intrinsically motivated learning semantic analysis and … · workflow and business process...

9
Computer Science springer.com/NEWSonline 40 A. Amato, V. Di Lecce, Politecnico di Bari, Taranto, Italy; V. Piuri, Università degli Studi di Milano, Crema, Italy Semantic Analysis and Understanding of Human Behavior in Video Streaming Semantic Analysis and Understanding of Hu- man Behaviour in Video Streaming investigates the semantic analysis of the human behaviour captured by video streaming, and introduces both theoretical and technological points of view. Video analysis based on the semantic content is in fact still an open issue for the computer vision research community, especially when real-time analysis of complex scenes is concerned. is book explores an innovative, original approach to human behaviour analysis and understanding by using the syntactical symbolic analysis of images and video streaming described by means of strings of symbols. A symbol is associated to each area of the analyzed scene. When a moving object enters an area, the corresponding symbol is appended to the string describing the motion. is approach allows for characterizing the motion of a moving object with a word composed by symbols. By studying and classifying these words we can categorize and understand the various behaviours. Contents Introduction.- Sensors for Human Behavior Anal- ysis.- Related Works.- Sensor Data Interpretation for Symbolic Analysis.- Semantic Analysis.- Evalu- ation of the proposed methodology.- Conclusions. Fields of interests Image Processing and Computer Vision; Multi- media Information Systems; User Interfaces and Human Computer Interaction Target groups Professional/practitioner Product category Professional book Due September 2012 2013. XIII, 141 p. 42 illus. Hardcover 7 * € (D) 64,15 | € (A) 65,95 | sFr 80,00 7 € 59,95 | £53.99 ISBN 978-1-4614-5485-4 9<HTMERB=efeife> G. Anastasi, Università di Pisa, Italy; E. Bellini, E. Di Nitto, C. Ghezzi, L. Tanca, Politecnico di Milano, Italy; E. Zimeo, Università degli Studi del Sannio, Benevento, italy (Eds) Methodologies and Technologies for Networked Enterprises ArtDeco: Adaptive Infrastructures for Decentralised Organisations Contents Introduction.- Reference Case Study.- Part I Organizational Issues: Methodologies, Empiri- cal Contexts and Policies.- Which Collaboration Strategy for the Networked Enterprise in Wine Industry? Technological and Organizational Challenges.- A Design-Driven Approach for the Innovation Management within Networked Enterprises.- Enhancing the Networked Enter- prise for SMEs: A Service Platforms – Oriented Industrial Policy.- Part II SoſtwareMethodolo- gies and Technologies.- Complex Autonomic Systems for Networked Enterprises: Mechanisms, Solutions and Design Approaches.- Autonomic Workflow and Business Process Modelling for Networked Enterprises.- Verification and Analysis of Autonomic Systems for Networked Enterpris- es.- Part III Knowledge Elicitation and Manage- ment.- Ontology-Based Knowledge Elicitation: An Architecture.- Knowledge Extraction from Natural Language Processing.- Knowledge Extraction from Events Flows.- Context-Aware Knowledge Querying in a Networked Enterprise.- On-the-Fly and Context-Aware Integration of Heterogeneous Data Sources.- Context Support for Designing Analytical Queries.- Part IV Management of Peripheral Devices. [...] Fields of interests Information Systems Applications (incl.Internet); Artificial Intelligence (incl. Robotics); Computer Communication Networks Target groups Research Product category Contributed volume Available 2012.XX, 453 p. 170 illus. (Lecture Notes in Computer Science / Information Systems and Applications, incl. Internet/Web, and HCI, Volume 7200) Softcover 7 * € (D) 66,34 | € (A) 68,20 | sFr 83,00 7 € 62,00 | £55.99 ISBN 978-3-642-31738-5 9<HTOGPC=dbhdif> G. Baldassarre, M. Mirolli, ISTC-CNR, Rome, Italy (Eds) Intrinsically Motivated Learning in Natural and Artificial Systems Contents Chap. 1 - Intrinsically Motivated Learning Systems: An Overview.- Chap. 2 - Intrinsic Motivation and Reinforcement Learning.- Chap. 3 - Functions and Mechanisms of Intrinsic Moti- vations.- Chap. 4 - Exploration from Generaliza- tion Mediated by Multiple Controllers.- Chap. 5 - Maximizing Fun by Creating Data with Easily Reducible Subjective Complexity.- Chap. 6 - e Role of the Basal Ganglia in Discovering Novel Actions.- Chap. 7 - Action Discovery and Intrinsic Motivation: A Biologically Constrained Formalisa- tion.- Chap 8 - Novelty Detection as an Intrinsic Motivation for Cumulative Learning Robots.- Chap. 9 - Novelty and Beyond: Towards Com- bined Motivation Models and Integrated Learning Architectures.- Chap. 10 - e Hippocampal-VTA Loop: e Role of Novelty and Motivation in Con- trolling the Entry of Information into Long-Term Memory.- Chap. 11 - Deciding Which Skill to Learn When: Temporal-Difference Competence- Based Intrinsic Motivation (TD-CB-IM).- Chap. 12 - Intrinsically Motivated Affordance Discovery and Modeling.- Chap. 13 - Intrinsically Motivated Learning of Real-World Sensorimotor Skills with Developmental Constraints.- Chap. 14 - Inves- tigating the Origins of Intrinsic Motivation in Human Infants.- Chap. 15 - A Novel Behavioural Task for Researching Intrinsic Motivations.- Chap. 16 - e “Mechatronic Board”: A Tool to Study Intrinsic Motivations in Humans, Monkeys, and Humanoid Robots.- Chap. 17 - e iCub Platform: A Tool for Studying Intrinsically Motivated Learn- ing. Fields of interests Artificial Intelligence (incl. Robotics); Cognitive Psychology; Control, Robotics, Mechatronics Target groups Research Product category Monograph Due November 2012 2012.X, 470 p. 97 illus., 66 in color. Hardcover 7 * € (D) 117,65 | € (A) 120,95 | sFr 146,50 7 € 109,95 | £99.00 ISBN 978-3-642-32374-4 9<HTOGPC=dcdhee>

Upload: doandat

Post on 20-Aug-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

Computer Science springer.com/NEWSonline

40

A. Amato, V. Di Lecce, Politecnico di Bari, Taranto, Italy; V. Piuri, Università degli Studi di Milano, Crema, Italy

Semantic Analysis and Understanding of Human Behavior in Video StreamingSemantic Analysis and Understanding of Hu-man Behaviour in Video Streaming investigates the semantic analysis of the human behaviour captured by video streaming, and introduces both theoretical and technological points of view. Video analysis based on the semantic content is in fact still an open issue for the computer vision research community, especially when real-time analysis of complex scenes is concerned. This book explores an innovative, original approach to human behaviour analysis and understanding by using the syntactical symbolic analysis of images and video streaming described by means of strings of symbols. A symbol is associated to each area of the analyzed scene. When a moving object enters an area, the corresponding symbol is appended to the string describing the motion. This approach allows for characterizing the motion of a moving object with a word composed by symbols. By studying and classifying these words we can categorize and understand the various behaviours.

Contents Introduction.- Sensors for Human Behavior Anal-ysis.- Related Works.- Sensor Data Interpretation for Symbolic Analysis.- Semantic Analysis.- Evalu-ation of the proposed methodology.- Conclusions.

Fields of interestsImage Processing and Computer Vision; Multi-media Information Systems; User Interfaces and Human Computer Interaction

Target groupsProfessional/practitioner

Product categoryProfessional book

Due September 2012

2013. XIII, 141 p. 42 illus. Hardcover7 * € (D) 64,15 | € (A) 65,95 | sFr 80,007 € 59,95 | £53.99ISBN 978-1-4614-5485-4

9<HTMERB=efeife>

G. Anastasi, Università di Pisa, Italy; E. Bellini, E. Di Nitto, C. Ghezzi, L. Tanca, Politecnico di Milano, Italy; E. Zimeo, Università degli Studi del Sannio, Benevento, italy (Eds)

Methodologies and Technologies for Networked EnterprisesArtDeco: Adaptive Infrastructures for Decentralised Organisations

Contents Introduction.- Reference Case Study.- Part I Organizational Issues: Methodologies, Empiri-cal Contexts and Policies.- Which Collaboration Strategy for the Networked Enterprise in Wine Industry? Technological and Organizational Challenges.- A Design-Driven Approach for the Innovation Management within Networked Enterprises.- Enhancing the Networked Enter-prise for SMEs: A Service Platforms – Oriented Industrial Policy.- Part II SoftwareMethodolo-gies and Technologies.- Complex Autonomic Systems for Networked Enterprises: Mechanisms, Solutions and Design Approaches.- Autonomic Workflow and Business Process Modelling for Networked Enterprises.- Verification and Analysis of Autonomic Systems for Networked Enterpris-es.- Part III Knowledge Elicitation and Manage-ment.- Ontology-Based Knowledge Elicitation: An Architecture.- Knowledge Extraction from Natural Language Processing.- Knowledge Extraction from Events Flows.- Context-Aware Knowledge Querying in a Networked Enterprise.- On-the-Fly and Context-Aware Integration of Heterogeneous Data Sources.- Context Support for Designing Analytical Queries.- Part IV Management of Peripheral Devices. [...]

Fields of interestsInformation Systems Applications (incl.Internet); Artificial Intelligence (incl. Robotics); Computer Communication Networks

Target groupsResearch

Product categoryContributed volume

Available

2012.XX, 453 p. 170 illus. (Lecture Notes in Computer Science / Information Systems and Applications, incl. Internet/Web, and HCI, Volume 7200) Softcover7 * € (D) 66,34 | € (A) 68,20 | sFr 83,007 € 62,00 | £55.99ISBN 978-3-642-31738-5

9<HTOGPC=dbhdif>

G. Baldassarre, M. Mirolli, ISTC-CNR, Rome, Italy (Eds)

Intrinsically Motivated Learning in Natural and Artificial SystemsContents Chap. 1 - Intrinsically Motivated Learning Systems: An Overview.- Chap. 2 - Intrinsic Motivation and Reinforcement Learning.- Chap. 3 - Functions and Mechanisms of Intrinsic Moti-vations.- Chap. 4 - Exploration from Generaliza-tion Mediated by Multiple Controllers.- Chap. 5 - Maximizing Fun by Creating Data with Easily Reducible Subjective Complexity.- Chap. 6 - The Role of the Basal Ganglia in Discovering Novel Actions.- Chap. 7 - Action Discovery and Intrinsic Motivation: A Biologically Constrained Formalisa-tion.- Chap 8 - Novelty Detection as an Intrinsic Motivation for Cumulative Learning Robots.- Chap. 9 - Novelty and Beyond: Towards Com-bined Motivation Models and Integrated Learning Architectures.- Chap. 10 - The Hippocampal-VTA Loop: The Role of Novelty and Motivation in Con-trolling the Entry of Information into Long-Term Memory.- Chap. 11 - Deciding Which Skill to Learn When: Temporal-Difference Competence-Based Intrinsic Motivation (TD-CB-IM).- Chap. 12 - Intrinsically Motivated Affordance Discovery and Modeling.- Chap. 13 - Intrinsically Motivated Learning of Real-World Sensorimotor Skills with Developmental Constraints.- Chap. 14 - Inves-tigating the Origins of Intrinsic Motivation in Human Infants.- Chap. 15 - A Novel Behavioural Task for Researching Intrinsic Motivations.- Chap. 16 - The “Mechatronic Board”: A Tool to Study Intrinsic Motivations in Humans, Monkeys, and Humanoid Robots.- Chap. 17 - The iCub Platform: A Tool for Studying Intrinsically Motivated Learn-ing.

Fields of interestsArtificial Intelligence (incl. Robotics); Cognitive Psychology; Control, Robotics, Mechatronics

Target groupsResearch

Product categoryMonograph

Due November 2012

2012.X, 470 p. 97 illus., 66 in color. Hardcover7 * € (D) 117,65 | € (A) 120,95 | sFr 146,507 € 109,95 | £99.00ISBN 978-3-642-32374-4

9<HTOGPC=dcdhee>

News 9/2012 Computer Science

41

M. Bestehorn, Landis+Gyr, Fehraltorf, Switzerland

Querying Moving Objects Detected by Sensor NetworksDeclarative query interfaces to Sensor Networks (SN) have become a commodity. These interfaces allow access to SN deployed for collecting data using relational queries. However, SN are not confined to data collection, but may track object movement, e.g., wildlife observation or traffic monitoring. While rational approaches are well suited for data collection, research on Moving Ob-ject Databases (MOD) has shown that relational operators are unsuitable to express information needs on object movement, i.e., spatio-temporal queries. Querying Moving Objects Detected by Sensor Networks studies declarative access to SN that track moving objects. The properties of SN present a straightforward application of MOD, e.g., node failures, limited detection ranges and accuracy which vary over time etc. Furthermore, point sets used to model MOD-entities like regions assume the availability of very accurate knowledge regarding the spatial extend of these entities, assuming such knowledge is unrealistic for most SN. This book is the first that defines a complete set of spatio-temporal operators for SN while taking into account their properties. Based on these operators, we systematically investigate how to derive query results from object detections by SN.

Contents Introduction.- Applications for MOSD.- Back-ground.- Generic Model of a Sensor Network.- Point Set Topology for Sensor Networks.- De-riving Predicate Results.- Spatio-Temporal Developments.- Spatio-Temporal Query Process-ing in SN.- Evaluation.

Fields of interestsComputer Imaging, Vision, Pattern Recognition and Graphics; Artificial Intelligence (incl. Robot-ics); Communications Engineering, Networks

Target groupsResearch

Product categoryBrief

Due September 2012

2013. X, 80 p. 23 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,75 | € (A) 43,95 | sFr 53,507 € 39,95 | £35.99ISBN 978-1-4614-4926-3

9<HTMERB=eejcgd>

M. Chemuturi, Chemuturi Consultants

Requirements Engineering and Management for Software Development ProjectsRequirements Engineering and Management for Software Development Projects presents a complete guide on requirements for software development including engineering, computer sci-ence and management activities. It is the first book to cover all aspects of requirements management in software development projects.

Features 7 The first book that covers all aspects of  re-quirements management in software development projects 7 Presents the best practices and pitfalls in software engineering requirements and man-agement in one place 7 Explains in detail the metrics used for efficient software requirements management

Contents Introduction to Requirements Engineering and Management.- Understanding Require-ments.- Elicitation and Gathering of Require-ments.- Requirements Analysis.- Establishment of Requirements.- Quality Assurance in Require-ments Management.- Planning for Requirements Management.- Requirements Change Manage-ment.- Requirements Tracing, Tracking and Reporting.- Measurement and Metrics.- Roles and Responsibilities in REM.- Requirements Manage-ment through SDLC.- Tools and Techniques for Requirements Engineering and Management.- Pit-falls and Best Practices in Requirements Engineer-ing and Management.- REM in Agile Projects.

Fields of interestsSoftware Engineering; Engineering, general; Sys-tem Performance and Evaluation

Target groupsProfessional/practitioner

Product categoryProfessional book

Due October 2012

2013. XVII, 282 p. 20 illus. Hardcover7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 107,507 approx. € 79,95 | £73.00ISBN 978-1-4614-5376-5

9<HTMERB=efdhgf>

R. P.‑Y. Chiang, Shin Kong Memorial Hospital, Fu Jen Catholic University, Taipei, Taiwan; S.‑C. Kang, National Taiwan University, Taipei, Taiwan (Eds)

Introduction to Modern Sleep TechnologyContents Section I: Introduction of Sleep Technology.-    Chapter 1: Introduction of Sleep Technology, by Rayleigh Ping-Ying Chiang,  Shih Chung Kang.-   Section II: Sleep Technology in Diagnosis and Screening: Chapter 2: Evaluation Instruments for Sleep Disorders : Polysomnography - History and Application, by José Haba-Rubio, Jean Krieg-er.-  Chapter 3: Screening and Evaluation Instru-ments of Sleep Disorders – Actigraphy, by Peng Chih Wang.-  Section III: Management of Sleep Disorders – Point of Views from Sleep Technol-ogy: Chapter 4: Management of Sleep Disorders – cPAP (Continuous Positive Airway Pressure), by Kannan Ramar.-  Chapter 5: Management of Sleep Disorders – Sleep Technology on Surgical Con-cepts and Instruments, by Sung Wan Kim, Michael Sarte.-  Chapter 6: Management of Sleep Disorders – Sleep Technology on Positional Therapy, by Chol Shin.-  Chapter 7: Management of Sleep Disorders - Cognitive Behavioral Therapy for Insomnia, by Cheng Ming Yang.-  Chapter 8: Management of Sleep Disorders – Light Therapy, by Wei-Chung Mao,  Sin-Chien Lee, Hsi-Chung Chen.-  Chapter 9: Management of Sleep Disorders – Biofeedback, by Pei-Shan Tsai.-  Section IV: Sleep Technology in Work and Life: Chapter 10: Sleep Environmental Control: from Sleep Coach to Sleeper-Centered Bedroom, by Shih Chung Kang.-  Chapter 11: Application of Biosensors on Sleep Technology, by Chih-Ting Lin.-  Chapter 12: Sleep Technology on Driving Safety, by Sei-Wang Chen.-  Chapter 13: Sleep Technology on the Elderly, by Michael V. [...]

Fields of interestsComputer Systems Organization and Communi-cation Networks; Civil Engineering; Biomedical Engineering

Target groupsProfessional/practitioner

Product categoryContributed volume

Due November 2012

2012. IV, 446 p. (Intelligent Systems, Control and Automation: Science and Engineering, Volume 64) Hardcover7 approx. * € (D) 139,05 | € (A) 142,95 | sFr 186,507 approx. € 129,95 | £117.00ISBN 978-94-007-5469-0

9<HTUELA=hfegja>

Computer Science springer.com/NEWSonline

42

G. Dougherty, California State University Channel Islands, Camarillo, CA, USA

Pattern Recognition and ClassificationAn Introduction

Contents Preface.- Acknowledgments.- Chapter 1 Intro-duction.- 1.1 Overview.- 1.2 Classification.- 1.3 Organization of the Book.- Bibliography.- Exer-cises.- Chapter 2 Classification.- 2.1 The Clas-sification Process.- 2.2 Features.- 2.3 Training and Learning.- 2.4 Supervised Learning and Algorithm Selection.- 2.5 Approaches to Classification.- 2.6 Examples.- 2.6.1 Classification by Shape.- 2.6.2 Classification by Size.- 2.6.3 More Examples.- 2.6.4 Classification of Letters.- Bibliography .- Ex-ercises.- Chapter 3 Non-Metric Methods.- 3.1 Introduction.- 3.2 Decision Tree Classifier.- 3.2.1 Information, Entropy and Impurity.- 3.2.2 Infor-mation Gain.- 3.2.3 Decision Tree Issues.- 3.2.4 Strengths and Weaknesses .- 3.3 Rule-Based Clas-sifier .- 3.4 Other Methods.- Bibliography .- Ex-ercises.- Chapter 4 Statistical Pattern Recognition .- 4.1 Measured Data and Measurement Errors.- 4.2 Probability Theory.- 4.2.1 Simple Probability Theory.- 4.2.2 Conditional Probability and Bayes’ Rule.- 4.2.3 Naïve Bayes classifier.- 4.3 Continu-ous Random Variables.- 4.3.1 The Multivariate Gaussian.- 4.3.2 The Covariance Matrix.- 4.3.3 The Mahalanobis Distance.- Bibliography .- Exercises.- Chapter 5 Supervised Learning.- 5.1 Parametric and Non-Parametric Learning.- 5.2 Paramet-ric Learning.- 5.2.1 Bayesian Decision Theory .- 5.2.2 Discriminant Functions and Decision Boundaries.- 5.2.3 MAP (Maximum A Posteriori) Estimator.- Bibliography.- Exercises.- Chapter 6 Non-Parametric Learning.- 6.1 Histogram Estima-tor and Parzen Windows. [...]

Fields of interestsPattern Recognition; Nonlinear Dynamics; Signal,Image and Speech Processing

Target groupsResearch

Product categoryMonograph

Due November 2012

2013. X, 302 p. 158 illus., 92 in color. With online files/update. Hardcover7 * € (D) 90,90 | € (A) 93,45 | sFr 113,507 € 84,95 | £76.50ISBN 978-1-4614-5322-2

9<HTMERB=efdccc>

New SeriesK.‑P. Fischer‑Hellmann, Mühltal, GermanyR. Bischoff, HS Furtwangen, Germany (Ed)

Information Flow Based Security Control Beyond RBACHow to enable fine‑grained security policy enforcement in business processes beyond limitations of role‑based access control (RBAC)

Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in compliance with restrictions implied by security policies, in particular, to prevent disclosure of information or access to resources beyond restric-tions defined by those security policies. Since RBAC only provides the alternatives of either granting or denying access, more fine-grained control of information flows such as “granting access to information provided that it will not be disclosed to targets outside our organisation dur-ing further processing” is not possible.

Features 7 Comprehensible for experts in the field as well as other readers 7 Providing modern methods of information flow control 7 Easy-to-apply and proven methods

Contents Cross-Organisational Deployment of Business Processes.- Approaches to Specification and Enforcement of Security Policies.- Analysis of Security-Relevant Semantics of BPEL.- Security Policy Compliance Assessment for BPEL-Defined Processes.- Extension of Methods for Security Policy Enforcement to Grid Processes and Cloud Workflows.

Fields of interestsSystems and Data Security; Data Structures; Cod-ing and Information Theory

Target groupsProfessional/practitioner

Due September 2012

2012. Approx. 200 p. 25 illus. (IT im Unternehmen, Volume 1) Softcover7 approx. * € (D) 42,75 | € (A) 43,95 | sFr 53,507 approx. € 39,95 | £35.99ISBN 978-3-8348-2617-6

9<HTOIOE=icgbhg>

C. A. Furia, ETH Zürich, Switzerland; D. Mandrioli, A. Morzenti, M. Rossi, Politecnico di Milano, Italy

Modeling Time in ComputingModels that include a notion of time are ubiqui-tous in disciplines such as the natural sciences, engineering, philosophy, and linguistics, but in computing the abstractions provided by the tradi-tional models are problematic and the discipline has spawned many novel models. This book is a systematic thorough presentation of the results of several decades of research on developing, analyzing, and applying time models to comput-ing and engineering. After an opening motivation introducing the topics, structure and goals, the authors introduce the notions of formalism and model in general terms along with some of their fundamental classification criteria.

Features 7 Comparative and conceptual approach make this a valuable introduction for non-experts 7 Organized presentation of issues that recur in computer science and other branches of engineering and science 7 Exercises considered optional on first reading but then are necessary to understand the most subtle aspects of the presentation

Contents Chap. 1 It‘s About Time.- Chap. 2 Languages and Interpretations.- Chap. 3 Dimensions of the Time Modeling Problem.- Chap. 4 Dynamical Sys-tems.- Chap. 5 Time in Hardware Modeling and Design.- Chap. 6 Time in the Analysis of Algo-rithms.- Chap. 7 Synchronous Abstract Machines.- Chap. 8 Asynchronous Abstract Machines: Petri Nets.- Chap. 9 Logic-Based Formalisms.- Chap. 10 Algebraic Formalisms.- Chap. 11 Dual-Language Approaches.- Chap. 12 Time Is up.- References.- Index.

Fields of interestsTheory of Computation; Computer Hardware; Mathematics of Computing

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Due September 2012

2012. XVIII, 398 p. 168 illus., 1 in color. (Monographs in Theoretical Computer Science. An EATCS Series) Hardcover7 * € (D) 101,60 | € (A) 104,45 | sFr 126,507 € 94,95 | £85.50ISBN 978-3-642-32331-7

9<HTOGPC=dcddbh>

News 9/2012 Computer Science

43

J. Fürnkranz, TU Darmstadt, Darmstadt, Germany; D. Gamberger, R. Boškovic Institute, Zagreb, Croatia; N. Lavrač, J. Stefan Institute, Ljubljana, Slovenia

Foundations of Rule LearningRules – the clearest, most explored and best un-derstood form of knowledge representation – are particularly important for data mining, as they of-fer the best tradeoff between human and machine understandability. This book presents the funda-mentals of rule learning as investigated in classical machine learning and modern data mining. It introduces a feature-based view, as a unifying framework for propositional and relational rule learning, thus bridging the gap between attribute-value learning and inductive logic programming, and providing complete coverage of most impor-tant elements of rule learning. The book can be used as a textbook for teaching machine learning, as well as a comprehensive reference to research in the field of inductive rule learning.

Features 7 Fills a significant gap in the machine learning literature 7 Explains the most comprehensive knowledge representation formalism 7 Offers researchers and graduate students a clear unifying terminology

Contents Part I. Introduction to Rule Learning.- Machine Learning and Data Mining.- Propositional Rule Learning.- Relational Rule Learning.- Part II. Elements of Rule Learning.- Formal Framework for Rule Analysis.- Features.- Heuristics.- Pruning of Rules and Rule Sets.- Survey of Classification Rule Learning Systems Through the Analysis of Rule Learning Elements Used.- Part III. Selected Topics in Predictive Induction.- Part IV Selected Techniques and Applications.

Fields of interestsData Mining and Knowledge Discovery; Artificial Intelligence (incl. Robotics); Pattern Recognition

Target groupsResearch

Product categoryGraduate/Advanced undergraduate textbook

Due October 2012

2012.X, 416 p. 94 illus., 1 in color. (Cognitive Technologies) Hardcover7 approx. * € (D) 64,15 | € (A) 65,95 | sFr 80,007 approx. € 59,95 | £53.99ISBN 978-3-540-75196-0

9<HTOFPA=hfbjga>

J. Gibbons, Oxford University, UK (Ed)

Generic and Indexed ProgrammingInternational Spring School, SSGIP 2010, Oxford, UK, March 22‑26, 2010, Revised Lectures

Generic programming is about making programs more widely applicable via exotic kinds of parame-trization---not just along the dimensions of values or of types, but also of things such as the shape of data, algebraic structures, strategies, computation-al paradigms, and so on. Indexed programming is a lightweight form of dependently typed program-ming, constraining flexibility by allowing one to state and check relationships between parameters: that the shapes of two arguments agree, that an encoded value matches some type, that values transmitted along a channel conform to the stated protocol, and so on. The two forces of genericity and indexing balance each other nicely, simultane-ously promoting and controlling generality.

Features 7 Tutorial volume 7 Aims at doctoral students, researchers, and practitioners in programming languages and related areas 7 Covers various aspects of generic and indexed programming

Contents Three Complementary Approaches to Bidirec-tional Programming.-Generic Programming with Adjunctions.-Typed Tagless Final Interpreters.-The C++0x “Concepts” Effort.-Generic Program-ming with Dependent Types. Generic Program-ming with Adjunctions.-Typed Tagless Final Interpreters.-The C++0x “Concepts” Effort.-Ge-neric Programming with Dependent Types.

Fields of interestsProgramming Languages, Compilers, Interpreters; Programming Techniques; Software Engineering

Target groupsResearch

Product categoryGraduate/Advanced undergraduate textbook

Available

2012.VII, 259 p. 24 illus. (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues, Volume 7470) Softcover7 * € (D) 49,22 | € (A) 50,60 | sFr 61,507 € 46,00 | £41.99ISBN 978-3-642-32201-3

9<HTOGPC=dccabd>

M. González Hidalgo, A. Mir Torres, J. Varona Gómez, University of the Balearic Islands, Palma de Mallorca, Spain (Eds)

Deformation ModelsTracking, Animation and Applications

Contents Preface.-   List of Contributors.-   List of Algo-rithms.-   Part I Fundamentals and animation applications: Deformable Objects Representa-tion, by Pere Palmer, Arnau Mir, and Manuel González-Hidalgo.-  Free form deformations or deformations non-constrained by geometries or topologies, by Romain Raffin.-  Cage based de-formations: a survey , by Jesús R. Nieto, Antonio Susín.-  Image Gradient Based Level Set Methods in 2D and 3D, by Xianghua Xie, Si Yong Yeo, Majid Mirmehdi, Igor Sazonov, and Perumal Ni-thiarasu.-  A fast geometric deformation method to adapt a foot to a platform, by J.M. Buades, M. González-Hidalgo, Francisco J.Perales, S. Ramis-Guarinos, A. Oliver and E. Montiel.-  Frame-based interactive simulation of complex deformable objects, by Benjamin Gilles, Franc¸ois Faure, Guillaume Bousquet, and Dinesh K. Pai.-  Part II Tracking and computer vision applications: Robust Deformable Models for 2D and 3D Shape Estimation, by Jorge S. Marques, Jacinto C. Nas-cimento, and Carlos Santiago.-  Deformable Face Alignment via Local Measurements and Global Constraints, by Jason M. Saragih.-  Learning-based Detection and Tracking in Medical Imaging: A Probabilistic Approach, by Yang Wang, Bogdan Georgescu, Terrence Chen, Wen Wu, Peng Wang, Xiaoguang Lu, Razvan Ionasec, Yefeng Zheng, Dorin Comaniciu. [...]

Fields of interestsComputer Imaging, Vision, Pattern Recognition and Graphics; Signal,Image and Speech Process-ing; Biomedical Engineering

Target groupsResearch

Product categoryContributed volume

Due September 2012

2012. 350 p. (Lecture Notes in Computational Vision and Biomechanics, Volume 7) Hardcover7 approx. * € (D) 106,95 | € (A) 109,95 | sFr 133,507 approx. € 99,95 | £90.00ISBN 978-94-007-5445-4

9<HTUELA=hfeefe>

Computer Science springer.com/NEWSonline

44

M. M. Hassan, King Saud University, Riyadh, Saudi Arabia; E.‑N. Huh, Kyung Hee University, Gyeonggi-do, South Korea

Dynamic Cloud Collaboration PlatformA Market‑Oriented Approach

Present trends in cloud providers (CPs) capabili-ties have given rise to the interest in federating or collaborating clouds, thus allowing providers to revel on an increased scale and reach more than that is achievable individually. Current research efforts in this context mainly focus on building supply chain collaboration (SCC) models, in which CPs leverage cloud services from other CPs for seamless provisioning. Nevertheless, in the near future, we can expect that hundreds of CPs will compete to offer services and thousands of users will also compete to receive the services to run their complex heterogeneous applications on a cloud computing environment. In this open feder-ation scenario, existing collaboration models (i.e. SCC) are not applicable since they are designed for static environments where a-priori agreements among the parties are needed to establish the federation. To move beyond these shortcomings, Dynamic Cloud Collaboration Platform establish-es the basis for developing dynamic, advanced and efficient collaborative cloud service solutions that are scalable, high performance, and cost effective.

Contents Overview of Cloud Computing and Motivation of the Work.- Related Work.- Architectural Frame-work and Market Model for Dynamic Cloud Col-laboration.- Multi-Objective Optimization Model and Algorithms for Partner Selection.- Closing Remarks.

Fields of interestsComputer Communication Networks; Communi-cations Engineering, Networks

Target groupsProfessional/practitioner

Product categoryBrief

Due September 2012

2013. X, 90 p. 19 illus., 8 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,75 | € (A) 43,95 | sFr 39,507 € 39,95 | £26.99ISBN 978-1-4614-5145-7

9<HTMERB=efbefh>

D. Hildenbrand, University of Technology Darmstadt, Germany

Foundations of Geometric Algebra ComputingFeatures 7 Defines geometric algebra computing as the geometrically intuitive development of algo-rithms with a focus on their efficient implemen-tation 7 Author anticipates the forthcoming widespread adoption of parallel processor technol-ogy 7 New computing platforms can benefit from the inherent optimization and parallelization of the techniques described

Contents Chap. 1 Introduction.- Chap. 2 Mathematical Introduction.- Chap. 3 The Conformal Geometric Algebra.- Chap. 4 Maple and the Identification of Quaternions and Other Algebras.- Chap. 5 Fitting of Planes or Spheres into Point Sets.- Chap. 6 Geo-metric Algebra Tutorial Using CLUCalc.- Chap. 7 Inverse Kinematics of a Simple Robot.- Chap. 8 Robot Grasping an Object.- Chap. 9 Efficient Computer Animation Application in CGA.- Chap. 10 Using Gaalop for Performant Geometric Al-gebra Computing.- Chap. 11 Collision Detection Using the Gaalop Precompiler.- Chap. 12 Gaalop Precompiler for GPGPUs.- Chap. 13 Molecular Dynamics Using Gaalop GPC for OpenCL.- Chap. 14 Geometric Algebra Computers.

Fields of interestsComputer Imaging, Vision, Pattern Recognition and Graphics; Geometry; Appl.Mathematics/Computational Methods of Engineering

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Due November 2012

2012.X, 238 p. 98 illus., 94 in color. (Geometry and Computing, Volume 8) Hardcover7 approx. * € (D) 53,45 | € (A) 54,95 | sFr 66,507 approx. € 49,95 | £44.99ISBN 978-3-642-31793-4

9<HTOGPC=dbhjde>

P. Hingston, Edith Cowan University, Mount Lawley, WA, Australia (Ed)

Believable BotsCan Computers Play Like People?

We share our modern world with bots – chatbots to converse with, roombots to clean our houses, spambots to fill our e-mail inboxes, and medibots to assist our surgeons. This book is about comput-er game bots, virtual companions who accompany us in virtual worlds or sharpen our fighting skills.

Features 7 Describes many details of state-of-the-art games 7 Addresses significant artificial intel-ligence issues 7 Interesting for games developers and academic researchers

Contents Chap. 1 Rethinking the Human-Agent Relation-ship: Which Social Cues Do Interactive Agents Really Need to Have?.- Chap. 2 Believability Through Psychosocial Behaviour: Creating Bots That Are More Engaging and Entertaining.- Chap. 3 Actor Bots.- Chap. 4 Embodied Conversa-tional Agent Avatars in Virtual Worlds.- Chap. 5 Human-Like Combat Behaviour via Multiobjec-tive Neuroevolution.- Chap. 6 Believable Bot Navi-gation via Playback of Human Traces.- Chap. 7 A Machine Consciousness Approach to the Design of Human-Like Bots.- Chap. 8 ConsScale FPS: Cognitive Integration for Improved Believability in Computer Game Bots.- Chap. 9 Assessing Believability.- Chap. 10 Making Diplomacy Bots Individual.- Chap. 11 Towards Imitation of Hu-man Driving Style in Car Racing Games.

Fields of interestsArtificial Intelligence (incl. Robotics); Com-putational Intelligence; Personality and Social Psychology

Target groupsResearch

Product categoryMonograph

Due October 2012

2013. XII, 311 p. 105 illus., 52 in color. Hardcover7 approx. * € (D) 101,60 | € (A) 104,45 | sFr 126,507 approx. € 94,95 | £85.50ISBN 978-3-642-32322-5

9<HTOGPC=dcdccf>

News 9/2012 Computer Science

45

J. M. Kizza, University of Tennessee-Chattanooga, TN, USA

Guide to Computer Network SecurityContents Part I: Understanding Traditional Computer Network Security.- Computer Network Funda-mentals.- Understanding Computer Network Security.- Part II: Security Challenges to Tradi-tional Computer Networks.- Security Threats to Computer Networks.- Computer Network Vulnerabilities.- Cyber Crimes and Hackers.- Hostile Scripts.- Security Assessment, Analysis, and Assurance.- Part III: Dealing with Network Security Challenges.- Disaster Management.- Ac-cess Control and Authorization.- Authentica-tion.- Cryptography.- Firewalls.- System Intru-sion Detection and Prevention.- Computer and Network Forensics.- Virus and  Content Filtering.- Standardization and Security Criteria: Security Evaluation of Computer Products.- Computer Network Security Protocols.- Security in Wire-less Networks and Devices.- Security in Sensor Networks.- Part IV: Elastic Extension Beyond the Traditional Computer Network – Virtualization, Cloud Computing and Mobile Systems.- Mobile Communication Systems and Related Security Issues.- Virtualization Infrastructure and Related Security Issues.- Cloud Computing and Related Security Issues.- Other Efforts to Secure Informa-tion and Computer Networks.- Part V: Hands-On Projects.- Hands-On Projects.

Fields of interestsInformation Storage and Retrieval; Data Storage Representation; Management of Computing and Information Systems

Target groupsLower undergraduate

Product categoryUndergraduate textbook

Due September 2012

2nd ed. 2013. X, 602 p. 104 illus., 52 in color. (Computer Communications and Networks) Hardcover7 approx. * € (D) 53,45 | € (A) 54,95 | sFr 66,507 approx. € 49,95 | £44.99ISBN 978-1-4471-4542-4

9<HTMEPH=befece>

D. Korzun, Helsinki Institute for Information Technology, Aalto, Finland; A. Gurtov, University of Oulu, Finland

Structured Peer-to-Peer SystemsFundamentals of Hierarchical Organization, Routing, Scaling, and Security

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, local-ity and security issues. By utilizing the processing and bandwidth resources  of end users, the P2P approach enables high performance of data dis-tribution which is hard to achieve with traditional client-server architectures.

Features 7 Covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems 7 Highlights P2P appli-cations in the modern Internet 7 Presents rank-ing and fairness mechanisms, look-ahead routing, analytical modeling and simulation methods, and security aspects in P2P systems

Contents Terminology, Problems, and Design Issues.- Flat DHT Routing Topologies.- Hierarchical Neigh-bor Maintenance.- Adaptable Overlay Network Topology.- Clustering.- Local Ranking.- Hier-archical DHT Architectures.- Cyclic Routing.- Diophantine Routing.- Structural Routing.- CR-Chord.- Indirection Infrastructures.- Commerical Applications.

Fields of interestsComputer Communication Networks; Systems and Data Security; Communications Engineering, Networks

Target groupsResearch

Product categoryMonograph

Due October 2012

2013. V, 380 p. 85 illus. Hardcover7 * € (D) 101,60 | € (A) 104,45 | sFr 126,507 € 94,95 | £85.50ISBN 978-1-4614-5482-3

9<HTMERB=efeicd>

J. H. Laros III, K. Pedretti, S. M. Kelly, Sandia National Laboratories, Albuquerque, NM, USA; W. Shu, University of New Mexico, Albuquerque, NM, USA; K. Ferreira, J. Vandyke, C. Vaughan, Sandia National Laboratories, Albuquerque, NM, USA

Energy-Efficient High Performance ComputingMeasurement and Tuning

In this work, the unique power measurement capabilities of the Cray XT architecture were exploited to gain an understanding of power and energy use, and the effects of tuning both CPU and network bandwidth. Modifications were made to deterministically halt cores when idle. Addi-tionally, capabilities were added to alter operating P-state.

Features 7 Examines the power requirements of a range of important DOE/NNSA production scien-tific computing applications running at large scale 7 Demonstrates how CPU and network bandwidth tuning can result in energy savings with little or no impact on run-time perfor-mance 7 Discusses how next-generation large-scale platforms could benefit from the capability to tune platform components to achieve more energy-efficient performance

Contents Introduction.- Platforms.- Measuring Power.- Applications.- Reducing Power During Idle Cycles.- Tuning CPU Power During Application Run-Time.- Network Bandwidth Tuning During Application Run-Time.- Energy Delay Product.- Conclusions.

Fields of interestsComputer Communication Networks; Perfor-mance and Reliability; Operating Systems

Target groupsResearch

Product categoryBrief

Due September 2012

2013. XIV, 67 p. 19 illus., 8 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,75 | € (A) 43,95 | sFr 53,507 € 39,95 | £35.99ISBN 978-1-4471-4491-5

9<HTMEPH=beejbf>

Computer Science springer.com/NEWSonline

46

N. Lee, Newton Lee Laboratories, LLC, Tujunga, CA, USA

Facebook NationTotal Information Awareness

President Barack Obama, in his 2011 State of the Union Address, called America „the nation of Edi-son and the Wright brothers“ and „of Google and Facebook.“ U.S. Chief Information Officer, Steven VanRoekel, said that America has become a „Face-book nation“ that demands increased transparency and interactivity from the federal government.

Features 7 Presents an insider’s perspective of Total Infor-mation Awareness, a governmental data mining project focused on scanning public and private data for the sake of national security 7 Closely examines how the rise of social media platforms, such as Facebook, has inadvertently led to the general public’s embracement of Total Information Awareness 7 Analyzes the privacy concerns with posting personal data on social media platforms, and explains how personal Total Information Awareness can benefit individuals, as well as Society as a whole

Contents From 1984 to Total Information Awareness.- So-cial Networks and Privacy.- Smartphones and Pri-vacy.- Consumer Privacy in the Age of Big Data.- Twitter – a World of Immediacy.- Generation C in the Age of Big Data.- Privacy Breaches.- Business Intelligence.- Misinformation and Disinforma-tion.- E-Government and E-Activism.- Living in Facebook Nation.- Personal Information Man-agement.- Total Information Awareness.- From Total Information Awareness to 1984.- Facebook Timeline.- Index.

Fields of interestsInformation Systems Applications (incl.Internet); Media Research; Multimedia Information Systems

Target groupsProfessional/practitioner

Product categoryProfessional book

Due October 2012

2013. XI, 225 p. 14 illus. Hardcover7 * € (D) 85,55 | € (A) 87,95 | sFr 106,507 € 79,95 | £72.00ISBN 978-1-4614-5307-9

9<HTMERB=efdahj>

G. O’Regan, Cork, Ireland

Mathematics in ComputingAn Accessible Guide to Historical, Foundational and Application Contexts

This clearly written and enlightening textbook provides a concise, introductory guide to the key mathematical concepts and techniques used by computer scientists.

Features 7 Provides a broad review of the applications of mathematics to computing, including software engineering, coding theory, cryptography and software reliability 7 Emphasizes the application of mathematics to computing, rather than math-ematics for its own sake, covering both discrete and continuous mathematics 7 Discusses the application of mathematical techniques to increase confidence in program correctness

Contents Mathematics in Civilization.- Sets, Relations and Functions.- Logic.- Software Engineering.- Formal Methods.- Z Formal Specification Language.- Number Theory.- Cryptography.- Coding Theory.- Language Theory and Semantics.- Computability and Decidability.- Probability, Statistics and Software Reliability.- Matrix Theory.- Complex Numbers and Quaternions.- Calculus.- Graph Theory.

Fields of interestsMath Applications in Computer Science; Math-ematical Applications in Computer Science; Mathematical Logic and Formal Languages

Target groupsUpper undergraduate

Product categoryUndergraduate textbook

Due November 2012

2013. XXV, 311 p. 106 illus. Hardcover7 approx. * € (D) 48,10 | € (A) 49,45 | sFr 60,007 approx. € 44,95 | £40.99ISBN 978-1-4471-4533-2

9<HTMEPH=befddc>

A. Oltramari, Carnegie Mellon University, Pittsburgh, PA, USA; P. Vossen, Vrije University Amsterdam, The Netherlands; L. Qin, The Hong Kong Polytechnic University, China; E. Hovy, Carnegie Mellon University, Pittsburg, PA, USA (Eds)

New Trends of Research in Ontologies and Lexical ResourcesIdeas, Projects, Systems

Contents 1.Introduction.- A.Oltramari, L.Qin, P.Vossen, E.Hovy.- Part I Achieving the Interoperability of Linguistic Resources in the Semantic Web.- 2.Towards Open Data for Linguistics: Linguistic Linked Data. C.Chiarcos, J.McCrae, P.Cimiano, and C.Fellbaum.- 3.Establishing Interoper-ability between Linguistic and Terminological Ontologies. W.Peters.- 4.On the Role of Senses in the Ontology-Lexicon. P.Cimiano, J.McCrae, P.Buitelaar, E.Montiel-Ponsoda.- Part II Event Analysis from Text and Multimedia.- 5.KYOTO: a Knowledge-rich Approach to the Interoperable Mining of Events From Text. P.Vossen, E.Agirre, G.Rigau and A.Soroa.- 6.Anchoring Background Knowledge to Rich Multimedia Contexts in the KNOWLEDGESTORE. R. Cattoni, F. Corco-glioniti, C. Girardi, B. Magnini, L. Serafini, and R. Zanoli.- 7.Lexical Mediation for Ontology-based Annotation of Multimedia. M.Cataldi, R.Damiano, V.Lombardo and A.Pizzo.- 8.Knowl-edge in Action: Integrating Cognitive Architec-tures and Ontologies. A.Oltramari, C.Lebiere.- Part III Enhancing NLP with Ontologies.- 9.Use of Ontology, Lexicon and Fact Repository for Reference Resolution in Ontological Semantics. M.McShane and S.Nirenburg.- 10.Ontology-based Semantic Interpretation via Grammar Constraints. S.Muresan. [...]

Fields of interestsData Mining and Knowledge Discovery; Applica-tions of Mathematics; Computational Linguistics

Target groupsResearch

Product categoryContributed volume

Due November 2012

2012. X, 240 p. 23 illus. in color. (Theory and Applications of Natural Language Processing) Hardcover7 * € (D) 90,90 | € (A) 93,45 | sFr 113,507 € 84,95 | £76.50ISBN 978-3-642-31781-1

9<HTOGPC=dbhibb>

News 9/2012 Computer Science

47

N. Ramzan, Queen Mary University of London, UK; R. v. Zwol, Netflix, Los Gatos, CA, USA; J.‑S. Lee, Yonsei University, Incheon, South Korea; K. Clüver, Technische Universität Berlin, Germany; X.‑S. Hua, Microsoft Research, Bellevue, WA, USA (Eds)

Social Media RetrievalContents Part I: Fundamentals of Social Media.- Social Video Retrieval.- Social Media Recommenda-tion.- Multimedia Indexing, Search and Retrieval in Large Databases of Social Networks.- Survey on Social Community Detection.- Detecting Multimedia Contents of Social Events in Social Networks.- Part II: Tagging of Social Media.- Geo-referencing in Social Networks.- Predicting User Tags in Social Media Repositories Using Semantic Expansion and Visual Analysis.- A Rule-Based Flickr Tag Recommendation System.- Sentic Computing for Social Media Analysis, Repre-sentation, and Retrieval.- Highlights Detection in Movie Scenes Through Inter-Users Physi-ological Linkage.- Towards Emotional Annota-tion of Multimedia Contents.- Part III: Privacy and Personalisation of Social Media.- Privacy in Recommender Systems.- Geotag Propagation with User Trust Modelling.- Context Aware Content Adaptation for Personalised Social Media Access.- Part IV: Applications and Services.- Progression in Social Media: How PetaMedia Facilitate?.- Video Technology for Storage and Distribution of Personalised Media.- Social Aware TV Content Delivery over Intelligent Networks.- Distributed Media Synchronization for Shared Video Watch-ing.- eGuided: Sharing Media in Academic and Social Networks based on Peer-Assisted Learning e-Portfolios.- Exploiting Social Media for Music Information Retrieval.

Fields of interestsComputer Communication Networks; Multimedia Information Systems; Pattern Recognition

Target groupsResearch

Product categoryContributed volume

Due November 2012

2013. X, 474 p. 114 illus., 5 in color. (Computer Communications and Networks) Hardcover7 approx. * € (D) 101,60 | € (A) 104,45 | sFr 126,507 approx. € 94,95 | £85.50ISBN 978-1-4471-4554-7

9<HTMEPH=beffeh>

K. S. Ray, Indian Statistical Institute, West Bengal, India

Soft Computing Approach to Pattern Classification and Object RecognitionA Unified Concept

Soft Computing Approach to Pattern Classifi-cation and Object Recognition establishes an innovative, unified approach to supervised pattern classification and model-based occluded object recognition.

Features 7 Outlines a unified approach to supervised pattern classification and model-based occluded object recognition 7 Presents an innovative, new interpretation of multidimensional fuzzy implication (MFI) and fuzzy pattern vector (FPV) 7 Provides a detailed guide to a complete-ly independent design methodology, developed and tested on a unified framework

Contents Soft Computing Approach to Pattern Classifica-tion and Object Recognition.- Pattern Classifica-tion Based on Conventional Interpretation of MFI.- Pattern Classification Based on New Inter-pretation of MFI.- Pattern Classification Based on New Interpretation of MFI and Floating Point Genetic Algorithm.- Neuro-Genetic Approach To Pattern Classification Based on the New Inter-pretation of MFI.- Knowledge-Based Occluded Object Recognition Based on New Interpretation of MFI and Floating Point Genetic Algorithm.- Neuro-fuzzy Approach to Occluded Object Recog-nition Based on the New Interpretation of MFI.

Fields of interestsImage Processing and Computer Vision; Signal,Image and Speech Processing; Artificial Intelligence (incl. Robotics)

Target groupsResearch

Product categoryMonograph

Due September 2012

2013. VII, 236 p. 46 illus. Hardcover7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 107,507 approx. € 79,95 | £73.00ISBN 978-1-4614-5347-5

9<HTMERB=efdehf>

M. Raynal, Institut Universitaire de France, Rennes Cedex, France

Concurrent Programming: Algorithms, Principles, and FoundationsContents Part I - Lock-Based Synchronization.- Chap. 1 - The Mutual Exclusion Problem.- Chap. 2 - Solving Mutual Exclusion.- Chap. 3 - Lock-Based Concur-rent Objects.- Part II - On the Foundations Side: The Atomicity Concept.- Chap. 4 - Atomicity: For-mal Definition and Properties.- Part III - Mutex-Free Synchronization.- Chap. 5 - Mutex-Free Concurrent Objects.- Chap. 6 - Hybrid Concur-rent Objects.- Chap. 7 - Wait-Free Objects from Read/Write Registers Only.- Chap. 8 - Snapshot Objects from Read/Write Registers Only.- Chap. 9 - Renaming Objects from Read/Write Registers Only.- Part IV - The Transactional Memory Ap-proach.- Chap. 10 - Transactional Memory.- Part V - On the Foundations Side: From Safe Bits to Atomic Registers.- Chap. 11 - Safe, Regular and Atomic Read/Write Registers.- Chap. 12 - From Safe Bits to Atomic Bits: A Lower Bound and an Optimal Construction.- Chap. 13 - Bounded Constructions of Atomic b-Valued Registers.- Part VI - On the Foundations Side: The Computability Power of Concurrent Objects (Consensus).- Chap. 14 - Universality of Consensus.- Chap. 15 - The Case of Unreliable Base Objects.- Chap. 16 - Con-sensus Numbers and the Consensus Hierarchy.- Chap. 17 - The Alphas and Omega of Consensus: Failure Detector-Based Consensus.- Afterword.- Bibliography.- Index.

Fields of interestsTheory of Computation; Computer Systems Organization and Communication Networks; Software Engineering/Programming and Operat-ing Systems

Target groupsUpper undergraduate

Product categoryGraduate/Advanced undergraduate textbook

Due September 2012

2012. XIX, 417 p. 249 illus., 66 in color. Hardcover7 * € (D) 64,15 | € (A) 65,95 | sFr 80,007 € 59,95 | £53.99ISBN 978-3-642-32026-2

9<HTOGPC=dcacgc>

Computer Science springer.com/NEWSonline

48

V. Subrahmanian, University of Maryland, College Park, MD, USA (Ed)

Handbook of Computational Approaches to CounterterrorismTerrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shap-ing policies about their behaviour. Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups.

Features 7 The first handbook that brings together a wide variety of computational techniques (and authors spanning multiple disciplines related to counter-terrorism research) in a single, definitive, reference work 7 A website with additional material relat-ing to book chapters will be available 7 Includes case studies explaining how various techniques proposed in this book are applicable to real-world counter-terrorism and conflict analysis

Contents Data and Data Acquisition.- Behavioral Models and Forecasting.- Terrorist Network Analysis.- Systems, Frameworks, and Case Studies.- New Directions.

Fields of interestsArtificial Intelligence (incl. Robotics); Probability and Statistics in Computer Science; Data Mining and Knowledge Discovery

Target groupsProfessional/practitioner

Product categoryHandbook

Due November 2012

2013. X, 600 p. 183 illus., 115 in color. Hardcover7 approx. * € (D) 117,65 | € (A) 120,95 | sFr 147,007 approx. € 109,95 | £99.50ISBN 978-1-4614-5310-9

9<HTMERB=efdbaj>

H. Yin, Syracuse University, Syracuse, NY, USA; D. Song, University of California, Berkeley, CA, USA

Automatic Malware AnalysisAn Emulator Based Approach

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars dam-ages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for automatic malware analysis is developed. These techniques capture intrinsic characteristics of malware, and are well suited for dealing with new malware samples and attack mechanisms.

Contents Introduction.- Dynamic Binary Analysis Platform.- Hidden Code Extraction.- Privacy-breaching Behavior Analysis.- Hooking Behavior Analysis.- Analysis of Trigger Conditions and Hidden Behaviors.- Concluding Remarks.

Fields of interestsSystems and Data Security; Data Encryption; Data Structures, Cryptology and Information Theory

Target groupsResearch

Product categoryBrief

Due September 2012

2013. VIII, 75 p. 15 illus., 5 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,75 | € (A) 43,95 | sFr 53,507 € 39,95 | £35.99ISBN 978-1-4614-5522-6

9<HTMERB=effccg>

B. P. Zeigler, George Mason University, Fairfax, VA, USA

Guide to Modeling and Simulation of Systems of SystemsUser’s Reference

This user’s reference is a companion to the separate book also titled “Guide to Modelling and Simulation of Systems of Systems.” The principal book explicates integrated development environ-ments to support virtual building and testing of systems of systems, covering in some depth the MS4 Modelling Environment™. This user’s refer-ence provides a quick reference and exposition of the various concepts and functional features covered in that book. The topics in the user’s refer-ence are grouped in alignment with the workflow displayed on the MS4 Modeling Environment™ launch page, under the headings Atomic Models, System Entity Structure, Pruning SES, and Miscel-laneous. For each feature, the reference discusses why we use it, when we should use it, and how to use it. Further comments and links to related features are also included.

Features 7 Supplements the separate book also titled “Guide to Modeling and Simulation of Systems of Systems” 7 Provides a quick reference and ex-position of various concepts relating to integrated development environments to support virtual building and testing of systems of systems 7 Dis-cusses why, when, and how the statements in the model development language should be used

Contents Atomic Models List.- System Entity Structure List.- Pruning SES List.- Miscellaneous List.

Fields of interestSimulation and Modeling

Target groupsResearch

Product categoryBrief

Due September 2012

2013. VIII, 65 p. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,75 | € (A) 43,95 | sFr 53,507 € 39,95 | £35.99ISBN 978-1-4471-4569-1

9<HTMEPH=befgjb>