Issue No.02 - February (2008 vol.41)
Published by the IEEE Computer Society
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2008.41
CMMI and Six Sigma: Partners in Process Improvement, Jeannine M. Siviy, M. Lynn Penn, and Robert W. Stoddard. This book focuses on the synergistic, rather than competitive, implementation of CMMI and Six Sigma. Topics range from formation of the value proposition to specific implementation tactics. The authors show how not taking advantage of what both initiatives offer puts an organization at risk of sinking time, energy, and money into inventing a solution that already exists. Along the way they debunk a few myths about Six Sigma applications in software.
Although the authors concentrate on the interoperability of Six Sigma and CMMI, they also recognize that organizations rarely implement only these two initiatives. Accordingly, the discussion turns to the emerging realm of multimodel process improvement, as well as strategies and tactics that transcend models to help organizations effectively knit together a single unified internal process standard.
Addison-Wesley Professional; informit.com; 0-321-51608-7; 368 pp.
Algorithmic Game Theory, Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V. Vazirani, eds. In the past few years game theory has substantially influenced computer science, especially Internet- and e-commerce-related issues. More than 40 top researchers in this field have contributed chapters to this book that go from game theory's foundations to its state-of-the-art applications.
Early chapters cover algorithmic methods for equilibria, mechanism design, and combinatorial auctions, while later chapters address incentives and pricing, cost sharing, information markets, and cryptography and security.
Cambridge University Press; www.cambridge.org; 978-0-521-87282-9; 776 pp.
Advances in Biometrics: Sensors, Algorithms and Systems, Nalini K. Ratha and Venu Govindaraju, eds. Biometrics technology continues to progress, with its wider acceptance and the need for various new security facets in modern society. From simply logging on to a laptop to crossing a national border, biometrics is being called upon to meet the growing challenges of identity management.
With contributions by leading international authorities in the field, this book presents a comprehensive treatment of biometrics that covers the entire gamut of topics in the field, including data acquisition, pattern-matching algorithms, and system-level issues such as standards, security, networks, and databases. Organized into three sections, the book covers: sensors, advances in biometric matching algorithms, and topics that deal with issues at the systems level.
Springer; www.springer.com; 978-1-84628-920-0; 508 pp.
Networking with Microsoft Windows Vista: Your Guide to Easy and Secure Windows Vista Networking, Paul McFedries. The author provides a beginner's guide to creating, configuring, administering, and using a small network with Windows Vista computers. Coverage spans networking hardware, including Ethernet hardware (from NICs to cables to switches to routers) and wireless hardware (from wireless NICs to access points to range extenders).
The book includes buyer's guides that help readers make smart choices when purchasing network hardware, then shows readers how to put everything together, including configuring a router, laying cable, and connecting the devices. Mastering Windows Vista's networking features involves using the Network and Sharing Center, managing wired and wireless connections, accessing shared network resources, sharing local resources on the network, and working with network files offline.
The book also provides extensive coverage of security issues that affect anyone connected to the Internet. The author shows how to secure each computer, secure global networking settings, and batten down wireless connections. The book also includes intermediate networking tasks such as making remote connections, monitoring the network, troubleshooting network problems, and setting up Vista's built-in Web and FTP servers.
QUE; www.informit.com/que; 0-7897-3777-9; 552 pp.
Conversational Informatics: An Engineering Approach, Toyoaki Nishida, ed. This book investigates human behavior with a view to designing conversational artifacts capable of interacting with humans. It spans an array of topics, including linguistics, psychology, and human-computer interaction. Until recently, research in such areas has been carried out in isolation, with no attempt made to connect the various disciplines. Advancements in science and technology have changed this.
This book provides an interdisciplinary introduction to conversational informatics and places emphasis on the integration of scientific approaches to achieve engineering goals and advance further understanding of conversation. A collection of surveys explores four prominent research areas: conversational artifacts; conversational contents; conversation environment design; and conversation measurement, analysis, and modeling.
Wiley; www.wiley.com; 978-0-470-02699-1; 430 pp.