0% found this document useful (0 votes)
28 views15 pages

Game of Life Cellular Automata

Uploaded by

ardy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views15 pages

Game of Life Cellular Automata

Uploaded by

ardy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/253231764

Game of Life Cellular Automata

Book · January 2010


DOI: 10.1007/978-1-84996-217-9

CITATIONS READS

155 4,334

1 author:

Andrew Adamatzky
University of the West of England, Bristol
872 PUBLICATIONS 13,721 CITATIONS

SEE PROFILE

All content following this page was uploaded by Andrew Adamatzky on 02 September 2014.

The user has requested enhancement of the downloaded file.


springer.com/NEWSonline Springer News 7/8/2010 Computer Science 73

A. Adamatzky, University of the West of England, M. R. Berthold, Konstanz University, Germany; R. Böhme, Technische Universität Dresden, Germany
UK (Ed.) C. Borgelt, European Center for Soft Computing,
Mieres, Spain; F. Höppner, Ostfalia University of Advanced Statistical
Game of Life Cellular Applied Sciences, Wolfsburg, Germany; F. Klawonn,
Steganalysis
Ostfalia University of Applied Sciences,
Automata Wolfenbuettel, Germany
Steganography is the art and science of hiding
In the late 1960s British mathematician John Guide to Intelligent Data information in inconspicuous cover data so
Conway invented a virtual mathematical machine that even the existence of a secret message is
that operates on a two-dimensional array of square Analysis kept confidential, and steganalysis is the task of
cell. Each cell takes two states, live and dead. The How to Intelligently Make Sense of Real Data detecting secret messages in covers. This research
cells’ states are updated simultaneously and in monograph focuses on the role of cover signals,
discrete time. A dead cell comes to life if it has Each passing year bears witness to the develop- the distinguishing feature that requires us to treat
exactly three live neighbours. A live cell remains ment of ever more powerful computers, increas- steganography and steganalysis differently from
alive if two or three of its neighbours are alive, ingly fast and cheap storage media, and even other secrecy techniques. The main theoretical
otherwise the cell dies. Conway’s Game of Life higher bandwidth data connections. This makes it contribution of the book is a proposal to structure
became the most programmed solitary game and easy to believe that we can now – at least in prin- approaches to provably secure steganography
the most known cellular automaton. ciple – solve any problem we are faced with so long according to their implied assumptions on the
as we only have enough data. Yet this is not the limits of the adversary and on the nature of covers.
Features case. Although large databases allow us to retrieve A further contribution is the emphasis on dealing
7 Simple to understand examples of cellular many different single pieces of information and with heterogeneity in cover distributions, crucial
automata dynamics 7 Abundance of illustra- to compute simple aggregations, general patterns for security analyses. The author’s work comple-
tions, working examples, and codes 7 Efficient and regularities often go undetected. Further- ments earlier approaches based on information,
techniques for evaluating space-time dynamics more, it is exactly these patterns, regularities and complexity, probability and signal processing
of discrete non-linear systems 7 References to trends that are often most valuable. To avoid the theory, and he presents numerous practical impli-
online interacting demonstrations 7 Overview danger of “drowning in information, but starving cations. The scientific advances are supported by
of exciting concepts at the edge of mathematics, for knowledge” the branch of research known as a survey of the classical steganography literature;
computer science, engineering and physics data analysis has emerged, and a considerable a new proposal for a unified terminology and
number of methods and software tools have been notation that is maintained throughout the book; a
From the contents developed. However, it is not these tools alone but critical discussion of the results achieved and their
1. Introduction to Cellular Automata and Conway’s the intelligent application of human intuition in limitations; and an assessment of the possibility of
Game of Life.- Part I Historical.- 2. Conway’s combination with computational power, of sound transferring elements of this research’s empirical
Game of Life: Early Personal Recollections.- background knowledge with computer-aided perspective to other domains in information
3. Conway’s Life.- 4. Life’s Still Lifes.- 5. A Zoo of modeling, and of critical reflection with conve- security.
Life Forms.- Part II Classical Topics.- 6. Growth nient automatic model construction, that results in
and Decay in Life-Like Cellular Automata.- successful intelligent data analysis projects. Features
7. The B36/S125 “2x2” Life-Like Cellular 7 The first book dedicated to modern steganog-
Automaton.- 8. Object Synthesis in Conway’s Features raphy and steganalysis 7 The scientific advances
Game of Life and other Cellular Automata.- 7 Presents a broad-range of perspectives on data are complemented by a survey of the classical
9. Gliders and Glider Guns Discovery in Cellular analysis, providing readers with a comprehensive steganography literature 7 Author presents
Automata.- 10. Constraint Programming to Solve account of the field 7 Focuses on the practical numerous practical implications of his work
Maximal Density Still Life.- Part III Asynchronous, aspects as well as presenting the theory compre-
Continuous and Memory-Enriched Automata.- hensively 7 A special emphasis is given to put From the contents
11. Larger than Life’s Extremes: Rigorous Results on pointing out the pitfalls that lead to wrong Introduction.- Principles of Modern Steganog-
for Simplified Rules and Speculation on the Phase or insufficient analysis of results 7 Hands-on raphy and Steganalysis.- Towards a Theory of
Boundaries.- 12. RealLife.- 13. Variations on the examples are given to provide readers with further Cover Models.- Detection of Model-Based Steg-
Game of Life. insight into the topic anography with First-Order Statistics.

Fields of interest Fields of interest Fields of interest


Theory of Computation; Computation by Abstract Artificial Intelligence (incl. Robotics) Image Processing and Computer Vision; Data
Devices; Discrete Mathematics in Computer Encryption; Signal, Image and Speech Processing
Science Target groups
Graduate Target groups
Target groups Research
Research Type of publication
Graduate/Advanced undergraduate textbook Type of publication
Type of publication Monograph
Monograph

Due August 2010 Due August 2010


Due September 2010
2010. XII, 397 p. (Texts in Computer Science, Volume 42) 2010. XII, 285 p. (Information Security and
2010. XVI, 621 p. 926 illus., 463 in color. Hardcover Hardcover Cryptography) Hardcover
7 €119,95 | £108.00 7 approx. € 69,95 | £55.00 7 approx. € 79,95 | £72.00
7 * € (D) 128,35 | € (A) 131,95 | sFr 186,50 7 approx. * € (D) 74,85 | € (A) 76,95 | sFr 109,00 7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50
ISBN 978-1-84996-216-2 ISBN 978-1-84882-259-7 ISBN 978-3-642-14312-0

9<HTMIPJ=jgcbgc> 9<HTMIPI=ic fjh> 9<HTOGPC=bedbca>


74 Computer Science Springer News 7/8/2010 springer.com/NEWSonline

P. Borba, Universidade Federal de Pernambuco, C. Care, University of Warwick, Coventry, UK Ò. Celma, BMAT, Barcelona, Spain
Recife, PE, Brazil; A. Cavalcanti, University of York,
UK; A. Sampaio, Universidade Federal de Technology for Modelling Music Recommendation and
Pernambuco, Recife, PE, Brazil; J. Woodcook,
University of York, UK (Eds.) Electrical Analogies, Engineering Practice, Discovery
and the Development of Analogue The Long Tail, Long Fail, and Long Play in the
Testing Techniques in Computing Digital Music Space
Software Engineering Historians have different views on the core identity With so much more music available these days,
Second Pernambuco Summer School on of analogue computing. Some portray the tech- traditional ways of finding music have diminished.
Software Engineering, PSSE 2007, Recife, nology solely as a precursor to digital computing, Today radio shows are often programmed by large
Brazil, December 3-7, 2007, Revised Lectures whereas others stress that analogue applications corporations that create playlists drawn from a
existed well after 1940. Even within contemporary limited pool of tracks. Similarly, record stores
This tutorial book presents an augmented selection sources, there is a spectrum of understanding have been replaced by big-box retailers that have
of the material presented at the Second Pernam- around what constitutes analogue computing. ever-shrinking music departments. Instead of
buco Summer School on Software Engineering, To understand the relationship between analogue relying on DJs, record-store clerks or their friends
PSSE 2007, held in Receife, Brazil in December and digital computing, and what this means for for music recommendations, listeners are turning
2007. users today, the history must consider how the to machines to guide them to new music.In this
The 8 contributions are the thoroughly revised technology is used. Technology for Modelling book, Òscar Celma guides us through the world of
versions of the papers presented by the invited investigates the technologies, the concepts, and automatic music recommendation. He describes
lecturers. The revision was inspired by the synergy the applications of analogue computing. The text how music recommenders work, explores some
generated by the opportunity for the lecturers to asserts that analogue computing must be thought of the limitations seen in current recommenders,
present and discuss their work among themselves, of as not just a computing technology, but also as offers techniques for evaluating the effectiveness
and with the school’s attendees. The courses cover a modelling technology, demonstrating how the of music recommendations and demonstrates how
a wide spectrum of topics in software engineering history of analogue computing can be understood to build effective recommenders by offering two
with a special focus on testing - a key activity for in terms of the parallel themes of calculation and real-world recommender examples. He empha-
assuring software quality. Apart from foundational modelling. The book also includes a number of sizes the user’s perceived quality, rather than
issues, languages and techniques, the courses also detailed case studies of the technology’s use and the system’s predictive accuracy when providing
cover the semantic underpinnings of refinement, application. recommendations, thus allowing users to discover
as well as industrial applications and refinement new music by exploiting the long tail of popularity
tools. Features and promoting novel and relevant material (“non-
7 Suggests a new interpretation of the history of obvious recommendations”). In order to reach out
Features analogue computing, taking into account how the into the long tail, he needs to weave techniques
7 The book gives an detailed tutorial introduction technology has been used and applied 7 Demon- from complex network analysis and music infor-
to the scientific basis of testing strates how the history of analogue computing can mation retrieval.
7 This book is the outcome of Pernambuco be understood in terms of the two parallel themes
Summer School on Software Engineering (PSSE) of calculation and modelling, and describes how Features
2007, devoted to the study of computer science the technology evolved 7 Includes a number of 7 Starts with a formalization of the general
and to the promotion of international scientific detailed case studies examining analogue model- recommendation problem 7 Presents the
collaboration 7 includes state of the art contribu- ling in academic research, oil reservoir modelling, pros and cons of most-used recommendation
tions from invited lecturers aeronautical design, and meteorology approaches, with a focus on the music domain
7 Combines elements from recommender
Fields of interest Fields of interest systems, complex network analysis, music infor-
Software Engineering; Programming Techniques; History of Computing; Simulation and Modeling mation retrieval, and personalization
Programming Languages, Compilers, Interpreters 7 Emphasizes "user's perceived quality" versus
Target groups "system's predictive accuracy"
Target groups Research
Research Fields of interest
Type of publication Information Storage and Retrieval; Discrete
Type of publication Monograph Mathematics in Computer Science; Artificial
Graduate/Advanced undergraduate textbook Intelligence (incl. Robotics)

Target groups
Graduate

Type of publication
Monograph

Due July 2010 Due August 2010


Due July 2010
2010. IX, 313 p. (Lecture Notes in Computer Science, 2010. XVIII, 203 p. 64 illus., 32 in color. (History of
Volume 6153) Softcover Computing) Hardcover 2010. 208 p. Hardcover
7 €54,00 | £48.99 7 €79,95 | £59.95 7 €39,95 | £35.99
7 * € (D) 57,78 | € (A) 59,40 | sFr 84,00 7 * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 * € (D) 42,75 | € (A) 43,95 | sFr 62,00
ISBN 978-3-642-14334-2 ISBN 978-1-84882-947-3 ISBN 978-3-642-13286-5

9<HTOGPC=bed ec> 9<HTMIPI=icjehd> 9<HTOGPC=bdcigf>


springer.com/NEWSonline Springer News 7/8/2010 Computer Science 75

E. Champion, Massey University, Auckland, New V. Cortellessa, A. Di Marco, P. Inverardi, U L'Aquila, M. Dastani, Department of Information and
Zealand Italy Computing Sciences, Utrecht, The Netherlands;
K. V. Hindriks, Delft University of Technology, The
Playing with the Past Model-Based Software Netherlands; J. C. Meyer, Department of Information
and Computing Sciences, Utrecht, The Netherlands
How can we increase awareness and understanding Performance Analysis (Eds.)
of other cultures using interactive digital visualiza-
tions of past civilizations? In order to answer the Poor performance is one of the main quality- Specification and Verification
above question, this book first examines the needs related shortcomings that cause software projects
and requirements of virtual travelers and virtual to fail. Thus, the need to address performance of Multi-agent Systems
tourists. Is there a market for virtual travel? Erik concerns early during the software develop-
Champion examines the overall success of current ment process is fully acknowledged, and there Specification and Verification of Multi-agent
virtual environments, especially the phenomenon is a growing interest in the research and soft- Systems presents a coherent treatment of the area
of computer gaming. Why are computer games and ware industry communities towards techniques, of formal specification and verification of agent-
simulations so much more successful than other methods and tools that permit to manage system based systems with a special focus on verification
types of virtual environments? Arguments that performance concerns as an integral part of soft- of multi-agent programs. This edited volume
virtual environments are impeded by technological ware engineering. Model-based software perfor- includes contributions from international leading
constraints or by a paucity of evaluation studies mance analysis introduces performance concerns researchers in the area, addressing logical formal-
can only be partially correct, for computer games in the scope of software modeling, thus allowing isms and techniques, such as model checking,
and simulations are also virtual environments. the developer to carry on performance analysis theorem proving, and axiomatisations for (semi)
Many of the underlying issues are caused by a lack throughout the software lifecycle. With this book, automatic verification of agent-based systems.
of engagement with the philosophical underpin- Cortellessa, Di Marco and Inverardi provide the
nings of culture, presence and inhabitation, and cross-knowledge that allows developers to tackle Features
there are few exemplars that engage the public with software performance issues from the very early 7 Addresses diverse topics with known results to
history and heritage using interactive media in a phases of software development. They explain provide a useful tool for students, practitioners,
meaningful and relevant manner. the basic concepts of performance analysis and researchers 7 Ties together in a coherent concep-
describe the most representative methodologies tual framework most of the available results in this
Features used to annotate and transform software models relevant area of research 7 Includes contribu-
7 There is very little concentrated literature into performance models. To this end, they go all tions from international leading researchers in the
on theory and practice in creating meaningful the way from performance primers through soft- area, addressing logical formalisms and techniques
interaction in virtual environments, especially ware and performance modeling notations to the
those designed to communicate heritage or history latest transformation-based methodologies. From the contents
7 The book covers the gap between theory, the Using Theorem Proving to Verify Proper-
design and the evaluation of virtual places for Features ties of Agent Programs.- The Refinement of
learning, especially for history and heritage 7 Integrates performance modeling into the Multi-Agent Systems.- Model Checking Agent
7 It will cover the gap between the theory, the software development process 7 Describes both Communication.- Directions for Agent Model
design and the evaluation of virtual places for the basic concepts of performance modeling and Checking.- Model Checking Logics of Strategic
learning analysis, and state-of-the-art methodologies Ability: Complexity.- Correctness of Multi-Agent
7 Self-contained textbook for courses on software Programs: A Hybrid Approach.- The Norm Imple-
Contents performance mentation Problem in Normative Multi-Agent
1. Introducing Virtual Travel.- 2. Virtual Environ- Systems.- A Verification Logic for Goal Agents.-
ments.- 3.Virtual Places.- 4. Cultural and Social Contents Using the Maude Term Rewriting Language for
Presence.- 5. Game-Style Interaction.- 6. Playing What is Software Performance Analysis.- Software Agent Development with Formal Foundations.-
With The Past.- 7. Augmenting the Present With Lifecycle and Software Performance.- Software The Cognitive Agents Specification Language and
the Past.- 8. Evaluating Virtual Heritage.- Modeling Notations.- Performance Modeling Verification Environment.- A Temporal Trace
9. Conclusion.- Index. Notations.- From Software Models to Performance Language for Formal Modelling and Analysis
Models.- Performance Model Solution and Results
Fields of interest Interpretation.- Current Trends in Software Perfor- Fields of interest
Computer Appl. in Social and Behavioral Sciences; mance. Software Engineering/Programming and
Computer Appl. in Arts and Humanities; Media Operating Systems; Artificial Intelligence (incl.
Design Fields of interest Robotics); Mathematical Logic and Formal
Software Engineering; System Performance and Languages
Target groups Evaluation; Simulation and Modeling
Research Target groups
Target groups Research
Type of publication Professional/practitioner
Monograph Type of publication
Type of publication Contributed volume
Graduate/Advanced undergraduate textbook
Due October 2010
Due September 2010 Due July 2010
2010. X, 238 p. 98 illus., 49 in color. (Human-Computer
Interaction Series) Hardcover 2010. 180 p. Hardcover 2010. XVIII, 405 p. 200 illus., 100 in color. Hardcover
7 approx. € 79,95 | £59.99 7 approx. € 54,95 | £49.99 7 approx. € 99,35 | £90.00
7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 approx. * € (D) 58,80 | € (A) 60,45 | sFr 85,50 7 approx. * € (D) 106,30 | € (A) 109,29 | sFr 165,00
ISBN 978-1-84996-500-2 ISBN 978-3-642-13620-7 ISBN 978-1-4419-6983-5

9<HTMIPJ=jgfa c> 9<HTOGPC=bdgcah> 9<HTMEPB=jgjidf>


76 Computer Science Springer News 7/8/2010 springer.com/NEWSonline

A. Dovier, University of Udine, Italy; E. Pontelli, G. Elia, University of Salento, Lecce, Italy; A. Poce, E. Estrada, M. Fox, D. J. Higham, G. Oppo, University
New Mexiko State University, Las Cruces, NM, USA (Eds.) Università Roma Tre, Italy (Eds.) of Strathclyde, Glasgow, UK (Eds.)

A 25-Year Perspective on Logic Open Networked “i-Learning” Network Science


Programming Models and Cases of “Next-Gen” Learning Complexity in Nature and Technology
Achievements of the Italian Association for A new overall interdisciplinary framework called Network Science is the emerging field concerned
Logic Programming, GULP “i learning” integrates managerial organization with the study of large, realistic networks.
and technology aspects also known as “technology This interdisciplinary endeavor, focusing on
This book celebrates the 25th anniversary of enhanced learning”. Open Networked i Learning: the patterns of interactions that arise between
GULP—the Italian Association for Logic Program- Models and Cases of “Next-Gen” Learning begins individual components of natural and engineered
ming. Authored by Italian researchers at the its investigation with the important changes that systems, has been applied to data sets from activi-
leading edge of their fields, it presents a state- have recently occurred within the management, ties as diverse as high-throughput biological exper-
of-the-art survey of logic programming, making technology and society fields. Social and cultural iments, online trading information, smart-meter
it a useful reference for both researchers and aspects of society that influence the “dynamics” utility supplies, and pervasive telecommunications
students. The volume contains 14 invited papers, and the “styles” of the learning processes are and surveillance technologies.
each giving a detailed analysis of a specific field of presented as well. The last section of this edited This unique text/reference provides a fascinating
logic programming and providing both a historical volume focuses on possible future scenarios of the insight into the state of the art in network science,
perspective and a precise discussion of current learning processes by describing the main models, highlighting the commonality across very different
research. The book closes with a chapter reviewing processes, tools, technologies, and involved orga- areas of application and the ways in which each
in detail the main applications of logic program- nizations. Open Networked i Learning: Models area can be advanced by injecting ideas and
ming developed in Italian researchers in the last and Cases of “Next-Gen” Learning is suitable for techniques from another. The book includes
25 years, illustrating successful work done and advanced under- and graduate level students and contributions from an international selection of
potential directions for future developments. professors concentrating on computer science, experts, providing viewpoints from a broad range
engineering and business management as a of disciplines. It emphasizes networks that arise
Features secondary text or reference book. Professionals in nature–such as food webs, protein interactions,
7 Celebrating the 25th anniversary of GULP – the and researchers who work in the related industry gene expression, and neural connections–and in
Italian Association for Logic Programming of “technology enhanced learning “will find this technology–such as finance, airline transport,
7 Authored by italian researchers at the leading book useful as well. urban development and global trade.
edge of their fields 7 A state-of-the-art survey of
logic programming Features Features
7 This is the first available book that specifically 7 Presents a broad, topical overview of the new
From the contents focuses on “i Learning” 7 Includes descriptive and emerging discipline of network science
Logic Programming in Italy: A Historical case studies that describe how the “i-Learning” 7 Provides viewpoints from disciplines as varied
Perspective.-Theoretical Foundations and framework has been instanced and implemented as computer science, mathematics, engineering,
Semantics of Logic Programming.- Theory- 7 Presents social and cultural aspects of society physics, chemistry, biology, ecology, neuroscience,
Specific Automated Reasoning .- Constraint Logic that influence the “dynamics” and the “styles” of epidemiology, and the social sciences
Programming.- Knowledge Representation and the learning processes 7 Includes contributions from an international
Non-monotonic Reasoning .- The Transforma- selection of experts
tional Approach to Program Development.- Static Contents
Analysis, Abstract Interpretation and Verification Introduction.- Chapter 1 – The emerging of the Fields of interest
in (Constraint Logic) Programming.- Answer Set “i-Learning” paradigm.- Chapter 2 – Collab- Computer Communication Networks; Analysis;
Programming.- Logic Programming Languages for orative i-Learning.- Chapter 3 – Problem Based Algorithm Analysis and Problem Complexity
Databases and the Web. i-Learning.- Chapter 4 – Case Based i-Learning.-
Chapter 5 – Networked i-learning.- Chapter 6 – Target groups
Fields of interest Future i-Learning.- Conclusions.- Bibliography.- Research
Mathematical Logic and Formal Languages; Index.
Logics and Meanings of Programs; Programming Type of publication
Techniques Fields of interest Contributed volume
Computer Appl. in Social and Behavioral Sciences;
Target groups Information Systems Applications (incl.Internet);
Research Computer Systems Organization and Communica-
tion Networks
Type of publication
Contributed volume Target groups
Professional/practitioner

Type of publication
Due July 2010 Monograph

2010. XIV, 329 p. (Lecture Notes in Computer Science / Due September 2010 Due September 2010
Programming and Software Engineering, Volume 6125)
Softcover 2010. 195 p. Hardcover 2010. XVIII, 248 p. Hardcover
7 €54,00 | £48.99 7 approx. € 73,40 | £66.99 7 approx. € 79,95 | £59.95
7 * € (D) 57,78 | € (A) 59,40 | sFr 84,00 7 approx. * € (D) 78,54 | € (A) 80,74 | sFr 114,00 7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50
ISBN 978-3-642-14308-3 ISBN 978-1-4419-6853-1 ISBN 978-1-84996-395-4

9<HTOGPC=bedaid> 9<HTMEPB=jgifdb> 9<HTMIPJ=jgdjfe>


springer.com/NEWSonline Springer News 7/8/2010 Computer Science 77

J. Feng, University of Warwick, Coventry, UK; B. Furht, Florida Atlantic University, Boca Raton, FL, J. Fürnkranz, Technische Universität Darmstadt,
W. Fu, Michigan State University, East Lansing, MI, USA (Ed.) Darmstadt, Germany; E. Hüllermeier, Philipps-
USA; F. Sun, University of Southern California, Los Universität Marburg, Germany (Eds.)
Angeles, CA, USA (Eds.) Handbook of Social Network
Technologies and Preference Learning
Frontiers in Computational
and Systems Biology Applications The topic of preferences is a new branch of
machine learning and data mining, and it has
Social networking is a concept that has existed attracted considerable attention in artificial intel-
This unique volume surveys state-of-the-art for a long time; however, with the explosion of ligence research in previous years. It involves
research on statistical methods in molecular and the Internet, social networking has become a learning from observations that reveal informa-
systems biology, with contributions from leading tool for people to connect and communicate in tion about the preferences of an individual or a
experts in the field. Each chapter discusses theo- ways that were impossible in the past. The recent class of individuals. Representing and processing
retical aspects, applications to biological problems, development of Web 2.0 has provided many new knowledge in terms of preferences is appealing as
and possible future developments. Topics and applications, such as Myspace, Facebook, and it allows one to specify desires in a declarative way,
features: presents the use of thermodynamic LinkedIn. The purpose of Handbook of Social to combine qualitative and quantitative modes of
models to analyze gene regulatory mechanisms; Networks: Technologies and Applications is to reasoning, and to deal with inconsistencies and
reviews major algorithms for RNA secondary provide comprehensive guidelines on the current exceptions in a flexible manner. And, generalizing
structure prediction; discusses developments in and future trends in social network technologies beyond training data, models thus learned may
the area of oligo arrays; examines the application and applications in the field of Web-based Social be used for preference prediction. This is the first
of models of stochastic processes in nonequi- Networks. This handbook includes contributions book dedicated to this topic, and the treatment is
librium thermodynamics and biological signal from world experts in the field of social networks comprehensive. The editors first offer a thorough
transduction; describes phylogenetic footprinting from both academia and private industry. A introduction, including a systematic categorization
methods for TFBS identification; introduces penal- number of crucial topics are covered including according to learning task and learning technique,
ized regression-based methods for constructing Web and software technologies and communica- along with a unified notation. The first half of the
genetic interaction or regulatory networks; tion technologies for social networks. Web-mining book is organized into parts on label ranking,
investigates the specific role played by irreversible techniques, visualization techniques, intelligent instance ranking, and object ranking; while the
Markov processes in modeling cellular biochem- social networks, Semantic Web, and many other second half is organized into parts on applications
ical systems; explores the concept of gene modules topics are covered. Standards for social networks, of preference learning in multiattribute domains,
in a transcriptional regulatory network. case studies, and a variety of applications are information retrieval, and recommender systems.
covered as well.
Features Features
7 Reviews the current hot topics in computa- Features 7 This is the first book dedicated to this topic
tional biology and system biology, using prob- 7 Provides current and future trends in creating 7 This topic has attracted considerable attention
ability and statistics as mathematical tools intelligent social networks, and the main players in artificial intelligence research in recent years
7 With contributions by towering figures in the and their social networks applications 7 A comprehensive treatment
field from across the globe, including Prof. Michael 7 Presents web-mining techniques, visualization
Waterman and Prof. Terry Speed techniques, social networks and Semantic Web, Fields of interest
and many other topics 7 Includes contributions Artificial Intelligence (incl. Robotics); Data Mining
Fields of interest from world experts in the field of social networks and Knowledge Discovery
Computational Biology/Bioinformatics; Systems from both academia and private industry
Biology; Statistics and Computing/Statistics 7 Presents standards for social networks, case Target groups
Programs studies, and a variety of applications Research

Target groups Fields of interest Type of publication


Research Management of Computing and Information Monograph
Systems; Information Systems Applications (incl.
Type of publication Internet); Computer Systems Organization and
Contributed volume Communication Networks

Target groups
Research

Type of publication
Handbook

Due July 2010


Due October 2010 Due October 2010
2010. XXV, 24 p. 186 illus., 93 in color. (Computational
Biology, Volume 15) Hardcover 2011. X, 650 p. 100 illus., 50 in color. Hardcover 2010. VIII, 454 p. Hardcover
7 €99,95 | £90.00 7 approx. € 147,50 | £132.50 7 approx. € 99,95 | £90.00
7 * € (D) 106,95 | € (A) 109,95 | sFr 155,50 7 approx. * € (D) 157,83 | € (A) 162,25 | sFr 229,00 7 approx. * € (D) 106,95 | € (A) 109,95 | sFr 155,50
ISBN 978-1-84996-195-0 ISBN 978-1-4419-7141-8 ISBN 978-3-642-14124-9

9<HTMIPJ=jgbjfa> 9<HTMEPB=jhbebi> 9<HTOGPC=bebcej>


78 Computer Science Springer News 7/8/2010 springer.com/NEWSonline

D. M. Gabbay, O. T. Rodrigues, King's College L. Gavrilovska, Ss. Cyril and Methodius University of D. Hamlet, Camas, WA, USA
London, UK; A. Russo, Imperial College London, UK Skopje, Macedonia; S. Krco, Ericsson Ireland Research
Centre, Athlone, County Westmeath, Ireland; Composing Software
Revision, Acceptability and V. Milutinovic, University of Belgrade, Serbia;
Components
I. Stojmenovic, University of Ottawa, ON, Canada;
Context R. Trobec, Jožef Stefan Institute, Ljubljana, Slovenia A Software-testing Perspective
Theoretical and Algorithmic Aspects (Eds.)
Software components and component-based soft-
An important aspect in the formalisation of Application and Multi- ware development (CBSD) are acknowledged as
common-sense reasoning is the construction of a the best approach for constructing quality software
model of what an agent believes the world to be disciplinary Aspects of at reasonable cost. Composing Software Compo-
like to help in her reasoning process. This model is Wireless Sensor Networks nents: A Software-testing Perspective describes
often incomplete or inaccurate, but new informa- a 10-year investigation into the underlying prin-
Concepts, Integration, and Case Studies
tion can be used to refine it. The study of tech- ciples of CBSD.
niques that achieve this in a rational way is the task It is a general trend in computing that computers
of the discipline of belief revision, with which this are becoming ever smaller and ever more intercon- Features
book is concerned. There are three key elements nected. Sensor networks – large networks of small, 7 Provides more than a dozen revealing case
to the book’s approach. Firstly, the methodology simple devices – are a logical extreme of this trend. studies of component synthesis 7 Includes
of logic by translation. A specific instance of this Wireless sensor networks (WSNs) are attracting supporting software (written in Perl for Linux,
is the idea of revision by translation. Revision for an increasing degree of research interest, with a Mac, and Windows) with tutorial examples and
a foreign logic is done via its translation into a growing number of industrial applications starting data for the replication of experiments 7 Presents
well-known logic, usually classic logic. Secondly, to emerge. Two of these applications, personal an original, fundamental theory of component
the technique of meta-level/object-level move- health monitoring and emergency/disaster composition based on software testing rather than
ment, where we bring some operation defined at recovery, are the focus of the European Commis- proof-of-programs
the meta-level of a logic into its object level. In this sion project ProSense: Promote, Mobilize, Rein-
book, we bring the operation of deletion to the force and Integrate Wireless Sensor Networking From the contents
object level. Finally, through Labelled Deductive Research and Researchers. This hands-on intro- Introduction.- Part I Components and Compo-
Systems, we use the context of the revision to fine- duction to WSN systems development presents a nent-based Development.- Engineering, Compo-
tune its operation and illustrate the idea through broad coverage of topics in the field, contributed nents, and Software.- Software Components
the presentation of various algorithms. by researchers involved in the ProSense project. and Component-based Development.- CBSD in
An emphasis is placed on the practical knowledge Practice and Theory.- Part II Software Testing:
Features required for the successful implementation of Practice and Theory.- Software Testing’s Place in
7 This is the most-up-to-date book on this WSNs. Divided into four parts, the first part covers Development.- Software Testing Theory.- Subdo-
topic 7 The book is suitable for researchers and basic issues of sensors, software, and position- main Testing.- Part III Composition of Compo-
postgraduates in the areas of artificial intelligence, based routing protocols. Part two focuses on nents.- Subdomain Theory of Stateless Component
database theory, and logic 7 The authors illus- multidisciplinary issues, including sensor network Composition.- Tutorial Example – SYN Tools for
trate the idea through the presentation of various integration, mobility aspects, georouting, medical Stateless Components.- Persistent State.- Concur-
algorithms applications. rent Execution.- The Other Non-functional Prop-
erty: Reliability.- Part IV Supporting Tools.- CBSD
Contents Features Support Tools.- Tool Implementation.- Debugging
Background and Overview.- Introducing Revision 7 Provides a broad overview of WSN technology, Components, Component-based Systems, and
Theory.- Stepwise Revision Operations.- Iterating and a basic introduction to related fields Support Tools.- Unfinished Business: Volunteer
Revision.- Structured Revision.- Algorithmic 7 Includes an extensive case studies section Tool Makers.- Part V Case Studies.- Accuracy of
Context Revision.- Revision by Translation.- 7 Reviews the frameworks for WSN systems Component Measurements and System Predic-
Object-Level Deletion.- Conclusions and Discus- integration, through which WSN technology is tions.- Case Studies of I-CBSD.- Part VI Impli-
sions.- List of Symbols.- Subject Index to become one of the backbones of the Future cations for Software Testing Unit vs. System
Internet concept 7 Covers real-life applications Testing.- Functional vs. Non-functional Proper-
Fields of interest of WSN systems in medical and vehicular sensor ties.- Conclusion: Lessons Learned from I-CBSD.
Artificial Intelligence (incl. Robotics); Database networks
Management Fields of interest
Fields of interest Computer-Aided Engineering (CAD, CAE) and
Target groups Computer Communication Networks Design; Models and Principles; Performance and
Research Reliability
Target groups
Type of publication Graduate Target groups
Monograph Research
Type of publication
Contributed volume Type of publication
Monograph
Due October 2010
Due August 2010 Due September 2010
2011. VI, 310 p. (Computer Communications and
2010. VI, 385 p. (Cognitive Technologies) Hardcover Networks) Hardcover 2010. XVIII, 368 p. 100 illus., 50 in color. Hardcover
7 approx. € 99,95 | £90.00 7 €79,95 | £59.95 7 approx. € 95,60 | £86.00
7 approx. * € (D) 106,95 | € (A) 109,95 | sFr 155,50 7 * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 approx. * € (D) 102,29 | € (A) 105,16 | sFr 148,50
ISBN 978-3-642-14158-4 ISBN 978-1-84996-509-5 ISBN 978-1-4419-7147-0

9<HTOGPC=bebfie> 9<HTMIPJ=jgfajf> 9<HTMEPB=jhbeha>


springer.com/NEWSonline Springer News 7/8/2010 Computer Science 79

C. Hazay, Y. Lindell, Bar Ilan University, Israel A. G. Hoekstra, J. Kroc, P. M. Sloot (Eds.) H. Isomäki, University of Jyväskylä, Finland;
S. Pekkola, Tampere University of Technology,
Efficient Secure Two-Party Simulating Complex Systems Finland (Eds.)

Protocols by Cellular Automata Reframing Humans in


Techniques and Contructions
Deeply rooted in fundamental research in Math- Information Systems
The authors present a comprehensive study of ematics and Computer Science, Cellular Automata Development
efficient protocols and techniques for secure (CA) are recognized as an intuitive modeling
two-party computation. They study both general paradigm for Complex Systems. Already very basic Modern society has been transformed by the
constructions that can be used to securely compute CA, with extremely simple micro dynamics such as digital convergence towards a future where
any functionality, and protocols for specific prob- the Game of Life, show an almost endless display technologies embed themselves into the fabric of
lems of interest. The aim of the book is to focus of complex emergent behavior. Conversely, CA can everyday life. This ongoing merging of social and
on techniques for both constructing protocols also be designed to produce a desired emergent technological infrastructures provides and neces-
and proving them secure. In addition, the authors behavior, using either theoretical methodologies or sitates new possibilities to renovate past notions,
study the different definitional paradigms used and evolutionary techniques. Meanwhile, beyond the models and methods of information systems
compare the efficiency of protocols achieved under original realm of applications - Physics, Computer development that accommodates humans as actors
these different definitions. This book is essential Science, and Mathematics – CA have also become within the infrastructure. This shift introduces
for practitioners and researchers in the field of work horses in very different disciplines such as new possibilities for information systems designers
secure protocols, particularly those with a focus epidemiology, immunology, sociology, and finance. to fulfil more and more everyday functions, and
on efficiency, and for researchers in the area of to enhance their value and worth to the user.
privacy-preserving data mining. Features Reframing Humans in Information Systems
7 A well balance and up-to-date introduction Development aims to reframe the phenomenon
Features to both foundations and applications 7 Edited of human-centered development of informa-
7 Essential reading for researchers in the area of and authored by leading researchers in the field tion systems by connecting scientific constructs
secure protocols 7 The authors compare the effi- 7 Excellent starting point for own research for produced within the field of information systems
ciencies of different protocols 7 Essential reading newcomers to the field which has recently provided a plethora of multidis-
for researchers in the area of privacy-preserving ciplinary user views, without explicitly defining
data mining Contents clear constructs that serve the IS field in particular.
Theory of Cellular Automata.- Applications.-
Contents Cellular Automata Software. Features
Introduction.- Definitions.- Semi-honest Adver- 7 Provides a comprehensive overview of the
saries.- Malicious Adversaries.- Covert Adver- Fields of interest perceptions of the end-users in different ISD
saries.- Sigma Protocols and Efficient Zero-Knowl- Simulation and Modeling; Statistical Physics, methods and approaches. 7 Reduces the current
edge.- Oblivious Transfer and Applications.- The Dynamical Systems and Complexity; Computa- detached viewpoints of human-centred ISD by
k-th Ranked Element.- Search Problems.- Refer- tional Science and Engineering synthesizing and concentrating on the most essen-
ences.- Index. tial viewpoints. 7 Offers conceptualisations that
Target groups serve as key constructs for theory development in
Fields of interest Research information systems science and thus promotes
Data Structures, Cryptology and Information grounds for multi-perspective theory development
Theory; Computer Communication Networks; Type of publication within the field of IS
Data Mining and Knowledge Discovery Monograph
Fields of interest
Target groups User Interfaces and Human Computer Interaction;
Research Computer Appl. in Social and Behavioral Sciences;
History of Computing
Type of publication
Monograph Target groups
Research

Type of publication
Reference work

Due September 2010 Due July 2010 Due September 2010

2010. VIII, 265 p. (Information Security and 2010. XXI, 384 p. (Understanding Complex Systems) 2011. XII, 300 p. 32 illus. (Computer Supported
Cryptography) Hardcover Hardcover Cooperative Work, Volume 201) Hardcover
7 approx. € 79,95 | £72.00 7 €119,95 | £108.00 7 €99,95 | £79.95
7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 * € (D) 128,35 | € (A) 131,95 | sFr 186,50 7 * € (D) 106,95 | € (A) 109,95 | sFr 155,50
ISBN 978-3-642-14302-1 ISBN 978-3-642-12202-6 ISBN 978-1-84996-346-6

9<HTOGPC=bedacb> 9<HTOGPC=bc acg> 9<HTMIPJ=jgdeg >


80 Computer Science Springer News 7/8/2010 springer.com/NEWSonline

I. Koch, Johann Wolfgang Goethe University, R. J. Lipton, Georgia Institute of Technology, Atlanta, H. Liu, University of Portsmouth, UK; D. Gu,
Frankfurt am Main, Germany; W. Reisig, Humboldt- GA, USA University of Essex, UK; R. J. Howlett, University of
University Berlin, Germany; F. Schreiber, Martin Brighton, UK; Y. Liu, University of Wales, Bangor, UK
Luther University, Halle-Wittenberg, Germany (Eds.) The P=NP Question and (Eds.)

Modeling in Systems Biology Gödel’s Lost Letter Robot Intelligence


The Petri Net Approach The P=NP question is one of the great problems of An Advanced Knowledge Processing
The emerging, multi-disciplinary field of systems science, which has intrigued computer scientists Approach
biology is devoted to the study of the relation- and mathematicians for decades. Despite the
ships between various parts of a biological system, abundant research in theoretical computer science Robot intelligence has become a major focus of
and computer modeling plays a vital role in the regarding the P=NP question, it has not been intelligent robotics. Recent innovation in compu-
drive to understand the processes of life from an solved. tational intelligence including fuzzy learning,
holistic viewpoint. Advancements in experimental neural networks, evolutionary computation and
technologies in biology and medicine have gener- Features classical Artificial Intelligence provides sufficient
ated an enormous amount of biological data on the 7 A cutting edge discussion of the "The P=NP theoretical and experimental foundations for
dependencies and interactions of many different Question" 7 Includes free access to the enabling robots to undertake a variety of tasks
molecular cell processes, fueling the development author’s blog "The P=NP Question" 7 "This is with reasonable performance. This book reflects
of numerous computational methods for exploring a much needed treatment of great open problem the recent advances in the field from an advanced
this data. The mathematical formalism of Petri computing," states Richard Demillo, Professor, knowledge processing perspective; there have been
net theory is able to encompass many of these Georgia Institute of Technology attempts to solve knowledge based information
techniques. This essential text/reference presents a explosion constraints by integrating computational
comprehensive overview of cutting-edge research From the contents intelligence in the robotics context.
in applications of Petri nets in systems biology, Part I A Prologue.- A Walk In the Snow.-
with contributions from an international selection Part II On the P=NP Question.- Algorithms: Features
of experts. Those unfamiliar with the field are also Tiny Yet Powerful.- Is P=NP Well Posed?.- What 7 Recent innovations on robot learning and
provided with a general introduction to systems Would You Bet?.- What Happens What P=NP Is adaptive methods 7 Advanced knowledge-based
biology, the foundations of biochemistry, and the Resolved?.- NP Too Big or P Too Small?. qualitative reasoning 7 Integration of robot
basics of Petri net theory. Further chapters address - How To Solve P=NP?.- Why Believe P Not Equal learning and robot control
Petri net modeling techniques for building and To NP?.- A Nightmare About SAT.- Bait and
analyzing biological models, as well as network Switch.- Who’s Afraid of Natural Proofs?.- An From the contents
prediction approaches, before reviewing the Approach To P=NP.- Is SAT Easy?.- SAT is Not 1. Programming-by-Demonstration of Robot
applications to networks of different biological Too Easy.- Ramsey’s Theorem and NP.- Can They Motions.- 2. Grasp Recognition by Fuzzy Modeling
classification. Do That?.- Rabin Flips a Coin.- A Proof We All and Hidden Markov Models.- 3. Distributed Adap-
Missed.- Barrington Gets Simple.- Exponential tive Coordinated Control of Multi-Manipulator
Features Algorithms.- An EXPSPACE Lower Bound.- Systems Using Neural Networks.- 4. A New
7 Presents a comprehensive overview of cutting- Randomness has Unbounded Power.- Counting Framework for View-invariant Human Action
edge research in applications of Petri nets in Cycles and Logspace.- Ron Graham Gives a Talk.- Recognition.- 5. Using Fuzzy Gaussian Inference
systems biology 7 Enables readers to apply and An Approximate Counting Method.- Easy and and Genetic Programming to Classify 3D Human
develop their own biochemical models using Petri Hard Sums.- How To Avoid O-Abuse.- How Good Motions.- 6. Obstacle Detection using Cross-ratio
net techniques 7 Contains a glossary of the is The Worst Case Model?.- Savitch’s Theorem.- and Disparity Velocity.- 7. Learning and Vision-
concepts and notation used in the book, in addi- Adaptive Sampling and Timed Adversaries.- On based Obstacle Avoidance and Navigation.-
tion to exercises at the end of each chapter The Intersection of Finite Automata.- Where 8. A Fraction Distortion Model for Accurate
are the Movies?.- Part III On Integer Factoring.- Camera Calibration and Correction.- 9. A Leader-
Fields of interest Factoring and Factorials.- BDD’s.- Factoring and follower Flocking System Based on Estimated
Computational Biology/Bioinformatics; Systems Fermat.- Part IV On Mathematics.- A Curious Flocking Center.- 10. A Behavior Based Control
Biology Algorithm.- Edit Distance.- Protocols.- Erdõs and System for Surveillance.- 11. Hierarchical
the Quantum Method.- Amplifiers.- Amplifying. Composite Anti-Disturbance Control for Robotic
Target groups Systems Using Robust Disturbance Observer.
Research Fields of interest
Theory of Computation; Mathematics of Fields of interest
Type of publication Computing; History of Computing Artificial Intelligence (incl. Robotics)
Contributed volume
Target groups Target groups
Professional/practitioner Research

Type of publication Type of publication


Monograph Monograph

Due November 2010 Due August 2010


Due September 2010
2010. XX, 368 p. (Computational Biology, Volume 16) 2010. XIV, 301 p. 136 illus., 68 in color. (Advanced
Hardcover 2010. XII, 244 p. 20 illus. Hardcover Information and Knowledge Processing) Hardcover
7 approx. € 99,95 | £79.95 7 approx. € 44,95 | £39.99 7 €99,95 | £79.95
7 approx. * € (D) 106,95 | € (A) 109,95 | sFr 155,50 7 approx. * € (D) 48,10 | € (A) 49,45 | sFr 69,00 7 * € (D) 106,95 | € (A) 109,95 | sFr 155,50
ISBN 978-1-84996-473-9 ISBN 978-1-4419-7154-8 ISBN 978-1-84996-328-2

9<HTMIPJ=jgehdj> 9<HTMEPB=jhbfei> 9<HTMIPJ=jgdcic>


springer.com/NEWSonline Springer News 7/8/2010 Computer Science 81

T. Liu, Microsoft Research Asia, Beijing, China Y. Ma, K. Zhan, Z. Wang, Lanzhou University, Gansu, Z. Manna, Stanford University, Stanford, CA, USA;
China D. A. Peled, Bar Ilan University, Ramat Gan, Israel
Learning to Rank for (Eds.)

Information Retrieval Applications of Pulse-Coupled


Neural Networks Time for Verification
Due to the fast growth of the Web and the diffi- Essays in Memory of Amir Pnueli
culties in finding desired information, efficient “Applications of Pulse-Coupled Neural Networks”
and effective information retrieval systems have explores the fields of image processing, including This volume is dedicated to the memory of the
become more important than ever, and the search image filtering, image segmentation, image fusion, 1996 Turing Award winner Amir Pnueli, who
engine has become an essential tool for many image coding, image retrieval, and biometric passed away in November 2009. The Festschrift
people. The ranker, a central component in every recognition, and the role of pulse-coupled neural contains 15 scientific articles written by leading
search engine, is responsible for the matching networks in these fields. This book is intended scientists who were close to Amir Pnueli either as
between processed queries and indexed docu- for researchers and graduate students in artificial former students, colleagues or friends. The topics
ments. Because of its central role, great attention intelligence, pattern recognition, electronic engi- covered span the entire breadth of the scientific
has been paid to the research and development of neering, and computer science. work of Amir Pnueli, with a focus on the develop-
ranking technologies. In addition, ranking is also ment and the application of formal methods. Also
pivotal for many other information retrieval appli- Features included is the first chapter of the unpublished
cations, such as collaborative filtering, definition 7 First book focusing on efficient adaptive pulse Volume III of Zohar Manna and Amir Pnueli’s
ranking, question answering, multimedia retrieval, coupled neural networks 7 New spiking cortical work on the verification of reactive systems using
text summarization, and online advertisement. models proposed and analysis on their behaviors temporal logic techniques.
Leveraging machine learning technologies in the 7 Comprehensive and systematical introduction
ranking process has led to innovative and more to pulse coupled neural networks 7 Robust and Fields of interest
effective ranking models, and eventually to a novel application examples on image processing Programming Techniques; Mathematical Logic
completely new research area called “learning and Formal Languages; Computation by Abstract
to rank”. Contents Devices
I. Pulse Coupled Neural Networks.- II. Image
Features filter.- III. Adaptive PCNN Model for Image Target groups
7 Only comprehensive overview of a key innova- segment.- IV. Image coding.- V. Image enhance- Research
tive technology for search engine development ment.- VI. Image fusion.- VII. Feature extraction
7 Written by one of the leading authorities in this using entropy.- VIII. Combinatorial Optimization. Type of publication
field 7 Combines scientific theoretical soundness Contributed volume
with broad development and application experi- Fields of interest
ences Artificial Intelligence (incl. Robotics); Pattern
Recognition; Electrical Engineering
Contents
1. Ranking in IR.- 2. Learning to Rank for IR.- Target groups
3. Regression/Classification: Conventional ML Research
Approach to Learning to Rank.- 4. Ordinal Regres-
sion: A Pointwise Approach to Learning to Rank.- Type of publication
5. Preference Learning: A Pairwise Approach to Monograph
Learning to Rank.- 6. Listwise Ranking: A Listwise
APproach to Learning to Rank.- 7. Advanced
Topics.- 8. LETOR: A Benchmark Dataset for
Learning to Rank.- 9. SUmmary and Outlook.

Fields of interest
Information Storage and Retrieval; Artificial Intel-
ligence (incl. Robotics); Probability and Statistics
in Computer Science

Target groups
Research

Type of publication
Monograph
Due August 2010

Distribution rights in China: Higher Education Press Due July 2010

Due September 2010 Jointly published with Higher Education Press 2010. VIII, 413 p. (Lecture Notes in Computer Science /
Theoretical Computer Science and General Issues,
2010. 300 p. Hardcover 2010. 260 p. 90 illus. Hardcover Volume 6200) Softcover
7 approx. € 79,95 | £72.00 7 €129,95 | £117.00 7 €62,00 | £55.99
7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 * € (D) 139,05 | € (A) 142,94 | sFr 202,00 7 * € (D) 66,34 | € (A) 68,20 | sFr 96,50
ISBN 978-3-642-14266-6 ISBN 978-3-642-13744-0 ISBN 978-3-642-13753-2

9<HTOGPC=becg g> 9<HTOGPC=bdhe a> 9<HTOGPC=bdhfdc>


82 Computer Science Springer News 7/8/2010 springer.com/NEWSonline

es
N. Memon, University of Southern Denmark, Odense, X. Meng, Information School, Renmin University of
New Seri Denmark; R. Alhajj, University of Calgary, AB, Canada
(Eds.)
China, Beijing, China; J. Chen, EMC Research China,
Beijing, China

From Sociology to Computing Moving Objects Management


in Social Networks Models, Techniques and Applications
Lecture Notes in Social Theory, Foundations and Applications
The continued advances in wireless communica-
Networks Important aspects of social networking analysis tion and positioning technologies such as GPS
are covered in this work by combining experi- have made new data management applications
Series editor: Nasrullah Memon, Reda Alhajj mental and theoretical research. A specific focus is possible, such as location-based services (LBS) that
devoted to emerging trends and the industry needs store and manage the continuously changing posi-
Lecture Notes in Social Networks (LNSN) associated with utilizing data mining techniques. tions of moving objects. “Moving Objects Manage-
comprises serialized volumes that cover the theory, Some of the techniques covered include data ment - Models, Techniques and Applications”
foundations and applications of the new emerging mining advances in the discovery and analysis of focuses on moving objects management, from the
multidisciplinary field of social networks analysis communities, in the personalization of solitary location management perspective to the explora-
and mining. LNSN publishes peer reviewed works activities (like searches) and social activities (like tion of how the continually changing locations
(including conference/workshop proceedings and discovering potential friends), in the analysis of affect the traditional database and data mining
edited books) in the analytical, technical as well as user behavior in open fora (like conventional sites, technology. Specifically, the book describes the
the organizational side of social computing, social blogs and fora) and in commercial platforms (like topics of moving objects modeling and location
networks, sociology and other related disciplines. e-auctions), and in the associated security and updating, indexing and querying, clustering, loca-
The numbered volumes are guest-edited by experts privacy-preservation challenges; as well as social tion uncertainty and privacy issues, as well as their
in a specific domain. network modeling, scalable, customizable social application to intelligent transportation systems.
network infrastructure construction, and the
identification and discovery of dynamic growth Features
and evolution patterns using machine learning 7 A comprehensive architecture including not
approaches or multi-agent based simulation. only basic theories and new concepts but also
These topics will be of interest to practitioners practical technologies and applications 7 A set
and researchers alike in this dynamic and growing of new database techniques in modeling, indexing,
field. querying and updating locations as well as data
mining techniques in clustering analysis of moving
Features objects 7 A typical application of moving objects
7 Experts in Social Networking and Data Mining management in intelligent transportation systems
have come together to create this volume
7 Special Focus on emerging trends and the Contents
needs of industry associated with data mining Introduction.- Modeling of Moving Objects.-
techniques for social networking 7 Useful Indexing of Moving Objects.- Querying of Moving
applications for utilizing the commercial aspects of Objects.- Location Updating of Moving Objects.-
social networking Trajectory Prediction of Moving Objects.- Clus-
tering Analysis of Moving Objects.- Uncertainty
Fields of interest of Moving Objects.- Location Privacy of Moving
Computer Appl. in Social and Behavioral Sciences Objects.- Application to Intelligent Transportation
System.- Conclusions.
Target groups
Research Fields of interest
Database Management; Data Mining and
Type of publication Knowledge Discovery; Information Systems and
Contributed volume Communication Service

Target groups
Research

Type of publication
Monograph

Due August 2010

Distribution rights in China: Tsinghua University Press.


Due July 2010
Jointly published with Tsinghua University Press
2010. XIX, 430 p. 127 illus. in color. (Lecture Notes in
Social Networks, Volume 1) Hardcover 2010. 300 p. 50 illus. Hardcover
7 approx. € 99,95 | £90.00 7 €139,95 | £126.00
7 approx. * € (D) 106,95 | € (A) 109,95 | sFr 155,50 7 * € (D) 149,75 | € (A) 153,94 | sFr 217,50
ISBN 978-3-7091-0293-0 ISBN 978-3-642-13198-1

9<HTOHLJ=bacjda> 9<HTOGPC=bdbjib>
springer.com/NEWSonline Springer News 7/8/2010 Computer Science 83

J. Nin, J. Herranz, Universitat Politècnica de C. W. Probst, Technical University of Denmark, M. Rusiñol, J. Lladós, Universitat Autònoma de
Catalunya, Spain (Eds.) Kongens Lyngby, Denmark; J. Hunker, Pittsburgh, PA, Barcelona, Bellaterra, Barcelona, Spain
USA; D. Gollmann, Technical University Hamburg-
Privacy and Anonymity in Harburg, Hamburg, Germany; M. Bishop, University Symbol Spotting in Digital
of California, Davis, CA, USA (Eds.)
Information Management Libraries
Systems Insider Threats in Cyber Focused Retrieval over Graphic-rich
New Techniques for New Practical Problems Security Document Collections

The specific problem of symbol recognition in


The development of information technologies Insider Threats in Cyber Security is a cutting edge graphical documents requires additional tech-
in the last few years has been remarkable. Large text presenting IT and non-IT facets of insider niques to those developed for character recogni-
amounts of data are collected and stored by both threats together. This volume brings together a crit- tion. The most well-known obstacle is the so-called
public institutions and private companies every ical mass of well-established worldwide researchers, Sayre paradox: Correct recognition requires good
day. There are clear threats to the privacy of and provides a unique multidisciplinary overview. segmentation, yet improvement in segmentation is
citizens if no care is taken when collecting, storing Monica van Huystee, Senior Policy Advisor at MCI, achieved using information provided by the recog-
and disseminating data. Ensuring privacy for Ontario, Canada comments “The book will be a nition process. This dilemma can be avoided by
individuals in a society when dealing with digital must read, so of course I’ll need a copy.” Insider techniques that identify sets of regions containing
information, is a task which involves many agents, Threats in Cyber Security covers all aspects of useful information. Such symbol-spotting methods
including politicians, legal authorities, managers, insider threats, from motivation to mitigation. It allow the detection of symbols in maps or tech-
developers, and system administrators. Privacy includes how to monitor insider threats (and what nical drawings without having to fully segment
and Anonymity in Information Management to monitor for), how to mitigate insider threats, or fully recognize the entire content. This unique
Systems deals with the more technical parts of this and related topics and case studies. Insider Threats text/reference provides a complete, integrated and
`privacy cycle’, those issues that are mostly related in Cyber Security is intended for a professional large-scale solution to the challenge of designing
to computer science, and discusses the process by audience composed of the military, government a robust symbol-spotting method for collections
which different privacy mechanisms are motivated, policy makers and banking; financing companies of graphic-rich documents. The book examines
designed, analyzed, tested and finally implemented focusing on the Secure Cyberspace industry. This a number of features and descriptors, from basic
in companies or institutions. book is also suitable for advanced-level students photometric descriptors commonly used in
and researchers in computer science as a secondary computer vision techniques to those specific to
Features text or reference book. graphical shapes, presenting a methodology which
7 A snapshot of the research that privacy can be used in a wide variety of applications.
researchers are currently carrying out 7 A book Features Additionally, readers are supplied with an insight
that can be considered as an actual baseline of 7 A cutting-edge book bringing together IT and into the problem of performance evaluation of
privacy and anonymity research 7 The different non-IT facets of insider threats 7 Covers all spotting methods. Some very basic knowledge of
profiles of the two editors bring the areas of theo- aspects of insider threats – from motivation to pattern recognition, document image analysis and
retical cryptography and privacy in real life closer mitigation 7 Provides a unique multidisciplinary graphics recognition is assumed.
7 A combination of theory and practice; that wills overview
erve as a bridge between rsearchers in cryptog- Features
raphy and researchers in other, more aplied, topics From the contents 7 The first book to address the particular problem
such as statistical/medical databases Aspects of Insider Threats.- Combating Insider of symbol spotting in graphics/document image
Threats.- Insider Threat and Information Security analysis and recognition. 7 Supplies an insight
From the contents Management.- Information Security Manage- into performance evaluation of spotting methods.
List of Contributors .- Part I Overview.- 1. Intro- ment.- A State of the Art Survey of Fraud Detec- 7 With a Foreword by Professor Karl Tombre,
duction to Privacy and Anonymity in Information tion Technology.- Combining Traditional Cyber Director of INRIA Nancy - Grand Est Research
Management Systems.- 2. Advanced Privacy- Security Audit Data with Psychosocial.- A Risk Centre
Preserving Data Management and Analysis.- Management Approach to the “Insider Threat”.-
Part II Theory of SDC.- 3. Practical Applications in Legally Sustainable Solutions for Privacy Issues in Field of interest
Statistical Disclosure Control Using R. Collaborative Fraud Detection. Pattern Recognition

Fields of interest Fields of interest Target groups


Systems and Data Security Systems and Data Security; Computer Communi- Research
cation Networks; Data Encryption
Target groups Type of publication
Research Target groups Monograph
Professional/practitioner
Type of publication
Reference work Type of publication
Contributed volume

Due July 2010 Due August 2010


Due July 2010
2010. XVI, 229 p. 62 illus., 31 in color. (Advanced 2010. XII, 244 p. 40 illus., 20 in color. (Advances in
Information and Knowledge Processing) Hardcover Information Security, Volume 49) Hardcover 2010. XIV, 188 p. 140 illus., 70 in color. Hardcover
7 €79,95 | £45.00 7 approx. € 73,40 | £66.99 7 €79,95 | £59.99
7 * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 approx. * € (D) 78,54 | € (A) 80,74 | sFr 114,00 7 * € (D) 85,55 | € (A) 87,95 | sFr 124,50
ISBN 978-1-84996-237-7 ISBN 978-1-4419-7132-6 ISBN 978-1-84996-207-0

9<HTMIPJ=jgcdh > 9<HTMEPB=jhbdcg> 9<HTMIPJ=jgcaha>


84 Computer Science Springer News 7/8/2010 springer.com/NEWSonline

A. Sadeghi, Ruhr-Universität Bochum, Bochum, M. E. Schuckers, St Lawrence University, Canton, NY, L. Shao, University of Sheffield, UK; C. Shan, Philips
Germany; D. Naccache, École normale supérieure, USA Research Laboratories, Eindhoven, The Netherlands;
Cedex, Paris, France J. Luo, Kodak Research Laboratories, Rochester, NY,
Computational Methods in USA; M. Etoh, NTT Docomo, Yokosuka, Kanagawa,
Towards Hardware-Intrinsic Biometric Authentication Japan (Eds.)

Security Statistical Methods for Performance Multimedia Interaction and


Foundations and Practice Evaluation Intelligent User Interfaces
Foreword by: P. Tuyls, Intrinsic-ID, Eindhoven, Biometrics, the science of using physical traits to Principles, Methods and Applications
The Netherlands identify individuals, is playing an increasing role
in our security-conscious society and across the Consumer electronics (CE) devices, providing
Hardware-intrinsic security is a young field globe. Biometric authentication, or bioauthentica- multimedia entertainment and enabling commu-
dealing with secure secret key storage. By gener- tion, systems are being used to secure everything nication, have become ubiquitous in daily life.
ating the secret keys from the intrinsic properties from amusement parks to bank accounts to mili- However, consumer interaction with such equip-
of the silicon, e.g., from intrinsic Physical Unclon- tary installations. Yet developments in this field ment currently requires the use of devices such as
able Functions (PUFs), no permanent secret key have not been matched by an equivalent improve- remote controls and keyboards, which are often
storage is required anymore, and the key is only ment in the statistical methods for evaluating these inconvenient, ambiguous and non-interactive. An
present in the device for a minimal amount of systems. important challenge for the modern CE industry is
time. The field is extending to hardware-based Compensating for this need, this unique text/ the design of user interfaces for CE products that
security primitives and protocols such as block reference provides a basic statistical methodology enable interactions which are natural, intuitive
ciphers and stream ciphers entangled with the for practitioners and testers of bioauthentication and fun. As many CE products are supplied with
hardware, thus improving IC security. While at devices, supplying a set of rigorous statistical microphones and cameras, the exploitation of
the application level there is a growing interest in methods for evaluating biometric authentica- both audio and visual information for interactive
hardware security for RFID systems and the neces- tion systems. This framework of methods can be multimedia is a growing field of research.
sary accompanying system architectures. This book extended and generalized for a wide range of appli-
brings together contributions from researchers cations and tests. Features
and practitioners in academia and industry, an 7 Describes recent advances in multimedia inter-
interdisciplinary group with backgrounds in Features action and intelligent user interfaces, with applica-
physics, mathematics, cryptography, coding theory 7 The first single resource on statistical methods tions for consumer electronics 7 Covers different
and processor theory. It will serve as important for estimation and comparison of the performance techniques in computer vision, machine learning,
background material for students and practitio- of biometric authentication systems 7 Supplies audio and speech processing, communications,
ners, and will stimulate much further research and decision-makers with the tools needed to choose artificial intelligence and media technology
development. the appropriate biometric device for an application 7 Contains contributions from leading
7 With more than 120 examples researchers in industry, with an emphasis on prac-
Features tical issues of multimedia interaction 7 Uniquely
7 First book on this topic 7 Contains important Contents combines multimedia content analysis and human-
background material for students and practitioners Part I: Introduction.- Introduction.- Statistical machine interaction
7 Many contributions from interdisciplinary Background.- Part II: Primary Matching and Clas-
teams sification Measures.- False Non-Match Rate.- False Contents
Match Rate.- Receiver Operating Characteristic Retrieving Human Actions Using Spatio-temporal
Fields of interest Curve and Equal Error Rate.- Part III: Biometric Features and Relevance Feedback.- Computation-
Data Structures, Cryptology and Information Specific Measures.- Failure to Enrol.- Failure to ally Efficient Clustering of Audio-Visual Meeting
Theory; Computer Hardware; Electrical Engi- Acquire.- Part IV: Additional Topics and Appen- Data.- Cognitive-aware Modality Allocation in
neering dices.- Additional Topics and Discussion.- Tables. Intelligent Multimodal Information Presentation.-
Natural Human-Computer Interaction.- Gesture
Target groups Fields of interest Control for Consumer Electronics.
Research Biometrics; Math Applications in Computer
Science; Computational Mathematics and Fields of interest
Type of publication Numerical Analysis Multimedia Information Systems; User Interfaces
Monograph and Human Computer Interaction; Artificial Intel-
Target groups ligence (incl. Robotics)
Research
Target groups
Type of publication Research
Monograph
Type of publication
Contributed volume

Due September 2010 Due July 2010 Due November 2010

2010. Approx. 780 p. (Information Security and 2010. XXV, 317 p. (Information Science and Statistics) 2010. X, 304 p. 300 illus., 150 in color. (Advances in
Cryptography) Hardcover Hardcover Pattern Recognition) Hardcover
7 approx. € 99,95 | £90.00 7 €99,95 | £90.00 7 approx. € 79,95 | £59.95
7 approx. * € (D) 106,95 | € (A) 109,95 | sFr 155,50 7 * € (D) 106,95 | € (A) 109,95 | sFr 155,50 7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50
ISBN 978-3-642-14451-6 ISBN 978-1-84996-201-8 ISBN 978-1-84996-506-4

9<HTOGPC=be fbg> 9<HTMIPJ=jgcabi> 9<HTMIPJ=jgfage>


springer.com/NEWSonline Springer News 7/8/2010 Computer Science 85

Y. Q. Shi, New Jersey Institute of Technology, Newark, R. Slowinski, Poznań University of Technology, G. Viscusi, University of Milano-Bicocca, Italy;
NJ, USA (Ed.) Poland; P. Lingras, Saint Mary's University, Halifax, M. Mecella, University of Rome, Italy; C. Batini,
NS, Canada; S. Tsumoto, Shimane University, Izumo, University of Milano-Bicocca, Italy
Transactions on Data Hiding Japan; D. Miao, Tongji University, Shanghai, China

and Multimedia Security V (Eds.) Information Systems for


Transactions on Rough eGovernment
Since the mid 1990s, data hiding has been A Quality-of-Service Perspective
proposed as an enabling technology for securing Sets XII
multimedia communication, and is now used in The success of public sector investment in eGov-
various applications including broadcast moni- Editors-in-chief: J. F. Peters, University of Manitoba, ernment initiatives strongly depends on effec-
toring, movie fingerprinting, steganography, video Winnipeg, MB, Canada; A. Skowron, Warsaw tively exploiting all aspects of ICT systems and
indexing and retrieval, and image authentication. University, Poland infrastructures. The related objectives are hardly
Data hiding and cryptographic techniques are reachable without methodological frameworks
often combined to complement each other, thus The LNCS journal Transactions on Rough Sets that provide a holistic perspective and knowledge
triggering the development of a new research is devoted to the entire spectrum of rough sets on the contexts of eGovernment initiatives. Yet
field of multimedia security. Besides, two related related issues, from logical and mathematical public administrators usually have a mix of legal
disciplines, steganalysis and data forensics, are foundations, through all aspects of rough set and administrative knowledge, while lacking an
increasingly attracting researchers and becoming theory and its applications, such as data mining, information systems background. With this book,
another new research field of multimedia security. knowledge discovery, and intelligent information Viscusi, Batini and Mecella provide a comprehen-
This journal, LNCS Transactions on Data Hiding processing, to relations between rough sets and sive methodology for service-oriented informa-
and Multimedia Security, aims to be a forum for other approaches to uncertainty, vagueness, and tion systems planning, with special emphasis on
all researchers in these emerging fields, publishing incompleteness, such as fuzzy sets and theory of eGovernment initiatives. They present the eG4M
both original and archival research results. evidence. methodology which structurally supports the
This issue contains a special section on forensic This volume contains 8 revised selected papers development of optimal eGovernment plans,
image analysis for crime prevention including from 11 submissions to the Rough Set and considering technological, organizational, legal,
two papers. The additional four papers deal with Knowledge Technology Conference (RSKT 2008), economic and social aspects alike. The approach is
collusion-resistant fingerprinting systems; together with 5 papers introducing advances in focused on two pillars: the quality of the provided
rough set theory and its applications. The topics services and related processes, and the quality of
Fields of interest covered are: perceptually near Pawlak partitions, the data managed in the administrative processes
Systems and Data Security; Computer Communi- hypertext classification, topological space versus and services.
cation Networks; Data Encryption rough set theory in terms of lattice theory, feature
extraction in interval-valued information systems, Features
Target groups jumping emerging patterns (JEP), and rough set 7 Takes into account all aspects of eGovernment
Research theory. systems planning: technology, public law, and
economics, and social issues 7 Emphasizes the
Type of publication Features quality of services, processes, and data 7 Proof of
Contributed volume 7 The twelfth title in the LNCS series Trans- concept in several case studies
actions on Rough Sets 7 Includes extended
versions of papers accepted for presentation at the From the contents
Rough Set and Knowledge Technology Confer- Part I eGovernment: a complex challenge.-
ence (RSKT) 2008, which are part of a special issue 1 The different facets of eGovernment initiatives:
on rough set structuring of knowledge 7 With paradigms and approaches.- 2 Data Governance.-
8 selected and reviewed submission papers and 5 3 The eG4M methodology at a glance.-
papers introducing advances in rough set theory Part II Strategic planning.- 4 eGovernment vision
elicitation.- 5 State Reconstruction.-6 eReadiness
Fields of interest Assessment.- 7 Quality Assessment.
Mathematical Logic and Formal Languages;
Computation by Abstract Devices; Theory of Fields of interest
Computation Information Systems Applications (incl.Internet);
Information Systems; Management of Computing
Target groups and Information Systems
Research
Target groups
Type of publication Professional/practitioner
Contributed volume
Type of publication
Professional book
Due July 2010 Due July 2010

2010. XI, 129 p. (Lecture Notes in Computer Science / 2010. X, 339 p. 5 illus. in color. (Lecture Notes in Due September 2010
Transactions on Data Hiding and Multimedia Security, Computer Science / Transactions on Rough Sets,
Volume 6010) Softcover Volume 6190) Softcover 2010. 319 p. Hardcover
7 €46,00 | £41.99 7 approx. € 73,00 | £65.99 7 €54,95 | £49.99
7 * € (D) 49,22 | € (A) 50,60 | sFr 71,50 7 approx. * € (D) 78,11 | € (A) 80,30 | sFr 113,50 7 * € (D) 58,80 | € (A) 60,45 | sFr 85,50
ISBN 978-3-642-14297-0 ISBN 978-3-642-14466-0 ISBN 978-3-642-13570-5

9<HTOGPC=becjha> 9<HTOGPC=be g a> 9<HTOGPC=bdfhaf>


86 Computer Science Springer News 7/8/2010 springer.com/NEWSonline

S. Yekhanin, Microsoft Research, Mountain View, CA, Y. Yin, Yamagata University, Yamagata, Japan; X. Zhang, IACAS, Beijing, China; K. Wong, Murdoch
USA I. Kaku, Akita Prefectural University, Yulihonjo, Japan; University, Perth, WA, Australia (Eds.)
J. Tang, Northeastern University, Shenyang, China;
Locally Decodable Codes and J. Zhu, Central University of Finance and Economics, Transactions on
Beijing, China
Private Information Retrieval Edutainment IV
Schemes Data Mining
Editors-in-chief: Z. Pan, Zhejiang University, China;
Locally decodable codes (LDCs) are codes that Concepts, Methods and Applications in A. D. Cheok, NUS, Singapore; W. Müller, University of
simultaneously provide efficient random access Management and Engineering Design Education, Weingarten, Germany
retrieval and high noise resilience by allowing reli-
able reconstruction of an arbitrary bit of a message Data Mining introduces in clear and simple ways This journal subline serves as a forum for
by looking at only a small number of randomly how to use existing data mining methods to obtain stimulating and disseminating innovative research
chosen codeword bits. Local decodability comes effective solutions for a variety of management and ideas, theories, emerging technologies, empirical
with a certain loss in terms of efficiency – specifi- engineering design problems. investigations, state-of-the-art methods, and tools
cally, locally decodable codes require longer Data Mining is organised into two parts: the first in all different genres of edutainment, such as
codeword lengths than their classical counterparts. provides a focused introduction to data mining game-based learning and serious games, interac-
Private information retrieval (PIR) schemes are and the second goes into greater depth on subjects tive storytelling, virtual learning environments,
cryptographic protocols designed to safeguard such as customer analysis. It covers almost all VR-based education, and related fields. It covers
the privacy of database users. They allow clients managerial activities of a company. aspects from educational and game theories,
to retrieve records from public databases while human-computer interaction, computer graphics,
completely hiding the identity of the retrieved Features artificial intelligence, and systems design.
records from database owners. 7 Introduces data mining methods for the solu-
tion of design issues 7 Presents methods for Features
Features preprocessing data prior to mining 7 Written by 7 Fourth volume in the Transactions on Edutain-
7 First book on this topic 7 A fresh look at the experts ment series 7 Outstanding contributions from
theory 7 Related thesis won the ACM Disserta- EDUTAINMENT 2010 are presented together with
tion Award in 2007 Contents regular papers collected for this issue
1. Decision Analysis and Cluster Analysis.- 7 Rich overview of how edutainment technolo-
Contents 2. Association Rules Mining in Inventory Data gies can be creatively used for training and educa-
Introduction.- Locally Decodable Codes via the Base.- 3. Fuzzy Modeling and Optimization: tion purposes
the Point Removal Method.- Limitations of the Theory and Methods.- 4. Genetic Algorithm
Point Removal Method.- Private Information Based Fuzzy Nonlinear Programming.- 5. Neural From the contents
Retrieval.- References.- Index. Network and Self Organizing Maps.- 6. Privacy The Study and Design of Adaptive Learning
Preserving Data Mining.- 7. Supply Chain Design System Based on Fuzzy. Set Theory.-Modeling
Field of interest by Using Decision Analysis.- 8. Product Architec- Personalized Learning Styles in a Web-Based
Data Structures, Cryptology and Information ture and Product Development Process for Global Learning. System.-An Emotional Agent in Virtual
Theory Performance.- 9. Application of Cluster Analysis to Learning Environment.-Lunar Surface Collab-
Cellular Manufacturing.- 10. Manufacturing Cells orative Browsing System for Science Museum
Target groups Design by Cluster Analysis.- 11. Fuzzy Approach Exhibitions.-Towards a Structural Model for Inten-
Research to Quality Function Deployment-based Product tion to Play a Digital Educational Game.-Case
Planning.- 12. Decision Making with Consider- Study of FISS: Digital Game Based Learning for
Type of publication ation of Association in Supply Chains.- a Broad Range of Ages .-Woodment: Web-Based
Monograph 13. Applying Self Organizing Maps to Master Data Collaborative Multiplayer Serious Game.-Learning
Making in Automatic Exterior Inspection.- with Virtual Reality: Its Effects on Students with
14. Application for Privacy Preserving Data Different Learning Styles .-Automatic Motion
Mining. Generation Based on Path Editing from Motion
Capture Data.
Fields of interest
Data Mining and Knowledge Discovery; Engi- Fields of interest
neering Economics, Organization, Logistics, Computers and Education
Marketing; Operations Research/Decision Theory
Target groups
Target groups Research
Research
Type of publication
Type of publication Contributed volume
Monograph

Due September 2010 Due November 2010 Due July 2010

2010. VIII, 82 p. (Information Security and Cryptography) 2010. IX, 369 p. 68 illus. (Decision Engineering) 2010. X, 277 p. (Lecture Notes in Computer Science /
Hardcover Hardcover Transactions on Edutainment, Volume 6250) Softcover
7 approx. € 79,95 | £72.00 7 approx. € 104,95 | £70.00 7 €63,00 | £56.99
7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 approx. * € (D) 112,30 | € (A) 115,45 | sFr 174,50 7 * € (D) 67,41 | € (A) 69,30 | sFr 98,00
ISBN 978-3-642-14357-1 ISBN 978-1-84996-337-4 ISBN 978-3-642-14483-7

9<HTOGPC=bedfhb> 9<HTMIPJ=jgd he> 9<HTOGPC=be idh>


View publication stats

You might also like