Top Banner
Computer Science springer.com/NEWSonline 82 N. Agarwal, R. T. Wigand, University of Arkansas, Little Rock, AR, USA; M. Lim, Arizona State University, Tempe, AZ, USA Online Collective Action Dynamics of the Crowd in Social Media e authors aim at illuminating several funda- mental and powerful yet theoretically obscure aspects of collective actions in social media. e reader will gain an advanced and deepen our understanding of collective action in the new generation of (ICT) enabled by Web 2.0, also referred to as social media, to help critical decision and policy making. e developed theories will be a valuable and comprehensive reference for those interested in newer Information and Communica- tion Technologies (ICTs), in examining their role in decision and policy making, understanding the dynamics of interaction, communication, and information propagation, and researching in social networks for years to come. is interdisciplinary work is the result of researchers, practitioners, working in computer science, sociology, behavior- al science, psychology, cultural study, information systems, operations research and communication, and methodologies research. e researchers present their new concepts, ideas, principles, and methodologies, aiming to advance and deepen our understanding of collective action in social media to help critical decision and policy making. Features 7 Illuminates fundamental and powerful yet theoretically obscure aspects of collective ac- tions in social media 7 Provides a common- platform for diverse researchers to share their research 7 Represents a valuable companion for policy and decision makers Fields of interest Computer Appl. in Social and Behavioral Sciences; Statistical Physics, Dynamical Systems and Com- plexity; Sociology, general Target groups Research Product category Monograph Due August 2013 2013. 350 p. 100 illus. (Lecture Notes in Social Networks) Hardcover 7 approx. * € (D) 106,95 | € (A) 109,95 | sFr 143,50 7 approx. € 99,95 | £90.00 ISBN 978-3-7091-1339-4 9<HTOHLJ=bbddje> L.‑m. Ang, Edith Cowan University, Joondalup, WA, Australia; K. P. Seng, Sunway University, Selangor, Malaysia; L. W. Chew, Intel Corporation, Penang, Malaysia; L. S. Yeong, W. C. Chia, Sunway University, Selangor, Malaysia Wireless Multimedia Sensor Networks on Reconfigurable Hardware Information Reduction Techniques Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity. Features 7 Focus on efficient algorithms and architectures for information reduction 7 Includes compre- hensive review of wireless multimedia sensor network 7 Benefits researchers and engineers in image processing and wireless sensor networks Contents Chap. 1 Introduction.- Chap. 2 Wireless Multime- dia Sensor Network Technology.- Chap. 3 Hard- ware Technology and Programming Languages for Reconfigurable Devices.- Chap. 4 FPGA Wireless Multimedia Sensor Node Hardware Platforms.- Chap. 5 Single-View Information Reduction Tech- niques for WMSN Using Event Detection.- Chap. 6 Single-View Information Reduction Techniques for WMSN Using Event Compression.- Chap. 7 Multiple-View Information Reduction Techniques for WMSN Using Image Stitching.- Appendix.- References. Fields of interest Image Processing and Computer Vision; Electrical Engineering; Computer Systems Organization and Communication Networks Target groups Research Product category Monograph Due June 2013 2013. X, 280 p. Hardcover 7 approx. * € (D) 101,60 | € (A) 104,45 | sFr 126,50 7 approx. € 94,95 | £85.50 ISBN 978-3-642-38202-4 9<HTOGPC=dicace> L. G. Birta, G. Arbez, University of Ottawa, ON, Canada Modelling and Simulation Exploring Dynamic System Behaviour is textbook presents a practical introduction to the fundamental aspects of modelling and simula- tion. It provides the necessary foundations both for those wishing to learn about this methodology and also for those who have a need to apply it in their work. Illustrative examples are drawn from projects formulated within the domains of both DEDS and CTDS. Features 7 Fully updated and expanded new edi- tion 7 e only textbook to give a balanced and integrated presentation of modelling and simulation activity for both discrete-event dynamic systems and continuous-time dynamic systems 7 Contains numerous examples, algo- rithms, exercises and projects, in addition to a series of primers in the appendices, and teaching support material at an associated website Contents Part I: Fundamentals.- Introduction.- e Model- ling and Simulation Process.- Part II: DEDS Modelling and Simulation.- DEDS Stochastic Behaviour and Modelling.- A Conceptual Model- ling Framework for DEDS.- DEDS Simulation Model Development.- e Activity-Object World View for DEDS.- Experimentation and Output Analysis.- Part III: CTDS Modelling and Simula- tion.- Modelling of Continuous Time Dynamic Systems.- Simulation with CTDS Models.- Op- timization.- Probability Primer.- GPSS Primer.- MATLAB Primer. Fields of interest Computer Graphics; Simulation and Modeling; Appl.Mathematics/Computational Methods of Engineering Target groups Graduate Product category Graduate/Advanced undergraduate textbook Due July 2013 2nd ed. 2014. X, 434 p. 117 illus., 11 in color. (Simulation Foundations, Methods and Applications) Hardcover 7 * € (D) 74,89 | € (A) 76,99 | sFr 93,50 7 € 69,99 | £62.99 ISBN 978-1-4471-2782-6 9<HTMEPH=bchicg>
11

Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

Apr 20, 2018

Download

Documents

doancong
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

Computer Science springer.com/NEWSonline

82

N. Agarwal, R. T. Wigand, University of Arkansas, Little Rock, AR, USA; M. Lim, Arizona State University, Tempe, AZ, USA

Online Collective ActionDynamics of the Crowd in Social Media

The authors aim at illuminating several funda-mental and powerful yet theoretically obscure aspects of collective actions in social media. The reader will gain an advanced and deepen our understanding of collective action in the new generation of (ICT) enabled by Web 2.0, also referred to as social media, to help critical decision and policy making. The developed theories will be a valuable and comprehensive reference for those interested in newer Information and Communica-tion Technologies (ICTs), in examining their role in decision and policy making, understanding the dynamics of interaction, communication, and information propagation, and researching in social networks for years to come. This interdisciplinary work is the result of researchers, practitioners, working in computer science, sociology, behavior-al science, psychology, cultural study, information systems, operations research and communication, and methodologies research. The researchers present their new concepts, ideas, principles, and methodologies, aiming to advance and deepen our understanding of collective action in social media to help critical decision and policy making.

Features 7 Illuminates fundamental and powerful yet theoretically obscure aspects of collective ac-tions in social media 7 Provides a common-platform for diverse researchers to share their research 7 Represents a valuable companion for policy and decision makers

Fields of interestComputer Appl. in Social and Behavioral Sciences; Statistical Physics, Dynamical Systems and Com-plexity; Sociology, general

Target groupsResearch

Product categoryMonograph

Due August 2013

2013. 350 p. 100 illus. (Lecture Notes in Social Networks) Hardcover7 approx. * € (D) 106,95 | € (A) 109,95 | sFr 143,507 approx. € 99,95 | £90.00ISBN 978-3-7091-1339-4

9<HTOHLJ=bbddje>

L.‑m. Ang, Edith Cowan University, Joondalup, WA, Australia; K. P. Seng, Sunway University, Selangor, Malaysia; L. W. Chew, Intel Corporation, Penang, Malaysia; L. S. Yeong, W. C. Chia, Sunway University, Selangor, Malaysia

Wireless Multimedia Sensor Networks on Reconfigurable HardwareInformation Reduction Techniques

Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity.

Features 7 Focus on efficient algorithms and architectures for information reduction 7 Includes compre-hensive review of wireless multimedia sensor network 7 Benefits researchers and engineers in image processing and wireless sensor networks

Contents Chap. 1 Introduction.- Chap. 2 Wireless Multime-dia Sensor Network Technology.- Chap. 3 Hard-ware Technology and Programming Languages for Reconfigurable Devices.- Chap. 4 FPGA Wireless Multimedia Sensor Node Hardware Platforms.- Chap. 5 Single-View Information Reduction Tech-niques for WMSN Using Event Detection.- Chap. 6 Single-View Information Reduction Techniques for WMSN Using Event Compression.- Chap. 7 Multiple-View Information Reduction Techniques for WMSN Using Image Stitching.- Appendix.- References.

Fields of interestImage Processing and Computer Vision; Electrical Engineering; Computer Systems Organization and Communication Networks

Target groupsResearch

Product categoryMonograph

Due June 2013

2013. X, 280 p. Hardcover7 approx. * € (D) 101,60 | € (A) 104,45 | sFr 126,507 approx. € 94,95 | £85.50ISBN 978-3-642-38202-4

9<HTOGPC=dicace>

L. G. Birta, G. Arbez, University of Ottawa, ON, Canada

Modelling and SimulationExploring Dynamic System Behaviour

This textbook presents a practical introduction to the fundamental aspects of modelling and simula-tion. It provides the necessary foundations both for those wishing to learn about this methodology and also for those who have a need to apply it in their work. Illustrative examples are drawn from projects formulated within the domains of both DEDS and CTDS.

Features 7 Fully updated and expanded new edi-tion 7 The only textbook to give a balanced and integrated presentation of modelling and simulation activity for both discrete-event dynamic systems and continuous-time dynamic systems 7 Contains numerous examples, algo-rithms, exercises and projects, in addition to a series of primers in the appendices, and teaching support material at an associated website

Contents Part I: Fundamentals.- Introduction.- The Model-ling and Simulation Process.- Part II: DEDS Modelling and Simulation.- DEDS Stochastic Behaviour and Modelling.- A Conceptual Model-ling Framework for DEDS.- DEDS Simulation Model Development.- The Activity-Object World View for DEDS.- Experimentation and Output Analysis.- Part III: CTDS Modelling and Simula-tion.- Modelling of Continuous Time Dynamic Systems.- Simulation with CTDS Models.- Op-timization.- Probability Primer.- GPSS Primer.- MATLAB Primer.

Fields of interestComputer Graphics; Simulation and Modeling; Appl.Mathematics/Computational Methods of Engineering

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Due July 2013

2nd ed. 2014. X, 434 p. 117 illus., 11 in color. (Simulation Foundations, Methods and Applications) Hardcover7 * € (D) 74,89 | € (A) 76,99 | sFr 93,507 € 69,99 | £62.99ISBN 978-1-4471-2782-6

9<HTMEPH=bchicg>

Page 2: Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

News 6/2013 Computer Science

83

Y. Borenstein, VisualDNA, London, UK; A. Moraglio, University of Birmingham, UK (Eds)

Theory and Principled Methods for the Design of MetaheuristicsThis edited book puts together theoretical and principled methods for incorporating problem knowledge in evolutionary algorithms and other metaheuristics, and for designing and adapting them to the specific problems’ features. The first part of the book suggests a line of theoretical enquiry aimed at deriving new search algorithms from “scratch” based on well-formulated assump-tions on the class of problems considered.

Features 7 Valuable for practitioners and research-ers 7 Explains theoretical basis of key meta-heuristic techniques 7 Contributing authors among the leading authorities on the theory of evolutionary computation, search, and heuristics

Contents No Free Lunch Theorems: Limitations and Perspectives of Metaheuristics.- Convergence Rates of Evolutionary Algorithms and Parallel Evolutionary Algorithms.- Rugged and Elemen-tary Landscapes.- Single-Funnel and Multi-funnel Landscapes and Subthreshold Seeking Behavior.- Black-Box Complexity for Bounding the Performance of Randomized Search Heuris-tics.- Designing and Optimal Search Algorithm with Respect to Prior Information.- The Bayesian Search Game.- Principled Design of Continuous Stochastic Search: From Theory to Practice.- Parsi-mony Pressure Made Easy: Solving the Problem of Bloat in GP.- Experimental Analysis of Optimiza-tion Algorithms: Tuning and Beyond.- Formal Search Algorithms + Problem Characterizations = Executable Search Strategies.

Fields of interestArtificial Intelligence (incl. Robotics); Computa-tional Intelligence; Optimization

Target groupsResearch

Product categoryMonograph

Due June 2013

2013. Approx. 285 p. (Natural Computing Series) Hardcover7 approx. * € (D) 90,90 | € (A) 93,45 | sFr 113,507 approx. € 84,95 | £76.50ISBN 978-3-642-33205-0

9<HTOGPC=ddcafa>

P. Campisi, Roma Tre University, Rome, Italy (Ed)

Security and Privacy in BiometricsThis important text/reference presents the latest secure and privacy-compliant techniques in auto-matic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues.

Features 7 Provides an overview of the most recent privacy-enhancing techniques for biometric-based recognition systems 7 Presents real-world applications of biometric-based recognition systems 7 Covers ethical, legal, and procedural aspects

Contents Introduction.- Design Aspects of Secure Bio-metric Systems and Biometrics in the Encrypted Domain.- Beyond PKI.- Fuzzy Sketches for Protecting Biometric Templates.- Privacy Leak-age in Binary Biometric Systems.- Obtaining Cryptographic Keys Using Multi-Biometrics.- Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation.- Fingerprint Template Protection.- Biometric En-cryption.- Smart Cards to Enhance Security and Privacy in Biometrics.- Two Efficient Architec-tures for Handling Biometric Data While Taking Care Of Their Privacy.- Standards for Biometric Data Protection.- Nameless and Faceless.- Best Practices for Privacy and Data Protection for the Processing of Biometric Data.- Biometrics and the Challenge to Human Rights in Europe.- Recom-mendations on the Use of Biometric Technology.

Fields of interestBiometrics; Data Encryption; User Interfaces and Human Computer Interaction

Target groupsResearch

Product categoryMonograph

Due June 2013

2013. X, 470 p. 113 illus. Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £85.50ISBN 978-1-4471-5229-3

9<HTMEPH=bfccjd>

G. Cervone, J. Lin, N. Waters, George Mason University, Fairfax, VA, USA (Eds)

Data Mining for GeoinformaticsMethods and Applications

The rate at which geospatial data is being gener-ated exceeds our computational capabilities to ex-tract patterns for the understanding of a dynami-cally changing world. Geoinformatics and data mining focuses on the development and imple-mentation of computational algorithms to solve these problems. This unique volume contains a collection of chapters on state-of-the-art data min-ing techniques applied to geoinformatic problems of high complexity and important societal value.

Features 7 Presents a series of geoinformatic techniques and methodologies to solve real world problems of important societal value 7 Provides geoinfor-matic algorithms necessary to extract knowl-edge from massive amounts of geographically distributed data 7 Bridges fields together such as GIS, statistics, machine learning, remote sensing, natural hazards, earth and atmospheric sciences

Contents Computation in Hyperspectral Imagery (HSI) Data Analysis: Role and Opportunities.- Toward Understanding Tornado Formation Through Spatiotemporal Data Mining.- Source Term Estimation for the 2011 Fukushima Nuclear Accident.- GIS-based Traffic Simulation using OSM.- Evaluation of Real-time Traffic Applica-tions based on Data Stream Mining.- Geospatial Visual Analytics of Traffic and Weather Data for Better Winter Road Management.- Exploratory vi-sualization of collective mobile objects data using temporal granularity and spatial similarity.

Fields of interestData Mining and Knowledge Discovery; Database Management; Geographical Information Systems/Cartography

Target groupsResearch

Product categoryContributed volume

Due July 2013

2014. XX, 172 p. 63 illus., 35 in color. Hardcover7 * € (D) 90,94 | € (A) 93,49 | sFr 113,507 € 84,99 | £76.50ISBN 978-1-4614-7668-9

9<HTMERB=ehggij>

Page 3: Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

Computer Science springer.com/NEWSonline

84

C.‑k. Chan, The Hong Kong Polytechnic University, China; H.‑f. Leung, The Chinese University of Hong Kong, China

Belief-based Stability in Coalition Formation with UncertaintyAn Intelligent Agents’ Perspective

Belief-based Stability in Coalition Formation with Uncertainty An Intelligent Agents’ Perspective discusses coalition stability. It extends the classic stability concept of the non-transferable util-ity core by proposing new belief-based stability criteria under uncertainty, and illustrates how the new concept can be used to analyze the stability of a new type of belief-based coalition formation game. The book is intended for graduate students, engineers, and researchers in the field of artificial intelligence and computer science. Chi-kong Chan is a laboratory manager and a visiting lecturer at the Hong Kong Polytechnic University, China; Ho-fung Leung is a Professor and the Chairman of Department of Computer Science and Engineer-ing, The Chinese University of Hong Kong, China.

Features 7 First attempt to model uncertainty in belief based coalition formation 7 Application in buyer coalition problems 7 Multiple illustrating examples

Contents Game Theoretic Analysis of Coalition Formation.- Strong Core and Weak Core.- b-Core.- An Ex-ample Application of the b-Core.- The Complete Picture—the sb-Core and the wb-Core.

Fields of interestArtificial Intelligence (incl. Robotics); Game Theory, Economics, Social and Behav. Sciences; Computers and Society

Target groupsResearch

Product categoryMonograph

Due August 2013

Jointly published with Higher Education Press.

Distribution rights in China: Higher Education Press

2013. 200 p. 20 illus. Hardcover7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 115,007 approx. € 79,95 | £72.00ISBN 978-3-642-38214-7

9<HTOGPC=dicbeh>

R. Chbeir, University of Pau et Adour Countries, Anglet, France; B. Al Bouna, Antonine University, Baabda, Lebanon (Eds)

Security and Privacy Preserving in Social NetworksThis volume aims at assessing the current ap-proaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches as well as outlining future directions in this field.

Features 7 First time that experts in the field have ad-dressed this topic in such depth 7 Numerous examples will be of use to both the reader and lecturer in explaining the material 7 Numerous diagrams and illustrations help to clarify the topics to the reader 7 Interdisciplinary coverage of the topic ensures comprehensive treatment

Contents Privacy in Online Social Networks.- Online Social Networks: Privacy Threats and Defenses.- On-line Social Networks and Terrorism: Threats and Defenses.- User-Managed Access Control in Web Based Social Networks.- UPP+: A Flexible User Privacy Policy for Social Networking Services.- Social Semantic Network-Based Access Control.- Supporting Data Privacy in P2P Systems.- Privacy Preserving Reputation Management in Social Networks.- Security and Privacy Issues in Mobile Social Networks.- Avatar Facial Biometric Authen-tication Using Wavelet Local Binary Patterns.- A Flexible Image-Based Access Control Model for Social Networks.- Problems and Questions.

Fields of interestSystems and Data Security; Statistical Physics, Dynamical Systems and Complexity; Sociology, general

Target groupsResearch

Product categoryMonograph

Due August 2013

2013. Approx. 355 p. 195 illus., 45 in color. (Lecture Notes in Social Networks) Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £85.50ISBN 978-3-7091-0893-2

9<HTOHLJ=baijdc>

L. Chen, J. Ji, Sam Houston State University, Huntsville, TX, USA; Z. Zhang (Eds)

Wireless Network SecurityTheories and Applications

Wireless Network Security Theories and Applica-tions discusses the relevant security technolo-gies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth Networks and Communi-cations, Vehicular Ad Hoc Networks (VANETs), Wireless Sensor Networks (WSNs), Wireless Mesh Networks (WMNs), and Radio Frequency Identification (RFID). The audience of this book may include professors, researchers, graduate students, and professionals in the areas of Wireless Networks, Network Security and Information Security, Information Privacy and Assurance, as well as Digital Forensics.

Features 7 Most recent research 7 Most popular types of wireless networks 7 Both theories and applica-tions

Contents Challenges in Wireless Network Security.- Secu-rity in Centralized Wireless Networks.- Security in Decentralized Wireless Networks.-Security in Hybrid Wireless Networks.

Fields of interestComputer Communication Networks; Data Encryption; Communications Engineering, Networks

Target groupsResearch

Product categoryMonograph

Due June 2013

Jointly published with Higher Education Press

Distribution rights in China: Higher Education Press

2013. Approx. 375 p. 80 illus. Hardcover7 approx. * € (D) 106,95 | € (A) 109,95 | sFr 143,507 approx. € 99,95 | £90.00ISBN 978-3-642-36510-2

9<HTOGPC=dgfbac>

Page 4: Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

News 6/2013 Computer Science

85

B. Coecke, L. Ong, University of Oxford, UK; P. Panangaden, McGill University, Montreal, OC, Canada (Eds)

Computation, Logic, Games, and Quantum Foundations - The Many Facets of Samson AbramskyEssays Dedicted to Samson Abramsky on the Occasion of His 60th Birthday

Contents Use of a Canonical Hidden-Variable Space in Quantum Mechanics.- Imperfect Information in Logic and Concurrent Games.- Compositional Quantum Logic.- The Algebra of Directed Acyclic Graphs.- Diagrammatic Reasoning for Delay-Insensitive Asynchronous Circuits.- Payoffs, Intensionality and Abstraction in Games.- On the Theory of Composition in Physics.- On the Functor 2.- Quantum Speedup and Categorical Distributivity.- Unifying Semantics for Concur-rent Programming.- Unfixing the Fixpoint: The Theories of the λY -Calculus.- Continuous Do-main Theory in Logical Form.- Presheaf Models of Quantum Computation: An Outline.- Nothing Can Be Fixed.- Dialogue Categories and Frobenius Monoids.- Anatomy of a Domain of Continu-ous Random Variables II.- Towards Nominal Abramsky.- Techniques for Formal Modelling and Analysis of Quantum Systems.- Quantum Field Theory for Legspinners.- Bicompletions of Distance Matrices.- Partial Recursive Functions and Finality.- Breaking the Atom with Samson.- Reasoning about Strategies.- Domain Theory in Topical Form.- Kolmogorov Complexity of Categories.

Fields of interestLogics and Meanings of Programs; Computation by Abstract Devices; Mathematical Logic and Formal Languages

Target groupsResearch

Product categoryContributed volume

Available

2013. XX, 363 p. 26 illus. (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues, Volume 7860) Softcover7 * € (D) 57,78 | € (A) 59,40 | sFr 72,007 € 54,00 | £48.99ISBN 978-3-642-38163-8

9<HTOGPC=dibgdi>

U.‑D. Ehlers, Baden-Wuerttemberg Cooperative State University, Stuttgart, Germany

Open Learning CulturesA Guide to Quality, Evaluation, and Assessment for Future Learning

Today we are seeing a new form of blended learn-ing: not only is technology enhancing the learning environment but formal and informal learning are combining and there is self- and peer-assessment of results. Open learning cultures are challeng-ing the old and long-practiced methods used by educators and transforming learning into a more student-driven and independent activity , which uses online tools such as blogs, wikis or podcasts to connect resources, students and teachers in a novel way. While in higher education institutions most assessments are still tied to formal learning scenarios, teachers are more and more bound to recognize their students’ informal learning pro-cesses and networks. This book will help teachers, lecturers and students to better understand how open learning landscapes work, how to define quality and create assessments in such environ-ments, and how to apply these new measures.

Features 7 Details the influence of collaborative web-based technology on learning environments and learning behavior 7 Provides educators, teachers, lecturers and students with a practical guide to developing customized quality concepts in open learning environments 7 Includes guidelines, templates and use cases to facilitate the practical implementation of the methods presented 7 Presents a concept of quality control and assessments as an integral part of learning processes

Fields of interestAssessment, Testing and Evaluation; Computers and Education; Educational Technology

Target groupsProfessional/practitioner

Product categoryProfessional book

Due July 2013

2013. X, 241 p. 38 illus., 7 in color. Hardcover7 * € (D) 85,59 | € (A) 87,99 | sFr 106,507 € 79,99 | £72.00ISBN 978-3-642-38173-7

9<HTOGPC=dibhdh>

B. Furht, Florida Atlantic University, Boca Raton, FL, USA

Survey of Cloud ComputingSpringerBriefs present concise summaries of cutting-edge research and practical applica-tions across a wide spectrum of fields. Featuring compact volumes of 50 to 100 pages, the series covers a range of content from professional to academic. Briefs allow authors to present their ideas and readers to absorb them with minimal time investment. As part of Springer’s eBook col-lection, SpringBriefs are published to millions of users worldwide. A Survey of Cloud Computing covers a wide range of topics making it a great tool for anyone looking for a quick, yet comprehen-sive reference on this subject. Cloud computing has become a significant technology trend, and many experts expect that cloud computing will reshape information technology processes and the IT marketplace. This new web based technology can be used with a variety of devices, including PCs, laptops, smart phones, and PDAs to access programs, storage, and application-development platforms over the Internet. Covering key topics like cloud computing, cloud architecture, and cloud platforms, this book is a great reference for practitioners, academicians, researchers, and students.

Field of interestComputer Communication Networks

Target groupsProfessional/practitioner

Product categoryBrief

Due December 2014

2015. V, 70 p. 20 illus. (SpringerBriefs in Computer Science) Softcover7 approx. * € (D) 42,75 | € (A) 43,95 | sFr 39,507 approx. € 39,95 | £26.99ISBN 978-1-4614-2040-8

9<HTMERB=ecaeai>

Page 5: Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

Computer Science springer.com/NEWSonline

86

U. Gellert, A. D. Cristea, S+P LION AG, Heddesheim, Germany

Web Dynpro ABAP for PractitionersWeb Dynpro ABAP, a NetWeaver web applica-tion user interface tool from SAP, enables web programming connected to SAP Systems. The authors’ main focus was to create a book based on their own practical experience. Each chapter includes examples which lead through the content step-by-step and enable the reader to gradually explore and grasp the Web Dynpro ABAP process.

Features 7 Step-by-step-introduction into Web Dyn-pro ABAP 7 Practical examples for every step 7 Integration of the Web Dynpro applica-tion into the SAP NetWeaver portal

Contents What is Web Dynpro?.- SAP Easy Access.- De-signing a Web Dynpro Component.- ABAP Dic-tionary.- Context Nodes and Attributes at Design Time.- Data Binding, Context Mapping and Inter-face Methods.- View Controller Methods.- Layout UI Elements.- User Interface Elements.- Messages, Exceptions, and Web Dynpro ABAP.- Writ-ing Multilanguage Applications.- Web Dynpro Model.- ALV and Select Options.- Integrating the Web Dynpro Application into the SAP NetWeaver Portal.- Web Dynpro and Authorization.- Web Dynpro ABAP Mind Map.- Power Lists.- Modal Windows and External Windows.- Web Dynpro appliction paramters.- Shared Objects.- Business Server Pages (BSP).- Multilanguage E-mails.- In-dex.

Fields of interestSoftware Engineering/Programming and Operat-ing Systems; Information Systems and Communi-cation Service; Operating Systems

Target groupsProfessional/practitioner

Product categoryProfessional book

Due July 2013

2nd ed. 2013. X, 270 p. 700 illus., 699 in color. Hardcover7 * € (D) 64,19 | € (A) 65,99 | sFr 80,007 € 59,99 | £53.99ISBN 978-3-642-38246-8

9<HTOGPC=dicegi>

C. Gerth, University of Paderborn, Germany

Business Process ModelsChange Management

Driven by the need for a closer alignment of business and IT requirements, the role of business process models in the development of enterprise software systems has increased continuously. Similar to other software artifacts, process models are developed and refined in team environments by several stakeholders, resulting in different ver-sions. These versions need to be merged in order to obtain an integrated process model. Existing solutions to this basic problem in the field of software configuration management are mainly limited to textual documents, e.g., source code. This monograph presents a generally applicable framework for process model change manage-ment, which provides easy-to-use comparison and merging capabilities for the integration of different process model versions. The framework supports popular modeling languages such as BPMN, BPEL, or UML Activity Diagrams. Dif-ferences between process models are represented in terms of intuitive, high-level change opera-tions. Equipped with a sophisticated analysis of dependencies and a semantic-aware computation of conflicts between differences, the framework constitutes a comprehensive and practically usable solution for process model change management in the model-driven development of enterprise software systems.

Features 7 Gives a modern approach 7 Unique visibil-ity 7 State of the art

Fields of interestInformation Systems Applications (incl.Internet); Software Engineering; Computers and Society

Target groupsResearch

Product categoryMonograph

Due June 2013

2013. XVI, 246 p. (Lecture Notes in Computer Science / Information Systems and Applications, incl. Internet/Web, and HCI, Volume 7849) Softcover7 approx. * € (D) 49,22 | € (A) 50,60 | sFr 61,507 approx. € 46,00 | £41.99ISBN 978-3-642-38603-9

9<HTOGPC=digadj>

J. Graba, Sheffield Hallam University, UK

An Introduction to Network Programming with JavaJava 7 Compatible

Since the second edition of this text, the use of the Internet and networks generally has continued to expand at a phenomenal rate. This has led to both an increase in demand for network software and to improvements in the technology used to run such networks, with the latter naturally leading to changes in the former. During this time, the Java libraries have been updated to keep up with the new developments in network technology, so that the Java programming language continues to be one of the mainstays of network software develop-ment. In providing a very readable text that avoids getting immersed in low-level technical details, while still providing a useful, practical guide to network programming for both undergraduates and busy IT professionals, this third edition con-tinues the trend of its predecessors.

Features 7 Revised third edition has been fully updated to incorporate Java 7 compatibility 7 Includes many end-of-chapter exercises 7 Features nu-merous code examples

Contents Preface.- Basic Concepts, Protocols and Ter-minology.- Starting Network Programming in Java.- Multithreading and Multiplexing.- File Handling.- Remote Method Invocation (RMI).- CORBA.- Java Database Connectivity.- Servlets.- JavaServer Pages (JSPs).- JavaBeans.- Multime-dia.- Applets.- Appendix A – Structured Query Language (SQL).- Index.

Fields of interestComputer Communication Networks; Input/Output and Data Communications; Software En-gineering/Programming and Operating Systems

Target groupsLower undergraduate

Product categoryUndergraduate textbook

Due July 2013

Originally published by Addison-Wesley

3rd ed. 2014. X, 409 p. 82 illus., 22 in color. Softcover7 * € (D) 48,14 | € (A) 49,49 | sFr 60,007 € 44,99 | £40.95ISBN 978-1-4471-5253-8

9<HTMEPH=bfcfdi>

Page 6: Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

News 6/2013 Computer Science

87

L. Hempel, Technical University of Berlin, Germany; A. Sasse, University College London, UK

Human TargetHuman Target provides a comprehensive coverage of computer security and security management. Dr. Leon Hempel explores the legal and ethical is-sues surrounding the topic, and Prof. Angela Sasse analyses the technical aspects. The two comple-mentary sections contribute to a formidable Brief.

Contents Foreword.- Non-technical Aspects.- Technical Aspects.

Fields of interestUser Interfaces and Human Computer Interaction; Systems and Data Security; Industrial, Organisa-tional and Economic Psychology

Target groupsResearch

Product categoryBrief

Due August 2013

2014. X, 90 p. 7 illus. (SpringerBriefs in Cybersecurity) Softcover7 approx. * € (D) 42,79 | € (A) 43,99 | sFr 53,507 approx. € 39,99 | £35.99ISBN 978-1-4471-5130-2

9<HTMEPH=bfbdac>

G. Jakus, University of Ljubljana, Slovenia; V. Milutinović, University of Belgrade, Serbia; S. Omerović, S. Tomažič, University of Ljubljana, Slovenia

Concepts, Ontologies, and Knowledge RepresentationRecording knowledge in a common framework that would make it possible to seamlessly share global knowledge remains an important challenge for researchers. This brief examines several ideas about the representation of knowledge addressing this challenge. A widespread general agreement is followed that states uniform knowledge represen-tation should be achievable by using ontologies populated with concepts. A separate chapter is dedicated to each of the three introduced topics, following a uniform outline: definition, organi-zation, and use. This brief is intended for those who want to get to know the field of knowledge representation quickly, or would like to be up to date with current developments in the field. It is also useful for those dealing with implementation as examples of numerous operational systems are also given.

Contents Introduction.- Concepts.- Ontologies.- Knowledge Representation.- Trends and Outlook.

Fields of interestInformation Storage and Retrieval; Multimedia Information Systems; Models and Principles

Target groupsResearch

Product categoryBrief

Due June 2013

2013. VI, 128 p. 33 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £35.99ISBN 978-1-4614-7821-8

9<HTMERB=ehicbi>

X. Jia, K. Yang, City University of Hong Kong, Kowloon, Hong Kong

Security for Cloud Storage SystemsCloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services intro-duces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers for access control. To protect the data integrity in the cloud, an efficient and secure dynamic auditing protocol is introduced, which can support dynamic auditing and batch auditing. To ensure the data security in the cloud, two ef-ficient and secure data access control schemes are introduced in this brief: ABAC for Single-author-ity Systems and DAC-MACS for Multi-authority Systems. While Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data, the exist-ing schemes cannot be directly applied to data access control for cloud storage systems because of the attribute revocation problem. To solve the attribute revocation problem, new Revocable CP-ABE methods are proposed in both ABAC and DAC-MACS.

Contents Introduction.- TSAS: Third-party Storage Audit-ing Service.- ABAC: Attribute-Based Access Con-trol.- DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems.

Fields of interestSystems and Data Security; Data Encryption

Target groupsResearch

Product categoryBrief

Due July 2013

2014. X, 88 p. 11 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £35.99ISBN 978-1-4614-7872-0

9<HTMERB=ehihca>

Page 7: Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

Computer Science springer.com/NEWSonline

88

R. Y. Lee, Central Michigan University, Mount Pleasant, MI, USA

Software Engineering: A Hands-On ApproachThis textbook provides a progressive approach to the teaching of software engineering. First, readers are introduced to the core concepts of the object-oriented methodology, which is used throughout the book to act as the foundation for software en-gineering and programming practices, and partly for the software engineering process itself.

Features 7 A software engineering textbook for learn-ing core concepts and practical skills 7 Over 70 easy-to-follow diagrams and tables depicting concepts and tools used in software engineer-ing 7 A special chapter outlining the completion of a hands-on project with templates and examples makes the concepts learned more concrete 7 The comprehensive layout and selection of chapters show the important processes and underlying knowledge to complete a software engineering project

Contents Introduction to Software Engineering.- Object-Oriented Concepts.- Modeling with UML.- Starting the Project.- Requirements Elicitation.- Object-Oriented Analysis.- System Design.- Object-Oriented Design.- Implementa-tion.- Testing.- Project Wrap-up, Delivery, and Maintenance.-  Software Metrics and Measure-ments.- Hands-On Software Engineering Project.

Fields of interestComputer Imaging, Vision, Pattern Recognition and Graphics; Models and Principles; Computer Science, general

Target groupsUpper undergraduate

Product categoryGraduate/Advanced undergraduate textbook

Due June 2013

2013. XXIV, 285 p. 70 illus., 3 in color. Hardcover7 * € (D) 64,19 | € (A) 65,99 | sFr 80,007 € 59,99 | £53.99ISBN 978-94-6239-005-8

9<HTUERC=djaafi>

K. Markantonakis, K. Mayes, Royal Holloway, University of London, Egham, UK (Eds)

Secure Smart Embedded Devices, Platforms and ApplicationsContents An Introduction to Smart Cards and RFIDs.- Embedded DSP Devices.- Microprocessors & Microcontrollers Security.- An Introduction to the Trusted Platform Module and Mobile Trusted Module.- Hardware and VLSI Designs.- Infor-mation Security Best Practices.- Smart Card Security.- Graphics Processing Units.- A Survey of Recent Results in FPGA Security and Intellectual Property Protection.- Mobile Communication Security Controllers.- Security of Embedded Loca-tion Systems.- Automotive Embedded Systems.- Analysis of Potential Vulnerabilities in Payment Terminals.- Wireless Sensor Nodes.- Near Field Communication.- The BIOS and Rootkits.- Hard-ware Security Modules.- Security Evaluation and Common Criteria.- Physical Security Primitives.- SCADA System Cyber Security.- An Overview of PIC Microcontrollers and their Suitability for Cryptographic Algorithms.- An Introduction to Java Card Programming.- A Practical Example of Mobile Phone Application using SATSA (JSR 177) API.- Wireless Sensors(Languages/Programming/Developments/Tools/Examples).

Fields of interestSystems and Data Security; Data Structures, Cryptology and Information Theory; Information Systems Applications (incl.Internet)

Target groupsResearch

Product categoryContributed volume

Due July 2013

2014. XXXVI, 560 p. 135 illus. Hardcover7 * € (D) 117,69 | € (A) 120,99 | sFr 146,507 € 109,99 | £99.00ISBN 978-1-4614-7914-7

9<HTMERB=ehjbeh>

X. Meng, Renmin University of China, Beijing, China; Z. Ding, J. Xu, Chinese Academy of Sciences, Beijing, China

Moving Objects ManagementModels, Techniques and Applications, 2nd Edition

Applications, 2nd Edition focuses on moving object management, from the location manage-ment perspective to determining how constantly changing locations affect the traditional database and data mining technology.

Features 7 Significantly reorganized and expanded second edition includes not only basic theories and new concepts but also practical technologies and ap-plications 7 Updates novel database techniques in modeling, location tracking, indexing, querying as well as data mining in clustering analysis of moving objects 7 Updates the latest research on location privacy, uncertainty management and traffic flow analysis of moving objects 7 Presents a typical application of moving objects manage-ment in intelligent transportation systems

Contents Introduction.- Moving Objects Modeling.- Mov-ing Objects Tracking.- Moving Objects Indexing.- Moving Objects Basic Querying.- Moving Objects Advanced Querying.- Trajectory Prediction of Moving Objects.- Uncertainty Management in Moving Objects Database.- Statistical Analysis on Moving Object Trajectories.- Clustering Analysis of Moving Objects.- Dynamic Transportation Navigation.- Location Privacy.

Fields of interestDatabase Management; Transportation; Geo-graphical Information Systems/Cartography

Target groupsResearch

Product categoryMonograph

Due August 2014

Jointly published with Tsinghua University Press, Beijing

Distribution rights in China : Tsinghua University Press

2nd ed. 2014. 237 p. 105 illus., 10 in color. Hardcover7 approx. * € (D) 149,79 | € (A) 153,99 | sFr 186,507 approx. € 139,99 | £126.00ISBN 978-3-642-38275-8

9<HTOGPC=dichfi>

Page 8: Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

News 6/2013 Computer Science

89

F. Mogavero, Università degli Studi di Napoli Federico II, Italy

Logics in Computer ScienceA Study on Extensions of Temporal and Strategic Logics

In this monograph we introduce and examine four new temporal logic formalisms that can be used as specification languages for the automated verifica-tion of the reliability of hardware and software designs with respect to a desired behavior. The work is organized in two parts. In the first part two logics for computations, the graded computa-tion tree logic and the computation tree logic with minimal model quantifiers are discussed. These have proved to be useful in describing correct ex-ecutions of monolithic closed systems. The second part focuses on logics for strategies, strategy logic and memoryful alternating-time temporal logic, which have been successfully applied to formalize several properties of interactive plays in multi-entities systems modeled as multi-agent games.

Features 7 Provides four extensions of classic temporal and strategic logics 7 Comprises new results on expressiveness and succinctness of logics in computer science 7 Includes new techniques for proving upper and lower computational bounds

Contents Graded Computation Tree Logic.- Minimal Model Quantifiers.- Reasoning About Strategies.- Relent-ful Strategic Reasoning.- Appendix A Mathemati-cal Notation.

Fields of interestLogics and Meanings of Programs; Mathematical Logic and Formal Languages; Algorithm Analysis and Problem Complexity

Target groupsProfessional/practitioner

Product categoryMonograph

Due July 2013

2013. XVII, 174 p. 13 illus. (Atlantis Studies in Computing, Volume 3) Hardcover7 * € (D) 90,94 | € (A) 93,49 | sFr 113,507 € 84,99 | £76.50ISBN 978-94-91216-94-7

9<HTUEUB=cbgjeh>

G. O’Toole, Pennsylvania State University, University Park, PA, USA

Sustainable Web Ecosystem DesignThis book is about the process of creating web-based systems (i.e., websites, content, etc.) that consider each of the parts, the modules, the organisms – binary or otherwise – that make up a balanced, sustainable web ecosystem. In the current media-rich environment, a website is more than a collection of relative html documents of text and images on a static desktop computer monitor. There is now an unlimited combination of screens, devices, platforms, browsers, locations, versions, users, and exabytes of data with which to interact. Written in a highly approachable, practical style, this book is useful for stakehold-ers, system administrators, developers, designers, content managers, and the anonymous web user in industry, as well as faculty, staff, and students of all levels involved in teaching and learning in information technology.

Contents Introduction: Discovering Where We Are Not.- Seeing Where We Need to Be.- Getting There: Landing an Onion on Mars.- The Necessity of A Sustainable Web Ecosystem.- The Real Discovery: The Web is Glial.- Web User Research.- The Proj-ect.- Project Management.- Architecture.- Func-tionality.- Image.- Writing.- Code.- Web Hosting.- Post Launch.- Education.- Policy.- Philosophy of Technology.- Conclusion.

Fields of interestSoftware Engineering/Programming and Operat-ing Systems; User Interfaces and Human Com-puter Interaction

Target groupsResearch

Product categoryBrief

Due June 2013

2013. XIV, 118 p. 6 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £35.99ISBN 978-1-4614-7713-6

9<HTMERB=ehhbdg>

M. Raynal, Université de Rennes, France

Distributed Algorithms for Message-Passing SystemsFeatures 7 Constitutes an introduction to distrib-uted computing 7 Author among the leading researchers in the area of distributed comput-ing 7 Textbook features include summaries, keywords, bibliographic notes and exercises for each chapter

Contents Part I  Distributed Graph Algorithms.- Chap. 1  Base Definitions and Network Traversal Algo-rithms.- Chap. 2  Distributed Graph Algorithms.- Chap. 3  An Algorithmic Framework to Compute Global Functions on a Process Graph.- Chap. 4  Leader Election Algorithms.- Chap. 5  Mobile Ob-jects Navigating a Network.- Part II  Logical Time and Global States in Distributed Systems.- Chap. 6  Nature of Distributed Computations and the Concept of a Global State.- Chap. 7  Logical Time in Asynchronous Distributed Systems.- Chap. 8  Asynchronous Distributed Checkpointing.- Chap. 9  Simulating Synchrony on Top of Asynchronous Systems.- Part III  Mutual Exclusion and Resource Allocation.- Chap. 10  Permission-Based Mutual Exclusion Algorithms.- Chap. 11  Distributed Resource Allocation.- Part IV  High-Level Com-munication Abstractions.- Chap. 12  Order Constraints on Message Delivery.- Chap. 13  Rendezvous and Synchronous Communication.- Part V  Detection of Properties on Distributed Executions.- Chap. 14  Distributed Termination Detection.- Chap. 15  Distributed Deadlock Detection.- Part VI  Distributed Shared Memory.- Chap. 16  Atomic Consistency (Linearizability).- Chap. 17  Sequential Consistency.- Afterword.- Bibliography.- Index.

Fields of interestTheory of Computation; Computer Communica-tion Networks; Programming Techniques

Target groupsUpper undergraduate

Product categoryGraduate/Advanced undergraduate textbook

Due July 2013

2013. XXVIII, 490 p. 314 illus., 107 in color. Hardcover7 * € (D) 64,19 | € (A) 65,99 | sFr 80,007 € 59,99 | £53.99ISBN 978-3-642-38122-5

9<HTOGPC=dibccf>

Page 9: Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

Computer Science springer.com/NEWSonline

90

S. Rockcastle, M. Andersen, Ecole Polytechnique Fédérale de Lausanne, Switzerland

Annual Dynamics of Daylight Variability and ContrastA Simulation‑Based Approach to Quantifying Visual Effects in Architecture

Daylight is a dynamic source of illumination in ar-chitectural space, creating diverse and ephemeral configurations of light and shadow within the built environment. Perceptual qualities of daylight, such as contrast and temporal variability, are essential to our understanding of both material and visual effects in architecture. Although spatial contrast and light variability are fundamental to the visual experience of architecture, architects still rely primarily on intuition to evaluate their designs because there are few metrics that address these factors. Through an analysis of contemporary architecture, this work develops a new typological language that categorizes architectural space in terms of contrast and temporal variation.

Features 7 Introduces a new typological language that categorizes architectural space in terms of contrast and temporal variation 7 Proposes a new family of metrics that quantify the magnitude of contrast-based visual effects and time-based variation within daylit spaces 7 Demonstrates how, through the use of time-segmented daylight renderings, a more holistic analysis of daylight performance is made possible

Contents Introduction.- Research Context.- Architectural Context.- Defining New Metrics for Contrast and Variability.- Application of Metrics to Abstract Spatial Models.- Application of Metrics to De-tailed Case Studies.- Conclusion.

Fields of interestSimulation and Modeling; Architecture, general

Target groupsResearch

Product categoryBrief

Due June 2013

2013. VII, 84 p. 84 illus., 27 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £35.99ISBN 978-1-4471-5232-3

9<HTMEPH=bfcdcd>

A. Schmidt‑Richberg

Registration Methods for Pulmonary Image AnalysisIntegration of Morphological and Physiological Knowledge

Various applications in the field of pulmonary image analysis require a registration of CT images of the lung. For example, a registration-based estimation of the breathing motion is employed to increase the accuracy of dose distribution in radiotherapy. Alexander Schmidt-Richberg develops methods to explicitly model morphologi-cal and physiological knowledge about respiration in algorithms for the registration of thoracic CT images. Two lung-specific issues are in the focus: on the one hand, the alignment of the interlobular fissures and on the other hand, the estimation of sliding motion at the lung boundaries. It is shown that by explicitly considering these aspects based on a segmentation of the respective structure, reg-istration accuracy can be significantly improved.

Feature 7 Publication in the field of natural sciences

Contents Registration.- Segmentation.- Level Set Segmenta-tion.- Motion Estimation.- Sliding Motion.- Inte-grated Registration and Segmentation .

Fields of interestComputer Science, general; Health Informatics

Target groupsResearch

Product categoryMonograph

Due June 2013

2013. Approx. 190 p. (Aktuelle Forschung Medizintechnik, Volume 3) Softcover7 approx. * € (D) 74,89 | € (A) 76,99 | sFr 93,507 approx. € 69,99 | £62.99ISBN 978-3-658-01661-6

9<HTOGQI=abggbg>

N. K. Singh, University of York, UK

Using Event-B for Critical Device Software SystemsDefining a new development life-cycle methodol-ogy, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation). This is assessed and evaluated via a standard case study: the cardiac pacemaker. Additionally a formalisation of an Electrocardiogram (ECG) is used to identify anomalies in order to improve existing medical protocols. This allows the key issue - that formal methods are not currently integrated into estab-lished critical systems development processes - to be discussed in a highly effective and informative way.

Features 7 Presents an innovative development approach for critical systems and prototype implementa-tion 7 Discusses the automization of critical system development, from requirements analysis to code generation 7 Provides a novel approach for medical protocol verification, which can help to verify the diagnosis process

Contents Preface.- Introduction.- Background.- The Modelling Framework: Event-B.- Critical System Development Methodology.- Real-Time Anima-tor and Requirements Traceability.- Refinement Chart.- EB2ALL: An Automatic Code Generator Tool.- Formal Logic Based Heart-Model.- The Cardiac Pacemaker.- Electrocardiogram (ECG).- Conclusion.- Appendix A: Certification Stan-dards.- Index.

Fields of interestMathematical Logic and Formal Languages; Soft-ware Engineering; Health Informatics

Target groupsResearch

Product categoryMonograph

Due July 2013

2014. XVI, 320 p. 47 illus. Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £85.95ISBN 978-1-4471-5259-0

9<HTMEPH=bfcfja>

Page 10: Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

News 6/2013 Computer Science

91

H. Stübing, Darmstadt, Germany

Multilayered Security and Privacy Protection in Car-to-X NetworksSolutions from Application down to Physical Layer

Car-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic information. Thereby, security and privacy are re-garded as an absolute prerequisite for successfully establishing the C2X technology on the market. Towards the paramount objective of covering the entire ITS reference model with security and privacy measures, Hagen Stübing develops dedicated solutions for each layer, respectively. On application layer a security architecture in terms of a Public Key Infrastructure is presented, which provides low complexity and operational costs, while at the same time security and privacy con-straints are preserved. On facility layer comple-mentary security solutions based on mobility data verification are proposed, which promise efficient message content protection at a low computational complexity.

Feature 7 Publication in the field of technical science

Contents Security and Privacy in Car-to-X Communication Networks.- Public Key Infrastructure.- Mobility Data Verification.- Privacy Protocols.- Secure Car-to-X Beamforming.

Fields of interestInput/Output and Data Communications; Com-puter Systems Organization and Communication Networks

Target groupsResearch

Product categoryPh.D. Thesis

Due June 2013

2013. XVII, 191 p. 82 illus., 26 in color. Softcover7 * € (D) 69,99 | € (A) 71,95 | sFr 87,507 € 65,41 | £58.99ISBN 978-3-658-02530-4

9<HTOGQI=acfdae>

M. A. Treiber, ASM Assembly Systems GmbH & Co. KG, Munich, Germany

Optimization for Computer VisionAn Introduction to Core Concepts and Methods

This practical and authoritative text/reference presents a broad introduction to the optimization methods used specifically in computer vision. In order to facilitate understanding, the presentation of the methods is supplemented by simple flow charts, followed by pseudocode implementations that reveal deeper insights into their mode of operation. These discussions are further supported by examples taken from important applications in computer vision.

Features 7 Presents a comprehensive overview of topics of relevance to computer vision-related optimiza-tion 7 Facilitates understanding by focusing on the fundamental concepts, and providing clearly written and easy-to-follow explanations 7 Sup-plies detailed information on how to implement specific methods, such as pseudocode

Contents Introduction.- Continuous Optimization.- Linear Programming and the Simplex Method.- Varia-tional Methods.- Correspondence Problems.- Graph Cuts.- Dynamic Programming.

Fields of interestImage Processing and Computer Vision; Optimi-zation

Target groupsResearch

Product categoryMonograph

Due July 2013

2014. XII, 248 p. 104 illus., 90 in color. (Advances in Computer Vision and Pattern Recognition) Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £79.95ISBN 978-1-4471-5282-8

9<HTMEPH=bfcici>

A. Tympas, National and Kapodistrial University of Athens, Greece

Calculation and Computation in the Pre-electronic EraThe Mechanical and Electrical Ages

Features 7 Offers an introduction to the history of com-puting during the ‘first’ (steam) and the ‘second’ (electricity) industrial revolution 7 All scientists and engineers will find this book easily under-standable and free from unnecessary historio-graphical jargon

Contents Part I.- Calculating New Power: Steam Gen-eration.- Calculating More Power: Electricity Transmission.- Calculating Total Power: Nuclear Hit.- Part II.- Artifacts.- Uses.- Comparisons and Classifications.

Field of interestHistory of Computing

Target groupsResearch

Product categoryMonograph

Due August 2013

2014. Approx. 230 p. (History of Computing) Hardcover7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 115,007 approx. € 79,95 | £59.95ISBN 978-1-84882-741-7

9<HTMIPI=ichebh>

Page 11: Edith Cowan University, Joondalup, WA, University of …static.springer.com/sgw/documents/1398611/application/...ing techniques applied to geoinformatic problems of high complexity

Computer Science springer.com/NEWSonline

92

S. Xiao, Hunan University, Changsha, China; W. Gong, D. Towsley, University of Massachusetts Amherst, MA, USA

Dynamic Secrets in Communication SecurityDynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure commu-nication systems, a stolen key or password can be quickly and automatically reverted to its secret sta-tus without disrupting communication. Dynamic Secrets in Communication Security presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when par-ties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are de-tected even if an adversary steals a user’s password or their key is lost. Practitioners and researchers working in network security or wireless communi-cations will find this book a must-have reference. Dynamic Secrets in Communication Security is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

Features 7 Presents unique security properties and application studies for dynamic secrets 7 Com-pares dynamic secrets with conventional forms of secrets such as passwords and cryptographic keys using theoretical analysis and daily life analo-gies 7 Includes a case study on wireless medical devices and smart grid communications as ex-amples for the practicality of dynamic secrets

Fields of interestSystems and Data Security; Computer Communi-cation Networks; Data Encryption

Target groupsProfessional/practitioner

Product categoryMonograph

Due August 2013

2014. V, 145 p. 50 illus. Hardcover7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 107,507 approx. € 79,95 | £73.00ISBN 978-1-4614-7830-0

9<HTMERB=ehidaa>