16
1 Advanced Computer Architectures Sajjan G. Shiva About the Book: Contents: Despite the tremendous advances in performance enabled by modern architectures, there are always new applications and demands arising that require ever-increasing capabilities. Keeping up with these demands requires a deep-seated understanding of contemporary architectures in concert with a fundamental understanding of basic principles that allows one to anticipate what will be possible over the system's lifetime. Advanced Computer Architectures focuses on the design of high performance supercomputers with balanced coverage of the hardware, software structures, and application characteristics. This book is a timeless distillation of underlying principles punctuated by real-world implementations in popular current and past commercially available systems. It briefly reviews the basics of uniprocessor architecture before outlining the most popular processing paradigms, performance evaluation, and cost factor considerations. This builds to a discussion of pipeline design and vector processors, data parallel architectures, and multiprocessor systems. Rounding out the book, the final chapter explores some important current and emerging trends such as Dataflow, Grid, biology-inspired, and optical computing. More than 220 figures, tables, and equations illustrate the concepts presented. Based on the author's more than thirty years of teaching and research, Advanced Computer Architectures endows you with the tools necessary to reach the limits of existing technology, and ultimately, to break them. Preface. Introduction. Uniprocessor Architecture Overview. Models and Terminology. Pipelining. Vector Processors. Array Processors. Multiprocessor Systems. Current Directions. References. Index. About the Book: This book presents a variety of recently developed methods for generating fuzzy rules from data with the help of neural networks and evolutionary algorithms. Special efforts have been put on dealing with knowledge incorporation into neural and evolutionary systems and knowledge extraction from data with the help of fuzzy logic. On the one hand, knowledge that is understandable to human beings can be extracted from data using evolutionary and learning methods by maintaining the interpretability of the generated fuzzy rules. On the other hand, a priori knowledge like expert knowledge and human preferences can be incorporated into evolution and learning, taking advantage of the knowledge representation capability of fuzzy rule systems and fuzzy preference models. Several engineering application examples in the fields of intelligent vehicle systems, process modeling and control and robotics are presented. Ane Books Pvt. Ltd. COMPUTER SCIENCE COMPUTER SCIENCE www.anebooks.com 9780849337581 352 (Pb) ` 695.00 T&F / Routledge Advanced Fuzzy Systems Design and Applications Yaochu Jin 9788184896442 282 (Pb) ` 695.00 Springer Artificial Intelligence and Soft Computing With CD Amit Konar About the Book: Contents: With all the material available in the field of artificial intelligence (AI) and soft computing-texts, monographs, and journal articles-there remains a serious gap in the literature. Until now, there has been no comprehensive resource accessible to a broad audience yet containing a depth and breadth of information that enables the reader to fully understand and readily apply AI and soft computing concepts. Artificial Intelligence and Soft Computing fills this gap. It presents both the traditional and the modern aspects of AI and soft computing in a clear, insightful, and highly comprehensive style. It provides an in-depth analysis of mathematical models and algorithms and demonstrates their applications in real world problems. Beginning with the behavioral perspective of "human cognition," the text covers the tools and techniques required for its intelligent realization on machines. The author addresses the classical aspects-search, symbolic logic, planning, and machine learning-in detail and includes the latest research in these areas. He introduces the modern aspects of soft computing from first principles and discusses them in a manner that enables a beginner to grasp the subject. He also covers a number of other leading aspects of AI research, including nonmonotonic and spatio- temporal reasoning, knowledge acquisition, and much more. Artificial Intelligence and Soft Computing: Behavioral and Cognitive Modeling of the Human Brain is unique for its diverse content, clear presentation, and overall completeness. It provides a practical, detailed introduction that will prove valuable to computer science practitioners and students as well as to researchers migrating to the subject from other disciplines. Introduction to AI and Soft Computing . The Psychological Perspective of Cognition. Production Systems. Problem Solving by Intelligent Search. The Logic of Propositions and Predicates. Principles in Logic Programming . Default and Non-Monotonic Reasoning. Structured Approach to Knowledge Representation . Dealing with Imprecision and Uncertainty. Structured Approach to Fuzzy Reasoning. Reasoning with Space and Time. Intelligent Planning. Machine Learning Techniques. Machine Learning using Neural Nets. Genetic Algorithms . Realizing Cognition using Fuzzy Neural Nets. Visual Perception. Linguistic Perception. Problem Solving by Constraint Satisfaction. Acquisition of Knowledge. Verification, Validation and Maintenance Issues. Parallel and Distributed Architecture for Intelligent Systems. Case Study I : Building a System for Criminal Investigation. Case Study II : Realization of Cognition for Mobile Robots. Appendices. Contents: 1. Fuzzy Sets and Fuzzy Systems 2. Evolutionary Algorithms 3. Artificial Neural Networks 4. Conventional Data-driven Fuzzy Systems Design 5. Neural Network Based Fuzzy Systems Design 6. Evolutionary Design of Fuzzy Systems 7. Knowledge Discovery by Extracting Interpretable Fuzzy Rules 8. Fuzzy Knowledge Incorporation into Neural Networks 9. Fuzzy Preferences Incorporation into Multi-objective Optimization, References, Index 9780849313851 816 (Pb) £ 9.99 T & F / Routledge Special Indian Price Special Indian Price Special Indian Price

e-Mailer-Computer Science

Embed Size (px)

Citation preview

1

Advanced Computer Architectures

Sajjan G. Shiva

About the Book:

Contents:

Despite the tremendous advances in performance enabled by modern architectures, there are always new applications and demands arising that require ever-increasing capabilities. Keeping up with these demands requires a deep-seated understanding of contemporary architectures in concert with a fundamental understanding of basic principles that allows one to anticipate what will be possible over the system's lifetime. Advanced Computer Architectures focuses on the design of high performance supercomputers with balanced coverage of the hardware, software structures, and application characteristics.

This book is a timeless distillation of underlying principles punctuated by real-world implementations in popular current and past commercially available systems. It briefly reviews the basics of uniprocessor architecture before outlining the most popular processing paradigms, performance evaluation, and cost factor considerations. This builds to a discussion of pipeline design and vector processors, data parallel architectures, and multiprocessor systems. Rounding out the book, the final chapter explores some important current and emerging trends such as Dataflow, Grid, biology-inspired, and optical computing. More than 220 figures, tables, and equations illustrate the concepts presented.

Based on the author's more than thirty years of teaching and research, Advanced Computer Architectures endows you with the tools necessary to reach the limits of existing technology, and ultimately, to break them.

Preface. Introduction. Uniprocessor Architecture Overview. Models and Terminology. Pipelining. Vector Processors. Array Processors. Multiprocessor Systems. Current Directions. References. Index.

About the Book: This book presents a variety of recently developed methods for generating fuzzy rules from data with the help of neural networks and evolutionary algorithms. Special efforts have been put on dealing with knowledge incorporation into neural and evolutionary systems and knowledge extraction from data with the help of fuzzy logic. On the one hand, knowledge that is understandable to human beings can be extracted from data using evolutionary and learning methods by maintaining the interpretability of the generated fuzzy rules. On the other hand, a priori knowledge like expert knowledge and human preferences can be incorporated into evolution and learning, taking advantage of the knowledge representation capability of fuzzy rule systems and fuzzy preference models. Several engineering application examples in the fields of intelligent vehicle systems, process modeling and control and robotics are presented.

Ane Books Pvt. Ltd.COMPUTER SCIENCECOMPUTER SCIENCE

www.anebooks.com

9780849337581 352 (Pb) ` 695.00 T&F / Routledge

Advanced Fuzzy Systems Design

and Applications

Yaochu Jin

9788184896442 282 (Pb) ` 695.00 Springer

Artificial Intelligence and Soft Computing

With CD

Amit Konar

About the Book:

Contents:

With all the material available in the field of artificial intelligence (AI) and soft computing-texts, monographs, and journal articles-there remains a serious gap in the literature. Until now, there has been no comprehensive resource accessible to a broad audience yet containing a depth and breadth of information that enables the reader to fully understand and readily apply AI and soft computing concepts.

Artificial Intelligence and Soft Computing fills this gap. It presents both the traditional and the modern aspects of AI and soft computing in a clear, insightful, and highly comprehensive style. It provides an in-depth analysis of mathematical models and algorithms and demonstrates their applications in real world problems.

Beginning with the behavioral perspective of "human cognition," the text covers the tools and techniques required for its intelligent realization on machines. The author addresses the classical aspects-search, symbolic logic, planning, and machine learning-in detail and includes the latest research in these areas. He introduces the modern aspects of soft computing from first principles and discusses them in a manner that enables a beginner to grasp the subject. He also covers a number of other leading aspects of AI research, including nonmonotonic and spatio-temporal reasoning, knowledge acquisition, and much more.

Artificial Intelligence and Soft Computing: Behavioral and Cognitive Modeling of the Human Brain is unique for its diverse content, clear presentation, and overall completeness. It provides a practical, detailed introduction that will prove valuable to computer science practitioners and students as well as to researchers migrating to the subject from other disciplines.

Introduction to AI and Soft Computing . The Psychological Perspective of Cognition. Production Systems. Problem Solving by Intelligent Search. The Logic of Propositions and Predicates. Principles in Logic Programming . Default and Non-Monotonic Reasoning. Structured Approach to Knowledge Representation . Dealing with Imprecision and Uncertainty. Structured Approach to Fuzzy Reasoning. Reasoning with Space and Time. Intelligent Planning. Machine Learning Techniques. Machine Learning using Neural Nets. Genetic Algorithms . Realizing Cognition using Fuzzy Neural Nets. Visual Perception. Linguistic Perception. Problem Solving by Constraint Satisfaction. Acquisition of Knowledge. Verification, Validation and Maintenance Issues. Parallel and Distributed Architecture for Intelligent Systems. Case Study I : Building a System for Criminal Investigation. Case Study II : Realization of Cognition for Mobile Robots. Appendices.

Contents: 1. Fuzzy Sets and Fuzzy Systems 2. Evolutionary Algorithms 3. Artificial Neural Networks 4. Conventional Data-driven Fuzzy Systems Design 5. Neural Network Based Fuzzy Systems Design 6. Evolutionary Design of Fuzzy Systems 7. Knowledge Discovery by Extracting Interpretable Fuzzy Rules 8. Fuzzy Knowledge Incorporation into Neural Networks 9. Fuzzy Preferences Incorporation into Multi-objective Optimization, References, Index

9780849313851 816 (Pb) £ 9.99 T & F / Routledge

Special

Indian Price

Special

Indian Price

Special

Indian Price

2

COMPUTER SCIENCECOMPUTER SCIENCE

www.anebooks.com

Computer Graphics

C.S. Verma

About the Book:

Contents:

This book has been written in a very simple and lucid language so that even the student with no background can understand the dynamic of the same. This book has been thoroughly structured to serve as an ideal textbook for various courses like Engineering courses, MCA, BCA, MSc computer science etc of various universities like UPTU, DU, CSVTU, RGPTU, PSSOU etc. Numerous examples and lots of solved problems have been added in each topic. A brief overview of computers has been included to introduce the reader the basic concepts of computer graphics hardwares and software. Important elements of computer graphics like display and viewing have been presented after discussing entity generation. Mathematical techniques for producing projection are given, along with generalized techniques for rotation, translation and scaling of geometric figures. Definitions for both explicit and parametric representations are presented for both curves and surfaces. The various aspects of geometric modeling have been presented through detailed description of 2D and 3D curves and surfaces generation techniques.

1. Computer System for Graphics and Design 2. Principles of Computer Graphics 3. 2D and 3D Transformations 4. Curves and Surface Representation 5. Geometric Modelling for Space Curve, Index

9789380618111 186 (Pb) ` 160.00 Ane Books

Classic Operating Systems

From Batch Processing to Distributed Systems

Brinch Hansen

Reviews:

Contents:

This book demonstrates the historic development of modern operating systems Readers will learn not only what these modern operating system landmarks are, but how operating system designers think. This book is a must-read for anyone who is serious about operating systems research. -- Computing Reviews

"This excellent presentation of a collection of seminal operating system research papers has been compiled by a widely published and acknowledged authority in the field. … The author’s insightful selection successfully distills and succinctly presents the operating system research ethos, simplifying complex issues without belittling them, while managing to preserve the obvious enthusiasm shared by these pioneers. … This book is a mine of useful information that will prove useful to those students wishing to gain an insight into … operating system design." (Simon Berry, The Computer Journal, Vol. 45 (3), 2002)

1. The Evolution of Operating Systems 2. File Integrity in a Disc-Based Multi-Access System 3. The Unix Time-Sharing System

9780387951133 598 (Pb) ` 995.00 Springer

About the Book:

Contents:

Data flow analysis is used to discover information for a wide variety of useful applications, ranging from compiler optimizations to software engineering and verification. Modern compilers apply it to produce performance-maximizing code, and software engineers use it to re-engineer or reverse engineer programs and verify the integrity of their programs.

Unlike most comparable books, many of which are limited to bit vector frameworks and classical constant propagation, Data Flow Analysis: Theory and Practice offers comprehensive coverage of both classical and contemporary data flow analysis. It prepares foundations useful for both researchers and students in the field by standardizing and unifying various existing research, concepts, and notations. Divided into three parts, this unique text combines discussions of both inter- and intraprocedural analysis and then describes implementation of a generic data flow analyzer for bit vector frameworks in GCC.

This useful text:

Ÿ Addresses specification of data flow frameworks and the solution process

Ÿ Presents generalizations of constant and dependent parts of flow functions apart from the lattice theoretic modeling of data flow frameworks

Ÿ Includes an intermediate SSA representation of programs, which directly relates definition and use points of data for increased performance efficiency

Ÿ Avoids methods specific to particular applications and frameworks, focuses on generic functional and value based approaches, instead of presenting interprocedural methods specific to parituclar applications or frameworks

Ÿ use numerous case studies and examples to reinforce material

In addition to the text, readers will be able to use an accompanying updated Web page that features slides used in the course, as well as the source of the generic data flow analyzer gdfa, an errata that features errors as they are discovered, and any additional relevant material discovered in the course of research.

PREFACE: -An Introduction to Data Flow Analysis SECTION I: Intraprocedural Data Flow Analysis, Classical Bit Vector Data Flow Analysis -Theoretical Abstractions in Data Flow Analysis -General Data Flow Frameworks -Complexity of Iterative Data Flow Analysis -Single Static Assignment Form as Intermediate Representation SECTION II: Interprocedural Data Flow Analysis -Introduction to Interprocedural Data Flow Analysis -Functional Approach to Interprocedural Data Flow Analysis -Value Based Approach to Interprocedural Data Flow Analysis SECTION III: Implementing Data Flow Analysis -Implementing Data Flow Analysis in GCC, APPENDICES: An Introduction to GCC, About GCC, Building GCC, Further Readings in GCC

9780849328800 400 (Pb) ` 895.00 CRC Press

Data Flow Analysis Theory and Practice

Uday P. KhedkerAmitabha SanyalBageshri Karkare

Special

Indian Price

Special

Indian Price

3

www.anebooks.com

Ane Books Pvt. Ltd.

About the Book:

Contents:

With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible paths for future research in this area. This book fills this need.

From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, Data Mining and Machine Learning in Cybersecurity provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges—detailing cutting-edge machine learning and data mining techniques. It also:

Ÿ Unveils cutting-edge techniques for detecting new attacks

Ÿ Contains in-depth discussions of machine learning solutions to detection problems

Ÿ Categorizes methods for detecting, scanning, and profiling intrusions and anomalies

Ÿ Surveys contemporary cybersecurity problems and unveils state-of-the-art machine learning and data mining solutions

Ÿ Details privacy-preserving data mining methods

This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures help readers visualize the workflow of complex techniques and more than forty case studies provide a clear understanding of the design and application of data mining and machine learning techniques in cybersecurity.

List of Figures, List of Tables, Preface, Authors, Introduction, Classical Machine-Learning Paradigms for Data Mining, Supervised Learning for Misuse/Signature Detection, Machine Learning for Anomaly Detection, Introduction, Anomaly Detection, Machine Learning in Anomaly Detection Systems, Machine Learning for Hybrid Detection, Machine Learning for Scan Detection, Machine Learning for Profiling Network Traffic, Privacy-Preserving Data Mining, Emerging Challenges in Cybersecurity, Index

9781439839423 256 (Hb) ` 2995.00 CRC Press

Data Mining and Machine Learning

in Cybersecurity

Sumeet DuaXian Du

Data Mining For Design

and Marketing

Yukio OhsawaKatsutoshi Yada

About the Book:

Contents:

Data Mining for Design and Marketing shows how to design and integrate data mining tools into human thinking processes in order to make better business decisions, especially in designing and marketing products and systems.

The expert contributors discuss how data mining can identify valuable consumer patterns, which aid marketers and designers in detecting consumers’ needs. They also explore visualization tools based on the computational methods of data mining. Discourse analysis, chance discovery, knowledge discovery, formal concept analysis, and an adjacency matrix are just some of the novel approaches covered. The book explains how these methods can be applied to website design, the retrieval of scientific articles from a database, personalized e-commerce support tools, and more. Through the techniques of data mining, this book demonstrates how to effectively design business processes and develop competitive products and services. By embracing data mining tools, businesses can better understand the behavior and needs of their customers.

FeaturesŸ Examines the unification of marketing and design as a new application

domainŸ Reflects new research in subjective value creation, including how data

mining and visualization are used in market dynamicsŸ Analyzes human society to discover patterns in the business marketŸ Presents communication mining tools for industrial designsŸ Uses social data to discover and design products and servicesŸ Covers traditional evaluation criteria, such as predictive accuracy and

computation speedŸ Explores applications in online market analysis systems, website

design, global teamwork projects, database retrieval, and e-commerce

1 Sensing Values in Designing Products and Markets on Data Mining and Visualizations Yukio Ohsawa 2 Reframing the Data Mining Process David Bergner and Ozgur Eris 3 The Use of Online Market Analysis Systems to Achieve Competitive Advantage Lihua Zhao, Mark D. Uncles, and Gary Gregory 4 Finding Hierarchical Patterns in Large POS Data Using Historical Trees Takanobu Nakahara and Hiroyuki Morita 5 A Method to Search ARX Model Orders and Its Application to Sales Dynamics Analysis Kenta Fukata, Takashi Washio, Katsutoshi Yada, and Hiroshi Motoda 6 Data Mining for Improved Website Design and Enhanced Marketing Asem Omari 7 Discourse Analysis and Creativity Support for Concept Product Design Noriko Imafuji, Xavier Llora, and David E. Goldberg 8 Data Crystallization with Human Interactions Applied for Designing New Products Kenichi Horie, Yoshiharu Maeno, and Yukio Ohsawa 9 Improving and Applying Chance Discovery for Design Analysis Brett Bojduj 10 Mining for Influence Leaders in Global Teamwork Projects Renate Fruchter, Shubashri Swaminathan, Naohiro Matsumura, and Yukio Ohsawa 11 Analysis Framework for Knowledge Discovery Related to Persuasion Process Conversation Logs Wataru Sunayama and Katsutoshi Yada 12 Association Bundle-Based Market Basket Analysis Wenxue Huang, Milorad Krneta, Limin Lin, and Jianhong Wu 13 Formal Concept Analysis with Attribute Priorities Radim Belohlavek and Vilem Vychodil 14 Literature Categorization System for Automated Database Retrieval of Scientific Articles Based on Dedicated 15 A Data Mining Framework for Designing Personalized E-Commerce Support Tools Timothy Maciag, Dominik Slezak, Daryl H. Hepting, and Robert J. Hilderman 16 An Adjacency Matrix Approach for Extracting User Sentiments from Sentences Bin Shi and Kuiyu Chang 17 Visualizing RFID Tag Data in a Library for Detecting Latent Interest of Users Yukio Ohsawa, Takuma Hosoda, and Takeshi Ui

9781420070194 336 (Hb) ` 2995.00 CRC Press

Special

Indian Price Special

Indian Price

www.anebooks.com

4

COMPUTER SCIENCECOMPUTER SCIENCE

Data Mining Tools for

Malware Detection

Mehedy MasudLatifur Khan

Bhavani Thuraisingham

About the Book:

Contents:

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets.

The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations.

Ÿ Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data mining

Ÿ Includes four appendices that provide a firm foundation in data management, secure systems, and the semantic web

Ÿ Describes the authors’ tools for stream data mining

From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.

Preface, Acknowledgments, The Authors, Copyright Permission, Introduction, Data Mining and Security, Data Mining Techniques, Malware, Data Mining for Security Applications, Design and Implementation of Data Mining Tools, Data Mining for Email Worm Detection, Email Worm Detection, Design of the Data Mining Tool, Evaluation and Results, Data Mining for Detecting Malicious Executables, Malicious Executables, Design of the Data Mining Tool, Evaluation and Results, Data Mining for Detecting Remote Exploits, Detecting Remote Exploits, Design of the Data Mining Tool, Evaluation and Results, Data Mining for Detecting Botnets, Detecting Botnets, Design of the Data Mining Tool, Evaluation and Results, Stream Mining for Security Applications, Stream Mining, Design of the Data Mining Tool, Evaluation and Results, Emerging Applications, Data Mining For Active Defense, Data Mining for Insider Threat Detection, Dependable Real-Time Data Mining, Firewall Policy Analysis, Summary and Directions Appendix A: Data Management Systems: Developments and Trends, Appendix B: Trustworthy Systems, Appendix C: Secure Data, Information, and Knowledge Management, Appendix D: Semantic Web, Index.

9781439854549 450 (Hb) ` 3995.00 Ane Books

Digital Design Basic Concepts

and Principles

Mohammad A. KarimXinghao Chen

About the Book: In today’s digital design environment, engineers must achieve quick turn-around time with ready accesses to circuit synthesis and simulation applications. This type of productivity relies on the principles and practices of computer aided design (CAD). Digital Design: Basic Concepts and Principles addresses the many challenging issues critical to today’s digital design practices such as hazards and logic minimization, finite-state-machine synthesis, cycles and races, and testability theories while providing hands-on experience using one of the industry’s most popular design application, Xilinx Web PACK™.

The authors begin by discussing conventional and unconventional number systems, binary coding theories, and arithmetic as well as logic functions and Boolean algebra. Building upon classic theories of digital systems, the

Contents: Preface. List of contributors. 1. Data mining meets grid computing: time to dance (Alberto Sánchez, Jesús Montes, Werner Dubitzky, Julio J. Valdés, María S. Pérez and Pedro de Miguel). 2. Data analysis services in the Knowledge Grid (Eugenio Cesario, Antonio Congiusta, Domenico Talia and Paolo Trunfio). 3. GridMiner: an advanced support for e-science analytics (Peter Brezany, Ivan Janciak and A. Min Tjoa). 4. ADaM services: scientific data mining in the service-oriented architecture paradigm (Rahul Ramachandran, Sara Graves, John Rushing, Ken Keiser, Manil Maskey, Hong Lin and Helen Conover). 5. Mining for misconfigured machines in grid systems (Noam Palatin, Arie Leizarowitz, Assaf Schuster and Ran Wolff). 6. FAEHIM: Federated Analysis Environment for Heterogeneous Intelligent Mining (Ali Shaikh Ali and Omer F. Rana). 7. Scalable and privacy preserving distributed data analysis over a service-oriented platform (William K. Cheung). 8. Building and using analytical workflows in Discovery Net (Moustafa Ghanem, Vasa Curcin, Patrick Wendel and Yike Guo). 9. Building workflows that traverse the bioinformatics data landscape (Robert Stevens, Paul Fisher, Jun Zhao, Carole Goble and Andy Brass). 10. Specification of distributed data mining workflows with DataMiningGrid (Dennis Wegener and Michael May). 11. Anteater: service-oriented data mining (Renato A. Ferreira, Dorgival O. Guedes and Wagner Meira). 12. DMGA: a generic brokering-based data mining grid architecture (Alberto Sánchez, María S. Pérez, Pierre Gueant, José M. Peña and Pilar Herrero). 13. Grid-based data mining with the Environmental Scenario Search Engine (ESSE) (Mikhail Zhizhin, Alexey Poyda, Dmitry Mishin, Dmitry Medvedev, Eric Kihn and Vassily Lyutsarev). 14. Data pre-processing using OGSA-DAI (Martin Swain and Neil P. Chue Hong). Index.

9788126552054 288 (Hb) ` 3995.00 Wiley

Data Mining Techniques in

Grid Computing Environments

Werner Dubitzky

Special

Indian Price

Special

Indian Price

Special

Indian Price

5

www.anebooks.com

Ane Books Pvt. Ltd.

9781420061314 504 (Pb) ` 380.00 T & F / Routledge

About the Book:

Contents:

Embedded systems are today, widely deployed in just about every piece of machinery from toasters to spacecraft. Embedded system designers face many challenges. They are asked to produce increasingly complex systems using the latest technologies, but these technologies are changing faster than ever. They are asked to produce better quality designs with a shorter time-to-market. They are asked to implement increasingly complex functionality but more importantly to satisfy numerous other constraints. To achieve the current goals of design, the designer must be aware with such design constraints and more importantly, the factors that have a direct effect on them.

One of the challenges facing embedded system designers is the selection of the optimum processor for the application in hand; single-purpose, general-purpose or application specific. Microcontrollers are one member of the family of the application specific processors.

The book concentrates on the use of microcontroller as the embedded system’s processor, and how to use it in many embedded system applications. The book covers both the hardware and software aspects needed to design using microcontroller.

The book is ideal for undergraduate students and also the engineers that are working in the field of digital system design.

List of Abbreviations • Process design metrics; • A systems approach to digital system design; • Introduction to microcontrollers and microprocessors; • Instructions and Instruction sets; • Machine language and assembly language; • System memory • Timers, counters and watchdog timer; • Interfacing to local devices - Analogue data and analogue I/O subsystem; • Multiprocessor communications- Network-based interfaces. Index

9788793102064 570 (Hb) ` 3995.00 River Publishers

Digital System Design Use of

Microcontroller

Dawoud Shenouda DawoudR. Peplow

book illustrates the importance of logic minimization using the Karnaugh map technique. It continues by discussing implementation options and examining the pros and cons of each method in addition to an assessment of tradeoffs that often accompany design practices. The book also covers testability, emphasizing that a good digital design must be easy to verify and test with the lowest cost possible. Throughout the text, the authors analyze combinational and sequential logic elements and illustrate the designs of these components in structural, hierarchical, and behavior VHDL descriptions.

Covering fundamentals and best practices, Digital Design: Basic Concepts and Principles provides you with critical knowledge of how each digital component ties together to form a system and develops the skills you need to design and simulate these digital components using modern CAD software.

Preface, Acknowledgements, Authors 1. Data Type and Representations 2. Boolean Algebra 3. Minimization of Logic Functions 4. Logic Function Implementation 5. Introduction to Vhdl 6. Design of Modular Combinatorial Components 7. Sequential Logic Elements 8. Synchronous Sequential Circuits 9. Design of Modular Sequential Components 10. Sequential Arithmetic 11. Asynchronous Sequential Circuits 12. Introduction to Testability, Bibliography, Problems, Index.

Contents: About the Book:

Contents:

Discrete Mathematics for Computing, Second Edition is aimed especially at students with a limited background in mathematics. It introduces discrete mathematics at a gentle pace, and with an informal style, but without compromising the need for correct methodology. It takes the reader through all of the essential material that forms the background for studies in computing and information systems.

The text uses many examples of the applications of theory to problems in computing, including a chapter on the representation and manipulation of numbers in a computer, examples of the use of prepositional logic in program design, a section discussing the relationship between the mathematical and programming concepts of a function, and a chapter on the estimation of the time complexity of algorithms.

Ÿ Updated and revised second edition of a popular textŸ New sections on proof methods, recurrences and public key

encryptionŸ Many examples use algorithms written in pseudo-codeŸ The exercises have been updated to reflect changes in computing

since the first edition, and are designed both to provide practice in basic techniques and to challenge the student. Answers are given at the back of the book.

This book is suitable for students taking a one-semester introductory course in discrete mathematics, particulary for first year undergraduates studying Computing and Information Systems.

List of symbols, Preface, 1 Introduction to algorithms 2 Bases and number representation 3 Computer representation and arithmetic 4 Logic 5 Sets and relations 6 Functions 7 Induction and recursion 8 Boolean algebra and digital circuits 9 Combinatorics 10 Introduction to graph theory 11 Trees 12 Number Theory 13 Algorithms and computational complexity, Answers to exercises, Index.

9780230332898 320 (Pb) £ 7.99 Palgrave / Macmillan

Discrete Mathematics for

Computing 2/e

Peter Grossman

Special

Indian Price

Special

Indian Price

www.anebooks.com

6

COMPUTER SCIENCECOMPUTER SCIENCE

Essentials of .NET Programming Theory and Applications

C. KomalavalliSanjib K Sahu

About the Book:

Contents:

The book is an effort aimed at serving a textbook on .NET programming for the undergraduate students of GGS Indraprastha University. Though this book is written primarily to cover the syllabus prescribed by GGS Indraprastha University, this book would be useful for the undergraduate students of other universities.

Salient featuresŸ The language is very simple and easy to understandŸ Examples and illustrations have been liberally provided to enhance the students

understandingŸ Provides a single book for three languages used in .NET programmingŸ To make the reading of this book interesting, bullet points, tabular forms and a

summary of each chapter on capsules have been provided.1.Introduction to .NET Framework, 2.Introduction to .NET Development

Environment, 3.Visual Basic .NET, 4.Programming Concepts of VB.NET, 5.Object Oriented Features of VB.NET, 6.Windows FORMS and controls, 7.Database Connectivity Using ADO.NET, 8.ASP.NET, 9.Introduction to XML, 10.C++.NET, 11.Programming Concepts, 12.Windows Forms, Index

9789380156347 240 (Pb) ` 295.00 Ane Books

Essential Software Testing

A Use-Case Approach

Greg Fournier

About the Book: Much has been written about the difficulty of software testing. Often these laments are accompanied by cautionary words about how careful one has to be to ensure testing is done properly. However, there is a dearth of resources that give practical guidance on the nuts and bolts of testing. Essential Software Testing: A Use-Case Approach describes testing methods and techniques in a common sense manner that is easy to understand, helping readers to quickly and effectively implement project-specific testing solutions.

Divided into three parts, the book first discusses ways to make testing agile, providing insight into how testing can be done efficiently in different process environments. Next, the book supplies an overview of testing concepts. Lastly, it demonstrates how to perform the actual test, detailing specific testing activities that can be used on almost any project, with specific attention given to use-case driven testing. It describes how to test using Use Cases regardless of the specific requirements of the project.

The author weaves helpful war stories throughout the text, placing the concepts in a concrete framework. This guide gives software testers a firm grasp of all testing fundamentals: how to determine what to test and how to test it, how to select proper tests to match the plan, techniques to build and trace tests, and finally, how to conduct and record tests.

Contents : Dedication, Preface, Acknowledgments, Part One : Testing Essentially Chapter 1. On Being A Tester Chapter 2. Basic Concepts Boot Camp Chapter 3. Examples From My Experience We’ll Work With Chapter 4. What is Essential Testing? Chapter 5. Essential and Efficient Testing Chapter 6. Being Essentially Agile Chapter 7. Build Testing Agility Into Any Project Part Two : Fundamentals For Testing Success Chapter 8. Requirements – Fundamentals For Testing Success Chapter 9. Use Cases For Testers Chapter 10. Building A Test Process That Fits Part Three : The Successful Testing Process Chapter 11. Essential Test Planning Chapter 12. Grouping Requirements With Use Cases Chapter 13. Extending Use Cases For Testing Chapter 14. Identifying Tests Chapter 15. Essential Test Cases Chapter 16. Adding Test Design To Your Test Case Chapter 17. Creating Tests Chapter 18. Executing Tests Chapter 19. Essential Traceability Chapter 20. It All Comes Together Like This Chapter 21. Conclusion Appendix A. Appendix B. Examples Appendix C. Templates Index.

9781420089813 280 (Pb) £ 31.99 T & F / Routledge

Evidence-Based Software Engineering

and Systematic Reviews

Barbara Ann KitchenhamDavid Budgen Pearl Brereton

Features:

Contents:

• Provides a clear introduction to the use of an evidence-based model for software engineering research and practice. • Explains the roles of primary studies (experiments, surveys, case studies) as elements of an over-arching evidence model, rather than as disjointed elements in the empirical spectrum. • Presents well-established and up-to-date guidelines for conducting secondary studies in software engineering. • Supplies guidance on how an evidence-based approach can influence teaching, practice, and research.

PART I EVIDENCE-BASED PRACTICES IN SOFTWARE ENGINEERING, The Evidence-Based Paradigm, Evidence-Based Software Engineering (EBSE), Using Systematic Reviews in Software Engineering, Planning a Systematic Review, Searching for Primary Studies, Study Selection, Assessing Study Quality, Extracting Study Data, Mapping Study Analysis, Qualitative Synthesis, Meta-Analysis, Reporting a Systematic Review, Tool Support for Systematic Reviews, Evidence to Practice: Knowledge Translation and Diffusion, Further Reading for Part I, Part II THE SYSTEMATIC REVIEWER’S PERSPECTIVE OF PRIMARY STUDIES, Primary Studies and Their Role in EBSE, Controlled Experiments and Quasi-Experiments, Surveys, Case Studies, Data Mining Studies, Replicated and Distributed Studies, PART III GUIDELINES FOR SYSTEMATIC REVIEWS, A Catalogue of Systematic Reviews Relevant to Education and Practice, Bibliography, Index.

9781482228656 400 (Hb) £ 49.99 CRC Press

About the Book:

Contents:

Hyper Text Markup Language (HTML) is specially designed keeping in mind the ever-growing needs of undergraduate and postgraduate students. It also provides a wealth of information and serves as an encyclopedia to those who aspire to create their own websites. The whole concept has been narrated in a lucid language and easy to understand form, enriched with more examples and explanations.

Salient Features:Ÿ Focuses on the standard HTML 5, the latest version. Ÿ Contains many examples and screen shot outputs for easy

understanding.Ÿ Provides basics to in-depth in understanding of the concepts.Ÿ Deals with CSS and JavaScript.

1. Basic HTML Tags, 2. Increasing Better Visual Appearance, 3. Creating Interactivity, 4. Tables, 5. Forms, 6. Adding Multimedia Elements, 7. Advanced Html, 8. Attributes, Appendix

9789380618869 224 (Pb) ` 195.00 Ane Books

HTML 5

R. Lavanya

7

Effective Measurement and Management of It

Costs and Benefits 2/ed

Dan RemenyiArthur Money

Michael Sherwood-SmithZahir Irani

About the Book:

Contents:

The rapidly increasing level of expenditure on information technology in most organisations is one reason why IT benefits management has become an important business concern.

Top management have begun to insist that much more attention be paid to the economic aspects of information systems. This had led to a great demand for a comprehensive IT metric. However, little attempt has yet been made to produce a complete approach to understanding the economics of how information is used to boost the efficiency or effectiveness of companies.

This second and fully updated edition of The Effective Measurement and Management of IT Costs and Benefits provides a basic framework for an understanding of the economic issues of information as well as some suggestions as to how a company's IT efforts may be appraised.

The authors discuss a number of different evaluation concepts as well as reviewing several approaches to cost and benefit measurement. An IT Assessment Metric (ITAM) is proposed which allows firms to measure their progress towards obtaining maximum value from their information technology efforts.

A professional level book for the computer Weekly Professional Series- Provides a basic framework for an understanding of the economic issues of information as well as some suggestions as to how a company's IT efforts may be appraised.

1. The elusive nature of it benefits 2. Why evaluate information technology investments? 3. Aspects of the IT investment decision process 4. Issues and techniques for IT evaluation 5. Identification of IT costs 6. IT cost control 7. IT business case accounting 8. Risk analysis 9. Evaluation of the IT function 10. Ranking and scoring 11. Value for money and health checks 12. Designing IT surveys for benefit measurement 13. Evaluation and project management 14. Final thoughts, Appendices.

www.anebooks.com

9780750644204 384 (Hb) ` 895.00 Elsevier

Ane Books Pvt. Ltd.

Front End Design Tool Using

Vb.Net Including Crystal Reports

C. KomalavalliSanjib K Sahu

About the Book:

Contents:

The book is aimed at serving as textbook on Front End Design Tool-VB.NET for the undergraduate students of GGSIP University. Though this book is written primarily for GGSIP University students, the book would be useful for the undergraduate students of other universities as well.

Salient features:Ÿ Written is very simple language and easy to understand.Ÿ Examples, Screen Shots and Illustrations have been provided to

enhance the student's understanding.Ÿ Provides a single book to cover the entire syllabus of VB.NET.Ÿ To make the reading of this book interesting, bullet points, figures,

tabular forms, summary of each chapter, and exercises with previous year's question paper have been provided.

1. Introduction to .NET Framework 2. Introduction to .NET Development Environment 3. Visual Basic .NET 4. Programming Concepts of VB.NET 5. Object Oriented Features of VB.NET 6. Window Form and Controls 7. Advanced Controls 8. Database Connectivity using ADO.NET 9. Crystal Reports. Index

9789382127093 186 (Pb) ` 195.00 Ane Books

Special

Indian Price

About the Book:

Contents:

Since the advent of computers, individuals and organisations increasingly process information digitally. This has led to the study of Informatics, which has become essential for every student irrespective of the field of specialisation. Informatics encompasses the study of systems and tools for the processing, transmission and access of information, which necessitate acquiring basic knowledge about computers, hardware, software, networking and networks, online access of information sources and the structure and functions of the Internet.

Module-1 Informatics, Module-2 Basic Hardware, Module-3 Software, Module-4 Networking and the Internet, Module-5 Knowledge Resources on the Internet, Module-6 Computer Localization

9789380618357 284 (Pb) ` 160.00 Ane Books

InformaticsAn Introduction

K. Ravindran Asari

Introduction to Software Quality

Gerard O`Regan

About the Book:

Contents:

In order to maintain strong levels customer satisfaction and loyalty, software developers face considerable pressure to meet expectations for high-quality software products that are consistently delivered on time.

Introduction to Software Quality describes the approaches used by software engineers to build quality into their software. The fundamental principles of software quality management and software process im-provement are discussed in detail, with a particular focus on the capability maturity model integration (CMMI) framework.

Topics and features:

Ÿ Includes review questions at the end of each chapter

Ÿ Covers both theory and practice, in addition to providing guidance on applying the theory in an industrial environment

Ÿ Examines all aspects of the software development process, including project planning and tracking, software lifecycles, software inspections and testing, configuration management, and software quality assurance

Ÿ Provides detailed coverage of software metrics and problem solving

Ÿ Describes SCAMPI appraisals and how they form part of the continuous improvement cycle

Ÿ Presents an introduction to formal methods and the Z specification language, which are important in the safety critical field

Ÿ Discusses UML, which is used to describe the architecture of the system

Ÿ Reviews the history of the field of software quality, highlighting the pioneers who made key contributions to this area

This clearly written and easy-to-follow textbook will be invaluable to students of computer science who wish to learn how to build high-quality and reliable software on time and on budget. Software engineers, quality professionals and software managers in industry will also find the book to be a useful tool for self-study.

1. Introduction 2. Software Engineering 3. Project Management 4. Requirements, Design and Development 5. Configuration Management 6. Software Inspections 7. Software Testing 8. Supplier Selection and Management 9. Software Quality Assurance 10. Software Metrics 11. ISO 9000 12. Software Process Improvement 13. Capability Maturity Model Integration 14. Setting up a CMMI Initiative 15. SCAMPI Appraisals 16. Software Engineering Tools 17. Formal Methods 18. Z Formal Specification Language 19. Unified Modelling Language 20. Epilogue, Glossary, References, Index

9783319061054 382 (Pb) € 44.99 Springer

www.anebooks.com

8

COMPUTER SCIENCECOMPUTER SCIENCE

About the Book: Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;

What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?

It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.

9788184896343 226 (Pb) ` 595.00 Springer

Information Security Handbook

Hunter, John M.Special

Indian Price

Special

Indian Price

9

www.anebooks.com

Ane Books Pvt. Ltd.

About the Book:

Contents:

Computerised Accounting has replaced the manual accounting system. Today, for an organization to run smoothly, computerised accounting plays a very important role. Though there are several softwares available for computerised accounting but Tally.ERP 9 is still one of the most widely used and popular accounting software in India.

This book explains Data Entry, Reporting and Tax Management with Tally.ERP 9 it also covers new features of Tally.ERP 9. Students, Accountants, Professionals and, Businessman’s can use this book as a simple guide for learning Tally.ERP 9

-Introduction to Accounting -Main Screen of Tally.ERP 9 -Function Keys in Tally -Company Creation in Tally.ERP 9 -Transactions -Banking in Tally.ERP 9 -Interest Calculation in Tally.ERP 9 -Order Processing -Point of Sales (POS) -Split and Consolidation of Tally Data -Import and Export of Tally Data -E-Mail and Uploading from Tally.ERP 9 -Miscellaneous -MIS in Tally -Payroll in Tally.ERP 9 -Implementation of Service Tax in Tally.ERP 9 -Implementation of TDS in Tally.ERP 9 -Implementation of Value Added Tax (VAT) in Tally.ERP 9 -Implementation of Excise in Tally.ERP 9 -F:12 Configuration -Reporting in Tally -Printing from Tally, Index , Table of Figures

9789382127680 330 (Pb) ` 425.00 Ane Books

Learn Tally.ERP 9

Rajesh ChhedaObaid Motiwala

Mathematics For Computer Graphics

2/ED

Vince

Contents: Preface • Mathematics • Numbers • Algebra • Trigonometry • Cartesian Coordinates • Vectors • Transformation • Interpolation • Curves and Patches • Analytic Geometry • Barycentric coordinates • Worked Examples • Conclusion • References • Index

9788184894561 262 (Pb) ` 595.00 Springer

Special

Indian Price

About the Book:

Contents:

Mass Customization leads the strategy of today`s well succeeded companies. It indulges the customer with the so long yearned for product and/or service that exactly fits his desires and specifications. This book compiles a hand-selected variety of testimonies from Mass Customization experts worldwide with different experiences both on an academic research basis as well as on practical case studies. This diversity makes it a compulsory guide to use in any enterprise throughout the world that wants to take its business into new and more ambitious dimensions. Furthermore, its contents are structured in a way that will help everyone that wants to learn, teach or put into practice the concepts of Mass Customization.

Part I: THE STRATEGY OF MASS CUSTOMIZATION, On the Economics of Mass Customization, A Procedure for Building Product Models, Mass Customization Facing Logistics Challenges, From Mass Production to Mass Customization: The Impact on Integrated Supply Chains, Key Value Attributes in Mass Customization, Part II: PREPARATION AND IMPLEMENTATION, Web Tools for Supporting Mass Customization, Manufacturing Planning and Control Content Management in Virtual Enterprises Pursuing Mass Customization, Customer Interaction and Digitizability - A Structural Approach to Mass Customization, Intermediaries for the Provision of Mass Customized Digital Goods in Electronic Commerce, Knowledge Fusion in the Business Information Environment for e-Manufacturing Pursuing Mass Customization, Experiences of Applying Systematic Modularisation Methods in Light Assembly Industry, Part III: A VALUE CHAIN, Mass Customization and Beyond - Evolution of Customer Centricity in Financial Services, Modularity in Three Dimensions: A Study of Mass Customization in the Dutch House Building Industry, Customization of Capital Goods - Implications for After Sales, The Authors .

Moving into Mass Customization Information Systems and

Management Principles

Claus RautenstrauchRalph Seelmann Eggebert

Klaus Turowski

9781599040394 254 (Hb) ` 595.00 Springer

Special

Indian Price

www.anebooks.com

10

COMPUTER SCIENCECOMPUTER SCIENCE

About the Book:

Contents:

Considerable attention is currently devoted towards quality of service (QsS) issues and mobility challenges such as those arising from the integration of the integration of the next and future generation Internets over terrestrial digital TV, mobile user location management and multi service heterogeneous networks. Of particular importance is the convergence of wireless networks supported by internetworking and the evolution of wireless access and switching technologies.

Mobility Management and Quality of Service for Heterogeneous Networks presents recent advances in networks of diverse technology and the internet reflecting state of the art research achievements in mobility and access network management, performance enhancement, optimal admission control and methodologies for QoS.

Technical topics discussed in the book include

• Mobility Management;

• Optimal Admission Control;

• Performance Modelling Studies;

• Access Network Coverage;

• Quality of Service (QoS);

Mobility Management and Quality of Service for Heterogeneous Networks contains extended/revised research papers, which have their roots in the series of the HET-NETs International Working Conferences focusing on the 'Performance Modelling and Evaluation of Heterogeneous Networks' staged under the auspices of the EU Networks of Excellence Euro-NGI and Euro-FGI.

This book is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science, operational research, electrical engineering and telecommunication systems.

Preface; Participants of the Reviewing Process; - Mobility Management - Optimal Admission Control - Performance Modelling Studies - Access Networks Coverage - Quality of Service (QoS) Author Index, Subject Index

9788793102132 486 (Hb) ` 3995.00 River Publishers

Mobility Management and

Quality of Service For Heterogeneous

Networks

Demetres D. Kouvatsos

Special

Indian Price

A Practical Guide for

System Verilog Assertions

Vijayaraghavan, Srikanth, Ramanathan, Meyyappan

About the Book: SystemVerilog language consists of three very specific areas of constructs -- design, assertions and testbench. Assertions add a whole new dimension to the ASIC verification process. Assertions provide a better way to do verification proactively. Traditionally, engineers are used to writing verilog test benches that help simulate their design. Verilog is a procedural language and is very limited in capabilities to handle the complex Asic's built today. SystemVerilog assertions (SVA) are a declarative and temporal language that provides excellent control over time and parallelism. This provides the designers a very strong tool to solve their verification problems. While the language is built solid, the thinking is very different from the user's perspective when compared to standard verilog language. The concept is still very new and there is not enough expertise in the field to adopt this methodology and be successful. While the language has been defined very well, there is no practical guide that shows how to use the language to solve real verification problems. This book will be the practical guide that will help people to understand this new methodology.

"Today's SoC complexity coupled with time-to-market and first-silicon success pressures make assertion based verification a requirement and this book points the way to effective use of assertions."

Satish S. Iyengar, Director, ASIC Engineering, Crimson Microsystems, Inc.

"This book benefits both the beginner and the more advanced users of SystemVerilog Assertions (SVA). First by introducing the concept of Assertion Based Verification (ABV) in a simple to understand way, then by discussing the myriad of ideas in a broader scope that SVA can accommodate. The many real life examples, provided throughout the book, are especially useful."

Irwan Sie, Director, IC Design, ESS Technology, Inc.

"SystemVerilog Assertions is a new language that can find and isolate bugs early in the design cycle. This book shows how to verify complex protocols and memories using SVA with seeral examples. This book is a good reference guide for both design and verification engineers."

Derick Lin, Senior Director, Engineering, Airgo Networks, Inc.

9788184893397 488 (Hb) ` 895.00 Springer

Special

Indian Price

11

www.anebooks.com

Ane Books Pvt. Ltd.

About the Book:

Contents:

This book is devoted to the fundamentals of text mining using Perl, an open-source programming tool that is freely available via the Internet (www.perl.org). It covers mining ideas from several perspectives--statistics, data mining, linguistics, and information retrieval--and provides readers with the means to successfully complete text mining tasks on their own.

The book begins with an introduction to regular expressions, a text pattern methodology, and quantitative text summaries, all of which are fundamental tools of analyzing text. Then, it builds upon this foundation to explore:

Ÿ Probability and texts, including the bag-of-words model

Ÿ Information retrieval techniques such as the TF-IDF similarity measure

Ÿ Concordance lines and corpus linguistics

Ÿ Multivariate techniques such as correlation, principal components analysis, and clustering

Ÿ Perl modules, German, and permutation tests

Each chapter is devoted to a single key topic, and the author carefully and thoughtfully introduces mathematical concepts as they arise, allowing readers to learn as they go without having to refer to additional books. The inclusion of numerous exercises and worked-out examples further complements the book's student-friendly format.

Practical Text Mining with Perl is ideal as a textbook for undergraduate and graduate courses in text mining and as a reference for a variety of professionals who are interested in extracting information from text documents.

List of Figures. List of Tables. Preface. Acknowledgments. 1. Introduction. 2. Text Patterns. 3. Quantitative Text Summaries. 4. Probability and Text Sampling. 5. Applying Information Retrieval to Text Mining. 6. Concordance Lines and Corpus Linguistics. 7. Multivariate Techniques with Text. 8. Text Clustering. 9. A Sample of Additional Topics. Appendix A. Overview of Perl for Text Mining. Appendix B. Summary of R used in this Book. References. Index.

9788126554218 310 (Hb) ` 3995.00 Wiley

Practical Text Mining with Perl

Roger Bilisoly

Special

Indian Price

9789380618159 263 (Pb) ` 225.00 Ane Books

Principles of

Grid ComputingConcepts & Applications

P. Venkata KrishnaM. Rajasekhara Babu

V. Saritha

About the Book:

Contents:

The objectives of book is to provide a framework for learning necessary fundamentals that enable the students for advanced studies in the area of grid computing. The text describes the use of contemporary tools for the development of applications in the area of grid computing. Besides examples, it also provides snapshots for the output of programs for the convenience of students so that they can observe these results and use them in their practices. The textbook is divided in five core parts and thus defines the structure for evaluating effectiveness of learning. The five parts are: Grid, Grid Computing Technologies, Grid Platforms, Grid Implementation and Grid Applications. At the beginning of each part, there is an overview for students about which skills they will be learning and practicing. Each part comprises multiple chapters and every chapter ends with summary and knowledge testing. An extensive list of references has been provided for further study. Finally, the text concludes with glossary.

Part I: About Grid, 1. Introduction 2. Dynamic Virtual Organisation 3. Distributed Shared Memory in Grid Environment 4. Conceptual Evaluation and Pathway to Grid Computing, Part II: Grid Computing Technologies, 5. SOA, Service Oriented Architecture, 6. Web Services in Grid, 7. XML, Related Technologies and Their Role in GRID, Part III: Grid Paltforms, 8. Open Grid Service Architecture (OGSA), 9. OGSA Basic Services 10. Open Grid Services Infrastructure (OGSI), Part IV: Grid Implementation 11. Grid Security 12. Globus Toolkit, Part V: Grid Applications 13. GT4 in Linux and Running Sample Web Service 14. Cluster 15. Grid Technologies, Systems and Scheduling

9789380618876 148 (Pb) ` 160.00 Ane Books

About the Book:

Contents:

Programming with Middleware Technologies is designed to focus on the exact information you need to become an efficient middleware programmer. This book serves as an introduction and tutorial, and provides the information you need to handle real world programming challenges. The book is intended for the basic RMI, EJB, CORBA programmer. Suitable for individuals who want to learn middleware programming on their own. If the reader is new to Middleware, the ample code is a big plus because one can experiment with meaningful applications. Easier development and deployment of the various types of EJBs like Stateful Bean, Stateless Bean, CMP & BMP using Blazix server.

1. Middleware, 2. Remote Method Invocation, 3. Enterprise Jara Beans, 4. Session Beans, 5. Entity Beans, 6. Corba, Index

Programming with Middleware

Technologies

S AnithaM Gomathi

www.anebooks.com

12

COMPUTER SCIENCECOMPUTER SCIENCE

Performance Modelling and

Analysis of Heterogenceous

Networks

Demetres Kouvatsos

About the Book:

Contents:

During the last Decade, a considerable amount of effort has been devoted, both in industry and academia, into performance modeling, evaluation and prediction of convergent multiservice heterogeneous networks, such as mobile, wireless and optical networks, towards the design and dimensioning of the next and future generation Internets.

Performance Modelling and Analysis of Heterogeneous Networks presents recent advances in networks of diverse technology reflecting the state-of-the-art technology and research achievements in performance modeling analytic evaluation methodologies and applications.

Technical topics addressed in the book include:

1. Multiservice Switching Networks

2. Wireless Ad Hoc Networks

3. Wireless Sensor Networks

4. Wireless Cellular Networks

5. Optical Networks

Performance Modelling and Analysis of Heterogeneous Networks includes extended/revised research papers, which have their roots in the series of the HET-NETs International Working Conferences on the ‘Performance Modelling and Evaluation of Heterogeneous Networks’ staged under the auspices of the EU Networks of Excellence Euro-NGI and Euro-FGI.

The book is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science, operational research, electrical engineering and telecommunication systems and the Internet.

Two other related research books by River Publishers, also edited by Demetres Kouvatsos, are ‘Traffic and Performance Engineering for Heterogeneous Networks’ (ISBN 978-87-93102-10-1) and ‘Mobility Management and Quality-of-Service for Heterogeneous Networks’ (ISBN 978-87-93102-13-2).

Preface; Participants of the Reviewing Process; • Multiservice Switching Networks; • Wireless Ad Hoc Networks; • Wireless Sensor Networks; • Wireless Cellular Networks; • Optical Networks; Author Index; Keyword Index.

9788793102118 488 (Hb) ` 3995.00 River Publishers

Special

Indian Price

9781439841228 316 (Hb) ` 2995.00 CRC Press

About the Book:

Contents:

Software Engineering: The Current Practice helps you learn basic software engineering skills and explore recent developments in the field, including software changes and iterative processes of software development.

After a historical overview and an introduction to software technology and models, the book discusses the software change and its phases, including concept location, impact analysis, refactoring, actualization, and verification. It then covers the most common iterative processes: agile, directed, and centralized processes. The text also journeys through the initial development of software from scratch to the final stages that lead toward software closedown.

FeaturesŸ Emphasizes iterative processes of contemporary software

engineering practice, including agile processesŸ Uses object-oriented technology and UML to illustrate software

engineering conceptsŸ Describes the phases of software change, including concept location,

impact analysis, refactoring, unit testing, and frequent buildsŸ Shows how to deal with existing legacy code and develop new

programs from scratch

Preface, Acknowledgement, Author, INTRODUCTION, History of Software Engineering, Software Properties, Origins of Software, Birth of Software Engineering, Third Paradigm: Iterative Approach, Software Life Span Models, Staged Model, Variants of Staged Model, Software Technologies, Programming Languages and Compilers, Object-Oriented Technology, Version Control System, Software Models, UML Class Diagrams, UML Activity Diagrams, Class Dependency Graphs and Contracts, SOFTWARE CHANGE, Introduction to Software Change, Characteristics of Software Change, Phases of Software Change, Requirements and Their Elicitation, Requirements Analysis and Change Initiation, Concepts and Concept Location, Concepts, Concept Location Is a Search, Extraction of Significant Concepts (ESC), Concept Location by Grep, Concept Location by Dependency Search, Impact Analysis, Impact Set, Class Interaction Graphs, Process of Impact Analysis, Propagating Classes, Alternatives in Software Change, Tool Support for Impact Analysis, Actualization, Small Changes, Changes Requiring New Classes, Change Propagation, Refactoring, Extract Function, Extract Base Class, Extract Component Class, Prefactoring and Postfactoring, Verification, Testing Strategies, Unit Testing, Functional Testing, Structural Testing, Regression and System Testing, Code Inspection, Conclusion of Software Change, Build Process and New Baseline, Preparing for Future Changes, New Release, SOFTWARE PROCESSES, Introduction to Software Processes, Characteristics of Software Processes, Solo Iterative Process (SIP), Enacting and Measuring SIP, Planning in SIP, Team Iterative Processes, Agile Iterative Process (AIP), Directed Iterative Process (DIP), Centralized Iterative Process (CIP), Initial Development, Software Plan, Initial Product Backlog, Design, Implementation, Team Organizations for Initial Development, Final Stages, End of Software Evolution, Servicing, Phaseout and Closedown, Reengineering, CONCLUSION, Related Topics, Other Computing Disciplines, Professional Ethics, Software Management, Software Ergonomics, Software Engineering Research, Example of Software Change, Concept Location, Impact Analysis, Actualization, Testing, Example of SIP, Initial Development, Iteration 1, Iteration 2, Index.

Software Engineering

Vaclav Rajlich

Special

Indian Price

13

www.anebooks.com

Ane Books Pvt. Ltd.

About the Book:

Contents:

One consequence of the pervasive use of computers is that most documents originate in digital form. Text mining—the process of searching, retrieving, and analyzing unstructured, natural-language text—is concerned with how to exploit the textual data embedded in these documents.

Text Mining presents a comprehensive introduction and overview of the field, integrating related topics (such as artificial intelligence and knowledge discovery and data mining) and providing practical advice on how readers can use text-mining methods to analyze their own data. Emphasizing predictive methods, the book unifies all key areas in text mining: preprocessing, text categorization, information search and retrieval, clustering of documents, and information extraction. In addition, it identifies emerging directions for those looking to do research in the area. Some background in data mining is beneficial, but not essential.

This authoritative and highly accessible text, written by a team of authorities on text mining, develops the foundation concepts, principles, and methods needed to expand beyond structured, numeric data to automated mining of text samples. Researchers, computer scientists, and advanced undergraduates and graduates with work and interests in data mining, machine learning, databases, and computational linguistics will find the work an essential resource.

Preface 1 Overview of Text Mining 2 From Textual Information to Numerical Vectors 3 Using Text for Prediction 4 Information Retrieval and Text Mining 5 Finding Structure in a Document Collection 6 Looking for Information in Documents 7 Case Studies 8 Emerging Directions, Appendix: Software Notes, References, Author Index, Subject Index

9788126554218 310 (Hb) ` 3995.00 Wiley

Text Mining Predictive Methods for Analyzing

Unstructured Information

Weiss, S.M. Indurkhya, N.

Zhang, T. Damerau, F.

Text Mining Predictive Methods for Analyzing Unstructured

Information

Weiss, S.M. Indurkhya, N.

Zhang, T. Damerau, F.

Special

Indian Price

About the Book:

Contents:

The book "Trouble Free C++" is designed for both engineering/non-engineering students. The subject matter of this book has been divided into 18 chapters. Each chapter has been written and developed with simplified programs, for easy understanding of the core concepts of C++" languages. Through this book assumes no previous exposure to the C++ programming languages, it will be equally useful for experienced programmers.

Salient Features

Ÿ Lucid explanation of OOP concept.

Ÿ Covers C features in nutshell.

Ÿ Emphasis is on new features of C++.

Ÿ 12 fully explained programs on Type conversion

Ÿ Virtual Functions explored in depth.

Ÿ Detailed coverage of exception handling and templates.

Ÿ Over 600 thoroughly explained programs.

Ÿ Plenty of exercises.

Ÿ Short and explanatory coverage of STL (Standard Template Library).

Ÿ A complete chapter on string class.

Ÿ Description of file handling with more than 40 programs explained in great detail.

1. Introduction to Oops 2. Beginning with C++ 3. Introduction to C Features of C++ 4. Introduction to Operators and References in C++ 5. Introduction to Function in C++ 6. Introduction to Class and Objects 7. Constructor and Destructor 8. Introduction to Operator Overloading 9. Introduction to Inheritance 10. Pointers to Objects and Virtual Functions 11. Introduction to Input-Output and Manipulators 12. Introduction of File Handling in C++ 13. Miscellaneous New Features 14. Introduction of Template Programming 15. Exception Handling in C++ 16. Standard Template Library 17. The String Class 18.Hidden Truth of C++, Appendix 1, Appendix 2, Appendix 3.

9789380156620 948 (Pb) ` 595.00 Ane Books

Trouble Free C++

Hari Mohan Pandey

www.anebooks.com

14

COMPUTER SCIENCECOMPUTER SCIENCE

About the Book:

Contents:

Emphasizing the detailed design of various Verilog projects, Verilog HDL : Digital Design and Modeling offers students a firm foundation on the subject matter. The textbook presents the complete Verilog language by describing different modeling constructs supported by Verilog and by providing numerous design examples and problems in each chapter. Examples include counters of different moduli, half adders, full adders, a carry lookahead adder, array multipliers, different types of Moore and Mealy machines, and much more. The text also contains information on synchronous and asynchronous sequential machines, including pulse-mode asynchronous sequential machines.

In addition, it provides descriptions of the design module, the test bench module, the outputs obtained from the simulator, and the waveforms obtained from the simulator illustrating the complete functional operation of the design. Where applicable, a detailed review of the topic’s theory is presented together with logic design principles, including state diagrams, karnaugh maps, equations, and the logic diagram.

Verilog HDL : Digital Design and Modeling is a comprehensive, self-contained, and inclusive textbook that carriers all designs through to completion, preparing students to thoroughly understand this popular hardware description language (HDL).

Introduction. Overview. Language Elements. Expressions. Gate-Level Modeling. User-Defined Primitives. Dataflow Modeling. Behavioral Modeling. Structural Modeling. Tasks and Functions. Additional Design Examples. Appendix A: Event Queue. Appendix B: Verilog Project Procedure. Appendix C: Answers to Selected Problems. Index.

Verilog HDL Digital Design and Modeling

Joseph Cavanagh

9781420051547 920 (Hb) ` 3495.00 CRC Press

Special

Indian Price

About the Book: This book will help engineers write better Verilog/ System Verilog design and verification code as well as deliver digital designs to market more quickly. It shows over 100 common coding mistakes that can be made with the Verilog and SystemVerilog languages. Each example explains in detail the symptoms of the error, the languages rules that cover the error, and the correct coding style to avoid the error. The book helps digital design and verification engineers to recognize, and avoid, these common coding mistakes. Many of these errors are very subtle, and can potentially cost hours or days of lost engineering time trying to find and debug them.

Verilog and System Verilog

Gotchas101 Common Coding Errors and

How to Avoid Them

Stuart Sutherland Don Mills

9788184894608 218 (Pb) ` 495.00 Springer

Special

Indian Price

15

www.anebooks.com

Ane Books Pvt. Ltd.

ISBN TITLE AUTHOR PRICE

9781599044958 Computer-Mediated Relationships and Trust Brennan $ 180.00

9781599046518 Information Systems and Healthcare Enterprises RADAK $ 99.95

9781599042954 End User Computing Challenges and Technologies : Emerging Tools and Applications Clarke $ 180.00

9781599046488 Agent and Web Service Technologies in Virtual Enterprises Protogeros $ 180.00

9781599046549 Developing Successful Ict Strategies Rahman $ 180.00

9781599049243 Implementing Information Technology Governance Models Practices And Cases Grembergen $ 99.95

9781599049335 Knowledge Management Concepts Methodologies, 6 Volume Set Jennex $ 1,950.00

9781599043319 Video conferencing Technology in K-12 Instruction Newman $ 180.00

9781599045221 Social Simulation Technologies Edmonds $ 180.00

9781599043791 Securing Information Infrastructure Kizza $ 99.95

9781599041896 Handbook of Enterprise Systems Architecture in Practice SAHA $ 165.00

9781599041568 Strategies and Policies in Digital Convergence Park $ 165.00

9781599041292 Higher Creativity for Virtual Teams MACGREGOR $ 165.00

9781599042879 Emerging Information Resources Management Pour $ 99.95

9781599049298 Managing Worldwide Operations and Communications with Info Technology, 2 Vols Set Pour $ 495.00

9781599040813 Strategies for Information Technology and Intellectual Capital Joia $ 165.00

9781599047836 Consumer Adoption and Usage of Broadbhand Dwivedi $ 99.95

9781591409847 Handbook of Research on Nature Inspired Computing for Economics and Management, 2 Vol. Set Rennard $ 350.00

9781599040783 Contemporary Chief Information Officers Hunter $ 99.95

9781599042138 Linguistic and Cultural Online Communication Issues in Global Age (HB) Amant $ 165.00

9781599042923 Strategic Use of Information Technology for Global Organizations Hunter $ 99.95

9781599045498 Socio-Technical Knowledge Management HANDZIC $ 99.95

9781591408840 Mobile Government KUSHCHU $ 99.95

9781599041087 Architectural Design of Multi-Agent Systems LIN $ 165.00

9781599042848 Current Issues and Trends in E-Government Research NORRIS $ 79.95

9781599043944 Emerging E-Collaboration Concepts And Applications Kock $ 79.95

9781599045580 Global Mobile Commerce: Strategies, Implementation and Case Studies Huang $ 180.00

9781591408796 Intelligent Assistant Systems KASCHEK $ 84.95

9781591409694 Information Technology and Social Justice Rooksby $ 74.95

9781599040554 Reference Modeling For Business Systems Analysis Fettke $ 79.95

9781599040585 Information Communication Technologies & Human Development : Opp. & Challenges Hernandez $ 99.95

9781599041810 Enterprise Service Computing form Concept to Deployment QIU $ 79.95

9781599042022 Functional and Object Oriented Analysis and Design : An Integrated Methodology SHOVAL $ 79.95

9781599042664 Application of agents and intelligent information technologies Sugumaran $ 79.95

9781599043289 Enhancing Learning Through Human Computer Interaction MCKAY $ 165.00

9781599043906 Control and Constraint in E-Learning Dron $ 94.95

9781599043227 Instructional Design:Case Studies in Communities of Practice (HB) Keppell $ 94.95

9781599042190 Design Patterns Formalization Techniques TAIBI $ 99.95

9781599041667 Knowledge and Technology Management in Virtual Organization PUTNIK $ 84.95

9781599041056 Social Implications & Challenges Of E Business LI $ 165.00

9781591409878 Encyclopedia of Information Ethics Quigley $ 325.00

9781599040394 Mass Customization Info Systems In Business(Hb) Blecker $ 165.00

9781599042893 Contemporary Issues in Database Design and Information Systems Development (Hb) Siau $ 99.95

9781599043081 Knowledge Management Systems Gottschalk $ 79.95

9781599044293 Business Dynamics In Information Technology Petter $ 99.95

9781599044842 Ubiquitous and Pervasive Knowlwdge and Learning Management LYTRAS $ 84.95

9781599042787 E-Business Innovation And Process Management Lee $ 79.95

9781599042756 Business Data Communications and Networking GUTIERREZ $ 84.95

9781599041773 Case Studies on Digital Government Rocheleau $ 99.95

9781591403913 Integration of ICT in Smart Organizations MEZGAR $ 69.95

9781591408611 Digital Multimedia Perception and Design Ghinea $ 79.95

9781599044033 Cases on Electronic Commerce Technologies and Applications Pour $ 69.95

9781591408901 Handbook of Research on E-Porttolio Kaufman $ 195.00

9781591406853 Database Modeling for Industrial Data Management Ma $ 74.95

OTHER TITLES OF IDEA GROUP PUBLICATIONS

www.anebooks.com

16

COMPUTER SCIENCECOMPUTER SCIENCE

9781591408406 Imitation-Based Approach to Modeling Trajkovski $ 79.95

9781599044002 Cases on Database Technology and Applications Pour $ 69.95

9781591408949 Utilizing Information Technology in Developing Strategic Alliances Fierro $ 79.95

9781599040110 Agile Virtual Enterprises (PP) CUNHA $ 79.95

9781591406419 Applications of Information Systems to Homeland Security and Defense ABBASS $ 74.95

9781591406440 Global Electrinic Business Research Al-Qirim $ 74.95

9781591407584 Skills for Managing Rapidly Changing it Projects FIORAVANTI $ 74.95

9781591408581 Measuring Information Systems Delivery Quality DUGGAN $ 79.95

9781591406792 Advances in Electronic Business, Vol. 2 LI $ 79.95

9781591407515 User-Centered Computer Aided Language Learning ZAPHIRIS $ 69.95

9781591407997 Ency Of E-Commerce, E - Government 2 Volume Set Khosrow $ 545.00

9781591402374 Instructional Technologies Darbyshire $ 64.95

9781591405955 Authenitc Learning Environments in Higher Education HERRINGTON $ 69.95

9781591406563 Processing and Managing Complex Data for Decision Support DARMONT $ 79.95

9781591408154 Encyclopedia of Gender and Information Technology, 2 Vols Set TRAUTH $ 525.00

9781591408642 Advanced Data Mining Technologies in Bioinformatics Hsu $ 79.95

9781591408826 Global Information Technology and Competitive Financial Alliances KURIHARA $ 74.95

9781591409366 Advanced Topics in Database Research Vol 5 Siau $ 79.95

9781599043500 Enterprise Systems Education In The 21St Century Tarn $ 74.95

9781591408970 Object-Oriented Design Knowledge: Principles, Heuristics and Best Practices Garzas $ 79.95

9781591407096 Teaching and Learning With Virtual Teams FERRIS $ 69.95

9781591409489 Audience Response Systems in Higher Education (PP) Banks $ 74.95

9781599044156 Cases on Strategic Information Systems Pour $ 69.95

9781591407188 New Infrastructures for Knowledge Production Hine $ 69.95

9781591408437 Cognitive Informed Sytems Alkhalifa $ 74.95

9781599043975 Cases on Information and Technology and Business Process Reengineering Pour $ 69.95

9781599044064 Cases on the Human Side of Information Technology Knowrow-Pour $ 69.95

9781591408666 Handbook of Research on Mobile Multimedia Ibrahim $ 195.00

9781591409304 Advanced Topics in Information Resources Management:Vol.5(PP) Knowrow-Pour $ 74.95

9781599040172 Optimal Knowledge Management (Pb) JAMES $ 79.95

9781599040226 Cyber Terrorism Colarik $ 69.95

9781591409779 Strategic Alignment Process and Decision Support Systems : Theory and Case Studies SHIMIZU $ 74.95

9781599044248 CIO and Corporate Strategic Management: Changing Role of CIO to CEO Gottschalk $ 94.95

9781591404576 Electronic Monitoring in the Workplace WECKERT $ 69.95

9781591407744 Harnessing Knowledge Dynamics: Principled Organizational Knowing and Learning NISSEN $ 74.95

9781591405283 Transformation of Knowledge Information and Data BOMMEL $ 69.95

9781591405108 Knowlwdge Management and Higher Education METCALFE $ 69.95

9781591404187 Strategies for Generating E-Business Returns on Investment SHIN $ 74.95

9781878289902 Information Technology Evaluation Methods and Management Grembergan $ 74.95

9781878289483 Information Technology Diffusion in the Asia Pacific Tan $ 64.95

ISBN TITLE AUTHOR PRICE

9788793102118 Performance Modelling and Analysis of Heterogenceous Networks Kouvatsos ` 3,995.00

9788793102132 Mobility Management and Quality of Service for Heterogeneous Networks Kouvatsos ` 3,995.00

9788793102156 Biomedical and Environmental Sensing Agbinya ` 3,995.00

9788793102095 Adaptive Phy-Mac Design For Broadband Wireless Systems Prasad ` 3,995.00

9788793102125 Single and Multi Carrier Mimo Transmission for Broadband Wireless Systems Prasad ` 3,995.00

9788793102040 Planning and Optimization of 3G and 4G Wireless Networks Agbinya ` 3,995.00

9788793102149 Principles of Communication: A First Course in Communication Chen ` 3,995.00

9788793102170 Aerospace Technologies and Applications for Dual Use Finocchio ` 3,995.00

9788793102064 Digital System Design Use of Microcontroller Dawoud ` 3,995.00

9788793102071 Wireless Body Area Networks Li ` 3,995.00

9788793102163 4G Mobile and Wireless Communications Technologies Kyriazakos ` 3,995.00

9788793102101 Traffic and Performance Engineering for Heterogeneous Networks Kouvatsos ` 3,995.00

9788793102088 Multihop Mobile Wireless Networks Govindan ` 3,995.00

9788793102057 Pattern Recognition and Machine Vision Wang ` 3,995.00

OTHER TITLES OF RIVER PUBLISHERS