VDM Verlag Dr. Mueller e.K.

Logo

Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities

Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software security practitioners, a solution for correctly...


Digital Interactive Installations

The present book is based on the author's diploma thesis written at the Institute of Media and Phototechnology University of Applied Sciences Cologne and describes the recent development of digital...


Becoming the New Man in Post-Postmodernist Fiction - Portrayals of Masculinities in David Foster Wallace's Infinite Jest and Chuck Palahniuk's Fight Club

While scholars have analyzed the masculinity crisis portrayed in American fiction, few have focused on postmodernist fiction, few have examined masculinity without using feminist theory, and no...


Data Mining for Retail Website Design and Enhanced Marketing

Data mining is considered as one of the most powerful technologies that participates greatly in helping companies in any industry to focus on the most important information in their data warehouses....


Advergaming and In-Game Advertising

The term Advergaming is used to describe the different possibilities to advertise brands or products with or within computer- and video games. This book displays all developments that have been made...


Attribute Enabled Software Development

Attribute Enabled Programming (AEP) is a wide-spreading technique that uses attributes to decorate existing code entities. AEP is supported in several general purpose languages, such as, .NET and...


Hardware-In-The-Loop Simulation

Safety-critical real-time systems must guarantee correct operation in all operational conditions - even if these conditions are very unlikely to occur (rare events). Hardware-in-the-Loop (HiL)...


Nlp-Driven Document Representations for Text Categorization

Text Categorization is the task of assigning predefined labels to textual documents. Current research has been focused on using word based representations called bag-of-words (BOW) with strong...


Monte Carlo Methods in Global Illumination - Photo-Realistic Rendering with Randomization

This book discusses Monte Carlo algorithms and their application to solve the global illumination rendering problem of computer graphics. Mathematically, photo-realistic rendering is equivalent to...


Composing the Sacred in Soviet and Post-Soviet Russia

Alfred Schnittke (1934-1998) is commonly considered the most prolific and popular Russian composer of the late twentieth century. In addition to contributing to all major compositional genres,...


My Bloody Valentine's Loveless

My Bloody Valentines unique sound on their final album Loveless defined a sub-genre of indie rock known as shoegaze. This book is the first major academic study of My Bloody Valentine and their...


The Pedagogy of Violin Shifting

This work focuses on the development of an effective and efficient pedagogical approach to teach the technique of shifting to the intermediate-level violin student. The review of the literature...


Fatal Spaces

Before Alfred Hitchcock rose to fame, German director Fritz Lang was considered by many to be cinema's pre-eminent master of suspense. Lang's thrillers and crime epics had an abiding influence on...


Nasty Noises - Error as a Compositional Element in Electro-Acoustic Music

'Glitch' is a stylistic mannerism within electro-acoustic composition that emerged in the late 1990s. Glitch, or 'microsound', as it is known in the academic context, observes the conventions of...


Contemporary Indonesian Language Poetry from West Java

This book maps aspects of developments in contemporary Indonesian language poetry in West Java. While there have been studies undertaken of the development of modern Indonesian literature, relatively...


Euripidaristophanizing

While Greek tragedy endures as the best-known dramatic form from Ancient Greece, its cognate genre, Greek comedy, is perhaps the most literate genre of that period. Ancient comedy was a...


Shadowrun - Between Science Fiction and Fantasy

The pieces of the Shadowrun novel series present an interesting problem. Should they be categorized as Science Fiction or Fantasy novels? In order to answer this question we have to know exactly what...


Rendering Methods for Augmented Reality

Augmented reality (AR) is a fast-growing application of computer graphics. AR systems overlay computer-generated graphics over the real world. The research described in this book puts an emphasis on...


Automated Construction of Xsl-Templates

This work bridges the gap between fundamental research in Inductive Program Synthesis and its practical application for end user programming. It demonstrates that it is indeed feasible to...


Extending Key for the Verification of C Programs

Software verification is the study of formally proving the correctness of a program with respect to a given specification. Even after 40 years of research and considerable success stories in...


Software Agent Support of the Virtual Entreprise Life-Cycle

Today, enterprises need more flexibility than ever before, but classic firms often fail this requirement. Therefore, a more flexible kind of enterprise evolved: The Virtual Enterprise. One reason why...


Coordination Aware Service Monitoring

This book presents a research on monitoring concepts for composite coordinated services. It deals with coordination models, explaining them in detail in the monitoring aspect, in order to decide...


Business Processes and Context-Sensitive Business Documents - Business Collaborations Based on Umm 1.0

Exchanging business information by connecting computer systems of business partners is not particularly new, but seamless integration is still an open issue. The problem domain of seamless...


Efficient Matchmaking of Business Processes in Web Service Infrastructures

This work addresses the question of how to efficiently find business partners with matching business processes. In particular, the input business process enforces that some parts of the business...


An Incrementally Trainable Statistical Approach to Information Extraction - Based on Token Classification and Rich Context Model

Most of the information stored in digital form is hidden in natural language texts. The purpose of Information Extraction (IE) is to find desired pieces of information in unstructured or weakly...


Architecting Automated Design Systems

This book describes an information architecture designed to achieve intellectual control over large-scale, modular, integrated, fault-tolerant systems that leverage Semantic Web Services for...


Application Layer Peer-To-Peer Protocol Analysis - A Statistical Method for Analyzing P2P Protocols

Simulation is one of the most important techniques for analysis and improvement of technical systems. The reduction to the most important characteristics minimizes the complexity and points out the...


Quantifying and Improving the Performance of Garbage Collection

Researchers have devoted decades towards improving garbage collection performance. A key question is: What opportunity remains for performance improvement? Because the perceived performance...


A Meta-Methodology for Collaborative Networked Organisations

In the current global market, organizations worldwide often need to come together in order to bid for and execute projects whose requirements go beyond their individual competencies. Collaborative...


Modeling TCP Loss Recovery - Peformance Analysis and Improvement

Transmission control protocol (TCP), the major transport-layer protocol in the Internet, is designed to perform a process for the recovery of packet losses, because it inevitably causes packets lost...