managing and mining sensor outlier analysis principles of ... · fewer assumptions– the data can...

8
Computer Science springer.com/NEWSonline 22 C. C. Aggarwal, IBM, Yorktown Heights, NY, USA (Ed) Managing and Mining Sensor Data Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and have even been integrated into day-to-day devices of use, such as mobile phones. is has lead to a much larger scale of applicability and mining of sensor data sets. Features 7 Structured as a set of survey chapters, the book provides easy access to the material from a vast area in one place 7 Cross-disciplinary approach with topics related to both data-centric and sensor-centric aspects 7 Topics include: Stream Management Systems, Event Processing in Sensor Streams, Multimedia Sensor Mining, Social Sensing, Sensing for Mobile Objects Contents An Introduction to Sensor Data Analytics.- A Survey of Model-based Sensor Data Acquisition and Management.- Query Processing in Wireless Sensor Networks.- Event Processing in Sensor Streams.- Dimensionality Reduction and Filtering on Time Series Sensor Streams.- Mining Sensor Data Streams.- Real-Time Data Analytics in Sen- sor Networks.- Distributed Data Mining in Sensor Networks.- Social Sensing.- Sensing for Mobile Objects.- A Survey of RFID Data Processing.- e Internet of ings: A Survey from the Data- Centric Perspective.- Data Mining for Sensor Bug Diagnosis.- Mining of Sensor Data in Healthcare: A Survey.- Earth Science Applications of Sensor Data. Fields of interest Data Mining and Knowledge Discovery; Database Management; Information Storage and Retrieval Target groups Research Discount group Professional Non-Medical Due January 2013 2013. V, 545 p. 68 illus., 8 in color. Hardcover 7 approx. $149.00 ISBN 978-1-4614-6308-5 9<HTMERB=egdaif> C. C. Aggarwal, IBM, Yorktown Heights, NY, USA Outlier Analysis With the increasing advances in hardware techno- logy for data collection, and advances in soſtware technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions– the data can be of any type, structured or unstructured, and may be extre- mely large. Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and computer scientists. Features 7 Each chapter contains key research content on the topic, case studies, extensive bibliographic notes and the future direction of research in this field 7 Covers applications for credit card fraud, network intrusion detection, law enforcement and more 7 Content is simplified so students and practitioners can also benefit from this book Contents An Introduction to Outlier Analysis.- Probabilistic and Statistical Models for Outlier Detection.- Li- near Models for Outlier Detection.- Proximity- based Outlier Detection.- High-Dimensional Outlier Detection: e Subspace Method.- Su- pervised Outlier Detection.- Outlier Detection in Categorical, Text and Mixed Attribute Data.- Time Series and Multidimensional Streaming Outlier Detection.- Outlier Detection in Discrete Sequen- ces.- Spatial Outlier Detection.- Outlier Detection in Graphs and Networks.- Applications of Outlier Analysis. Fields of interest Data Mining and Knowledge Discovery; Artificial Intelligence (incl. Robotics); Statistics and Com- puting/Statistics Programs Target groups Research Discount group Professional Non-Medical Due February 2013 2013. V, 445 p. 50 illus., 6 in color. Hardcover 7 approx. $129.00 ISBN 978-1-4614-6395-5 9<HTMERB=egdjff> M. Bramer, University of Portsmouth, UK Principles of Data Mining Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas. Features 7 Presents the principal techniques of data mi- ning with particular emphasis on explaining and motivating the techniques used 7 Focuses on understanding of the basic algorithms and aware- ness of their strengths and weaknesses 7 Useful as a textbook and also for self-study 7 Substan- tially expanded second edition 7 Each chapter contains practical exercises to enable readers to check their progress, and there is a full glossary of technical terms Contents Introduction to Data Mining.- Data for Data Mi- ning.- Introduction to Classification: Naïve Bayes and Nearest Neighbour.- Using Decision Trees for Classification.- Decision Tree Induction: Using Entropy for Attribute Selection.- Decision Tree Induction: Using Frequency Tables for Attribute Selection.- Estimating the Predictive Accuracy of a Classifier.- Continuous Attributes.- Avoi- ding Overfitting of Decision Trees.- More About Entropy.- Inducing Modular Rules for Classifica- tion.- Measuring the Performance of a Classifier.- Dealing with Large Volumes of Data.- Ensemble Classification.- Comparing Classifiers.- Associate Rule Mining I.- Associate Rule Mining II.- As- sociate Rule Mining III.- Clustering.- Mining.- Appendix A – Essential Mathematics.- Appendix B – Datasets.- Appendix C – Sources of Further Information.- Appendix D – Glossary and Nota- tion.- Appendix E – Solutions to Self-assessment Exercises.- Index. Fields of interest Information Storage and Retrieval; Database Ma- nagement; Artificial Intelligence (incl. Robotics) Target groups Lower undergraduate Discount group Professional Non-Medical Due March 2013 2nd ed. 2013. XII, 440 p. 240 illus. (Undergraduate Topics in Computer Science) Softcover 7 $59.95 ISBN 978-1-4471-4883-8 9<HTMEPH=beiidi>

Upload: others

Post on 26-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Managing and Mining Sensor Outlier Analysis Principles of ... · fewer assumptions– the data can be of any type, structured or unstructured, and may be extre-mely large. Outlier

Computer Science springer.com/NEWSonline

22

C. C. Aggarwal, IBM, Yorktown Heights, NY, USA (Ed)

Managing and Mining Sensor DataAdvances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and  have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor data sets.

Features 7 Structured as a set of survey chapters, the book provides easy access to the material from a vast area in one place 7 Cross-disciplinary approach with topics related to both data-centric and sensor-centric aspects 7 Topics include: Stream Management Systems, Event Processing in Sensor Streams, Multimedia Sensor Mining, Social Sensing, Sensing for Mobile Objects

Contents An Introduction to Sensor Data Analytics.- A Survey of Model-based Sensor Data Acquisition and Management.- Query Processing in Wireless Sensor Networks.- Event Processing in Sensor Streams.- Dimensionality Reduction and Filtering on Time Series Sensor Streams.- Mining Sensor Data Streams.- Real-Time Data Analytics in Sen-sor Networks.- Distributed Data Mining in Sensor Networks.- Social Sensing.- Sensing for Mobile Objects.- A Survey of RFID Data Processing.- The Internet of Things: A Survey from the Data-Centric Perspective.- Data Mining for Sensor Bug Diagnosis.- Mining of Sensor Data in Healthcare: A Survey.- Earth Science Applications of Sensor Data.

Fields of interestData Mining and Knowledge Discovery; Database Management; Information Storage and Retrieval

Target groupsResearch

Discount groupProfessional Non-Medical

Due January 2013

2013. V, 545 p. 68 illus., 8 in color. Hardcover7 approx. $149.00ISBN 978-1-4614-6308-5

9<HTMERB=egdaif>

C. C. Aggarwal, IBM, Yorktown Heights, NY, USA

Outlier AnalysisWith the increasing advances in hardware techno-logy for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions– the data can be of any type, structured or unstructured, and may be extre-mely large. Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and computer scientists.

Features 7 Each chapter contains key research content on the topic, case studies, extensive bibliographic notes and the future direction of research in this field 7 Covers applications for credit card fraud, network intrusion detection, law enforcement and more 7 Content is simplified so students and practitioners can also benefit from this book

Contents An Introduction to Outlier Analysis.- Probabilistic and Statistical Models for Outlier Detection.- Li-near Models for Outlier Detection.- Proximity-based Outlier Detection.- High-Dimensional Outlier Detection: The Subspace Method.- Su-pervised Outlier Detection.- Outlier Detection in Categorical, Text and Mixed Attribute Data.- Time Series and Multidimensional Streaming Outlier Detection.- Outlier Detection in Discrete Sequen-ces.- Spatial Outlier Detection.- Outlier Detection in Graphs and Networks.- Applications of Outlier Analysis.

Fields of interestData Mining and Knowledge Discovery; Artificial Intelligence (incl. Robotics); Statistics and Com-puting/Statistics Programs

Target groupsResearch

Discount groupProfessional Non-Medical

Due February 2013

2013. V, 445 p. 50 illus., 6 in color. Hardcover7 approx. $129.00ISBN 978-1-4614-6395-5

9<HTMERB=egdjff>

M. Bramer, University of Portsmouth, UK

Principles of Data MiningData Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.

Features 7 Presents the principal techniques of data mi-ning with particular emphasis on explaining and motivating the techniques used 7 Focuses on understanding of the basic algorithms and aware-ness of their strengths and weaknesses 7 Useful as a textbook and also for self-study 7 Substan-tially expanded second edition 7 Each chapter contains practical exercises to enable readers to check their progress, and there is a full glossary of technical terms

Contents Introduction to Data Mining.- Data for Data Mi-ning.- Introduction to Classification: Naïve Bayes and Nearest Neighbour.- Using Decision Trees for Classification.- Decision Tree Induction: Using Entropy for Attribute Selection.- Decision Tree Induction: Using Frequency Tables for Attribute Selection.- Estimating the Predictive Accuracy of a Classifier.- Continuous Attributes.- Avoi-ding Overfitting of Decision Trees.- More About Entropy.- Inducing Modular Rules for Classifica-tion.- Measuring the Performance of a Classifier.- Dealing with Large Volumes of Data.- Ensemble Classification.- Comparing Classifiers.- Associate Rule Mining I.- Associate Rule Mining II.- As-sociate Rule Mining III.- Clustering.- Mining.- Appendix A – Essential Mathematics.- Appendix B – Datasets.- Appendix C – Sources of Further Information.- Appendix D – Glossary and Nota-tion.- Appendix E – Solutions to Self-assessment Exercises.- Index.

Fields of interestInformation Storage and Retrieval; Database Ma-nagement; Artificial Intelligence (incl. Robotics)

Target groupsLower undergraduate

Discount groupProfessional Non-Medical

Due March 2013

2nd ed. 2013. XII, 440 p. 240 illus. (Undergraduate Topics in Computer Science) Softcover7 $59.95ISBN 978-1-4471-4883-8

9<HTMEPH=beiidi>

Page 2: Managing and Mining Sensor Outlier Analysis Principles of ... · fewer assumptions– the data can be of any type, structured or unstructured, and may be extre-mely large. Outlier

News 1/2013 Computer Science

23

R. L. Cordeiro, University of São Paulo, Brazil; C. Faloutsos, Carnegie Mellon University, Pittsburgh, PA, USA; C. Traina Júnior, University of São Paulo, Brazil

Data Mining in Large Sets of Complex DataThe amount and the complexity of the data gathe-red by current enterprises are increasing at an exponential rate. Consequently, the analysis of Big Data is nowadays a central challenge in Computer Science, especially for complex data. For example, given a satellite image database containing tens of Terabytes, how can we find regions aiming at identifying native rainforests, deforestation or re-forestation? Can it be made automatically? Based on the work discussed in this book, the answers to both questions are a sound “yes”, and the results can be obtained in just minutes. In fact, results that used to require days or weeks of hard work from human specialists can now be obtained in minutes with high precision. Data Mining in Large Sets of Complex Data discusses new algorithms that take steps forward from traditional data mining (especially for clustering) by considering large, complex datasets.

Features 7 Contains a survey on clustering algorithms for moderate-to-high dimensionality data 7 In-cludes examples of applications in breast cancer diagnosis, region detection in satellite images, as-sistance to climate change forecast, recommender systems for the Web, and social networks

Contents Preface.- Introduction.- Related Work and Con-cepts.- Clustering Methods for Moderate-to-High Dimensionality Data.- Halite.- BoW.- QMAS.- Conclusion.

Fields of interestData Mining and Knowledge Discovery; Database Management

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2013

2013. IX, 119 p. 37 illus., 25 in color. (SpringerBriefs in Computer Science) Softcover7 $39.95ISBN 978-1-4471-4889-0

9<HTMEPH=beiija>

A. Criminisi, J. Shotton, Microsoft Research Ltd., Cambridge, UK (Eds)

Decision Forests for Computer Vision and Medical Image AnalysisContents Overview and Scope.- Notation and Terminology.- Part I: The Decision Forest Model.- Introduction.- Classification Forests.- Regression Forests.- Den-sity Forests.- Manifold Forests.- Semi-Supervised Classification Forests.- Part II: Applications in Computer Vision and Medical Image Analysis.- Keypoint Recognition Using Random Forests and Random Ferns.- Extremely Randomized Trees and Random Subwindows for Image Classifica-tion, Annotation, and Retrieval.- Class-Specific Hough Forests for Object Detection.- Hough-Based Tracking of Deformable Objects.- Efficient Human Pose Estimation from Single Depth Images.- Anatomy Detection and Localization in 3D Medical Images.- Semantic Texton Forests for Image Categorization and Segmentation.- Semi-Supervised Video Segmentation Using Decision Forests.- Classification Forests for Semantic Segmentation of Brain Lesions in Multi-Channel MRI.- Manifold Forests for Multi-Modality Classi-fication of Alzheimer’s Disease.- Entangled Forests and Differentiable Information Gain Maximiza-tion.- Decision Tree Fields.- Part III: Implemen-tation and Conclusion.- Efficient Implementation of Decision Forests.- The Sherwood Software Library.- Conclusions.

Fields of interestPattern Recognition; Artificial Intelligence (incl. Robotics)

Target groupsResearch

Discount groupProfessional Non-Medical

Due January 2013

2013. XXVI, 366 p. 140 illus., 135 in color. (Advances in Computer Vision and Pattern Recognition) Hardcover7 $129.00ISBN 978-1-4471-4928-6

9<HTMEPH=bejcig>

M. Dumas, University of Tartu, Estonia; M. La Rosa, Queensland University of Technology, Brisbane, QLD, Australia; J. Mendling, Vienna University of Economics and Business, Austria; H. A. Reijers, Eindhoven University of Technology, The Netherlands

Fundamentals of Business Process ManagementBusiness Process Management (BPM) is the art and science of how work should be performed in an organization in order to ensure consistent outputs and to take advantage of improvement op-portunities, e.g. reducing costs, execution times or error rates. Importantly, BPM is not about impro-ving the way individual activities are performed, but rather about managing entire chains of events, activities and decisions that ultimately produce added value for an organization and its customers.

Features 7 Encompasses the whole BPM lifecycle, inclu-ding process identification, modelling, analysis, redesign, automation and monitoring 7 Class-tested textbook complemented with additional teaching material on the accompanying web-site 7 Covers both relevant conceptual back-ground, industrial standards and actionable skills

Contents Introduction to Business Process Manage-ment.- Process Identification.- Essential Process Modeling.- Advanced Process Modeling.- Process Discovery.- Qualitative Process Analysis.- Quan-titative Process Analysis.- Process Redesign.- Pro-cess Automation.- Process Intelligence.

Fields of interestComputer Appl. in Administrative Data Proces-sing; Business Information Systems; Information Systems Applications (incl.Internet)

Target groupsGraduate

Discount groupProfessional Non-Medical

Due March 2013

2013. XXVIII, 406 p. 135 illus., 8 in color. Hardcover7 $79.95ISBN 978-3-642-33142-8

9<HTOGPC=ddbeci>

Page 3: Managing and Mining Sensor Outlier Analysis Principles of ... · fewer assumptions– the data can be of any type, structured or unstructured, and may be extre-mely large. Outlier

Computer Science springer.com/NEWSonline

24

H. ElAarag, Stetson University, DeLand, FL, USA

Web Proxy Cache Replacement StrategiesSimulation, Implementation, and Performance Evaluation

With contrib. by: S. Romano, Google, Pittsburgh, PA, USA; J. Cobb, Georgia Institute of Technology, Atlanta, GA, USA

This work presents a study of cache replacement strategies designed for static web content. Proxy servers can improve performance by caching static web content such as cascading style sheets, java script source files, and large files such as images. This topic is particularly important in wireless ad hoc networks, in which mobile devices act as proxy servers for a group of other mobile devices.

Features 7 Presents the simulation of 27 proxy cache replacement strategies, reviewing these by several important performance measures 7 Introduces the novel Neural Network Proxy Cache Replace-ment (NNPCR) approach, which utilizes neural networks for replacement decisions 7 Examines the implementation of NNPCR in a real environ-ment

Contents Introduction.- Background Information.- Arti-ficial Neural Networks.- A Quantitative Study of Web Cache Replacement Strategies using Simu-lation.- Web Proxy Cache Replacement Scheme Based on Back Propagation Neural Network.- Im-plementation of a Neural Network Proxy Cache Replacement Strategy in the Squid Proxy Server.

Fields of interestSimulation and Modeling; Computer Commu-nication Networks; System Performance and Evaluation

Target groupsResearch

Discount groupProfessional Non-Medical

Due January 2013

2013. X, 104 p. 81 illus., 15 in color. (SpringerBriefs in Computer Science) Softcover7 $39.95ISBN 978-1-4471-4892-0

9<HTMEPH=beijca>

A. Hameurlain, Paul Sabatier University, Toulouse, France; J. Küng, R. Wagner, University of Linz, Austria (Eds)

Transactions on Large-Scale Data- and Knowledge-Centered Systems VIIThe LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force be-hind application development in all domains.

Features 7 Contains detailed revised selected pa-pers 7 Focuses on a wide range of topics, from data management to service-oriented compu-ting 7 Includes a preface, introducing the five papers in the volume

Contents RFID Data Management and Analysis via Tensor Calculus.- Processing Exact Results for Windowed Stream Joins in a Memory-Limited System: A Disk-Based, Adaptive Approach.- Reducing the Semantic Heterogeneity of Unstructured P2P Sys-tems: A Contribution Based on a Dissemination Protocol.- Towards a Scalable Semantic Prove-nance Management System.- A Unified Concep-tual Framework for Service-Oriented Computing: Aligning Models of Architecture and Utilization.

Fields of interestDatabase Management; Data Mining and Know-ledge Discovery; Artificial Intelligence (incl. Robotics)

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2012. X, 171 p. 68 illus. (Lecture Notes in Computer Science / Transactions on Large-Scale Data- and Knowledge-Centered Systems, Volume 7720) Softcover7 $98.00ISBN 978-3-642-35331-4

9<HTOGPC=dfddbe>

S. A. Hamid, H. S. Hassanein, G. Takahara, Queen‘s University, Kingston, ON, Canada

Routing for Wireless Multi-Hop NetworksThe focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop rou-ting protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop routing protocol. Also presented is a glimpse of the ideal wireless multi-hop routing protocol along with several open issues.

Contents Introduction to Wireless Multi-Hop Networks.- Routing for Wireless Multi-Hop Neworks: Unify-ing Features.- Routing for Wireless Multi-Hop Networks: Distinguishing Features.- Conclusions and Open Issues.

Fields of interestComputer Communication Networks; Communi-cations Engineering, Networks

Target groupsResearch

Discount groupProfessional Non-Medical

Due January 2013

2013. XIII, 109 p. 14 illus. (SpringerBriefs in Computer Science) Softcover7 $39.95ISBN 978-1-4614-6356-6

9<HTMERB=egdfgg>

Page 4: Managing and Mining Sensor Outlier Analysis Principles of ... · fewer assumptions– the data can be of any type, structured or unstructured, and may be extre-mely large. Outlier

News 1/2013 Computer Science

25

S. Holland, K. Wilkie, P. Mulholland, The Open University, Milton Keynes, UK; A. Seago, London Metropolitan University, UK (Eds)

Music and Human-Computer InteractionContents Music Interaction: Understanding Music and Human-Computer Interaction.- Should Music Interaction Be Easy?.- Amateur Musicians, Long-term Engagement, and HCI.- Affective Musical Interaction: Influencing Users’ Behaviour and Experiences with Music.- Chasing a Feeling: Experience in Computer Support Jamming.- The Haptic Bracelets: Learning Multi-limb Rhythm Skills from Haptic Stimuli whilst Reading.- Piano Technique as a Case Study in Expressive Gestural Interaction.- Live Music-making: A Rich Open Task Requires a Rich Open Interface.- A New Interaction Strategy for Musical Timbre Design.- Pulsed Melodic Processing – The Use of Melodies in Affective Computations for Increased Proces-sing Transparency.- Computer Musicking: HCI, CSCW, and Collaborative Digital Musical Inter-action.- Song Walker Harmony Space: Embodied Interaction Design for Complex Musical Skills.- Evolutionary and Generative Music Informs Music HCI – and vice versa.- Video Analysis for Evaluating Music Interaction: Musical Tabletops.- Towards a Participatory Approach for Interaction Design based on Conceptual Metaphor Theory: A Case Study from Music Interaction.- Appropriate and Complementary Rhythmic Improvisation in an Interactive Music System.- Index.

Fields of interestUser Interfaces and Human Computer Interaction; Computer Appl. in Arts and Humanities; Compu-ters and Education

Target groupsResearch

Discount groupProfessional Non-Medical

Due March 2013

2013. XII, 286 p. 60 illus., 44 in color. (Springer Series on Cultural Computing) Hardcover7 $129.00ISBN 978-1-4471-2989-9

9<HTMEPH=bcjijj>

B.‑O. Küppers, U. Hahn, S. Artmann, Friedrich-Schiller-Univerität Jena, Germany (Eds)

Evolution of Semantic SystemsComplex systems in nature and society make use of information for the development of their inter-nal organization and the control of their functio-nal mechanisms. Alongside technical aspects of storing, transmitting and processing information, the various semantic aspects of information, such as meaning, sense, reference and function, play a decisive part in the analysis of such systems. With the aim of fostering a better understanding of semantic systems from an evolutionary and multi-disciplinary perspective, this volume collects con-tributions by philosophers and natural scientists, linguists, information and computer scientists.

Features 7 Presents a multidisciplinary perspective on semantic systems and information proces-sing 7 Discusses topics ranging from underlying universal principles to paradigmatic examp-les 7 Combines presentations by leading re-searchers from the fields of philosophy, computer science, and the natural sciences

Contents The Emergence of Reference.- Pragmatism and the Evolution of Semantic Systems.- System Surfaces - There Is Never Just Only One Structure.- Elements of a Semantic Code.- Talking about Structures.- Toward a Theory of Information Structure.- Me-chanics and Mental Change.- Semantic Techno-logies: A Computational Paradigm for Making Sense of Informal Meaning Structures.- What are Ontologies good for?.- Taxonomic Change as a Reflection of Progress in a Scientific Discipline.- Crystallization as a Form of Scientific Semantic Change: The Case of Thermodynamics.

Fields of interestArtificial Intelligence (incl. Robotics); Models and Principles; Coding and Information Theory

Target groupsResearch

Discount groupProfessional Non-Medical

Due January 2013

2013. XII, 222 p. 48 illus., 7 in color. Hardcover7 $109.00ISBN 978-3-642-34996-6

9<HTOGPC=dejjgg>

G. T. Leavens, University of Central Florida, Orlando, FL, USA; S. Chiba, The University of Tokyo, Japan; M. Haupt, Oracle Labs, Potsdam, Germany; K. Ostermann, University of Marburg, Germany; E. Wohlstadter, University of British Columbia, Vancouver, BC, Canada (Eds)

Transactions on Aspect-Oriented Software Development IXThe LNCS journal Transactions on Aspect-Orien-ted Software Development is devoted to all facets of aspect-oriented software development (AOSD) techniques in the context of all phases of the soft-ware life cycle, from requirements and design to implementation, maintenance and evolution.

Features 7 Contains up-to-date results from the field of Aspect-Oriented Software Development 7 Inclu-des a special section on Modularity in Systems Software 7 A further section on Modularity Concepts in Programming Languages is also included

Contents Domain-Driven Discovery of Stable Abstractions for Pointcut Interfaces.- Aspect of Assembly: From Theory to Performance.- Dynamic Aspect-Oriented Programming in Java: The HotWave Experience.- Abstracting Context in Event-Based Software.- The Aspect-Aware Design and Implementation of the CiAO Operating-System Family.- First-Class Compositions: Defining and Composing Object and Aspect Compositions with First-Class Operators.- Challenges in the Design of the Package Template Mechanism.

Fields of interestSoftware Engineering; Programming Languages, Compilers, Interpreters; Logics and Meanings of Programs

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2012. XIV, 307 p. 97 illus. (Lecture Notes in Computer Science / Transactions on Aspect-Oriented Software Development, Volume 7271) Softcover7 $113.00ISBN 978-3-642-35550-9

9<HTOGPC=dfffaj>

Page 5: Managing and Mining Sensor Outlier Analysis Principles of ... · fewer assumptions– the data can be of any type, structured or unstructured, and may be extre-mely large. Outlier

Computer Science springer.com/NEWSonline

26

C. Meinel, H. Sack, Hasso Plattner Institute, Potsdam, Germany

InternetworkingTechnological Foundations and Applications

This book is supposed to serve as a comprehensive and instructive guide through the new world of di-gital communication. On the physical layer optical and electrical cabling technology are described as well as wireless communication technologies. On the data link layer local area networks (LANs) are introduced together with the most popular LAN technologies such as Ethernet, Token Ring, FDDI, and ATM as well as wireless LAN technologies including IEEE 802.x, Bluetooth, or ZigBee.

Features 7 Step-by-step tutorials help the reader to understand the complete technical world of Inter-net 7 Beside general purpose description expert details are given in various excursions 7 The book can also be used as an compendium for Internet technologies

Contents Prologue.- The Foundation of the Internet : TCP/IP Reference Model.- Physical Layer.- Network Access Layer (1): Wired LAN Technologies.- Network Access Layer (2): Wireless Mobile LAN Technologies.- Network Access Layer (3): WAN Technologies.- Internet Layer.- Transport Layer.- Application Layer and Internet Applications.- Epilogue.- List of Persons.- Abbreviations and Acronyms.- Bibliography.- Index.

Fields of interestComputer Systems Organization and Communi-cation Networks; Information Systems Applica-tions (incl.Internet); Computer Communication Networks

Target groupsProfessional/practitioner

Discount groupProfessional Non-Medical

Due April 2013

2013. Approx. 920 p. 357 illus. (X.media.publishing) Hardcover7 approx. $139.00ISBN 978-3-642-35391-8

9<HTOGPC=dfdjbi>

G. Montavon, Technische Universität Berlin, Germany; G. Orr, Willamette University, Salem, OR, USA; K.‑R. Müller, Technische Universität Berlin, Germany (Eds)

Neural Networks: Tricks of the TradeContents Introduction.- Preface on Speeding Learning.- 1. Efficient BackProp.- Preface on Regularization Techniques to Improve Generalization.- 2. Early Stopping — But When?.- 3. A Simple Trick for Estimating the Weight Decay Parameter.- 4. Con-trolling the Hyperparameter Search in MacKay’s Bayesian Neural Network Framework.- 5. Adaptive Regularization in Neural Network Modeling.- 6. Large Ensemble Averaging.- Preface on Improving Network Models and Algorithmic Tricks.- 7. Square Unit Augmented, Radially Extended, Multilayer Perceptrons.- 8. A Dozen Tricks with Multitask Learning.- 9. Solving the Ill-Conditioning in Neural Network Learning.- 10. Centering Neural Network Gradient Factors.- 11. Avoiding Roundoff Error in Backpropagating Derivatives.- 12. Transformation Invariance in Pattern Recognition –Tangent Distance and Tangent Propagation.- 13. Combining Neural Networks and Context-Driven Search for On-line, Printed Handwriting Recognition in the Newtons.- 14. Neural Network Classification and Prior Class Probabilities.- 15. Applying Divide and Conquer to Large Scale Pattern Recognition Tasks.- Preface on Tricks for Time Series.- 16. Forecasting the Economy with Neural Nets: A Survey of Challenges and Solutions.- 17. How to Train Neural Networks.- Preface on Big Learning in Deep Neural Networks.- 18. Stochastic Gradi-ent Descent Tricks. [...]

Fields of interestComputation by Abstract Devices; Artificial Intel-ligence (incl. Robotics); Algorithm Analysis and Problem Complexity

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2nd ed. 2012. XII, 769 p. 223 illus. (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues, Volume 7700) Softcover7 $131.00ISBN 978-3-642-35288-1

9<HTOGPC=dfciib>

W. W. Osterhage, ‚Goethe University Frankfurt/Main, Germany

Computer Performance OptimizationComputing power performance was important at times when hardware was still expensive, because hardware had to be employed optimally. Later on this criterion was no longer critical, since hardware had become  inexpensive. Meanwhile, however, people have realized that performance again plays a significant role, because of the large input of system resources when developing com-plex applications. This book distinguishes between three levels of performance optimization: system level, application level and business processes. On each level optimizations can be realized and cost-cutting potentials can be identified. The relevant theoretical background and measuring methods as well as solution proposals are presented. An evaluation of network monitors and checklists completes the work.

Features 7 Performance optimization for business proces-ses 7 Instructions for the optimization of system parameters, data management, applications and business processes 7 Checklist for measurement and optimization provisions

Contents Preface.- Performance Theory.- Performance Measurement.- Analysis.- Optimization.- Network Performance.- Process Performance.- Best Practice Examples.- Wider Context.- Checklists.- Appen-dix.- References.- Index.

Field of interestPerformance and Reliability

Target groupsProfessional/practitioner

Discount groupProfessional Non-Medical

Due April 2013

2013. X, 190 p. 100 illus. Hardcover7 approx. $69.95ISBN 978-3-642-29970-4

9<HTOGPC=cjjhae>

Page 6: Managing and Mining Sensor Outlier Analysis Principles of ... · fewer assumptions– the data can be of any type, structured or unstructured, and may be extre-mely large. Outlier

News 1/2013 Computer Science

27

J. Peddie, Jon Peddie Research, Tiburon, CA, USA

The History of 3D in ComputersIf you have ever looked at a fantastic adventure or science fiction movie, or an amazingly complex and rich computer game, or a TV commercial where cars or gas pumps or biscuits behaved liked people and wondered, “How do they do that” then you’ve experienced the magic of 3D worlds gene-rated by a computer. 3D in computers began as a way to represent automotive designs and illustrate the construction of molecules. 3D graphics use evolved to visualizations of simulated data and artistic representations of imaginary worlds.

Features 7 Maps the history of the techniques behind science fiction movies, complex and rich computer games, and TV commercials capable of making cars, gas pumps and biscuits behave like human beings 7 Traces the development of powerful computers, graphics processors, displays, great software and tools—all elements of the 3D models behind modern computer graphics 7 Takes you from the development of basic geometry and perspective art through to gigantic visualization rooms and down to tablets for presentations undistinguishable from real life

Contents Foreword by Rae Earnshaw.- Foreword by Mark Fihn.- Preface.- Introduction: The History of 3D in Computers.- Getting to 3D.- Developing the Computer.- Developing the 3D Software.- De-veloping the Applications.- Development of 3D Controllers.- Development of Displays: Getting to See 3D.- Stereoscopic 3D in Computers.- The Future.- Index.

Fields of interestComputer Graphics; Engineering Design; Popular Science, general

Target groupsPopular/general

Discount groupProfessional Non-Medical

Due April 2013

2013. XIV, 424 p. 319 illus., 204 in color. Softcover7 approx. $44.95ISBN 978-1-4471-4931-6

9<HTMEPH=bejdbg>

H.‑W. Shen, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

Community Structure of Complex NetworksCommunity structure is a salient structural characteristic of many real-world networks. Communities are generally hierarchical, over-lapping, multi-scale and coexist with other types of structural regularities of networks. This poses major challenges for conventional methods of community detection. This book will comprehen-sively introduce the latest advances in community detection, especially the detection of overlapping and hierarchical community structures, the detec-tion of multi-scale communities in heterogeneous networks, and the exploration of multiple types of structural regularities. These advances have been successfully applied to analyze large-scale online social networks, such as Facebook and Twitter. This book provides readers a convenient way to grasp the cutting edge of community detection in complex networks.

Features 7 Nominated by Chinese Academy of Sciences as an outstanding PhD thesis 7 A comprehensive introduction to community detection in net-works 7 Includes the state-of-the-art develop-ment of community detection 7 Provides a useful complementary to complex network

Contents Community structure: An Introduction.- Detec-ting the overlapping and hierarchical community structure in networks.- Multiscale community detection in networks with heterogeneous degree distributions.- Community structure and diffusion dynamics on networks.- Exploratory Analysis of the structural regularities in networks.

Fields of interestData Mining and Knowledge Discovery; Statistics, general

Target groupsResearch

Discount groupProfessional Non-Medical

Due January 2013

2013. XIV, 120 p. 48 illus., 17 in color. (Springer Theses) Hardcover7 $129.00ISBN 978-3-642-31820-7

9<HTOGPC=dbicah>

L. STEELS, Universitat Pompeu Fabra-CSIC, Barcelona, Spain (Ed)

Computational Issues in Fluid Construction GrammarFeatures 7 New formalism for the representation of lexicons and grammars 7 Investigating language learning and language evolution 7 Robust lan-guage processing

Contents Design Methods for Fluid Construction Gram-mar.- Tools for Grammar Engineering.- A Reflec-tive Architecture for Robust Language Processing and Learning.- Chunking Constructions.- Expres-sing Grammatical Meaning with Morphology: A Case Study for Russian Aspect.- Handling Scope in Fluid Construction Grammar: A Case Study for Spanish Modals.- Complex Declension Systems and Morphology in Fluid Construction.- Gram-mar: A Case Study of Polish.- Field Topology and Information Structure: A Case Study for German Constituent Order.- A Formal Deconstruction of Fluid Construction Grammar.- A Logic Program-ming Approach to Parsing and Production in Fluid Construction Grammar.- Computational Construction Grammar: Comparing ECG and FCG.- Fluid Construction Grammar and Feature Constraint Logics.- Fluid Construction Grammar in the Brain.

Fields of interestArtificial Intelligence (incl. Robotics); Mathe-matical Logic and Formal Languages; Language Translation and Linguistics

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2012. X, 331 p. 102 illus. (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence, Volume 7249) Softcover7 $83.00ISBN 978-3-642-34119-9

9<HTOGPC=debbjj>

Page 7: Managing and Mining Sensor Outlier Analysis Principles of ... · fewer assumptions– the data can be of any type, structured or unstructured, and may be extre-mely large. Outlier

Computer Science springer.com/NEWSonline

28

T. Su, Harbin Institute of Technology, Harbin, China

Chinese Handwriting Recognition: An Algorithmic PerspectiveDesigning machines that can read handwriting like human beings has been an ambitious goal for more than half a century, driving talented resear-chers to explore diverse approaches. Obstacles have often been encountered that at first appeared insurmountable but were indeed overcome before long. Yet some open issues remain to be solved. As an indispensable branch, Chinese handwri-ting recognition has been termed as one of the most difficult Pattern Recognition tasks. Chinese handwriting recognition poses its own unique challenges, such as huge variations in strokes, diversity of writing styles, and a large set of confu-sable categories.

Features 7 The first monograph available on the recogniti-on of Chinese handwriting texts 7 A systematic sampling mechanics is presented for Chinese handwriting 7 A further reading list with lite-rature analysis is devoted to help readers quickly overview the state-of-the-art 7 Include scalable learning methods for large category learning tasks with inspiring results

Contents Introduction.- HIT-MW Database.- Integrated Segmentation-Recognition Strategy.- Segmentati-on-free Strategy: Basic Algorithms.- Segmentati-on-free Strategy: Advanced Algorithms

Fields of interestComputer Imaging, Vision, Pattern Recognition and Graphics; Pattern Recognition; Image Proces-sing and Computer Vision

Target groupsResearch

Discount groupProfessional Non-Medical

Due January 2013

2013. XII, 140 p. 62 illus., 16 in color. (SpringerBriefs in Electrical and Computer Engineering) Softcover7 $39.95ISBN 978-3-642-31811-5

9<HTOGPC=dbibbf>

L. Sun, I.‑H. Mkwawa, E. Jammeh, E. Ifeachor, University of Plymouth, UK

Guide to Voice and Video over IPFor Fixed and Mobile Networks

This book presents a review of the latest advances in speech and video compression, computer net-working protocols, the assessment and monitoring of VoIP quality, and next generation network ar-chitectures for multimedia services. The book also concludes with three case studies, each presenting easy-to-follow step-by-step instructions together with challenging hands-on exercises.

Features 7 Provides illustrative worked examples, end-of-chapter problems, and step-by-step case studies with challenging hands-on exercises 7 Introdu-ces the fundamental techniques and key concepts in voice/video over IP for voice/video calls over fixed and mobile IP networks 7 Presents detailed practical solutions for VoIP and mobile VoIP using the latest open source tools and packages

Contents Introduction.- Speech Compression.- Video Com-pression.- Media Transport for VoIP.- VoIP Sig-nalling – SIP.- VoIP Quality of Experience (QoE).- IMS and Mobile VoIP.- Case Study 1: Building Up a VoIP System Based on Asterisk.- Case Study 2: VoIP Quality Analysis and Assessment.- Case Study 3: Mobile VoIP Applications and IMS.

Field of interestComputer Communication Networks

Target groupsGraduate

Discount groupProfessional Non-Medical

Due February 2013

2013. XII, 308 p. 204 illus., 5 in color. (Computer Communications and Networks) Hardcover7 $79.95ISBN 978-1-4471-4904-0

9<HTMEPH=bejaea>

A. Tatnall, Victoria University, Melbourne, VIC, Australia (Ed)

Reflections on the History of ComputingPreserving Memories and Sharing Stories

Features 7 First volume of the new IFIP AICT subseries "Surveys" 7 Provides an overview on the history of computing 7 Unique visibility

Contents Australia’s WREDAC.– It Was Rocket Science.- Remembering LEO.- A Possible First Use of CAM/CAD.- Roberto Busa (1913-2011), Pioneer of Computers for the Humanities.- Micro Program-ming.- Experiences and Reflections.- Information Systems Degrees in Australia: The Genesis.- Loo-king Back.- The Impact of the Y2K Event on the Popularity of the Pick Database Environment.- Evolution of Computer Science Education in the Purview of Free Education.- Evolution of Computer Education in Spain: From Early Times to theImplementation of the Bologna Agreement.- The History of Computer Language Selection.- History of Data Centre Development.- Early Italian Computing Machines and Their Inventors.- Computing for the Masses? Constructing a British Culture of Computing in the Home.- Reflections on the History of Computer Education in Schools in Victoria.- From the History of Russian Compu-ter Science.- Hungarian Scientists in Information Technology.- Information Technology in Italy: The Origins and the Early Years (1954 - 1965).- Insti-tutional Nostalgia – Museum Victoria’s Cabinet of Computing Curiosities.- The Changing Face of the History of Computing: The Role of Emulation in Protecting Our Digital Heritage.- My Fascination with Computing History.

Fields of interestHistory of Computing; Computers and Education; Computer Science, general

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2012. X, 397 p. 58 illus. (IFIP Advances in Information and Communication Technology, Volume 387) Hardcover7 $155.00ISBN 978-3-642-33898-4

9<HTOGPC=ddijie>

Page 8: Managing and Mining Sensor Outlier Analysis Principles of ... · fewer assumptions– the data can be of any type, structured or unstructured, and may be extre-mely large. Outlier

News 1/2013 Computer Science

29

W. M. van der Aalst, Eindhoven University of Technology, The Netherlands; M. Ajmone Marsan, Politecnico di Torino, Turin, Italy; G. Franceschinis, Università del Piemonte Orientale, Alessandria, Italy; J. Kleijn, LIACS, Leiden, The Netherlands; L. M. Kristensen, Bergen University College, Norway (Eds)

Transactions on Petri Nets and Other Models of Concurrency VIEditor-in-chief: K. Jensen, Aarhus University, Denmark

These Transactions publish archival papers in the broad area of Petri nets and other models of concurrency, ranging from theoretical work to tool support and industrial applications. ToPNoC issues are published as LNCS volumes, and hence are widely distributed and indexed.

Features 7 Presents a wide range of current research in Petri nets and concurrency 7 Contains a detailed introductions summarizing the contents of the papers 7 Includes a special section on networks, protocols, and services

Contents RFID Data Management and Analysis via Tensor Calculus.- Processing Exact Results for Windowed Stream Joins in a Memory-Limited System: A Disk-Based, Adaptive Approach.- Reducing the Semantic Heterogeneity of Unstructured P2P Sys-tems: A Contribution Based on a Dissemination Protocol.- Towards a Scalable Semantic Prove-nance Management System.- A Unified Concep-tual Framework for Service-Oriented Computing: Aligning Models of Architecture and Utilization.

Fields of interestSoftware Engineering; Computation by Abstract Devices; Programming Languages, Compilers, Interpreters

Target groupsResearch

Discount groupProfessional Non-Medical

Available

2012. XX, 365 p. 193 illus. (Lecture Notes in Computer Science / Transactions on Petri Nets and Other Models of Concurrency, Volume 7400) Softcover7 $113.00ISBN 978-3-642-35178-5

9<HTOGPC=dfbhif>