Game of Life Cellular Automata
Game of Life Cellular Automata
net/publication/253231764
CITATIONS READS
155 4,334
1 author:
Andrew Adamatzky
University of the West of England, Bristol
872 PUBLICATIONS 13,721 CITATIONS
SEE PROFILE
All content following this page was uploaded by Andrew Adamatzky on 02 September 2014.
A. Adamatzky, University of the West of England, M. R. Berthold, Konstanz University, Germany; R. Böhme, Technische Universität Dresden, Germany
UK (Ed.) C. Borgelt, European Center for Soft Computing,
Mieres, Spain; F. Höppner, Ostfalia University of Advanced Statistical
Game of Life Cellular Applied Sciences, Wolfsburg, Germany; F. Klawonn,
Steganalysis
Ostfalia University of Applied Sciences,
Automata Wolfenbuettel, Germany
Steganography is the art and science of hiding
In the late 1960s British mathematician John Guide to Intelligent Data information in inconspicuous cover data so
Conway invented a virtual mathematical machine that even the existence of a secret message is
that operates on a two-dimensional array of square Analysis kept confidential, and steganalysis is the task of
cell. Each cell takes two states, live and dead. The How to Intelligently Make Sense of Real Data detecting secret messages in covers. This research
cells’ states are updated simultaneously and in monograph focuses on the role of cover signals,
discrete time. A dead cell comes to life if it has Each passing year bears witness to the develop- the distinguishing feature that requires us to treat
exactly three live neighbours. A live cell remains ment of ever more powerful computers, increas- steganography and steganalysis differently from
alive if two or three of its neighbours are alive, ingly fast and cheap storage media, and even other secrecy techniques. The main theoretical
otherwise the cell dies. Conway’s Game of Life higher bandwidth data connections. This makes it contribution of the book is a proposal to structure
became the most programmed solitary game and easy to believe that we can now – at least in prin- approaches to provably secure steganography
the most known cellular automaton. ciple – solve any problem we are faced with so long according to their implied assumptions on the
as we only have enough data. Yet this is not the limits of the adversary and on the nature of covers.
Features case. Although large databases allow us to retrieve A further contribution is the emphasis on dealing
7 Simple to understand examples of cellular many different single pieces of information and with heterogeneity in cover distributions, crucial
automata dynamics 7 Abundance of illustra- to compute simple aggregations, general patterns for security analyses. The author’s work comple-
tions, working examples, and codes 7 Efficient and regularities often go undetected. Further- ments earlier approaches based on information,
techniques for evaluating space-time dynamics more, it is exactly these patterns, regularities and complexity, probability and signal processing
of discrete non-linear systems 7 References to trends that are often most valuable. To avoid the theory, and he presents numerous practical impli-
online interacting demonstrations 7 Overview danger of “drowning in information, but starving cations. The scientific advances are supported by
of exciting concepts at the edge of mathematics, for knowledge” the branch of research known as a survey of the classical steganography literature;
computer science, engineering and physics data analysis has emerged, and a considerable a new proposal for a unified terminology and
number of methods and software tools have been notation that is maintained throughout the book; a
From the contents developed. However, it is not these tools alone but critical discussion of the results achieved and their
1. Introduction to Cellular Automata and Conway’s the intelligent application of human intuition in limitations; and an assessment of the possibility of
Game of Life.- Part I Historical.- 2. Conway’s combination with computational power, of sound transferring elements of this research’s empirical
Game of Life: Early Personal Recollections.- background knowledge with computer-aided perspective to other domains in information
3. Conway’s Life.- 4. Life’s Still Lifes.- 5. A Zoo of modeling, and of critical reflection with conve- security.
Life Forms.- Part II Classical Topics.- 6. Growth nient automatic model construction, that results in
and Decay in Life-Like Cellular Automata.- successful intelligent data analysis projects. Features
7. The B36/S125 “2x2” Life-Like Cellular 7 The first book dedicated to modern steganog-
Automaton.- 8. Object Synthesis in Conway’s Features raphy and steganalysis 7 The scientific advances
Game of Life and other Cellular Automata.- 7 Presents a broad-range of perspectives on data are complemented by a survey of the classical
9. Gliders and Glider Guns Discovery in Cellular analysis, providing readers with a comprehensive steganography literature 7 Author presents
Automata.- 10. Constraint Programming to Solve account of the field 7 Focuses on the practical numerous practical implications of his work
Maximal Density Still Life.- Part III Asynchronous, aspects as well as presenting the theory compre-
Continuous and Memory-Enriched Automata.- hensively 7 A special emphasis is given to put From the contents
11. Larger than Life’s Extremes: Rigorous Results on pointing out the pitfalls that lead to wrong Introduction.- Principles of Modern Steganog-
for Simplified Rules and Speculation on the Phase or insufficient analysis of results 7 Hands-on raphy and Steganalysis.- Towards a Theory of
Boundaries.- 12. RealLife.- 13. Variations on the examples are given to provide readers with further Cover Models.- Detection of Model-Based Steg-
Game of Life. insight into the topic anography with First-Order Statistics.
P. Borba, Universidade Federal de Pernambuco, C. Care, University of Warwick, Coventry, UK Ò. Celma, BMAT, Barcelona, Spain
Recife, PE, Brazil; A. Cavalcanti, University of York,
UK; A. Sampaio, Universidade Federal de Technology for Modelling Music Recommendation and
Pernambuco, Recife, PE, Brazil; J. Woodcook,
University of York, UK (Eds.) Electrical Analogies, Engineering Practice, Discovery
and the Development of Analogue The Long Tail, Long Fail, and Long Play in the
Testing Techniques in Computing Digital Music Space
Software Engineering Historians have different views on the core identity With so much more music available these days,
Second Pernambuco Summer School on of analogue computing. Some portray the tech- traditional ways of finding music have diminished.
Software Engineering, PSSE 2007, Recife, nology solely as a precursor to digital computing, Today radio shows are often programmed by large
Brazil, December 3-7, 2007, Revised Lectures whereas others stress that analogue applications corporations that create playlists drawn from a
existed well after 1940. Even within contemporary limited pool of tracks. Similarly, record stores
This tutorial book presents an augmented selection sources, there is a spectrum of understanding have been replaced by big-box retailers that have
of the material presented at the Second Pernam- around what constitutes analogue computing. ever-shrinking music departments. Instead of
buco Summer School on Software Engineering, To understand the relationship between analogue relying on DJs, record-store clerks or their friends
PSSE 2007, held in Receife, Brazil in December and digital computing, and what this means for for music recommendations, listeners are turning
2007. users today, the history must consider how the to machines to guide them to new music.In this
The 8 contributions are the thoroughly revised technology is used. Technology for Modelling book, Òscar Celma guides us through the world of
versions of the papers presented by the invited investigates the technologies, the concepts, and automatic music recommendation. He describes
lecturers. The revision was inspired by the synergy the applications of analogue computing. The text how music recommenders work, explores some
generated by the opportunity for the lecturers to asserts that analogue computing must be thought of the limitations seen in current recommenders,
present and discuss their work among themselves, of as not just a computing technology, but also as offers techniques for evaluating the effectiveness
and with the school’s attendees. The courses cover a modelling technology, demonstrating how the of music recommendations and demonstrates how
a wide spectrum of topics in software engineering history of analogue computing can be understood to build effective recommenders by offering two
with a special focus on testing - a key activity for in terms of the parallel themes of calculation and real-world recommender examples. He empha-
assuring software quality. Apart from foundational modelling. The book also includes a number of sizes the user’s perceived quality, rather than
issues, languages and techniques, the courses also detailed case studies of the technology’s use and the system’s predictive accuracy when providing
cover the semantic underpinnings of refinement, application. recommendations, thus allowing users to discover
as well as industrial applications and refinement new music by exploiting the long tail of popularity
tools. Features and promoting novel and relevant material (“non-
7 Suggests a new interpretation of the history of obvious recommendations”). In order to reach out
Features analogue computing, taking into account how the into the long tail, he needs to weave techniques
7 The book gives an detailed tutorial introduction technology has been used and applied 7 Demon- from complex network analysis and music infor-
to the scientific basis of testing strates how the history of analogue computing can mation retrieval.
7 This book is the outcome of Pernambuco be understood in terms of the two parallel themes
Summer School on Software Engineering (PSSE) of calculation and modelling, and describes how Features
2007, devoted to the study of computer science the technology evolved 7 Includes a number of 7 Starts with a formalization of the general
and to the promotion of international scientific detailed case studies examining analogue model- recommendation problem 7 Presents the
collaboration 7 includes state of the art contribu- ling in academic research, oil reservoir modelling, pros and cons of most-used recommendation
tions from invited lecturers aeronautical design, and meteorology approaches, with a focus on the music domain
7 Combines elements from recommender
Fields of interest Fields of interest systems, complex network analysis, music infor-
Software Engineering; Programming Techniques; History of Computing; Simulation and Modeling mation retrieval, and personalization
Programming Languages, Compilers, Interpreters 7 Emphasizes "user's perceived quality" versus
Target groups "system's predictive accuracy"
Target groups Research
Research Fields of interest
Type of publication Information Storage and Retrieval; Discrete
Type of publication Monograph Mathematics in Computer Science; Artificial
Graduate/Advanced undergraduate textbook Intelligence (incl. Robotics)
Target groups
Graduate
Type of publication
Monograph
E. Champion, Massey University, Auckland, New V. Cortellessa, A. Di Marco, P. Inverardi, U L'Aquila, M. Dastani, Department of Information and
Zealand Italy Computing Sciences, Utrecht, The Netherlands;
K. V. Hindriks, Delft University of Technology, The
Playing with the Past Model-Based Software Netherlands; J. C. Meyer, Department of Information
and Computing Sciences, Utrecht, The Netherlands
How can we increase awareness and understanding Performance Analysis (Eds.)
of other cultures using interactive digital visualiza-
tions of past civilizations? In order to answer the Poor performance is one of the main quality- Specification and Verification
above question, this book first examines the needs related shortcomings that cause software projects
and requirements of virtual travelers and virtual to fail. Thus, the need to address performance of Multi-agent Systems
tourists. Is there a market for virtual travel? Erik concerns early during the software develop-
Champion examines the overall success of current ment process is fully acknowledged, and there Specification and Verification of Multi-agent
virtual environments, especially the phenomenon is a growing interest in the research and soft- Systems presents a coherent treatment of the area
of computer gaming. Why are computer games and ware industry communities towards techniques, of formal specification and verification of agent-
simulations so much more successful than other methods and tools that permit to manage system based systems with a special focus on verification
types of virtual environments? Arguments that performance concerns as an integral part of soft- of multi-agent programs. This edited volume
virtual environments are impeded by technological ware engineering. Model-based software perfor- includes contributions from international leading
constraints or by a paucity of evaluation studies mance analysis introduces performance concerns researchers in the area, addressing logical formal-
can only be partially correct, for computer games in the scope of software modeling, thus allowing isms and techniques, such as model checking,
and simulations are also virtual environments. the developer to carry on performance analysis theorem proving, and axiomatisations for (semi)
Many of the underlying issues are caused by a lack throughout the software lifecycle. With this book, automatic verification of agent-based systems.
of engagement with the philosophical underpin- Cortellessa, Di Marco and Inverardi provide the
nings of culture, presence and inhabitation, and cross-knowledge that allows developers to tackle Features
there are few exemplars that engage the public with software performance issues from the very early 7 Addresses diverse topics with known results to
history and heritage using interactive media in a phases of software development. They explain provide a useful tool for students, practitioners,
meaningful and relevant manner. the basic concepts of performance analysis and researchers 7 Ties together in a coherent concep-
describe the most representative methodologies tual framework most of the available results in this
Features used to annotate and transform software models relevant area of research 7 Includes contribu-
7 There is very little concentrated literature into performance models. To this end, they go all tions from international leading researchers in the
on theory and practice in creating meaningful the way from performance primers through soft- area, addressing logical formalisms and techniques
interaction in virtual environments, especially ware and performance modeling notations to the
those designed to communicate heritage or history latest transformation-based methodologies. From the contents
7 The book covers the gap between theory, the Using Theorem Proving to Verify Proper-
design and the evaluation of virtual places for Features ties of Agent Programs.- The Refinement of
learning, especially for history and heritage 7 Integrates performance modeling into the Multi-Agent Systems.- Model Checking Agent
7 It will cover the gap between the theory, the software development process 7 Describes both Communication.- Directions for Agent Model
design and the evaluation of virtual places for the basic concepts of performance modeling and Checking.- Model Checking Logics of Strategic
learning analysis, and state-of-the-art methodologies Ability: Complexity.- Correctness of Multi-Agent
7 Self-contained textbook for courses on software Programs: A Hybrid Approach.- The Norm Imple-
Contents performance mentation Problem in Normative Multi-Agent
1. Introducing Virtual Travel.- 2. Virtual Environ- Systems.- A Verification Logic for Goal Agents.-
ments.- 3.Virtual Places.- 4. Cultural and Social Contents Using the Maude Term Rewriting Language for
Presence.- 5. Game-Style Interaction.- 6. Playing What is Software Performance Analysis.- Software Agent Development with Formal Foundations.-
With The Past.- 7. Augmenting the Present With Lifecycle and Software Performance.- Software The Cognitive Agents Specification Language and
the Past.- 8. Evaluating Virtual Heritage.- Modeling Notations.- Performance Modeling Verification Environment.- A Temporal Trace
9. Conclusion.- Index. Notations.- From Software Models to Performance Language for Formal Modelling and Analysis
Models.- Performance Model Solution and Results
Fields of interest Interpretation.- Current Trends in Software Perfor- Fields of interest
Computer Appl. in Social and Behavioral Sciences; mance. Software Engineering/Programming and
Computer Appl. in Arts and Humanities; Media Operating Systems; Artificial Intelligence (incl.
Design Fields of interest Robotics); Mathematical Logic and Formal
Software Engineering; System Performance and Languages
Target groups Evaluation; Simulation and Modeling
Research Target groups
Target groups Research
Type of publication Professional/practitioner
Monograph Type of publication
Type of publication Contributed volume
Graduate/Advanced undergraduate textbook
Due October 2010
Due September 2010 Due July 2010
2010. X, 238 p. 98 illus., 49 in color. (Human-Computer
Interaction Series) Hardcover 2010. 180 p. Hardcover 2010. XVIII, 405 p. 200 illus., 100 in color. Hardcover
7 approx. € 79,95 | £59.99 7 approx. € 54,95 | £49.99 7 approx. € 99,35 | £90.00
7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 approx. * € (D) 58,80 | € (A) 60,45 | sFr 85,50 7 approx. * € (D) 106,30 | € (A) 109,29 | sFr 165,00
ISBN 978-1-84996-500-2 ISBN 978-3-642-13620-7 ISBN 978-1-4419-6983-5
A. Dovier, University of Udine, Italy; E. Pontelli, G. Elia, University of Salento, Lecce, Italy; A. Poce, E. Estrada, M. Fox, D. J. Higham, G. Oppo, University
New Mexiko State University, Las Cruces, NM, USA (Eds.) Università Roma Tre, Italy (Eds.) of Strathclyde, Glasgow, UK (Eds.)
Type of publication
Due July 2010 Monograph
2010. XIV, 329 p. (Lecture Notes in Computer Science / Due September 2010 Due September 2010
Programming and Software Engineering, Volume 6125)
Softcover 2010. 195 p. Hardcover 2010. XVIII, 248 p. Hardcover
7 €54,00 | £48.99 7 approx. € 73,40 | £66.99 7 approx. € 79,95 | £59.95
7 * € (D) 57,78 | € (A) 59,40 | sFr 84,00 7 approx. * € (D) 78,54 | € (A) 80,74 | sFr 114,00 7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50
ISBN 978-3-642-14308-3 ISBN 978-1-4419-6853-1 ISBN 978-1-84996-395-4
J. Feng, University of Warwick, Coventry, UK; B. Furht, Florida Atlantic University, Boca Raton, FL, J. Fürnkranz, Technische Universität Darmstadt,
W. Fu, Michigan State University, East Lansing, MI, USA (Ed.) Darmstadt, Germany; E. Hüllermeier, Philipps-
USA; F. Sun, University of Southern California, Los Universität Marburg, Germany (Eds.)
Angeles, CA, USA (Eds.) Handbook of Social Network
Technologies and Preference Learning
Frontiers in Computational
and Systems Biology Applications The topic of preferences is a new branch of
machine learning and data mining, and it has
Social networking is a concept that has existed attracted considerable attention in artificial intel-
This unique volume surveys state-of-the-art for a long time; however, with the explosion of ligence research in previous years. It involves
research on statistical methods in molecular and the Internet, social networking has become a learning from observations that reveal informa-
systems biology, with contributions from leading tool for people to connect and communicate in tion about the preferences of an individual or a
experts in the field. Each chapter discusses theo- ways that were impossible in the past. The recent class of individuals. Representing and processing
retical aspects, applications to biological problems, development of Web 2.0 has provided many new knowledge in terms of preferences is appealing as
and possible future developments. Topics and applications, such as Myspace, Facebook, and it allows one to specify desires in a declarative way,
features: presents the use of thermodynamic LinkedIn. The purpose of Handbook of Social to combine qualitative and quantitative modes of
models to analyze gene regulatory mechanisms; Networks: Technologies and Applications is to reasoning, and to deal with inconsistencies and
reviews major algorithms for RNA secondary provide comprehensive guidelines on the current exceptions in a flexible manner. And, generalizing
structure prediction; discusses developments in and future trends in social network technologies beyond training data, models thus learned may
the area of oligo arrays; examines the application and applications in the field of Web-based Social be used for preference prediction. This is the first
of models of stochastic processes in nonequi- Networks. This handbook includes contributions book dedicated to this topic, and the treatment is
librium thermodynamics and biological signal from world experts in the field of social networks comprehensive. The editors first offer a thorough
transduction; describes phylogenetic footprinting from both academia and private industry. A introduction, including a systematic categorization
methods for TFBS identification; introduces penal- number of crucial topics are covered including according to learning task and learning technique,
ized regression-based methods for constructing Web and software technologies and communica- along with a unified notation. The first half of the
genetic interaction or regulatory networks; tion technologies for social networks. Web-mining book is organized into parts on label ranking,
investigates the specific role played by irreversible techniques, visualization techniques, intelligent instance ranking, and object ranking; while the
Markov processes in modeling cellular biochem- social networks, Semantic Web, and many other second half is organized into parts on applications
ical systems; explores the concept of gene modules topics are covered. Standards for social networks, of preference learning in multiattribute domains,
in a transcriptional regulatory network. case studies, and a variety of applications are information retrieval, and recommender systems.
covered as well.
Features Features
7 Reviews the current hot topics in computa- Features 7 This is the first book dedicated to this topic
tional biology and system biology, using prob- 7 Provides current and future trends in creating 7 This topic has attracted considerable attention
ability and statistics as mathematical tools intelligent social networks, and the main players in artificial intelligence research in recent years
7 With contributions by towering figures in the and their social networks applications 7 A comprehensive treatment
field from across the globe, including Prof. Michael 7 Presents web-mining techniques, visualization
Waterman and Prof. Terry Speed techniques, social networks and Semantic Web, Fields of interest
and many other topics 7 Includes contributions Artificial Intelligence (incl. Robotics); Data Mining
Fields of interest from world experts in the field of social networks and Knowledge Discovery
Computational Biology/Bioinformatics; Systems from both academia and private industry
Biology; Statistics and Computing/Statistics 7 Presents standards for social networks, case Target groups
Programs studies, and a variety of applications Research
Target groups
Research
Type of publication
Handbook
D. M. Gabbay, O. T. Rodrigues, King's College L. Gavrilovska, Ss. Cyril and Methodius University of D. Hamlet, Camas, WA, USA
London, UK; A. Russo, Imperial College London, UK Skopje, Macedonia; S. Krco, Ericsson Ireland Research
Centre, Athlone, County Westmeath, Ireland; Composing Software
Revision, Acceptability and V. Milutinovic, University of Belgrade, Serbia;
Components
I. Stojmenovic, University of Ottawa, ON, Canada;
Context R. Trobec, Jožef Stefan Institute, Ljubljana, Slovenia A Software-testing Perspective
Theoretical and Algorithmic Aspects (Eds.)
Software components and component-based soft-
An important aspect in the formalisation of Application and Multi- ware development (CBSD) are acknowledged as
common-sense reasoning is the construction of a the best approach for constructing quality software
model of what an agent believes the world to be disciplinary Aspects of at reasonable cost. Composing Software Compo-
like to help in her reasoning process. This model is Wireless Sensor Networks nents: A Software-testing Perspective describes
often incomplete or inaccurate, but new informa- a 10-year investigation into the underlying prin-
Concepts, Integration, and Case Studies
tion can be used to refine it. The study of tech- ciples of CBSD.
niques that achieve this in a rational way is the task It is a general trend in computing that computers
of the discipline of belief revision, with which this are becoming ever smaller and ever more intercon- Features
book is concerned. There are three key elements nected. Sensor networks – large networks of small, 7 Provides more than a dozen revealing case
to the book’s approach. Firstly, the methodology simple devices – are a logical extreme of this trend. studies of component synthesis 7 Includes
of logic by translation. A specific instance of this Wireless sensor networks (WSNs) are attracting supporting software (written in Perl for Linux,
is the idea of revision by translation. Revision for an increasing degree of research interest, with a Mac, and Windows) with tutorial examples and
a foreign logic is done via its translation into a growing number of industrial applications starting data for the replication of experiments 7 Presents
well-known logic, usually classic logic. Secondly, to emerge. Two of these applications, personal an original, fundamental theory of component
the technique of meta-level/object-level move- health monitoring and emergency/disaster composition based on software testing rather than
ment, where we bring some operation defined at recovery, are the focus of the European Commis- proof-of-programs
the meta-level of a logic into its object level. In this sion project ProSense: Promote, Mobilize, Rein-
book, we bring the operation of deletion to the force and Integrate Wireless Sensor Networking From the contents
object level. Finally, through Labelled Deductive Research and Researchers. This hands-on intro- Introduction.- Part I Components and Compo-
Systems, we use the context of the revision to fine- duction to WSN systems development presents a nent-based Development.- Engineering, Compo-
tune its operation and illustrate the idea through broad coverage of topics in the field, contributed nents, and Software.- Software Components
the presentation of various algorithms. by researchers involved in the ProSense project. and Component-based Development.- CBSD in
An emphasis is placed on the practical knowledge Practice and Theory.- Part II Software Testing:
Features required for the successful implementation of Practice and Theory.- Software Testing’s Place in
7 This is the most-up-to-date book on this WSNs. Divided into four parts, the first part covers Development.- Software Testing Theory.- Subdo-
topic 7 The book is suitable for researchers and basic issues of sensors, software, and position- main Testing.- Part III Composition of Compo-
postgraduates in the areas of artificial intelligence, based routing protocols. Part two focuses on nents.- Subdomain Theory of Stateless Component
database theory, and logic 7 The authors illus- multidisciplinary issues, including sensor network Composition.- Tutorial Example – SYN Tools for
trate the idea through the presentation of various integration, mobility aspects, georouting, medical Stateless Components.- Persistent State.- Concur-
algorithms applications. rent Execution.- The Other Non-functional Prop-
erty: Reliability.- Part IV Supporting Tools.- CBSD
Contents Features Support Tools.- Tool Implementation.- Debugging
Background and Overview.- Introducing Revision 7 Provides a broad overview of WSN technology, Components, Component-based Systems, and
Theory.- Stepwise Revision Operations.- Iterating and a basic introduction to related fields Support Tools.- Unfinished Business: Volunteer
Revision.- Structured Revision.- Algorithmic 7 Includes an extensive case studies section Tool Makers.- Part V Case Studies.- Accuracy of
Context Revision.- Revision by Translation.- 7 Reviews the frameworks for WSN systems Component Measurements and System Predic-
Object-Level Deletion.- Conclusions and Discus- integration, through which WSN technology is tions.- Case Studies of I-CBSD.- Part VI Impli-
sions.- List of Symbols.- Subject Index to become one of the backbones of the Future cations for Software Testing Unit vs. System
Internet concept 7 Covers real-life applications Testing.- Functional vs. Non-functional Proper-
Fields of interest of WSN systems in medical and vehicular sensor ties.- Conclusion: Lessons Learned from I-CBSD.
Artificial Intelligence (incl. Robotics); Database networks
Management Fields of interest
Fields of interest Computer-Aided Engineering (CAD, CAE) and
Target groups Computer Communication Networks Design; Models and Principles; Performance and
Research Reliability
Target groups
Type of publication Graduate Target groups
Monograph Research
Type of publication
Contributed volume Type of publication
Monograph
Due October 2010
Due August 2010 Due September 2010
2011. VI, 310 p. (Computer Communications and
2010. VI, 385 p. (Cognitive Technologies) Hardcover Networks) Hardcover 2010. XVIII, 368 p. 100 illus., 50 in color. Hardcover
7 approx. € 99,95 | £90.00 7 €79,95 | £59.95 7 approx. € 95,60 | £86.00
7 approx. * € (D) 106,95 | € (A) 109,95 | sFr 155,50 7 * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 approx. * € (D) 102,29 | € (A) 105,16 | sFr 148,50
ISBN 978-3-642-14158-4 ISBN 978-1-84996-509-5 ISBN 978-1-4419-7147-0
C. Hazay, Y. Lindell, Bar Ilan University, Israel A. G. Hoekstra, J. Kroc, P. M. Sloot (Eds.) H. Isomäki, University of Jyväskylä, Finland;
S. Pekkola, Tampere University of Technology,
Efficient Secure Two-Party Simulating Complex Systems Finland (Eds.)
Type of publication
Reference work
2010. VIII, 265 p. (Information Security and 2010. XXI, 384 p. (Understanding Complex Systems) 2011. XII, 300 p. 32 illus. (Computer Supported
Cryptography) Hardcover Hardcover Cooperative Work, Volume 201) Hardcover
7 approx. € 79,95 | £72.00 7 €119,95 | £108.00 7 €99,95 | £79.95
7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 * € (D) 128,35 | € (A) 131,95 | sFr 186,50 7 * € (D) 106,95 | € (A) 109,95 | sFr 155,50
ISBN 978-3-642-14302-1 ISBN 978-3-642-12202-6 ISBN 978-1-84996-346-6
I. Koch, Johann Wolfgang Goethe University, R. J. Lipton, Georgia Institute of Technology, Atlanta, H. Liu, University of Portsmouth, UK; D. Gu,
Frankfurt am Main, Germany; W. Reisig, Humboldt- GA, USA University of Essex, UK; R. J. Howlett, University of
University Berlin, Germany; F. Schreiber, Martin Brighton, UK; Y. Liu, University of Wales, Bangor, UK
Luther University, Halle-Wittenberg, Germany (Eds.) The P=NP Question and (Eds.)
T. Liu, Microsoft Research Asia, Beijing, China Y. Ma, K. Zhan, Z. Wang, Lanzhou University, Gansu, Z. Manna, Stanford University, Stanford, CA, USA;
China D. A. Peled, Bar Ilan University, Ramat Gan, Israel
Learning to Rank for (Eds.)
Fields of interest
Information Storage and Retrieval; Artificial Intel-
ligence (incl. Robotics); Probability and Statistics
in Computer Science
Target groups
Research
Type of publication
Monograph
Due August 2010
Due September 2010 Jointly published with Higher Education Press 2010. VIII, 413 p. (Lecture Notes in Computer Science /
Theoretical Computer Science and General Issues,
2010. 300 p. Hardcover 2010. 260 p. 90 illus. Hardcover Volume 6200) Softcover
7 approx. € 79,95 | £72.00 7 €129,95 | £117.00 7 €62,00 | £55.99
7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 * € (D) 139,05 | € (A) 142,94 | sFr 202,00 7 * € (D) 66,34 | € (A) 68,20 | sFr 96,50
ISBN 978-3-642-14266-6 ISBN 978-3-642-13744-0 ISBN 978-3-642-13753-2
es
N. Memon, University of Southern Denmark, Odense, X. Meng, Information School, Renmin University of
New Seri Denmark; R. Alhajj, University of Calgary, AB, Canada
(Eds.)
China, Beijing, China; J. Chen, EMC Research China,
Beijing, China
Target groups
Research
Type of publication
Monograph
9<HTOHLJ=bacjda> 9<HTOGPC=bdbjib>
springer.com/NEWSonline Springer News 7/8/2010 Computer Science 83
J. Nin, J. Herranz, Universitat Politècnica de C. W. Probst, Technical University of Denmark, M. Rusiñol, J. Lladós, Universitat Autònoma de
Catalunya, Spain (Eds.) Kongens Lyngby, Denmark; J. Hunker, Pittsburgh, PA, Barcelona, Bellaterra, Barcelona, Spain
USA; D. Gollmann, Technical University Hamburg-
Privacy and Anonymity in Harburg, Hamburg, Germany; M. Bishop, University Symbol Spotting in Digital
of California, Davis, CA, USA (Eds.)
Information Management Libraries
Systems Insider Threats in Cyber Focused Retrieval over Graphic-rich
New Techniques for New Practical Problems Security Document Collections
A. Sadeghi, Ruhr-Universität Bochum, Bochum, M. E. Schuckers, St Lawrence University, Canton, NY, L. Shao, University of Sheffield, UK; C. Shan, Philips
Germany; D. Naccache, École normale supérieure, USA Research Laboratories, Eindhoven, The Netherlands;
Cedex, Paris, France J. Luo, Kodak Research Laboratories, Rochester, NY,
Computational Methods in USA; M. Etoh, NTT Docomo, Yokosuka, Kanagawa,
Towards Hardware-Intrinsic Biometric Authentication Japan (Eds.)
2010. Approx. 780 p. (Information Security and 2010. XXV, 317 p. (Information Science and Statistics) 2010. X, 304 p. 300 illus., 150 in color. (Advances in
Cryptography) Hardcover Hardcover Pattern Recognition) Hardcover
7 approx. € 99,95 | £90.00 7 €99,95 | £90.00 7 approx. € 79,95 | £59.95
7 approx. * € (D) 106,95 | € (A) 109,95 | sFr 155,50 7 * € (D) 106,95 | € (A) 109,95 | sFr 155,50 7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50
ISBN 978-3-642-14451-6 ISBN 978-1-84996-201-8 ISBN 978-1-84996-506-4
Y. Q. Shi, New Jersey Institute of Technology, Newark, R. Slowinski, Poznań University of Technology, G. Viscusi, University of Milano-Bicocca, Italy;
NJ, USA (Ed.) Poland; P. Lingras, Saint Mary's University, Halifax, M. Mecella, University of Rome, Italy; C. Batini,
NS, Canada; S. Tsumoto, Shimane University, Izumo, University of Milano-Bicocca, Italy
Transactions on Data Hiding Japan; D. Miao, Tongji University, Shanghai, China
2010. XI, 129 p. (Lecture Notes in Computer Science / 2010. X, 339 p. 5 illus. in color. (Lecture Notes in Due September 2010
Transactions on Data Hiding and Multimedia Security, Computer Science / Transactions on Rough Sets,
Volume 6010) Softcover Volume 6190) Softcover 2010. 319 p. Hardcover
7 €46,00 | £41.99 7 approx. € 73,00 | £65.99 7 €54,95 | £49.99
7 * € (D) 49,22 | € (A) 50,60 | sFr 71,50 7 approx. * € (D) 78,11 | € (A) 80,30 | sFr 113,50 7 * € (D) 58,80 | € (A) 60,45 | sFr 85,50
ISBN 978-3-642-14297-0 ISBN 978-3-642-14466-0 ISBN 978-3-642-13570-5
S. Yekhanin, Microsoft Research, Mountain View, CA, Y. Yin, Yamagata University, Yamagata, Japan; X. Zhang, IACAS, Beijing, China; K. Wong, Murdoch
USA I. Kaku, Akita Prefectural University, Yulihonjo, Japan; University, Perth, WA, Australia (Eds.)
J. Tang, Northeastern University, Shenyang, China;
Locally Decodable Codes and J. Zhu, Central University of Finance and Economics, Transactions on
Beijing, China
Private Information Retrieval Edutainment IV
Schemes Data Mining
Editors-in-chief: Z. Pan, Zhejiang University, China;
Locally decodable codes (LDCs) are codes that Concepts, Methods and Applications in A. D. Cheok, NUS, Singapore; W. Müller, University of
simultaneously provide efficient random access Management and Engineering Design Education, Weingarten, Germany
retrieval and high noise resilience by allowing reli-
able reconstruction of an arbitrary bit of a message Data Mining introduces in clear and simple ways This journal subline serves as a forum for
by looking at only a small number of randomly how to use existing data mining methods to obtain stimulating and disseminating innovative research
chosen codeword bits. Local decodability comes effective solutions for a variety of management and ideas, theories, emerging technologies, empirical
with a certain loss in terms of efficiency – specifi- engineering design problems. investigations, state-of-the-art methods, and tools
cally, locally decodable codes require longer Data Mining is organised into two parts: the first in all different genres of edutainment, such as
codeword lengths than their classical counterparts. provides a focused introduction to data mining game-based learning and serious games, interac-
Private information retrieval (PIR) schemes are and the second goes into greater depth on subjects tive storytelling, virtual learning environments,
cryptographic protocols designed to safeguard such as customer analysis. It covers almost all VR-based education, and related fields. It covers
the privacy of database users. They allow clients managerial activities of a company. aspects from educational and game theories,
to retrieve records from public databases while human-computer interaction, computer graphics,
completely hiding the identity of the retrieved Features artificial intelligence, and systems design.
records from database owners. 7 Introduces data mining methods for the solu-
tion of design issues 7 Presents methods for Features
Features preprocessing data prior to mining 7 Written by 7 Fourth volume in the Transactions on Edutain-
7 First book on this topic 7 A fresh look at the experts ment series 7 Outstanding contributions from
theory 7 Related thesis won the ACM Disserta- EDUTAINMENT 2010 are presented together with
tion Award in 2007 Contents regular papers collected for this issue
1. Decision Analysis and Cluster Analysis.- 7 Rich overview of how edutainment technolo-
Contents 2. Association Rules Mining in Inventory Data gies can be creatively used for training and educa-
Introduction.- Locally Decodable Codes via the Base.- 3. Fuzzy Modeling and Optimization: tion purposes
the Point Removal Method.- Limitations of the Theory and Methods.- 4. Genetic Algorithm
Point Removal Method.- Private Information Based Fuzzy Nonlinear Programming.- 5. Neural From the contents
Retrieval.- References.- Index. Network and Self Organizing Maps.- 6. Privacy The Study and Design of Adaptive Learning
Preserving Data Mining.- 7. Supply Chain Design System Based on Fuzzy. Set Theory.-Modeling
Field of interest by Using Decision Analysis.- 8. Product Architec- Personalized Learning Styles in a Web-Based
Data Structures, Cryptology and Information ture and Product Development Process for Global Learning. System.-An Emotional Agent in Virtual
Theory Performance.- 9. Application of Cluster Analysis to Learning Environment.-Lunar Surface Collab-
Cellular Manufacturing.- 10. Manufacturing Cells orative Browsing System for Science Museum
Target groups Design by Cluster Analysis.- 11. Fuzzy Approach Exhibitions.-Towards a Structural Model for Inten-
Research to Quality Function Deployment-based Product tion to Play a Digital Educational Game.-Case
Planning.- 12. Decision Making with Consider- Study of FISS: Digital Game Based Learning for
Type of publication ation of Association in Supply Chains.- a Broad Range of Ages .-Woodment: Web-Based
Monograph 13. Applying Self Organizing Maps to Master Data Collaborative Multiplayer Serious Game.-Learning
Making in Automatic Exterior Inspection.- with Virtual Reality: Its Effects on Students with
14. Application for Privacy Preserving Data Different Learning Styles .-Automatic Motion
Mining. Generation Based on Path Editing from Motion
Capture Data.
Fields of interest
Data Mining and Knowledge Discovery; Engi- Fields of interest
neering Economics, Organization, Logistics, Computers and Education
Marketing; Operations Research/Decision Theory
Target groups
Target groups Research
Research
Type of publication
Type of publication Contributed volume
Monograph
2010. VIII, 82 p. (Information Security and Cryptography) 2010. IX, 369 p. 68 illus. (Decision Engineering) 2010. X, 277 p. (Lecture Notes in Computer Science /
Hardcover Hardcover Transactions on Edutainment, Volume 6250) Softcover
7 approx. € 79,95 | £72.00 7 approx. € 104,95 | £70.00 7 €63,00 | £56.99
7 approx. * € (D) 85,55 | € (A) 87,95 | sFr 124,50 7 approx. * € (D) 112,30 | € (A) 115,45 | sFr 174,50 7 * € (D) 67,41 | € (A) 69,30 | sFr 98,00
ISBN 978-3-642-14357-1 ISBN 978-1-84996-337-4 ISBN 978-3-642-14483-7