspectives. He reviews the main approaches tic optimization algorithms; Expands upon more face, robust recognition under pose and illumination and techniques available in the field, explains theo- sophisticated techniques including random and se- variations, video-based face recognition, learning, fa- retical relationships between information retrieval mi-random coverings, stratified sampling schemes, cial motion analysis, body pose estimation, and sign and information visualization, and presents major Markovian algorithms and population based algo- recognition. information retrieval visualization algorithms and rithms; Provides a thorough description of the meth- models. He then takes a detailed look at the theory ods based on statistical models of objective function; Fields of interest and applications of information [..] Discusses [..] Pattern Recognition; Image Processing and Com- puter Vision; Artificial Intelligence (incl. Robotics); Features Features Computer Graphics; Algorithm Analysis and Prob- First book to deal with information visualization Provides reader with a methodological and theoret- lem Complexity from an information retrieval perspective Presents ical basis for developing and investigating optimiza- most important information retrieval visualization tion heuristics Summarizes basic ideas and presents Target groups algorithms and models Details applications of in- recent progress and new results Includes an exten- Researchers and professionals formation retrieval visualization for Internet traf- sive bibliography with old Russian articles as well as fic analysis, and internet information searching and new English papers Includes an extensive discussion Type of publication browsing on probabilistic and statistical models used in the Proceedings Contents global random search Expands upon more sophisti- Due October 2007 1) Information Retrieval and Visualization - 2) In- cated [..] formation Retrieval Preliminaries - 3) Visualization Contents Models for Multiple Reference Points - 4) Euclidean 2007. X, 305 p. (Lecture Notes in Computer Science, Vol. 4778) Preface.- Introduction.- Basic Concepts and Ideas.- Spatial Characteristic Based Visualization Models Softcover Global Random Search: Fundamentals and Statistical - 5) Kohonen Self-Organizing Map - An Artificial Inference.- Global Random Search: Extensions.- Sta- 48,00 € Neural Network - 6) Pathfinder Associative Network tistical Models.- References.- Index. ISBN 978-3-540-75689-7 - 7) Multidimensional Scaling - 8) Internet Informa- tion Visualization - 9) Ambiguity in Information Vi- Fields of interest sualization - 10) The Implication of Metaphors in In- Optimization; Calculus of Variations and Optimal formation Visualization - 11) Benchmarks and Eval- Control; Optimization; Applications of Mathematics uation Criteria for Information Retrieval Visualiza- tion - 12) Afterthoughts - [..] Target groups Researchers interested in global optimization Fields of interest Information Storage and Retrieval; User Interfaces Type of publication and Human Computer Interaction; Information Sys- Monograph tems Applications (incl.Internet) Due December 2007 Target groups Researchers in academia and industry, libraries 2008. X, 272 p. (Springer Optimization and Its Applications, Vol. Type of publication 9) Hardcover Monograph 76,95 € ISBN 978-0-387-74022-5 Due November 2007

2008. XVII,292 pages with 72 illus(1 fig in color) (The Information Retrieval Series, Vol. 23) Hardcover

69,95 € ISBN 978-3-540-75147-2 156 Computer Science springer.com/booksellers

Y. Zhuang, College of Computer Science, Zhejiang University, H. Zhuge, Chinese Academy of Sciences, Beijing, China K.-H. Zimmermann, Hamburg University of Technology, Ham- Hangzhou, China; Y. Pan, Chinese Academy of Engineering, Bei- burg, Germany; Z. Ignatova, Max Planck Institute for Biochem- jing, China; J. Xiao, College of Computer Science, Zhejiang Uni- istry, Martinsried, Germany; I. Martinez-Perez, Hamburg Universi- versity, Hangzhou, China The Web Resource Space Model ty of Technology, Hamburg, Germany

A Modern Approach to Intelligent DNA Computing Models Animation: Theory and Practice Classifying objects into categories at different gran- ularity levels, establishing links between known ob- jects, and discovering clues between known and un- DNA contains the genetic instructions for the bio- known objects are essential for new-generation se- logical development of cellular life forms or viruses. Part of the new series, Advanced Topics in Science mantic data models. This book introduces the Re- DNA computing uses DNA as a substrate for stor- and Technology in China, this book discusses con- source Space Model (RSM), which effectively orga- ing information, while molecular biological opera- cepts, theory, and core technologies of intelligent nizes and correctly manages resources by normaliz- tions are used to manipulate this information. DNA theory and human animation, including video based ing classification semantics. This volume presents Computing Models provides the reader with a com- human animation, and intelligent technology of mo- basic models of RSM and the Semantic Link Net- prehensive introduction to the field of DNA comput- tion data management and reusing. It introduces sys- work (SLN), the relationship between the two, and ing. This book emphasizes computational methods tems developed to demonstrate the technologies of an approach to integrating the two models and ex- to tackle central problems of DNA computing, such video based animation. Each chapter is independent. ploring their semantic-rich interconnection. Also de- as controlling living cells, building patterns, and gen- Lively pictures and demos will be presented to make tailed is a comprehensive theory of query operations erating nanomachines. DNA Computing Models is the theory and technologies more understandable. on RSM and extensive coverage of the distribut- intended for researchers and graduate-level students For researchers, this is a reference book and an up- ed RSM in parallel with the distributed relational in computer science, bioengineering and molecular date on the current status of human animation. For database systems. This text is sure to be considered biology as a reference book. This volume is also ap- professionals, this is a guide for application develop- a substantial contribution to the field of Knowledge propriate for practitioners in industry. ment using human animation technologies. Yueting Grid by researchers in the areas of web, semantic Zhuang received his PhD in Computer Science from web, and decentralized data engineering, as well as Features Zhejiang University (1998). From 1997 to 1998, he the emerging semantic and knowledge grid arena. Includes laboratory-scale human-operated models of was a visiting scholar at Beckman Institute, U. of Illi- computation; includes the first experiment of DNA Features nois, Urbana-Champaign. Now he is professor and computation conducted by Adleman (1994), mod- Introduces the Resource Space Model (RSM) and vice dean of the College of Computer Science at Zhe- els to solve complex computational problems, and relevant theories to efficiently manage e-resources by jiang University. computationally universal models of DNA comput- normalized classification semantics Author is lead- ing Addresses the design of complex genetic circuits Features ing, well-cited figure in Knowledge Grid area by using cellular logical circuits Discusses human animation based on natural video, Contents monocular video of subject in tight clothes, and mul- Contents Contents.- Preface.- Resource Space Model Method- tiple camera video Discusses motion data reusing Preface.- Introduction.- X509-Infrastructure.- PGP ology.- A Semantic Overlay Integrating Normaliza- technology Introduces some prototype systems of and Paradigm.-  Trust Models.- Platform de- tion with Autonomy.- Expressiveness of Query Lan- video based human animation, in detail pendencies/independencies.- Revocation.- Boom or guages for Resource Space Model.- Algebra and Cal- Bust or Alterantives. Molecular Biology.- Theoretical Contents culus of the Resource Space Model.- Searching Com- Computer Science.- Non-Autonomous DNA Mod- 1. Introduction.- 2. Fundamental Issues.- 3. Ar- plexity of Resource Space Model.- Resource Space els.- Autonomous DNA Models.- Cell Computing chitecture of Video based Animation System.- 4. Model Storage.- Structured Peer-to-Peer Resource Models.- Transcriptional Cell Logic.- Index. Human Animation Technology based on Natural Space.- Unstructured Peer-to-Peer Resource Space.- Video.- 5. Human Animation Technology based on Probabilistic Resource Space Model.- References.- Fields of interest Monocular Video and Tighten Clothes.- 6. Human Index. Computational Biology/Bioinformatics; Pattern Animation Technology based on Multiple Cameras.- Recognition; Computer Applications in Chemistry; Fields of interest 7. Human Motion Database.- 8. Intelligent Process- Bioinformatics; Biomedicine general ing of Motion Data and Animation Production.- 9. Information Systems Applications (incl.Internet); In- Summary and Future Direction. formation Systems and Communication Service; In- Target groups formation Storage and Retrieval; Database Manage- Researchers and graduate-level students in computer Fields of interest ment science Computer Imaging, Vision, Pattern Recognition and Graphics; Image Processing and Computer Vision Target groups Type of publication Researchers in the areas of web, semantic web, and Monograph Target groups decentralized data engineering; advanced-level Software developers and researchers in computer an- students in computer science imation Due January 2008 Type of publication Type of publication Monograph 2008. Approx. 300 p. (Advances in Information Security, Vol. 42) Monograph Hardcover Due December 2007 Due November 2007 96,25 € ISBN 978-0-387-73635-8 2008. Approx. 250 p. (Web Information Systems Engineering and Distribution rights in China: Zhejiang University Press Internet Technologies Book Series, Vol. 4) Hardcover

84,95 € Jointly published with Zhejiang University Press ISBN 978-0-387-72771-4

2008. Approx. 300 p. 90 illus. (Advanced Topics in Science and Technology in China ) Hardcover

99,95 € ISBN 978-3-540-73759-9 springer.com/booksellers Computer Science 157

N. Ziviani, R. Baeza-Yates (Eds.) A.S. d'Avila Garcez, City University, London, UK; L.C. Lamb, Brazil; F.S. de Boer, Centre for Mathematics and Computer Science, D.M. Gabbay CWI, The Netherlands; M.M. Bonsangue, Leiden University, The Netherlands; S. Graf, VERIMAG, Grenoble-Gières, France; W.-P. de String Processing and Information Roever, University of Kiel, Germany (Eds.) Retrieval Neural-Symbolic Cognitive Reasoning Formal Methods for Components 14th International Symposium, SPIRE 2007 Santiago, Chile, October 29-31, 2007 Proceedings and Objects

Humans are often extraordinary at performing prac- 5th International Symposium, FMCO 2006, Amsterdam, tical reasoning. There are cases where the human Netherlands, November 7-10,2006, Revised Lectures This book constitutes the refereed proceedings of the computer, slow as it is, is faster than any artificial in- 14th International Symposium on String Processing telligence system. Are we faster because of the way and Information Retrieval, SPIRE 2007, held in San- we perceive knowledge as opposed to the way we Formal methods have been applied successfully to tiago, Chile, October 29-31, 2007. The 27 revised full represent it? The authors address this question by the verification of medium-sized programs in proto- papers presented were carefully reviewed and select- presenting neural network models that integrate the col and hardware design. However, their application ed from 77 submissions. The papers topics span dic- two most fundamental phenomena of cognition: our to the development of large systems requires more tionary algorithms, text searching, pattern matching, ability to learn from experience, and our ability to emphasis on specification, modelling and valida- text compression, text mining, natural language pro- reason from what has been learned. This book is the tion techniques supporting the concepts of reusabil- cessing, automata based string processing, IR mod- first to offer a self-contained presentation of neural ity and modifiability, and their implementation in elling, indexing, ranking and filtering, interface de- network models for a number of computer science new extensions of existing programming languages. sign, visualization, cross-lingual IR systems, mul- logics, including modal, temporal, and epistemic This book presents 12 revised lectures given by top- timedia IR, digital libraries, collaborative retrieval, logics. By using a graphical presentation, it explains researchers at the 5th International Symposium Web related applications, DNA sequencing and ap- neural networks through a sound neural-symbolic on Formal Methods for Components and Objects, plications in molecular biology, evolution and phy- integration methodology, and it focuses on the ben- FMCO 2006, held in Amsterdam, Netherlands, in logenetics, recognition of genes and regulatory ele- efits of integrating effective robust learning with ex- November 2006. The book provides a unique combi- ments, sequence driven protein structure prediction, pressive reasoning capabilities. It will be invaluable nation of ideas on software engineering and formal XML, SGML, information retrieval from semi-struc- reading for academic researchers, graduate students, methods that reflect the current interest in the appli- tured data, text mining and generation of structured and senior undergraduates in [..] cation or development of formal methods for large data from text. scale software systems such as component-based sys- Contents Fields of interest tems and object systems. The papers are organized in Introduction.- Logics and Knowledge Representa- Data Mining and Knowledge Discovery; Artificial topical sections on component and service oriented tion.- Artificial Neural Networks.- Neural-Symbol- Intelligence (incl. Robotics); Database Management; computing, system design, tools, algebraic methods, ic Learning Systems.- Connectionist Modal Logic.- Data Structures; Coding and Information Theory; model [..] Applications of Connectionist Non-classical Reason- Algorithm Analysis and Problem Complexity ing.- Connectionist Modal Logics in Practice.- Con- Fields of interest Target groups nectionist Temporal Logic.- Connectionist Intuition- Software Engineering; Programming Languages, Researchers and professionals istic Logic.- Fibring Neural Networks.- Argumenta- Compilers, Interpreters; Logics and Meanings of tion Frameworks as Neural Networks.- Probabilistic Programs; Operating Systems Type of publication Reasoning in Neural Networks.- Relational Learning Proceedings in Neural Networks.- Conclusions Target groups Researchers and professionals Fields of interest Due October 2007 Artificial Intelligence (incl. Robotics); Computation Type of publication by Abstract Devices; Theory of Computation; Logic; Proceedings 2007. XII, 311 p. Also available online. (Lecture Notes in Comput- Mathematical Logic and Formal Languages; Pattern er Science, Vol. 4726) Softcover Recognition Due October 2007 48,00 € Target groups ISBN 978-3-540-75529-6 Researchers, lecturers, postgraduate students, senior 2007. VI, 497 p. Also available online. (Lecture Notes in Computer undergraduate students Science, Vol. 4709) Softcover 64,00 € Type of publication ISBN 978-3-540-74791-8 Monograph

Due February 2008

2008. Approx 265 p. (Cognitive Technologies) Hardcover

54,00 € ISBN 978-3-540-73245-7 158 Computer Science springer.com/booksellers

H. van Ditmarsch, University of Otago, New Zealand; W. van der Hoek, University of Liverpool, UK; B. Kooi, University of Gronin- gen, The Netherlands

Dynamic Epistemic Logic

Dynamic Epistemic Logic is the logic of knowledge change. This is not about one logical system, but about a whole family of logics that allows us to spec- ify static and dynamic aspects of multi-agent sys- tems. This book provides various logics to support such formal specifications, including proof systems. Concrete examples and epistemic puzzles enliven the exposition. The book also contains exercises in- cluding answers and is eminently suitable for grad- uate courses in logic. A sweeping chapter-wise out- line of the content of this book is the following. The chapter 'Introduction' informs the reader about the history of the subject, and its relation to other dis- ciplines. 'Epistemic Logic' is an overview of mul- ti-agent epistemic logic - the logic of knowledge - including modal operators for groups, such as gen- eral and common knowledge. 'Belief Revision' is an overview on how to model belief revision, both in the 'traditional' way and in a dynamic epistemic setting. 'Public Announcements' is a detailed [..]

Features The first accessible reference to public announce- ment logic Eminently suitable textbook for a grad- uate audience Companion webpage with slides for lecturers, exams for further practice, etc. Everything you always wanted to know about the muddy chil- dren problem Many examples, exercises, and thor- ough completeness proofs and expressivity results

Contents Preface.- 1. Introduction.- 2. Epistemic Logic.- 3. Be- lief Revision.- 4. Public Announcements.- 5. Epis- temic Actions.- 6. Action Models.- 7. Completeness.- 8. Expressivity.- A. Selected Answers to Exercises.- References.- Index.

Fields of interest Logic; Artificial Intelligence (incl. Robotics); Episte- mology; Mathematical Logic and Formal Languages

Target groups Lecturers, researchers and graduate students in com- puter science, philosophy, logic, information science, artificial intelligence and cognitive science

Type of publication Monograph

Due November 2007

2007. XI, 296 p. (Synthese Library, Vol. 337) Softcover

29,95 € ISBN 978-1-4020-6908-6 Order Now! Springer Customized Book List

Yes, please send me:

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

copies ISBN € / £

Please bill me Please charge my credit card: Eurocard/Access/Mastercard Visa/Barclaycard/Bank/Americard AmericanExpress

Number Valid until

Available from Name

Dept.

Institution

Street

City / ZIP-Code

Country

Email

Date Signature

Springer Distribution Center GmbH, Haberstrasse 7, 69126 Heidelberg, Germany All € and £ prices are net prices subject to local VAT, e.g. in Germany 7% VAT for books and 19% VAT for electronic 7 Call: + 49 (0) 6221-345-4301 7 Fax: +49 (0)6221-345-4229 products. Pre-publication pricing: Unless otherwise stated, pre-pub prices are valid through the end of the third month following publication, and therefore are subject to change. All prices exclusive of carriage charges. Prices 7 Email: [email protected] 7 Web: springer.com and other details are subject to change without notice. All errors and omissions excepted.