Food in the Internet Age Hacking Europe Contemporary ...€¦ · Crocker, Cook’s Illustrated,...

13
Computer Science springer.com/NEWSonline 80 G. Alberts, University of Amsterdam, , Netherlands; R. Oldenziel, Eindhoven University of Technology, , Netherlands (Eds) Hacking Europe From Computer Cultures to Demoscenes Features 7 Describes how local hacker communities across Europe appropriated the computer and forged new cultures around it 7 Explores the mediating actors instrumental in introducing and spreading the cultures of computing around Europe 7 Highlights the role of mischief, humor, and play in hacker culture Contents Introduction: How European Players Captured the Computer and Created the Scenes.- Part I: Appropriating America: Making One’s Own.- Transnational (Dis)connection in Localizing Personal Computing in the Netherlands, 1975- 1990.- “Inside a Day You’ll be Talking to it Like an Old Friend”: e Making and Remaking of Sinclair Personal Computing in 1980s Britain.- Legal Pirates Ltd: Home Computing Cultures in Early 1980s Greece.- Part II: Illegitimate Sons in Between: Scences.- Galaxy and the New Wave: Yugoslav Computer Culture in the 1980s.- Playing and Copying: Social Practices of Home Computer Users in Poland During the 1980s.- Multiple Us- ers, Diverse Users: Demoscene and the Appropria- tion of the Personal Computer by Demoscene Hackers.- Part III: Going Public: How to Change the World.- Heroes Yet Criminals of the German Computer Revolution.- How Amsterdam Invented the Internet: European Networks of Significance 1980-1995.- Users in the Dark: e Development of a User-Controlled Technology in the Czech Wireless Network Community. Fields of interest History of Computing; Personal Computing; Computers and Society Target groups Research Product category Contributed volume Due October 2013 2014. VI, 228 p. 17 illus., 8 in color. (History of Computing) Hardcover 7 * € (D) 90,94 | € (A) 93,49 | sFr 113,50 7 € 84,99 | £76.50 ISBN 978-1-4471-5492-1 9<HTMEPH=bfejcb> W. Aspray, G. Royer, M. G. Ocepek, University of Texas, Austin, TX, USA Food in the Internet Age is book examines food in the United States in the age of the Internet. One major theme running through the book is business opportunities and failures, as well as the harms to consumers and traditional brick-and-mortar companies that occurred as entrepreneurs tried to take advantage of the Internet to create online companies related to food. e other major theme is the concept of trust online and different models used by differ- ent companies to make their web presence seem trustworthy. e book describes a number of ma- jor food companies, including AllRecipes, Betty Crocker, Cook’s Illustrated, Epicurious, Groupon, OpenTable, and Yelp. e book draws on business history, food studies, and information studies for its approach. Features 7 Tackles information science in terms of food on the internet 7 Covers business history and public trust 7 Discusses how the internet has affected certain food industries Contents Food Online: An Introduction to a Complex En- vironment.- Anatomy of a Dot-Com Failure: e Case of Online Grocer Webvan.- e Dark Side of Online Food Businesses: Harms to Consumers and Main-Street Businesses.- Trust Online: From Amazon to Recipe Sharing. Fields of interest Information Systems Applications (incl.Internet); Food Science; Operation Research/Decision eory Target groups Research Product category Brief Due September 2013 2013. XII, 83 p. 16 illus. (SpringerBriefs in Food, Health, and Nutrition) Softcover 7 * € (D) 53,49 | € (A) 54,99 | sFr 67,00 7 € 49,99 | £44.99 ISBN 978-3-319-01597-2 9<HTODMJ=abfjhc> T. Bäck, Leiden University, Leiden, Netherlands; C. Foussette, P. Krause, divis intelligent solutions GmbH, Dortmund, Germany Contemporary Evolution Strategies Evolution strategies have more than 50 years of history in the field of evolutionary computation. Since the early 1990s, many algorithmic variations of evolution strategies have been developed, char- acterized by the fact that they use the so-called derandomization concept for strategy parameter adaptation. Most importantly, the covariance matrix adaptation strategy (CMA-ES) and its successors are the key representatives of this group of contemporary evolution strategies. is book provides an overview of the key algorithm developments between 1990 and 2012, includ- ing brief descriptions of the algorithms, a unified pseudocode representation of each algorithm, and program code which is available for download. In addition, a taxonomy of these algorithms is provided to clarify similarities and differences as well as historical relationships between the various instances of evolution strategies. Features 7 Modern, comprehensive treatment of the key approaches 7 Authors' soſtware available for download 7 Valuable for industrial and aca- demic researchers and practitioners Contents Chap. 1 - Introduction.- Chap. 2 - Evolution Strategies.- Chap. 3 - Taxonomy of Evolution Strategies.- Chap. 4 - Empirical Analysis.- Chap. 5 - Summary.- List of Figures.- List of Algorithms.- Bibliography. Fields of interest Algorithm Analysis and Problem Complexity; Computational Intelligence; Artificial Intelligence (incl. Robotics) Target groups Research Product category Monograph Due September 2013 2013. IV, 126 p. 33 illus., 31 in color. (Natural Computing Series) Hardcover 7 * € (D) 42,79 | € (A) 43,99 | sFr 53,50 7 € 39,99 | £35.99 ISBN 978-3-642-40136-7 9<HTOGPC=eabdgh>

Transcript of Food in the Internet Age Hacking Europe Contemporary ...€¦ · Crocker, Cook’s Illustrated,...

Computer Science springer.com/NEWSonline

80

G. Alberts, University of Amsterdam, , Netherlands; R. Oldenziel, Eindhoven University of Technology, , Netherlands (Eds)

Hacking EuropeFrom Computer Cultures to Demoscenes

Features 7 Describes how local hacker communities across Europe appropriated the computer and forged new cultures around it 7 Explores the mediating actors instrumental in introducing and spreading the cultures of computing around Europe 7 Highlights the role of mischief, humor, and play in hacker culture

Contents Introduction: How European Players Captured the Computer and Created the Scenes.- Part I: Appropriating America: Making One’s Own.- Transnational (Dis)connection in Localizing Personal Computing in the Netherlands, 1975-1990.- “Inside a Day You’ll be Talking to it Like an Old Friend”: The Making and Remaking of Sinclair Personal Computing in 1980s Britain.- Legal Pirates Ltd: Home Computing Cultures in Early 1980s Greece.- Part II: Illegitimate Sons in Between: Scences.- Galaxy and the New Wave: Yugoslav Computer Culture in the 1980s.- Playing and Copying: Social Practices of Home Computer Users in Poland During the 1980s.- Multiple Us-ers, Diverse Users: Demoscene and the Appropria-tion of the Personal Computer by Demoscene Hackers.- Part III: Going Public: How to Change the World.- Heroes Yet Criminals of the German Computer Revolution.- How Amsterdam Invented the Internet: European Networks of Significance 1980-1995.- Users in the Dark: The Development of a User-Controlled Technology in the Czech Wireless Network Community.

Fields of interestHistory of Computing; Personal Computing; Computers and Society

Target groupsResearch

Product categoryContributed volume

Due October 2013

2014. VI, 228 p. 17 illus., 8 in color. (History of Computing) Hardcover7 * € (D) 90,94 | € (A) 93,49 | sFr 113,507 € 84,99 | £76.50ISBN 978-1-4471-5492-1

9<HTMEPH=bfejcb>

W. Aspray, G. Royer, M. G. Ocepek, University of Texas, Austin, TX, USA

Food in the Internet AgeThis book examines food in the United States in the age of the Internet. One major theme running through the book is business opportunities and failures, as well as the harms to consumers and traditional brick-and-mortar companies that occurred as entrepreneurs tried to take advantage of the Internet to create online companies related to food. The other major theme is the concept of trust online and different models used by differ-ent companies to make their web presence seem trustworthy. The book describes a number of ma-jor food companies, including AllRecipes, Betty Crocker, Cook’s Illustrated, Epicurious, Groupon, OpenTable, and Yelp. The book draws on business history, food studies, and information studies for its approach.

Features 7 Tackles information science in terms of food on the internet 7 Covers business history and public trust 7 Discusses how the internet has affected certain food industries

Contents Food Online: An Introduction to a Complex En-vironment.- Anatomy of a Dot-Com Failure: The Case of Online Grocer Webvan.- The Dark Side of Online Food Businesses: Harms to Consumers and Main-Street Businesses.- Trust Online: From Amazon to Recipe Sharing.

Fields of interestInformation Systems Applications (incl.Internet); Food Science; Operation Research/Decision Theory

Target groupsResearch

Product categoryBrief

Due September 2013

2013. XII, 83 p. 16 illus. (SpringerBriefs in Food, Health, and Nutrition) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-3-319-01597-2

9<HTODMJ=abfjhc>

T. Bäck, Leiden University, Leiden, Netherlands; C. Foussette, P. Krause, divis intelligent solutions GmbH, Dortmund, Germany

Contemporary Evolution StrategiesEvolution strategies have more than 50 years of history in the field of evolutionary computation. Since the early 1990s, many algorithmic variations of evolution strategies have been developed, char-acterized by the fact that they use the so-called derandomization concept for strategy parameter adaptation. Most importantly, the covariance matrix adaptation strategy (CMA-ES) and its successors are the key representatives of this group of contemporary evolution strategies. This book provides an overview of the key algorithm developments between 1990 and 2012, includ-ing brief descriptions of the algorithms, a unified pseudocode representation of each algorithm, and program code which is available for download. In addition, a taxonomy of these algorithms is provided to clarify similarities and differences as well as historical relationships between the various instances of evolution strategies.

Features 7 Modern, comprehensive treatment of the key approaches 7 Authors' software available for download 7 Valuable for industrial and aca-demic researchers and practitioners

Contents Chap. 1 - Introduction.- Chap. 2 - Evolution Strategies.- Chap. 3 - Taxonomy of Evolution Strategies.- Chap. 4 - Empirical Analysis.- Chap. 5 - Summary.- List of Figures.- List of Algorithms.- Bibliography.

Fields of interestAlgorithm Analysis and Problem Complexity; Computational Intelligence; Artificial Intelligence (incl. Robotics)

Target groupsResearch

Product categoryMonograph

Due September 2013

2013. IV, 126 p. 33 illus., 31 in color. (Natural Computing Series) Hardcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £35.99ISBN 978-3-642-40136-7

9<HTOGPC=eabdgh>

News 9/2013 Computer Science

81

O. Bagdasar, University of Derby, Derby, UK

Concise Computer MathematicsTutorials on Theory and Problems

Adapted from a modular undergraduate course on computational mathematics, Concise Com-puter Mathematics delivers an easily accessible, self-contained introduction to the basic notions of mathematics necessary for a computer sci-ence degree. The text reflects the need to quickly introduce students from a variety of educational backgrounds to a number of essential mathemati-cal concepts.

Features 7 Provides a concise introduction to the es-sential mathematical concepts for computer science undergraduate students 7 Contains numerous exercises throughout the text, together with solutions and additional, more challenging problems for those wishing to stretch themselves further 7 Presents classroom-tested material, specifically designed to support computer science courses

Contents Sets and Numbers.- Relations and Databas-es.- Functions.- Boolean Algebra, Logic and Quantifiers.- Normal Forms, Proof and Argu-ment.- Vectors and Complex Numbers.- Matrices and Applications.- Matrix Transformations for Computer Graphics.- Elements of Graph Theory.- Elements of Number Theory and Cryptography.- Elements of Calculus.- Elementary Numerical Methods.

Fields of interestDiscrete Mathematics in Computer Science; Mathematical Applications in Computer Science; Mathematical Logic and Formal Languages

Target groupsResearch

Product categoryBrief

Due October 2013

2013. IX, 111 p. 17 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-3-319-01750-1

9<HTODMJ=abhfab>

B. Berstel-Da Silva, University of Freiburg, Freiburg, Germany

Verification of Business Rules ProgramsRules represent a simplified means of program-ming, congruent with our understanding of human brain constructs. With the advent of business rules management systems, it has been possible to introduce rule-based programming to nonprogrammers, allowing them to map expert intent into code in applications such as fraud detection, financial transactions, healthcare, retail, and marketing. However, a remaining concern is the quality, safety, and reliability of the resulting programs.

Features 7 Approach to the formal verification of rule programs as found in business rules management systems 7 Enables rule authors and tool devel-opers to understand, express formally, and prove properties of the execution behavior of business rules programs 7 Interesting for practitioners, researchers and graduate students

Contents Chap. 1 - Introduction.- Chap. 2 - Related Work.- Chap. 3 - Syntax of Rules and Rule Programs.- Chap. 4 - States and State Assertions.- Chap. 5 - Operational Semantics of Rule Programs.- Chap. 6 - Correctness of Rule Programs.- Chap. 7 - Cor-rectness of Programs: A Comparison.- Chap. 8 - Main Steps in Rule Program Verification.- Chap. 9 - A Verification Method for Rule Programs.- Chap. 10 - Specialized Proof Rules.- Chap. 11 - Conclu-sion.- Appendix A - Verification in an Industrial Business Rules Management System.- List of Proof Rules.- Index.

Fields of interestLogics and Meanings of Programs; Artificial Intel-ligence (incl. Robotics); Database Management

Target groupsResearch

Product categoryMonograph

Due September 2013

2013. XIV, 226 p. 18 illus., 2 in color. Hardcover7 * € (D) 90,94 | € (A) 93,49 | sFr 113,507 € 84,99 | £76.50ISBN 978-3-642-40037-7

9<HTOGPC=eaadhh>

S. Bhattacharyya, RCC Inst. of Information Technology, Kolkata, India; U. Maulik, Jadavpur University Dept. Computer Science &, Kolkata, India

Soft Computing for Image and Multimedia Data ProcessingProper analysis of image and multimedia data requires efficient extraction and segmentation techniques. Among the many computational intelligence approaches, the soft computing paradigm is best equipped with several tools and techniques that incorporate intelligent concepts and principles.

Features 7 Starts with comprehensive tutorial on brain learning and the key soft computing tech-niques 7 Soft computing paradigm is best equipped for many complex real-world image processing problems 7 Standalone textbook for graduates, and reference for researchers and engineers

Contents Chap. 1 Introduction.- Chap. 2 Transformation-Invariant Image Recognition Using Multilayer Perceptron.- Chap. 3 Energy Efficient Intelligent Lighting Control Using a Multilayer Perceptron.- Chap. 4 Target Tracking Using Fuzzy Hostility Induced Segmentation of Optical Flow Field.- Chap. 5 Binary Object Extraction by Bidirectional Self-organizing Neural Network Architecture.- Chap. 6 Multilevel Object Extraction by BDSONN Architecture.- Chap. 7 Color Object Extraction by Parallel BDSONN Architecture.- Chap. 8 Gray-Scale Image Edge Detection Using Rough Sets.- References.- Index.

Fields of interestArtificial Intelligence (incl. Robotics); Image Processing and Computer Vision; Computational Intelligence

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Due October 2013

2013. X, 283 p. 171 illus., 53 in color. Hardcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-3-642-40254-8

9<HTOGPC=eacfei>

Computer Science springer.com/NEWSonline

82

M. Bramer, University of Portsmouth, Portsmouth, UK

Logic Programming with PrologLogic Programming is the name given to a distinc-tive style of programming, very different from that of conventional programming languages such as C++ and Java. By far the most widely used Logic Programming language is Prolog. Prolog is a good choice for developing complex applications, espe-cially in the field of Artificial Intelligence. Logic Programming with Prolog does not assume that the reader is an experienced programmer or has a background in Mathematics, Logic or Artificial Intelligence. It starts from scratch and aims to arrive at the point where quite powerful programs can be written in the language. It is intended both as a textbook for an introductory course and as a self-study book. On completion readers will know enough to use Prolog in their own research or practical projects.

Features 7 Features two entirely new chapters as well as updates to the chapters from the first edi-tion 7 Clearly written, with many worked examples and self- assessment exercises 7 Fully compatible with SWI-Prolog

Contents Introduction.- Getting Started.- Clauses and Predicates.- Satisfying Goals.- Operators and Arithmetic.- Input and Output.- Loops.- Prevent-ing Backtracking.- Changing the Prolog Data-base.- List Processing.- Strong Processing.- More Advanced Features.- Using Grammar Rules to Analyse English Sentences.- Prolog in Action.- Appendix 1 – Built-in Predicates.- Appendix 2 – Built-in Predicates.- Appendix 3 – Specimen Solutions to Practical Exercises.- Appendix 4 – Glossary.- Index.

Fields of interestProgramming Languages, Compilers, Interpreters; Programming Techniques

Target groupsResearch

Product categoryUndergraduate textbook

Due September 2013

2nd ed. 2014. X, 218 p. 6 illus. Softcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £35.99ISBN 978-1-4471-5486-0

9<HTMEPH=bfeiga>

A. Brodnik, University of Ljubljana, Ljubljana, Slovenia; A. Lopez-Ortiz, University of Waterloo, Waterloo, ON, Canada; V. Raman, The Insitute of Mathematical Sciences, Chennai, India; A. Viola, Universidad de la Republica, Montevideo, Uruguay (Eds)

Space-Efficient Data Structures, Streams, and AlgorithmsPapers in Honor of J. Ian Munro, on the Occasion of His 66th Birthday

Contents The Query Complexity of Finding a Hidden Permutation.- Bounds for Scheduling Jobs on Grid Processors.- Quake Heaps: A Simple Alternative to Fibonacci Heaps.- Variations on Instant Insan-ity.- A Simple Linear-Space Data Structure for Constant-Time Range.- Closing a Long-Standing Complexity Gap for Selection: V3(42) = 50.- Fru-gal Streaming for Estimating Quantiles.- From Time to Space: Fast Algorithms That Yield Small and Fast Data.- Computing (and life) Is all About Tradeoffs: A Small Sample of Some Computa-tional Tradeoffs.- A History of Distribution-Sensitive Data Structures.- A Survey on Priority Queues.- On Generalized Comparison-Based Sorting Problems.- A Survey of the Game “Lights Out!”.- Random Access to High-Order Entropy Compressed Text.- Succinct and Implicit Data Structures for Computational Geometry.- In Pursuit of the Dynamic Optimality Conjecture.- A Survey of Algorithms and Models for List Update.- Orthogonal Range Searching for Text Indexing.- A Survey of Data Structures in the Bitprobe Model.- Succinct Representations of Ordinal Trees.- Array Range Queries.- Indexes for Document Retrieval with Relevance.

Fields of interestAlgorithm Analysis and Problem Complexity; Data Structures; Discrete Mathematics in Com-puter Science

Target groupsResearch

Product categoryContributed volume

Available

2013. XXVIII, 363 p. 58 illus. (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues, Volume 8066) Softcover7 * € (D) 57,78 | € (A) 59,40 | sFr 72,007 € 54,00 | £48.99ISBN 978-3-642-40272-2

9<HTOGPC=eachcc>

S. Cagnoni, University of Parma, Parma, Italy; M. Mirolli, Istituto di Scienze e Tecnologie della Cognizione, Rome, Italy; M. Villani, University of Modena and Reggio Emilia, Reggio Emilia, Italy (Eds)

Evolution, Complexity and Artificial LifeWIVACE 2012

Contents Part I -- Research Issues.- Chap. 1 -- Two Limitations of Current Living Artifacts and How to Overcome Them.- Chap. 2 -- Taming the Complexity of Natural and Artificial Evolution-ary Dynamics.- Part II -- Biological Modeling.- Chap. 3 -- Models of Gene Regulatory Networks: Integrating Modern Knowledge into the Random Boolean Network Framework.- Chap. 4 -- A Dynamical Model of Cell Differentiation.- Chap. 5 -- Automatic the Design of Boolean Networks for Modeling Cell Differentiation.- Chap. 6 -- Experi-mental Perspectives for a Chemical Communica-tion Between Synthetic and Natural Cells.- Part III -- Mind and Society.- Chap. 7 -- A Bioinspired Learning Signal for the Cumulative Learning of Different Skills.- Chap. 8 -- Regulatory Traits in Cultural Evolution.- Chap. 9 -- Development of Categorization Abilities in Evolving Embodied Agents: A Study of Internal Representations with External Social Inputs.- Chap. 10 -- Artificial Life-Based Edutainment Systems: Two Case Sudies.- Part IV – Applications.- Chap. 11 -- The Effects of Multivalency and Kinetics in Nanoscale Search by Molecular Spiders.- Chap. 12 -- Towards the use of Genetic Programming for the Prediction of Sur-vival in Cancer.- Chap. 13 -- A Neuroevolutionary Approach to Electrocardiographic Signal Clas-sification.- Chap. 14 -- An Evolutionary Approach to Grid Computing Agents. [...]

Fields of interestArtificial Intelligence (incl. Robotics); Complexity; Computational Intelligence

Target groupsResearch

Product categoryMonograph

Due January 2014

2014. X, 275 p. Hardcover7 approx. * € (D) 90,90 | € (A) 93,45 | sFr 113,507 approx. € 84,95 | £76.50ISBN 978-3-642-37576-7

9<HTOGPC=dhfhgh>

News 9/2013 Computer Science

83

M. E. Celebi, Louisiana State University, Shreveport, LA, USA; B. Smolka, Silesian University of Technology, Gliwice, Poland (Eds)

Advances in Low-Level Color Image ProcessingContents Preface.- 1 Automated Color Misalignment Cor-rection for Close-Range and Long-Range Hyper-Resolution Multi-Line CCD Images, by Zhiyu Chen, Andreas Koschan, Chung-Hao Chen, and Mongi Abidi.- 2 Adaptive Demosaicing Algorithm Using Characteristics of the Color Filter Array Pattern, by Ji Won Lee and Rae-Hong Park.- 3 A Taxonomy of Color Constancy and Invariance Algorithm, by Dohyoung Lee and Konstanti-nos N. Plataniotis.- 4 On the von Kries Model: Estimate, Dependence on Light and Device, and Applications, by Michela Lecca.- 5 Impulse and mixed multi-channel denoising using statistical halfspace depth functions, by Djordje Baljozović, Aleksandra Baljozović, Branko Kovačević.- 6 Spatially Adaptive Color Image Processing, by Johan Debayle and Jean-Charles Pinoli.- 7 Vector ordering and multispectral morphological image processing, by Santiago Velasco-Ferero and Jesus Angelo.- 8 Morphological Template Matching in Color Images, by Sébastien Lefèvre, Erhan Aptoula, Benjamin Perret, and Jonathan Weber.- 9 Tensor Voting for Robust Color Edge Detec-tion, by Rodrigo Moreno, Miguel Angel Garcia, and Domenec Puig.- 10 Color Categorization Models for Color Image Segmentation, by Teresa Alarcon, Oscar Dalmau.- 11 Skin region detection and segmentation in color images, by Michal Kawulok, Jakub Nelepa and Jolanta Kawulok.- 12 Contribution of skin color cue in face detection applications, by Dohyoung Lee, Jeaff Wang, and Konstantinos N. Plataniotis. [...]

Fields of interestImage Processing and Computer Vision; Signal,Image and Speech Processing; Imaging / Radiology

Target groupsResearch

Product categoryMonograph

Due September 2013

2014. XLVI, 470 p. 176 illus., 148 in color. (Lecture Notes in Computational Vision and Biomechanics, Volume 11) Hardcover7 * € (D) 106,99 | € (A) 109,99 | sFr 133,507 € 99,99 | £90.00ISBN 978-94-007-7583-1

9<HTUELA=hhfidb>

E. Ch’ng, V. Gaffney, H. Chapman, University of Birmingham, , UK (Eds)

Visual Heritage in the Digital AgeContents Foreword by Ross Perry.- Seeing Things: Heritage Computing and the Arts and Humanities.- Digi-tal Heritage: What Happens when we Digitize Everything?.- Digital Reconstruction of Archaeo-logical Sites and Monuments: Some Experiences in South-Eastern Sicily.- Urban Scrawl: Recon-structing Urban Landscapes Using Documentary Sources.- Crossing Borders: A Multi-Layer GIS Mapping Framework for the Cultural Manage-ment of the Mundo Maya Region.- Situating Cultural Technologies Outdoors: Designing for Mobile Interpretation of Rock Art in Rural Britain.- Simulation and Visualisation of Agent Survival and Settlement Behaviours in the Hunter-Gatherer Colonisation of Mesolithic Landscapes.- Visualising Large Scale Behaviours: Presenting 4D Data in Archaeology.- Time and Tide: Modelling the Effects of Landscape Change on Population Support in the Southern North Sea.- Time and Tide: Modelling the Effects of Landscape Change on Population Support in the Southern North Sea.- Reconstructing a Painful Past: A Non-inva-sive Approach to Reconstructing Lager Norderney in Alderney, the Channel Islands.- A Theoretical Framework for Stigmergetic Reconstruction of Ancient Text.- Multi-Touch Tables for Exploring Heritage Content in Public Spaces.- More Than Just a Sum of the Points: Re-thinking the Value of Laser Scanning Data.- Resolving the Carving: The Application of Laser-scanning in Reconstructing a Viking Cross from Neston, Cheshire.- “There’s An App For That”: Building Smartphone Applications to Improve the Ergonomics of Landscape Study, Analysis and Interpretation. [...]

Fields of interestUser Interfaces and Human Computer Interaction; Archaeology; Cultural Heritage

Target groupsResearch

Product categoryContributed volume

Due December 2013

2014. X, 321 p. 145 illus., 98 in color. (Springer Series on Cultural Computing) Hardcover7 approx. * € (D) 101,64 | € (A) 104,49 | sFr 126,507 approx. € 94,99 | £85.95ISBN 978-1-4471-5534-8

9<HTMEPH=bffdei>

S. Crespi Reghizzi, L. Breveglieri, A. Morzenti, Politecnico di Milano, Milano, Italy

Formal Languages and CompilationThis revised and expanded new edition elucidates the elegance and simplicity of the fundamental theory underlying formal languages and compila-tion. Retaining the reader-friendly style of the 1st edition, this versatile textbook describes the essential principles and methods used for defining the syntax of artificial languages, and for designing efficient parsing algorithms and syntax-directed translators with semantic attributes. Features: presents a novel conceptual approach to parsing algorithms that applies to extended BNF gram-mars, together with a parallel parsing algorithm (NEW); supplies supplementary teaching tools at an associated website; systematically discusses am-biguous forms, allowing readers to avoid pitfalls; describes all algorithms in pseudocode; makes extensive usage of theoretical models of automata, transducers and formal grammars; includes con-cise coverage of algorithms for processing regular expressions and finite automata; introduces static program analysis based on flow equations.

Features 7 Fully revised and expanded new edi-tion 7 Supplies supplementary teaching tools at an associated website 7 Now presents a novel conceptual approach to parsing algorithms that applies to extended BNF grammars, together with a parallel parsing algorithm

Contents Introduction.- Syntax.- Finite Automata as Regu-lar Language Recognizers.- Pushdown Automata and Parsing.- Translation Semantics and Static Analysis.

Field of interestMathematical Logic and Formal Languages

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Due October 2013

2nd ed. 2014. XII, 438 p. 115 illus., 1 in color. (Texts in Computer Science) Hardcover7 * € (D) 64,19 | € (A) 65,99 | sFr 80,007 € 59,99 | £53.99ISBN 978-1-4471-5513-3

9<HTMEPH=bffbdd>

Computer Science springer.com/NEWSonline

84

F. C. Delicato, P. F. Pires, Federal University of Rio de Janeiro, Rio de Janeiro, Brazil; T. Batista, Federal University of Rio Grande do Norte, Natal, Brazil

Middleware Solutions for the Internet of ThingsAfter a brief introduction and contextualization on the Internet of Things (IoT) and Web of Things (WoT) paradigms, this timely new book describes one of the first research initiatives aimed at tackling the several challenges involved in build-ing a middleware-layer infrastructure capable of realizing the WoT vision: the SmartSensor infrastructure.

Features 7 Presents an overview on the emergent IoT/WoT paradigms describing its main concepts, principles and building blocks 7 Describes a middleware-layer infrastructure that integrates distinct Wireless Sensor Networks (WSN) en-dowed with heterogeneous elements and provides a RESTful-based programming model 7 Shows how developers can create a Web Mashup applica-tion, without having specific knowledge about the low-level details required to integrate different types of WSN sensed data

Contents Preface.- Introduction.- Basic Concepts.- Smart-Sensor - An infrastructure for the Web of Things.- The Sensor Integration Module (SIM).- Smart Sensor Programming and Execution Module – PEM.- Smart Sensor Proof of Concept.- Final Remarks.

Fields of interestSoftware Engineering; Information Systems and Communication Service

Target groupsResearch

Product categoryBrief

Due September 2013

2014. X, 78 p. 39 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-1-4471-5480-8

9<HTMEPH=bfeiai>

J. F. Dooley, Knox College, Galesburg, IL, USA

A Brief History of Cryptology and Cryptographic AlgorithmsThe science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one’s messages. Yet for every system there is a cryptana-lyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New math-ematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them – so far.

Features 7 Traces the history of the conflict between cryptographer and cryptanalyst 7 Explores in some depth the algorithms created to protect mes-sages 7 Suggests where the field of cryptology is going in the future

Contents Introduction: A Revolutionary Cipher.- Cryp-tology Before 1500: A Bit of Magic.- The Black Chambers: 1500 – 1776.- Crypto goes to War: 1861 – 1865.- Crypto and the War to End All Wars: 1914 – 1917.- The Interwar Period: 1919 – 1939.- The Coming of the Machines: 1918 – 1945.- The Machines Take Over: Computer Cryptogra-phy.- Alice and Bob and Whit and Martin: Public Key Crypto.

Fields of interestHistory of Computing; Data Structures, Cryptol-ogy and Information Theory; History of Science

Target groupsResearch

Product categoryBrief

Due September 2013

2013. XII, 99 p. 33 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-3-319-01627-6

9<HTODMJ=abgchg>

G. M. Farinella, S. Battiato, Università di Catania, Catania, Italy; R. Cipolla, University of Cambridge, Cambridge, UK (Eds)

Advanced Topics in Computer VisionFeatures 7 Presents a broad selection of cutting-edge re-search from internationally-recognized computer vision groups 7 Covers both theoretical and practical aspects of reconstruction, registration, and recognition 7 Provides an overview of challenging areas, and describes novel algorithms designed to infer the semantic content of images and videos

Contents Visual Features: From Early Concepts to Modern Computer Vision.- Where Next in Object Recog-nition and How Much Supervision Do We Need?.- Recognizing Human Actions by Using Effective Codebooks and Tracking.- Evaluating and Extend-ing Trajectory Features for Activity Recognition.- Co-Recognition of Images and Videos: Unsuper-vised Matching of Identical Object Patterns and its Applications.- Stereo Matching: State-of-the-Art and Research Challenges.- Visual Localization for Micro Aerial Vehicles in Urban Outdoor Environ-ments.- Moment Constraints in Convex Optimiza-tion for Segmentation and Tracking.- Large Scale Metric Learning for Distance-Based Image Clas-sification on Open Ended Data Sets.- Top-Down Bayesian Inference of Indoor Scenes.- Efficient Loopy Belief Propagation Using the Four Color Theorem.- Boosting k-Nearest Neighbors Classi-fication.- Learning Object Detectors in Stationary Environments.- Video Temporal Super-Resolution Based on Self-Similarity.

Field of interestComputer Imaging, Vision, Pattern Recognition and Graphics

Target groupsResearch

Product categoryContributed volume

Due October 2013

2014. XVIII, 450 p. 216 illus., 170 in color. (Advances in Computer Vision and Pattern Recognition) Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £79.95ISBN 978-1-4471-5519-5

9<HTMEPH=bffbjf>

News 9/2013 Computer Science

85

A. Hameurlain, Paul Sabatier University, Toulouse, France; J. Küng, R. Wagner, Universität Linz, Linz, Austria (Eds)

Transactions on Large-Scale Data- and Knowledge-Centered Systems IXThe LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot top-ics in computer science. Since the 1990s, the In-ternet has become the main driving force behind application development in all domains.

Features 7 Contains 5 carefully reviewed papers, selected from 20 regular submissions to the Transactions on Large-Scale Data- and Knowledge-Centered Systems 7 Covers a wide range of hot topics in the field of data- and knowledge manage-ment 7 Subjects range from top-k query pro-cessing in PSP systems to pairwise similarity for cluster ensemble problems

Contents As-Soon-As-Possible Top-k Query Processing in P2P Systems.- Self-stabilizing Consensus Average Algorithm in Distributed Sensor Networks.- Re-coverable Encryption through a Noised Secret over a Large Cloud.- Conservative Type Exten-sions for XML Data.- Pairwise Similarity for Cluster Ensemble Problem: Link-Based and Ap-proximate Approaches.

Fields of interestData Mining and Knowledge Discovery; Comput-er Communication Networks; Algorithm Analysis and Problem Complexity

Target groupsResearch

Product categoryContributed volume

Available

2013. X, 123 p. 35 illus. (Lecture Notes in Computer Science / Transactions on Large-Scale Data- and Knowledge-Centered Systems, Volume 7980) Softcover7 * € (D) 67,41 | € (A) 69,30 | sFr 84,007 € 63,00 | £56.99ISBN 978-3-642-40068-1

9<HTOGPC=eaagib>

N. Jonoska, M. Saito, University of South Florida, Tampa, FL, USA (Eds)

Discrete and Topological Models in Molecular BiologyContents Chap. 1 - Perspectives in Computational Genome Analysis.- Chap. 2 - The Sequence Reconstruction Problem.- Chap. 3 - Extracting Coevolving Char-acters from a Tree of Species.- Chap. 4 - When and How the Perfect Phylogeny Model Explains Evolution.- Chap. 5 - An Invitation to the Study of Brain Networks with Some Statistical Analysis of Thresholding Techniques.- Chap. 6 - Simplicial Models and Topological Inference in Biological Systems.- Chap. 7 - Combinatorial Insights into RNA Secondary Structure.- Chap. 8 - Redundant and Critical Noncovalent Interactions in Protein Rigid Cluster Analysis.- Chap. 9 - Modeling Autonomous Supramolecular Assembly.- Chap. 10 - The Role of Symmetry in Conformational Changes of Viral Capsids: A Mathematical Ap-proach.- Chap. 11 - Minimal Tile and Bond-Edge Types for Self-Assembling DNA Graphs.- Chap. 12 - Programmed Genome Processing in Ciliates.- Chap. 13 - The Algebra of Gene Assembly in Cili-ates.- Chap. 14 - Invariants of Graphs Modeling Nucleotide Rearrangements.- Chap. 15 - Intro-duction to DNA Topology.- Chap. 16 - Reactions Mediated by Topoisomerases and Other Enzymes: Modelling Localised DNA Transformations.- Chap. 17 - Site-Specific Recombination on Unknot and Unlink Substrates Producing Two-Bridge Links.- Chap. 18 - Site-Specific Recombination Modeled as a Band Surgery: Applications to Xer Recombination.- Chap. 19 - Understanding DNA Looping Through Cre-Recombination Kinetics .- Chap. 20 - The QSSA in Chemical Kinetics: As taught and as Practiced.- Chap. 21 - Algebraic Models and Their Use in Systems Biology. [...]

Fields of interestTheory of Computation; Mathematical and Com-putational Biology; Evolutionary Biology

Target groupsResearch

Product categoryMonograph

Due September 2013

2013. X, 579 p. 209 illus., 152 in color. (Natural Computing Series) Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £85.50ISBN 978-3-642-40192-3

9<HTOGPC=eabjcd>

M. Koutny, Newcastle University, Newcastle upon Tyne, UK; W. M. van der Aalst, Eindhoven University of Technology, Eindhoven, The Netherlands; A. Yakovlev, University of Newcastle, Newcastle upon Tyne, UK (Eds)

Transactions on Petri Nets and Other Models of Concurrency VIIIFeatures 7 Contains the best papers selected from the workshops PNSE 2012, CompoNet 2012, LAM 2012, and BioPNN 7 Topics covered range from model checking and system verification to synthe-sis 7 Petri-net-based standards and innovative applications of Petri nets and other models of concurrency are also covered

Contents Comparing Metabolic Pathways through Reac-tions and Potential Fluxes.- Modeling and Analyz-ing Wireless Sensor Networks with VeriSensor: An Integrated Workflow.- Local State Refinement and Composition of Elementary Net Systems: An Approach Based on Morphisms.- From Code to Coloured Petri Nets: Modelling Guidelines.- Using Integer Time Steps for Checking Branching Time Properties of Time Petri Nets.- When Can We Trust a Third Party?: A Soundness Perspective.- Hybrid Petri Nets for Modelling the Eukaryotic Cell Cycle.- Simulative Model Checking of Steady State and Time-Unbounded Temporal Operators.- Model-Driven Middleware Support for Team-Oriented Process Management.- Grade/CPN: A Tool and Temporal Logic for Testing Colored Petri Net Models in Teaching.

Fields of interestSoftware Engineering; Logics and Meanings of Programs

Target groupsResearch

Product categoryContributed volume

Available

2013. XVIII, 203 p. 85 illus. (Lecture Notes in Computer Science / Transactions on Petri Nets and Other Models of Concurrency, Volume 8100) Softcover7 * € (D) 67,41 | € (A) 69,30 | sFr 84,007 € 63,00 | £56.99ISBN 978-3-642-40464-1

9<HTOGPC=eaegeb>

Computer Science springer.com/NEWSonline

86

T. Lerner, Mainz, Germany

Mobile PaymentPaying with mobile devices such as mobile phones or smart phones will expand in Germany in the coming years. This development provides oppor-tunities for various industries (banking, telecom-munications, credit card business, manufacturers, suppliers, retail) and for consumers. The book comprehensively describes current status, trends and critical aspects of successful mobile payment. It combines theory and practice. Comprising essential aspects of a successful mobile payment as well as successful case studies and practical examples, this book is for all who are developing, offering and using mobile payment.

Features 7 Mobile makes the world go round 7 With case studies and examples 7 Important aspects of mobile payment

Contents Definition and characteristics.- failures and suc-cesses.- ingredients to success.- What can prevail in the market?.- Technologies, security, trust and regulatory requirements.- Successful models of practice.- Case Studies.- Final Review.

Fields of intereste-Commerce/e-business; Computer Applications; Special Purpose and Application-Based Systems

Target groupsProfessional/practitioner

Product categoryProfessional book

Due November 2013

2013. Approx. 200 p. 100 illus. Softcover7 approx. * € (D) 53,49 | € (A) 54,99 | sFr 67,007 approx. € 49,99 | £44.99ISBN 978-3-658-03250-0

9<HTOGQI=adcfaa>

X. Liang, R. Lu, University of Waterloo, Waterloo, ON, Canada; X. Lin, University of Ontario Institute of Technology, Oshawa, ON, Canada; X. Shen, University of Waterloo, Waterloo, ON, Canada

Security and Privacy in Mobile Social NetworksThis book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evalu-ation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location pri-vacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introduc-ing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summa-rizes the future research directions for this rapidly growing area of research.

Contents Overview.- Profile Matching Protocol with Ano-nymity Enhancing Techniques.- Cooperative Data Forwarding Strategy with Privacy Preservation.- Recommendation-based Trustworthy Service Evaluation.

Fields of interestComputer Communication Networks; Commu-nications Engineering, Networks; Information Systems Applications (incl.Internet)

Target groupsResearch

Product categoryBrief

Due September 2013

2014. X, 100 p. 27 illus., 17 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-1-4614-8856-9

9<HTMERB=eiifgj>

Y. Liu, J. K. Muppala, The Hong Kong University of Science and, Kowloon, Hong Kong SAR; M. Veeraraghavan, University of Virginia, Charlottesville, VA, USA; D. Lin, The Hong Kong University of Science and, Kowloon, Hong Kong SAR; M. Hamdi, Hong Kong University of Science & Technology, Kowloon, Hong Kong SAR

Data Center NetworksThis SpringerBrief presents a survey of data center network designs and topologies and compares several properties in order to highlight their advantages and disadvantages. The brief also ex-plores several routing protocols designed for these topologies and compares the basic algorithms to establish connections, the techniques used to gain better performance, and the mechanisms for fault-tolerance. Readers will be equipped to understand how current research on data center networks enables the design of future architectures that can improve performance and dependability of data centers. This concise brief is designed for research-ers and practitioners working on data center networks, comparative topologies, fault tolerance routing, and data center management systems. The context provided and information on future directions will also prove valuable for students interested in these topics.

Contents Introduction.- Data Center Network Topologies: Current State-of-the-Art.- Data Center Net-work Topologies: Research Proposals.- Routing Techniques.- Performance Enhancement.- Fault-Tolerant Routing.- Conclusions.

Fields of interestComputer Communication Networks; Commu-nications Engineering, Networks; Information Systems Applications (incl.Internet)

Target groupsResearch

Product categoryBrief

Due September 2013

2013. X, 65 p. 16 illus., 15 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-3-319-01948-2

9<HTODMJ=abjeic>

News 9/2013 Computer Science

87

M. D. Lozano, J. A. Gallud, R. Tesoriero, V. M. Penichet, University of Castilla-La Mancha, Albacete, Spain (Eds)

Distributed User Interfaces: Usability and CollaborationFeatures 7 Broadens the reader’s understanding of col-laboration and usability issues on Distributed User Interface settings 7 Presents foundations and models regarding DUIs 7 Includes chapters on security and usability, and privacy and usability

Contents Preface.- Revisiting the Concept of Distributed User Interfaces.- Improving DUIs with a Decen-tralized Approach with Transactions and Feed-backs.- Distributed UI on Interactive Tabletops: Is-sues and Context Model.- Collaborative Contents Creation using Web-based Distributed User In-terface (DUI).- TwisterSearch: A Distributed User Interface for Collaborative Web Search.- Integra-tion of Collaborative Features in Ubiquitous and Context-aware Systems using Distributed User Interfaces.- A Framework for a priori Evaluation of Multimodal User Interfaces Supporting Coop-eration.- Enhancing the Security and Usability of DUI based Collaboration with Proof based Access Control.- Enhancing LACOME to Consider Pri-vacy and Security Concerns.- Evaluating Usability and Privacy in Collaboration Settings with DUIs: Problem Analysis and Case Studies.- Distributed and Tangible User Interfaces to Design Interactive Systems for People with Cognitive Disabilities.- Two Thousand Points of Interaction: Augmenting Paper Notes for a Distributed User Experience.- Distributed User Interfaces in a Cloud Educational System.

Fields of interestUser Interfaces and Human Computer Interaction; Multimedia Information Systems

Target groupsResearch

Product categoryContributed volume

Due September 2013

2014. XIV, 174 p. 75 illus., 74 in color. (Human–Computer Interaction Series) Hardcover7 * € (D) 90,94 | € (A) 93,49 | sFr 113,507 € 84,99 | £59.95ISBN 978-1-4471-5498-3

9<HTMEPH=bfejid>

C. Maciel, Federal University of Mato Grasso, Cuiabá, Brazil; V. C. Pereira, Federal University of Mato Grosso, Cuiabá, Brazil (Eds)

Digital Legacy and InteractionPost-Mortem Issues

The views of leading researchers on the emerging topic of post-mortem digital legacy and posthu-mous interaction are explored in this book which combines the technical, cultural and legal aspects associated with this new branch of HCI.

Features 7 The first book to address post-mortem digital legacy issues in HCI 7 Provides an interdis-ciplinary approach covering technical, cultural and legal aspects, relevant to designers, users and researchers 7 Explores the repercussions that may come from the development and use of emerging technologies, especially social networks and memorials

Contents Preface.- The Fate of Digital Legacy in Software Engineers’ View: Technical and Cultural Aspects.- Living with the Dead: Emergent Post-Mortem Digital Curation and Creation Practices.- The Persistence of Memory Online: Digital Memorials, Fantasy, and Grief as Entertainment.- The Internet Generation and the Posthumous Interaction.- Narrating the Digital: The Evolving Memento Mori.- Tombstone Technology: Deathscapes in Asia, the U.K. and the U.S..- “What Happens to my Facebook Profile when I Die?”: Legal Issues Around Transmission of Digital Assets on Death.

Fields of interestUser Interfaces and Human Computer Interaction; Computer Appl. in Social and Behavioral Sciences; Interdisciplinary Studies

Target groupsResearch

Product categoryContributed volume

Due October 2013

2013. X, 144 p. 4 illus., 3 in color. (Human–Computer Interaction Series) Hardcover7 * € (D) 90,94 | € (A) 93,49 | sFr 113,507 € 84,99 | £59.95ISBN 978-3-319-01630-6

9<HTODMJ=abgdag>

O. Mali, P. Neittaanmäki, University of Jyväskylä, Jyväskylä, Finland; S. Repin, University of Jyväskylä, Jyväskylä, Finland, and Russian Academy of Sciences, St. Petersburg, Russia

Accuracy Verification MethodsTheory and Algorithms

Contents 1 Errors Arising In Computer Simulation Meth-ods.- 1.1 General scheme.- 1.2 Errors of math-ematical models.- 1.3 Approximation errors.- 1.4 Numerical errors.- 2 Error Indicators.- 2.1 Error indicators and adaptive numerical methods.- 2.1.1 Error indicators for FEM solutions.- 2.1.2 Ac-curacy of error indicators.- 2.2 Error indicators for the energy norm.- 2.2.1 Error indicators based on interpolation estimates.- 2.2.2 Error indicators based on approximation of the error functional.- 2.2.3 Error indicators of the Runge type.- 2.3 Error indicators for goal-oriented quantities.- 2.3.1 Error indicators relying on the superconvergence of av-eraged fluxes in the primal and adjoint problems.- 2.3.2 Error indicators using the superconvergence of approximations in the primal problem.- 2.3.3 Error indicators based on partial equilibration of fluxes in the original problem.- 3 Guaran-teed Error Bounds I.- 3.1 Ordinary differential equations.- 3.1.1 Derivation of guaranteed error bounds.- 3.1.2 Computation of error bounds.- 3.2 Partial differential equations.- 3.2.1 Maximal deviation from the exact solution.- 3.2.2 Minimal deviation from the exact solution.- 3.2.3 Particu-lar cases.- 3.2.4 Problems with mixed boundary conditions.- 3.2.5 Estimates of global constants entering the majorant.- 3.2.6 Error majorants based on Poincar´e inequalities.- 3.2.7 Estimates with partially equilibrated fluxes.- 3.3 Error con-trol algorithms.- 3.3.1 Global minimization of the majorant.- 3.3.2 Getting an error bound by local procedures. [...]

Fields of interestNumeric Computing; Computational Science and Engineering; Numerical Analysis

Target groupsResearch

Product categoryMonograph

Due October 2013

2014. X, 374 p. 69 illus. (Computational Methods in Applied Sciences, Volume 32) Hardcover7 * € (D) 106,99 | € (A) 109,99 | sFr 133,507 € 99,99 | £90.00ISBN 978-94-007-7580-0

9<HTUELA=hhfiaa>

Computer Science springer.com/NEWSonline

88

P. Michelucci, ThinkSplash, LLC, Fairfax, VA, USA (Ed)

Handbook of Human ComputationContents Foundations in Human Computation.- Patterns of Connection.- Human Computation and Di-vided Labor: The Precursors of Modern Crowd-sourcing.- Ant Colonies as a Model of Human Computation.- From Neural to Human Commu-nication.- The Psychopathology of Information Processing Systems.- Information and Computa-tion.- Epistemological Issues in Human Com-putation.- Synthesis and Taxonomy of Human Computation.- Human Computation in the Wild.- Human Computation for Disaster Response.- The Virtuous Circle of the Quantified Self: A Human Computation Approach to Improved Health Outcomes.- Knowledge Engineering via Human Computation.- Human Computation in Citizen Science.- Human Computation as an Educational Opportunity.- Search and Discovery Through Human Computation.- Human Computation in Electronic Literature.- Human Computation for Information Retrieval.- Human Computation-Enabled Network Analysis for a Systemic Credit Risk Rating.- Innovation via Human Computa-tion.- Human Computation for Organizations: Socializing Business Process Management.- Solving Wicked Problems.- Introduction to Techniques and Modalities.- Social Knowledge Collection.- Location Based Games for Citizen Computation.- Augmented Reality Interfaces in Human Computation Systems.- Pervasive Hu-man Computing.- Building Blocks for Collective Problem Solving.- Adaptive Agents in Combinato-rial Prediction Markets.- Risks and Rewards of Crowdsourcing Marketplaces.- Designing Systems with Homo Ludens in the Loop. [...]

Fields of interestArtificial Intelligence (incl. Robotics); User In-terfaces and Human Computer Interaction; Data Mining and Knowledge Discovery

Target groupsResearch

Product categoryHandbook

Due October 2013

2014. XX, 980 p. 800 illus. Hardcover7 * € (D) 149,79 | € (A) 153,99 | sFr 186,507 € 139,99 | £126.00ISBN 978-1-4614-8805-7

9<HTMERB=eiiafh>

G. Rakocevic, Serbian Academy of Science and Arts, Belgrade, Serbia; T. Djukic, N. Filipovic, University of Kragujevac, Kragujevac, Serbia; V. Milutinović, University of Belgrade, Belgrade, Serbia (Eds)

Computational Medicine in Data Mining and ModelingThis book presents an overview of a variety of con-temporary statistical, mathematical and computer science techniques which are used to further the knowledge in the medical domain.

Features 7 Explains the latest cross-disciplinary research based on synergy of results that can be obtained with the different described approaches 7 Dem-onstrates applications of data mining to the medi-cal domain 7 Includes case studies that illustrate imaging techniques

Contents Mining Clinical Data.- Applications of proba-bilistic and related logics to decision support in medicine.- Transforming electronic medical books to diagnostic decision support systems using relational database management systems.- Text mining in medicine.- A primer on information theory, with applications to neuroscience.- Ma-chine Learning based Imputation of Missing SNP Genotypes in SNP Genotype Arrays.- Computer modeling of atherosclerosis.- Particle dynamics and design of nano-drug delivery systems.- Com-putational Modeling of Ultrasound Wave Propaga-tion in Bone.

Fields of interestData Mining and Knowledge Discovery; Compu-tational Biology/Bioinformatics; Artificial Intel-ligence (incl. Robotics)

Target groupsGraduate

Product categoryContributed volume

Due October 2013

2014. X, 346 p. 140 illus., 85 in color. Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £85.50ISBN 978-1-4614-8784-5

9<HTMERB=eihief>

H. Reimer, TeleTrusT - Bundesverband IT-Sicherheit e.V., Erfurt, Germany; N. Pohlmann, Gelsenkirchen, Germany; W. Schneider, Darmstadt, Germany (Eds)

ISSE 2013 Securing Electronic Business ProcessesHighlights of the Information Security Solutions Europe 2013 Conference

This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Security, Trust Services, eId & Access Manage-ment - Human Factors, Awareness & Privacy, Regulations and Policies - Security Management - Cyber Security, Cybercrime, Critical Infrastruc-tures - Mobile Security & Applications Adequate information security is one of the basic require-ments of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applica-tions. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.

Features 7 The most interesting talks given at ISSE 2013 7 State-of-the-art: best papers 7 How to adequately secure electronic business processes

Contents Cloud Security, Trust Services, eId & Access Man-agement.- Human Factors, Awareness & Privacy, Regulations and Policies.- Security Management.- Cyber Security, Cybercrime, Critical Infrastruc-tures.- Mobile Security & Applications.

Fields of interestSystems and Data Security; Computer Science, general

Target groupsProfessional/practitioner

Product categoryProfessional book

Due October 2013

2013. XV, 282 p. 59 illus. Softcover7 approx. * € (D) 74,89 | € (A) 76,99 | sFr 93,507 approx. € 69,99 | £62.99ISBN 978-3-658-03370-5

9<HTOGQI=addhaf>

News 9/2013 Computer Science

89

M. M. Richter, TU Kaiserslautern FB Informatik, Kaiserslautern, Germany; R. O. Weber, Drexel University College of Inform. Science & Technol., Phildalphia, PA, USA

Case-Based ReasoningA Textbook

Features 7 First English-language textbook on the topic 7 Coauthor among the pioneers of the subject 7 Content thoroughly class-tested, book features chapter summaries, background notes, and exercises throughout

Contents Part I - Basics and Preliminaries.- Chap. 1 - Introduction.- Chap. 2 - Basic CBR Elements.- Chap. 3 - Extended View.- Chap. 4 - Application Examples.- Part II - Core Methods.- Chap. 5 - Case Representations.- Chap. 6 - Basic Similarity Topics.- Chap. 7 - Complex Similarity Topics.- Chap. 8 - Retrieval.- Chap. 9 - Adaptation.- Chap. 10 - Evaluation, Revisions, and Learning.- Chap. 11 - Development and Maintenance.- Part III - Advanced Elements.- Chap. 12 - Advanced CBR Elements.- Chap. 13 - Advanced Similarity Topics.- Chap. 14 - Advanced Retrieval.- Chap. 15 - Uncertainty.- Chap. 16 - Probabilities.- Part IV - Complex Knowledge Sources.- Chap. 17 - Textual CBR.- Chap. 18 - Images.- Chap. 19 - Sensor Data and Speech.- Chap. 20 - Conversational CBR.- Chap. 21 - Knowledge Management.- Part V - Appendices.- Chap. 22 - Basic Formal Definitions and Methods.- Chap. 23 - Relations and Compari-sons with Other Techniques.

Fields of interestArtificial Intelligence (incl. Robotics); Business Information Systems; Information Systems and Communication Service

Target groupsUpper undergraduate

Product categoryGraduate/Advanced undergraduate textbook

Due September 2013

2013. XIV, 502 p. 173 illus., 6 in color. Hardcover7 * € (D) 64,19 | € (A) 65,99 | sFr 80,007 € 59,99 | £53.99ISBN 978-3-642-40166-4

9<HTOGPC=eabgge>

M. N. Sadiku, S. M. Musa, Prairie View A&M University, Prairie View, TX, USA

Performance Analysis of Computer NetworksThis book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queu-ing theory and simulation are introduced as the major tools analysts have access to. It presents performance analysis on local, metropolitan, and wide area networks, as well as on wireless networks. It concludes with a brief introduction to self-similarity. Designed for a one-semester course for senior-year undergraduates and graduate en-gineering students, it may also serve as a fingertip reference for engineers developing communica-tion networks, managers involved in systems plan-ning, and researchers and instructors of computer communication networks.

Features 7 Presents performance analysis on local, metro-politan, and wide area networks, as well as wireless networks 7 Provides engineering designers the freedom and flexibility to adjust various param-eters of the computer networks in the planning rather than the operational phase 7 Includes exercises at the end of each chapter

Contents Introduction.- Probability and Random Vari-ables.- Stochastic Processes.- Queueing Models.- Simulation.- Local Area Networks.- Metropolitan Area Networks.- Wide Area Networks.- Wireless Networks.- Self-Similarity of Network Traffic.

Field of interestComputer Communication Networks

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Due September 2013

2013. XIV, 262 p. 127 illus., 31 in color. Hardcover7 * € (D) 64,19 | € (A) 65,99 | sFr 80,007 € 59,99 | £53.99ISBN 978-3-319-01645-0

9<HTODMJ=abgefa>

X. Shi, University of Arkansas, Fayetteville, AR, USA; V. Kindratenko, University of Illinois, Urbana, IL, USA; C. Yang, George Mason University Center for Earth Observing & Space, Fairfax, VI, USA (Eds)

Modern Accelerator Technologies for Geographic Information ScienceContents Modern Accelerator Technologies for GIScience.- Introduction to GPGPU.- Intel® Xeon Phi™ Coprocessors.- Accelerating Geocomputation with Cloud Computing.- Parallel Primitives based Spatial Join of Geospatial Data on GPGPUs.- Utilizing CUDA-enabled GPUs to support 5D scientific geovisualization: a case study of simulat-ing dust storm events.- A Parallel Algorithm to Solve Near-Shortest Path Problems on Raster Graphs.- CUDA-Accelerated HD-ODETLAP: Lossy High Dimensional Gridded Data Compres-sion.- Accelerating Agent-Based Modeling Using Graphics Processing Units.- Large-Scale Pulse Compression for Costas Signal with GPGPU.- Parallelizing ISODATA Algorithm for Unsuper-vised Image Classification on GPU.- Accelerating Mean Shift Segmentation Algorithm on Hybrid CPU/GPU Platforms.- Simulation and analysis of cluster-based caching replacement based on temporal and spatial locality of tile access.- A High-Concurrency Web Map Tile Service Built with Open-Source Software.- Improved Parallel Optimal Choropleth Map Classification.- Pursu-ing Spatiotemporally Integrated Social Science using Cyberinfrastructure.- Opportunities and Challenges for Urban Land-use Change Modeling using High-performance Computing.- Modern Accelerator Technologies for Spatially-explicit Integrated Environmental Modeling.

Fields of interestInformation Systems Applications (incl.Internet); Geotechnical Engineering & Applied Earth Sci-ences; Computational Science and Engineering

Target groupsGraduate

Product categoryContributed volume

Due October 2013

2014. X, 275 p. 75 illus., 51 in color. Hardcover7 * € (D) 90,94 | € (A) 93,49 | sFr 113,507 € 84,99 | £76.50ISBN 978-1-4614-8744-9

9<HTMERB=eiheej>

Computer Science springer.com/NEWSonline

90

J. C. Strassner, Pohang University of Science & Technology, Pohang, Korea, Republic of (South Korea); B. Jennings, Waterford Institute of Technology (WIT) Telecommunications Software &, Waterford, Ireland

Fundamentals of Autonomic CommunicationsPrinciples for Building Autonomic Systems

This book will serve as a comprehensive intro-duction to and reference for autonomic commu-nication and systems. Autonomic technologies are designed to manage the increasing business, system, and technical complexity of computing systems. Systems built from these technologies are self-governing, and exhibit self-configuration, self-healing, and other capabilties. More importantly, autonomic systems reconnect business needs and objectives with the management of the underlying technology used to build them.

Features 7 This book is aimed at a research profes-sional (industry or academic), but could be easily modified to be suitable for graduate school students 7 This book benefits from practical research; the authors have all worked on two large autonomic systems projects 7 This book has an accompanying web site with all code, papers, and other important features (e.g., small tutorials for key concepts)

Contents PART ONE: FOUNDATIONS PART TWO: COMMUNICATION PART THREE: SYSTEM ARCHITECTURE PART FOUR: Blueprint for Building Real Systems APPENDICES

Fields of interestComputer Communication Networks; Computer Systems Organization and Communication Net-works; Information Systems and Communication Service

Target groupsResearch

Product categoryMonograph

Due December 2013

2011. Approx. 500 p. (Autonomic Systems) Softcover7 approx. * € (D) 64,15 | € (A) 65,95 | sFr 86,007 approx. € 59,95 | £53.99ISBN 978-3-0346-0237-2

9<HTOAOE=gacdhc>

J. Tang, Y. Cheng, Illinois Institute of Technology, Chicago, IL, USA

Intrusion Detection for IP-Based Multimedia Communications over Wireless NetworksIP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distrib-uted nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CU-SUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

Contents Introduction.- Real-Time Misbehavior Detec-tion in IEEE 802:11TM: An Analytical Ap-proach.- Adaptive Misbehavior Detection in IEEE 802:11TM Based on Markov Decision Process.- SIP Flooding Attack Detection.

Fields of interestComputer Communication Networks; Systems and Data Security; Communications Engineering, Networks

Target groupsResearch

Product categoryBrief

Due October 2013

2014. XV, 110 p. 31 illus., 1 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-1-4614-8995-5

9<HTMERB=eijjff>

S. P. Vadhan, Harvard University Dept. Physics, Cambridge, MA, USA

A Study of Statistical Zero-Knowledge ProofsZero-knowledge interactive proofs play a central role in the design and study of cryptographic pro-tocols and are rich objects for complexity-theoret-ic study. Statistical zero-knowledge (SZK) proofs achieve strong information-theoretic “security”, and can provide a clean test bed for the study of more general notions that incorporate compu-tational security. This monograph is a revised and extended version of the author’s PhD thesis, the winning thesis of the 2000 ACM Doctoral Dissertation Competition. It is a comprehensive investigation of statistical zero-knowledge (SZK) proofs. It begins by showing that SZK has two natural complete problems, and then uses these complete problems to address a wide variety of fundamental questions about SZK. It also includes a chapter that surveys recent developments in the area, in particular how the results and techniques of this thesis have been extended to computational zero-knowledge proofs and arguments.

Feature 7 The author won the ACM Doctoral Disserta-tion Award (2000) for the best Ph.D. thesis in Electrical Engineering & Computer Science, and this book is based on that Ph.D.

Contents Introduction.- Definitions.- Complete Problems.- Applications of the Complete Problems.- Private Coins vs. Public Coins.- Coping with Cheating Verifiers.- Noninteractive SZK.- Subsequent Work and Conclusions.- App. A, Chernoff Bounds.- App. B, Hashing Lemmas.- References

Fields of interestData Structures, Cryptology and Information Theory; Coding and Information Theory; Theory of Computation

Target groupsResearch

Product categoryGraduate/Advanced undergraduate textbook

Due January 2014

2014. Approx. 190 p. (Information Security and Cryptography) Hardcover7 approx. * € (D) 53,45 | € (A) 54,95 | sFr 72,007 approx. € 49,95 | £45.99ISBN 978-3-540-71373-9

9<HTOFPA=hbdhdj>

News 9/2013 Computer Science

91

W. Wang, Q. Zhang, Hong Kong University of Science and Technology, Kowloon, Hong Kong SAR

Location Privacy Preservation in Cognitive Radio NetworksThis brief focuses on the current research on loca-tion privacy preservation in cognitive radio net-works (CRNs). Along with a review of the existing works, this book includes fundamental privacy models, possible frameworks, useful performance, and future research directions. It explores privacy preservation techniques, collaborative spectrum sensing, database-driven CRNS, and modeling potential privacy threats. Conflicts between da-tabase owners and unlicensed users can compro-mise location privacy, and CRNs are a means to mitigate the spectrum scarcity issue due to the increasing demand for wireless channel resources. By examining the current and potential privacy threats, the authors equip readers to understand this developing issue. The brief is designed for researchers and professionals working with computer communication networks and cognitive radio networks. Graduate students interested in networks and communication engineering will also find the brief helpful.

Contents Introduction.- Privacy Preservation Techniques.- Location Privacy Preservation in Collaborative Spectrum Sensing.- Location Privacy Preservation in Database-Driven Cognitive Radio Networks.- Future Research Directions.

Fields of interestComputer Communication Networks; Communi-cations Engineering, Networks

Target groupsResearch

Product categoryBrief

Due October 2013

2013. VIII, 102 p. 31 illus., 27 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 54,507 € 49,99 | £36.99ISBN 978-3-319-01942-0

9<HTODMJ=abjeca>

D. Weber-Wulff, HTW Berlin, Berlin, Germany

False FeathersA Perspective on Academic Plagiarism

Since human beings have been writing it seems there has been plagiarism. It is not something that sprouted with the advent of the Internet. Teachers have been struggling for years in countries all over the globe to find good methods for dealing with the problem of plagiarizing students. How do we spot plagiarism? How do we teach them not to plagiarize? And how do we deal with those who have been found out to be plagiarists? The purpose of this book is to collect material on the various aspects of plagiarism in education with special attention given to the German problem of dis-sertation plagiarism. Since there is a wide-spread interest in the German plagiarism situation and in strategies for dealing with it, the book is written in English in order to be accessible to a larger audience.

Features 7 Identifies and elaborates on many differ-ent strategies for identifying plagiarism 7 The author, as an active member of the VroniPlag Wiki group, explains how the group finds and docu-ments plagiarism in dissertations 7 Presents for the first time a chapter summarizing the history of plagiarism in German-speaking countries 7 In-cludes an overview of plagiarism policies in differ-ent countries

Contents Introduction.- Plagiarism and Scientific Miscon-duct.- Plagiarism in Germany.- Plagiarism Detec-tion.- Plagiarism Avoidance.- Plagiarism Policies and Procedures Abroad.- Plagiarism Perspective.- The future?.- Works Cited.- Appendix.

Fields of interestInformation Systems Applications (incl.Internet); Science Education

Target groupsPopular/general

Product categoryMonograph

Due February 2014

2014. X, 210 p. 7 illus., 5 in color. Hardcover7 approx. * € (D) 32,09 | € (A) 32,99 | sFr 40,007 approx. € 29,99 | £26.99ISBN 978-3-642-39960-2

9<HTOGPC=djjgac>

H. Zhang, University of Science and Technology of, Heifei, China, People’s Republic; Y. Wen, Nanyang Technological University, Singapore, Singapore; H. Xie, N. Yu, University of Science and Technology of, Heifei, China, People’s Republic

Distributed Hash TableTheory, Platforms and Applications

This SpringerBrief summarizes the development of Distributed Hash Table in both academic and in-dustrial fields. It covers the main theory, platforms and applications of this key part in distributed systems and applications, especially in large-scale distributed environments. The authors teach the principles of several popular DHT platforms that can solve practical problems such as load balance, multiple replicas, consistency and latency. They also propose DHT-based applications including multicast, anycast, distributed file systems, search, storage, content delivery network, file sharing and communication. These platforms and applications are used in both academic and commercials fields, making Distributed Hash Table a valuable re-source for researchers and industry professionals.

Contents Introduction.- DHT Theory.- DHT Platforms.- DHT Applications.- Summary.

Fields of interestInformation Systems Applications (incl.Internet); Computer Communication Networks; Informa-tion Storage and Retrieval

Target groupsResearch

Product categoryBrief

Due October 2013

2014. X, 60 p. 15 illus., 9 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-1-4614-9007-4

9<HTMERB=ejaahe>

Computer Science springer.com/NEWSonline

92

H. Zhao, X. Li, University of Florida, Gainesville, FL, USA

Resource Management in Utility and Cloud ComputingThis SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. It describes three new schemes that address cost-efficiency, user incentives, and allocation fairness with regard to different scheduling contexts. The first scheme, taking the Amazon EC2™ market as a case of study, investigates the optimal resource rental planning models based on linear integer programming and stochastic optimization tech-niques. This model is useful to explore the interac-tion between the cloud infrastructure provider and the cloud resource customers. The second scheme targets a free-trade resource market, studying the interactions amongst multiple rational resource traders. Leveraging an optimization framework from AI, this scheme examines the spontaneous exchange of resources among multiple resource owners. Finally, the third scheme describes an experimental market-oriented resource sharing platform inspired by eBay’s transaction model. The study presented in this book sheds light on economic models and their implication to the utility-oriented scheduling problems.

Contents Introduction.- Optimal Resource Rental Man-agement.- Efficient and Fair Resource Trading Management.- Flexible Resource Sharing Manage-ment.- Conclusion and Future Work.

Fields of interestComputer Communication Networks; Informa-tion Systems Applications (incl.Internet); Com-munications Engineering, Networks

Target groupsResearch

Product categoryBrief

Due October 2013

2014. V, 85 p. 25 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-1-4614-8969-6

9<HTMERB=eijgjg>

K. Zheng, Beijing University, Beijing, China, People’s Republic; M. Li, Nanyang Technological University, Singapore, Singapore; H. Jiang, Huazhong University, Wuhan, China, People’s Republic (Eds)

Mobile and Ubiquitous Systems: Computing, Networking, and Services9th International Conference, MOBIQUITOUS 2012, Beijing, China, December 12-14, 2012. Revised Selected Papers

Features 7 Fast conference proceedings 7 State-of-the-art report 7 Up to date results

Contents Traffic Density Estimation Protocol Using Vehicu-lar Networks.- Mobile-to-Mobile Video Recom-mendation.- Dual Codes: Backward Compatible Multi-layer 2D-Barcodes.- A Collaborative Framework of Enabling Device Participation in Mobile Cloud Computing.- Design and Evaluation of a Publish/Subscribe Framework for Ubiquitous Systems.- Where am I? Using Mobile Sensor Data to Predict a User’s Semantic Place with a Random Forest Algorithm.- Recognizing a Mobile Phone’s Storing Position as a Context of a Device and a User.- Privacy Preserving Social Mobile Ap-plications.- Fine-Grained Transportation Mode Recognition Using Mobile Phones and Foot Force Sensors.

Fields of interestComputer System Implementation; Information Storage and Retrieval; Computer Communication Networks

Target groupsResearch

Product categoryContributed volume

Due August 2013

2013. X, 289 p. 118 illus. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Volume 120) Softcover7 approx. * € (D) 49,22 | € (A) 50,60 | sFr 61,507 approx. € 46,00 | £41.99ISBN 978-3-642-40237-1

9<HTOGPC=eacdhb>