1
September 2001 115 NEW BOOKS I nformation Hiding: Steganography and Watermarking—Attacks and Counter- measures, Neil F. Johnson, Zoran Duric, and Sushil Jajodia. The authors report research in three areas: investigation of data hiding and labeling techniques, attacks against steganography and water- marked information, and countermea- sures that assist in protecting digital watermarking systems. They analyze methods for hiding information in digi- tal media to uncover their limitations and assess attacks on these techniques to aid in developing countermeasures that assist in protecting digital watermarking sys- tems. Johnson and colleagues assert that systems for uncovering hidden informa- tion and recovering seemingly lost data will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Kluwer Academic Publishers, Nor- well, Mass.; http://www.wkap.nl; ISBN 0-7923-7204-2; 137 pp.; $95. RISK ANALYSIS WITH USE CASES A pplying Use Cases: A Practical Guide, Second Edition, Geri Schnei- der and Jason P. Winters. A cutting-edge software development technique, use- case analysis defines a system’s outward features from the user’s viewpoint. This new edition discusses the Unified Mod- eling Language (UML) version 1.3, eval- uates the pros and cons of use-case doc- umentation techniques, and reviews the relationships between modeling ap- proaches and use cases. The authors demonstrate how to apply use cases to a project’s inception, requirements and risk analysis, system architecture, scheduling, review and test- ing, and documentation. They describe system interfaces—people, other soft- ware, hardware devices, data stores, or networks—and review use cases for test- ing architectural designs and ensuring accuracy. The authors identify common mistakes and suggest possible solutions, then provide documentation templates and a UML notation guide. They assert that use-case analysis plays a role in the new unified software-development pro- cess and that it can apply to realistic pro- jects. Addison-Wesley, Boston; http://www. awl.com/cseng/; ISBN 0-201-70853-1; 245 pp.; $34.95. BLOCK-BY-BLOCK CHIP BUILDING V LSI Design, M. Michael Vai. Writing from a digital circuit engineer’s per- spective, Vai presents an overview of very large scale integration technologies ranging from complementary metal- oxide semiconductor design, intellectual property cores, and silicon-on-a-chip designs to leading-edge, application-spe- cific array processors and fault-tolerant architectures. He uses a microprocessor and field-programmable gate array to demonstrate top-down design method- ology. CRC Press, Boca Raton, Fla.; ISBN 0- 8493-1876-9; 406 pp.; $89.95. CUSTOMER-DRIVEN REQUIREMENTS E ffective Requirements Practices, Ralph R. Young. Using requirements practices to redirect resources can satisfy customers’ real business needs, keep pro- jects on track, reduce costs, and improve quality. Young describes this compre- hensive process and identifies key ele- ments for verifying what customers require when they request systems and software solutions. Young provides guidelines for creat- ing teams that combine the expertise of customers and contractors. He discusses the impact of change on requirements and offers steps for managing change to meet the customers’ needs. To deliver systems swiftly and economically, the author believes that developers must invest more time in the requirements process. Addison-Wesley, Boston; http://www. awl.com/cseng/series/it; ISBN 0-201- 70912-0; 359 pp.; $39.95. HUMAN BEHAVIOR: SWARM THEORY S warm Intelligence, James Kennedy and Russell C. Eberhart, with Yuhui Shi. The authors argue that intelligent human cognition derives from interac- tions among individuals in a social world and that we can effectively apply the sociocognitive view to computationally intelligent systems. They use the term swarm to describe the social processes that take place in the human mind and in high-dimensional mathematical systems. The authors describe results of recent experiments using particle swarm opti- mization algorithms and offer a basic overview of statistics so that readers can analyze the results of using the algo- rithms in their own experiments. Morgan Kaufmann, San Francisco; http://www.mkp.com; ISBN 1-55860- 595-9; 512 pp.; $65.95. Cloaking and Uncloaking Data Editor: Michael J. Lutz, Rochester Institute of Technology, Rochester, NY; mikelutz@mail. rit.edu. Send press releases and new books to Stephanie Kawada, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; fax +1 714 821 4010; [email protected].

Human behavior: swarm theory [Book Review]

  • Upload
    mj

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Human behavior: swarm theory [Book Review]

September 2001 115

N E W B O O K S

I nformation Hiding: Steganography andWatermarking—Attacks and Counter-

measures, Neil F. Johnson, Zoran Duric,and Sushil Jajodia. The authors reportresearch in three areas: investigation ofdata hiding and labeling techniques,attacks against steganography and water-marked information, and countermea-sures that assist in protecting digitalwatermarking systems. They analyzemethods for hiding information in digi-tal media to uncover their limitations andassess attacks on these techniques to aidin developing countermeasures that assistin protecting digital watermarking sys-tems.

Johnson and colleagues assert thatsystems for uncovering hidden informa-tion and recovering seemingly lost datawill be useful to law enforcementauthorities in computer forensics anddigital traffic analysis.

Kluwer Academic Publishers, Nor-well, Mass.; http://www.wkap.nl; ISBN0-7923-7204-2; 137 pp.; $95.

RISK ANALYSIS WITH USE CASES

A pplying Use Cases: A PracticalGuide, Second Edition, Geri Schnei-

der and Jason P. Winters. A cutting-edgesoftware development technique, use-case analysis defines a system’s outwardfeatures from the user’s viewpoint. Thisnew edition discusses the Unified Mod-eling Language (UML) version 1.3, eval-uates the pros and cons of use-case doc-umentation techniques, and reviews therelationships between modeling ap-proaches and use cases.

The authors demonstrate how toapply use cases to a project’s inception,requirements and risk analysis, systemarchitecture, scheduling, review and test-ing, and documentation. They describesystem interfaces—people, other soft-

ware, hardware devices, data stores, ornetworks—and review use cases for test-ing architectural designs and ensuringaccuracy. The authors identify commonmistakes and suggest possible solutions,then provide documentation templatesand a UML notation guide. They assertthat use-case analysis plays a role in thenew unified software-development pro-cess and that it can apply to realistic pro-jects.

Addison-Wesley, Boston; http://www.awl.com/cseng/; ISBN 0-201-70853-1;245 pp.; $34.95.

BLOCK-BY-BLOCK CHIP BUILDING

V LSI Design, M. Michael Vai. Writingfrom a digital circuit engineer’s per-

spective, Vai presents an overview ofvery large scale integration technologiesranging from complementary metal-oxide semiconductor design, intellectualproperty cores, and silicon-on-a-chipdesigns to leading-edge, application-spe-cific array processors and fault-tolerantarchitectures. He uses a microprocessorand field-programmable gate array todemonstrate top-down design method-ology.

CRC Press, Boca Raton, Fla.; ISBN 0-8493-1876-9; 406 pp.; $89.95.

CUSTOMER-DRIVEN REQUIREMENTS

E ffective Requirements Practices,Ralph R. Young. Using requirements

practices to redirect resources can satisfycustomers’ real business needs, keep pro-jects on track, reduce costs, and improvequality. Young describes this compre-hensive process and identifies key ele-ments for verifying what customersrequire when they request systems andsoftware solutions.

Young provides guidelines for creat-ing teams that combine the expertise ofcustomers and contractors. He discussesthe impact of change on requirementsand offers steps for managing change tomeet the customers’ needs. To deliversystems swiftly and economically, theauthor believes that developers mustinvest more time in the requirementsprocess.

Addison-Wesley, Boston; http://www.awl.com/cseng/series/it; ISBN 0-201-70912-0; 359 pp.; $39.95.

HUMAN BEHAVIOR: SWARM THEORY

S warm Intelligence, James Kennedyand Russell C. Eberhart, with Yuhui

Shi. The authors argue that intelligenthuman cognition derives from interac-tions among individuals in a social worldand that we can effectively apply thesociocognitive view to computationallyintelligent systems. They use the termswarm to describe the social processesthat take place in the human mind and inhigh-dimensional mathematical systems.

The authors describe results of recentexperiments using particle swarm opti-mization algorithms and offer a basicoverview of statistics so that readers cananalyze the results of using the algo-rithms in their own experiments.

Morgan Kaufmann, San Francisco;http://www.mkp.com; ISBN 1-55860-595-9; 512 pp.; $65.95.

Cloaking andUncloaking Data

Editor: Michael J. Lutz, Rochester Institute ofTechnology, Rochester, NY; [email protected]. Send press releases and new booksto Stephanie Kawada, 10662 Los VaquerosCircle, Los Alamitos, CA 90720; fax +1 714821 4010; [email protected].