Professional Documents
Culture Documents
Textbook Encyclopedia of Computer Science and Technology Second Edition Volume Ii Laplante Ebook All Chapter PDF
Textbook Encyclopedia of Computer Science and Technology Second Edition Volume Ii Laplante Ebook All Chapter PDF
https://textbookfull.com/product/encyclopedia-of-computer-
science-and-technology-second-edition-volume-i-laplante/
https://textbookfull.com/product/encyclopedia-of-computer-
science-and-technology-volume-16-index-first-edition-edition-
belzer/
https://textbookfull.com/product/encyclopedia-of-information-
science-and-technology-fifth-edition-mehdi-kosrow/
https://textbookfull.com/product/encyclopedia-of-information-
science-and-technology-4th-edition-mehdi-khosrow-pour/
Encyclopedia of Plasma Technology II Microplasma Wool
1st Edition J. Leon Shohet
https://textbookfull.com/product/encyclopedia-of-plasma-
technology-ii-microplasma-wool-1st-edition-j-leon-shohet/
https://textbookfull.com/product/biota-grow-2c-gather-2c-cook-
loucas/
https://textbookfull.com/product/oil-spill-science-and-
technology-second-edition-fingas/
https://textbookfull.com/product/food-science-and-technology-
second-edition-campbell-platt/
https://textbookfull.com/product/handbook-of-food-science-and-
technology-volume-3-food-biochemistry-and-technology-1st-edition-
jeantet/
Encyclopedia of
Computer
Science and
Technology
Second Edition
Volume II
Fuzzy–XML
Encyclopedias from the Taylor & Francis Group
Print Online Print Online
Agriculture Engineering
Encyclopedia of Agricultural, Food, and Biological Engineering, Dekker Encyclopedia of Nanoscience and Nanotechnology,
2nd Ed., 2 Vols. Pub'd. 10/21/10 3rd Ed., 7 Vols. Pub'd. 3/20/14
K10554 (978-1-4398-1111-5) K11382 (978-1-4398-2806-9) K14119 (978-1-4398-9134-6) K14120 (978-1-4398-9135-3)
Encyclopedia of Animal Science, 2nd Ed., 2 Vols. Pub'd. 2/1/11 Encyclopedia of Energy Engineering and Technology, 2nd Ed.,
K10463 (978-1-4398-0932-7) K10528 (978-0-415-80286-4) 4 Vols. Pub'd. 12/1/14
Encyclopedia of Biotechnology in Agriculture and Food Pub'd. 7/16/10 K14633 (978-1-4665-0673-2) KE16142 (978-1-4665-0674-9)
DK271X (978-0-8493-5027-6) DKE5044 (978-0-8493-5044-3) Encyclopedia of Optical and Photonic Engineering, 2nd Ed.,
Encyclopedia of Pest Management Pub'd. 5/9/02 5 Vols. Pub'd. 9/22/15
DK6323 (978-0-8247-0632-6) DKE517X (978-0-8247-0517-6) K12323 (978-1-4398-5097-8) K12325 (978-1-4398-5099-2)
International Standard Book Number-13: 978-1-4822-0819-1 (Hardback - Set) 978-1-4822-0820-7 (Volume 1) 978-1-4822-0821-4 (Volume 2)
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and
information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission
to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic,
mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or
retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact
the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides
licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment
has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation
without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Encyclopedia of Computer Science and Technology
Second Edition
Brief Contents
Volume I Volume II
3-D Graphics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Fuzzy Set Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
3-D Graphics: Bump Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Fuzzy Sets and Fuzzy Logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
3-D Graphics: Coordinate Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Genetic Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
3-D Graphics: High Level Shading Language (HLSL) . . . . . . . . . . . . . . . . . . . 22 Hash Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
3-D Graphics: Light Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Human–Robot Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
3-D Graphics: Polygon Meshes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Image Processing and Measurement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
3-D Graphics: Real-Time Graphics Pipeline . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Internet Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
3-D Graphics: Skeletal Animation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
3-D Graphics: Standard Local Lighting Model . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Languages: Domain-Specific . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
3-D Graphics: Texture Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 LDPC Decoders: Acceleration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
3-D Graphics: Viewing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Learning and Teaching Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
Access Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Locality Sensitive Hashing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
Ad Hoc Networks: Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Location-Based Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
Advanced Encryption Standard (AES) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Mathematics of Computer Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
Algorithms: Rendering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Modeling and Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
American National Standards Institute (ANSI) . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Modeling: Sparse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
Animation: Facial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Optical Character Recognition (OCR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 Parallel Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
Authentication and Authorization: Pedestrian Detection and Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634
Policy-Based . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Predictive and Anticipatory Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Privacy Preserving Cryptographic Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
Bioelectronics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Programming Languages: Concurrency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
Bluetooth Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Securing Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
CDMA Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Security Risks: Managing Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Cellular Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Semantics: Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
Classes: NP and NP-Complete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 Sentiment Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Coding Theory: History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 Set Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 716
Computer Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Social Context Computing: Wireless Networking . . . . . . . . . . . . . . . . . . . . . . . 720
Concurrency: Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 Social Media: Trends, Events, and Influential Users . . . . . . . . . . . . . . . . . . . . . 732
Counting: Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Turing Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
Cryptography: Advanced Encryption Turing Machines: Completeness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
Standard (AES) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Ubiquitous Computing Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
Data Mining: Geographic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Undecidability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
Data Mining: Privacy-Preservation Techniques . . . . . . . . . . . . . . . . . . . . . . . . . 314 Undecidability and Reducibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
Digital Arithmetic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 Virtual Worlds: Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813
Digital Arithmetic: Division Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348 Viruses: History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 824
Digital Geometry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364 Wireless Embedded Systems: Secure Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Disabilities, Users with . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377 Wireless LANs (WLANs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
Disabilities: Assistive Technology Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 Wireless LANs (WLANs): IEEE 802.11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852
Discrete Fourier Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Wireless Networks: VoIP Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
Distributed Sensor Actuator Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 Wireless Sensor Networks (WSNs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
Ethics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 Women in Computer Science: Deterrents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871
Field Programmable Gate Arrays (FPGA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427 XML and Other Metadata Languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 880
v
To the beloved dogs that I have had in my life: Ginger, Francis, Teddy, Maggie and Henry,
and those yet to come.
vii
Encyclopedia of Computer Science and Technology
Second Edition
Editor-in-Chief
Phillip A. Laplante
Professor of Software Engineering, Great Valley School of Graduate Professional Studies, Pennsylvania State University,
Malvern, Pennsylvania, U.S.A.
ix
Contributors
xi
xii Contributors
Michael Gerassimos Strintzis / Information Technologies Institute, Center for Research and
Technology Hellas, Thermi-Thessaloniki, and Electrical and Computer Engineering
Department, Aristotle University of Thessaloniki, Thessaloniki, Greece
Chunhua Su / Department of Computer Science and Engineering, Kyushu University, Fukuoka,
Japan
Apostolos Syropoulos / Xanthi, Greece
Leyla Toumi / LSR-IMAG, CNSR/INPG, Grenoble, France
Yash Ukidave / Department of Electrical and Computer Engineering, Northeastern University,
Boston, Massachusetts, U.S.A.
Stefan Wagner / Heuristic and Evolutionary Algorithms Laboratory, University of Applied
Sciences Upper Austria, Hagenberg, Austria
Guilin Wang / Department of Computer Science and Communication Engineering, Kyushu
University, Fukuoka, Japan
Keith Waters / Kwaters Consulting, Boston, Massachusetts, U.S.A.
Chris Wee / Department of Computer Science, University of California at Davis, Davis,
California, U.S.A.
Petra Wiederhold / Department of Automatic Control, Center of Advanced Studies and
Investigation, National Polytechnic Institute, Mexico City, Mexico
Stephan Winkler / Heuristic and Evolutionary Algorithms Laboratory, University of Applied
Sciences Upper Austria, Hagenberg, Austria
Gary K.W. Wong / Faculty of Education, University of Hong Kong, Hong Kong, China
Shinichi Yamagiwa / JST PRESTO, Faculty of Engineering, Information and Systems,
University of Tsukuba, Tsukuba, Japan
Jana Zabinski / American National Standards Institute, New York, New York, U.S.A.
Jianying Zhou / Department of Computer Science and Communication Engineering, Kyushu
University, Fukuoka, Japan
Roberto V. Zicari / Department of Computer Science, Goethe University, Frankfurt, Germany
Encyclopedia of Computer Science and Technology
Second Edition
Contents
Volume I
3-D Graphics / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
3-D Graphics: Bump Mapping / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3-D Graphics: Coordinate Spaces / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3-D Graphics: High Level Shading Language (HLSL) / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . 22
3-D Graphics: Light Sources / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3-D Graphics: Polygon Meshes / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3-D Graphics: Real-Time Graphics Pipeline / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . 51
3-D Graphics: Skeletal Animation / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3-D Graphics: Standard Local Lighting Model / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . 66
3-D Graphics: Texture Mapping / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
3-D Graphics: Viewing / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Access Methods / Bernd-Peter Paris . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Ad Hoc Networks: Technologies / Marco Conti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Advanced Encryption Standard (AES) / Ben Rothke . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Algorithms / Edna E. Reiter and Clayton Matthew Johnson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Algorithms: Rendering / Orion Sky Lawlor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
American National Standards Institute (ANSI) / Jana Zabinski . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Animation: Facial / Frederic I. Parke and Keith Waters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Artificial Intelligence / Jianhua Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Authentication and Authorization: Policy-Based / Jeff Hayes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Big Data / Roberto V. Zicari . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Bioelectronics / Alistair McEwan, Gaetano D. Gargiulo, Ché Fornusek and Torsten Lehmann . . . . . . . . . 172
Bluetooth Systems / William Stallings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
CDMA Networks / Tero Ojanperä and Steven D. Gray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Cellular Systems / Lal C. Godara . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Classes: NP and NP-Complete / Edna E. Reiter and Clayton
Matthew Johnson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Coding Theory: History / Dave K. Kythe and Prem K. Kythe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Computer Organization / Perhaad Mistry, Yash Ukidave, Zhongliang Chen and David Kaeli . . . . . . . . . 232
Concurrency: Concepts / Matthew J. Sottile, Timothy G. Mattson and Craig E. Rasmussen . . . . . . . . . . . 246
Counting: Basics / Rebecca Grasser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Cryptography / Javek Ikbal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Cryptography: Advanced Encryption Standard (AES) / D. Mukhopadhyay . . . . . . . . . . . . . . . . . . . . . . . . . 279
xvii
xviii Contents
Volume I (cont’d.)
Data Mining: Geographic / Harvey J. Miller and Jiawei Han . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
Data Mining: Privacy-Preservation Techniques / Chunhua Su, Jianying Zhou, Feng Bao, Guilin Wang
and Kouichi Sakurai . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
Digital Arithmetic / Dave K. Kythe and Prem K. Kythe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Digital Arithmetic: Division Algorithms / Paolo Montuschi and Alberto Nannarelli . . . . . . . . . . . . . . . . . . 348
Digital Geometry / Petra Wiederhold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Disabilities, Users with / Pradipta Biswas and Peter Olaf Looms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Disabilities: Assistive Technology Design / Jo Lumsden, Lilit Hakobyan, Rock Leung and
Dympna O’Sullivan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Discrete Fourier Transform / Dave K. Kythe and Prem K. Kythe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Distributed Sensor Actuator Networks / Shivakumar Sastry and S. Sitharama Iyengar . . . . . . . . . . . . . . . 409
Ethics / Michael James Heron . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Field Programmable Gate Arrays (FPGA) / D. Mukhopadhyay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Volume II
Fuzzy Set Theory / Donald Kraft, Gloria Bordogna and Gabriella Pasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Fuzzy Sets and Fuzzy Logic / Apostolos Syropoulos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Genetic Algorithms / Michael Affenzeller, Stephan Winkler, Stefan Wagner and Andreas Beham . . . . . . . 469
Hash Algorithms / Keith Pasley . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Human–Robot Interaction / Giovanni Piumatti, Maria Luce Lupetti and Fabrizio Lamberti . . . . . . . . . . . 487
Image Processing and Measurement / John C. Russ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Internet Security / Matt Bishop, Steven Cheung, Jeremy Frank, James Hoagland, Steven Samorodin
and Chris Wee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
Languages / Edna E. Reiter and Clayton Matthew Johnson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
Languages: Domain-Specific / Vassilios Karakoidas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
LDPC Decoders: Acceleration / Joao Andrade, Gabriel Falcao, Vitor Silva, Shinichi Yamagiwa
and Leonel Sousa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
Learning and Teaching Programming / Anthony Robins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
Locality Sensitive Hashing / Haiying Shen, Ting Li, Tom Schweiger and Yuhua Lin . . . . . . . . . . . . . . . . . . . 562
Location-Based Services / Ben Falchuk, Dave Famolari and Shoshana Loeb . . . . . . . . . . . . . . . . . . . . . . . . . 575
Mathematics of Computer Security / D. Mukhopadhyay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Mobile Ad Hoc Networks / Jonathan Loo, Shafiullah Khan and Ali Naser Al-Khwildi . . . . . . . . . . . . . . . . . 598
Modeling and Simulation / Mariam Kiran . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
Modeling: Sparse / Irina Rish and Genady Ya. Grabarnik . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
Optical Character Recognition (OCR) / Matthew C. Mariner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
Parallel Algorithms / Matthew J. Sottile, Timothy G. Mattson and Craig E. Rasmussen . . . . . . . . . . . . . . . . 630
Pedestrian Detection and Tracking / Gianluca Paravati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634
Predictive and Anticipatory Computing / Mihai Nadin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
Privacy Preserving Cryptographic Protocols / Mikhail J. Atallah and Keith B. Frikken . . . . . . . . . . . . . . 660
Programming Languages: Concurrency / Matthew J. Sottile, Timothy G. Mattson and
Craig E. Rasmussen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
Securing Software / Dimitris Mitropoulos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
Security Risks: Managing Software / Gary McGraw . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Semantics: Learning / Valentina Gatteschi, Claudio Demartini and Fabrizio Lamberti . . . . . . . . . . . . . . . . 692
Sentiment Analysis / Carlos E. Otero, Shoaib Shaikh, Marco Rossi and
Xavier Merino . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Contents xix
Algorithms
Algorithms / Edna E. Reiter and Clayton Matthew Johnson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Algorithms: Rendering / Orion Sky Lawlor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Genetic Algorithms / Michael Affenzeller, Stephan Winkler, Stefan Wagner, and Andreas Beham . . . . . . . 469
Hash Algorithms / Keith Pasley . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Parallel Algorithms / Matthew J. Sottile, Timothy G. Mattson, and Craig E. Rasmussen . . . . . . . . . . . . . . . 630
Applications
Animation: Facial / Frederic I. Parke and Keith Waters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Artificial Intelligence / Jianhua Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Image Processing and Measurement / John C. Russ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Locality Sensitive Hashing / Haiying Shen, Ting Li, Tom Schweiger and Yuhua Lin . . . . . . . . . . . . . . . . . . . 562
Location-Based Services / Ben Falchuk, Dave Famolari, and Shoshana Loeb . . . . . . . . . . . . . . . . . . . . . . . . . 575
Modeling and Simulation / Mariam Kiran . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
Optical Character Recognition (OCR) / Matthew C. Mariner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
Pedestrian Detection and Tracking / Gianluca Paravati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634
Predictive and Anticipatory Computing / Mihai Nadin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
Semantics: Learning / Valentina Gatteschi, Claudio Demartini, and Fabrizio Lamberti . . . . . . . . . . . . . . . . 692
Sentiment Analysis / Carlos E. Otero, Shoaib Shaikh, Marco Rossi, and Xavier Merino . . . . . . . . . . . . . . . 703
Ubiquitous Computing Systems / Jakob E. Bardram and Adrian Friday . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
Virtual Worlds: Design / Ann Latham Cudworth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813
Data Mining
Big Data / Roberto V. Zicari . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Data Mining: Geographic / Harvey J. Miller and Jiawei Han . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
Data Mining: Privacy-Preservation Techniques / Chunhua Su, Jianying Zhou, Feng Bao,
Guilin Wang, and Kouichi Sakurai . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
Graphics
3-D Graphics / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
3-D Graphics: Bump Mapping / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3-D Graphics: Coordinate Spaces / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3-D Graphics: High Level Shading Language (HLSL) / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . 22
3-D Graphics: Light Sources / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3-D Graphics: Polygon Meshes / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3-D Graphics: Real-Time Graphics Pipeline / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . 51
xxi
xxii Topical Table of Contents
Graphics (cont’d.)
3-D Graphics: Skeletal Animation / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3-D Graphics: Standard Local Lighting Model / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . 66
3-D Graphics: Texture Mapping / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
3-D Graphics: Viewing / Fletcher Dunn and Ian Parberry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Hardware
Bioelectronics / Alistair McEwan, Gaetano D. Gargiulo, Ché Fornusek, and Torsten Lehmann . . . . . . . . . 172
Computer Organization / Perhaad Mistry, Yash Ukidave, Zhongliang Chen, and David Kaeli . . . . . . . . . 232
Digital Arithmetic / Dave K. Kythe and Prem K. Kythe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Digital Arithmetic: Division Algorithms / Paolo Montuschi and Alberto Nannarelli . . . . . . . . . . . . . . . . . . . 348
Field Programmable Gate Arrays (FPGA) / D. Mukhopadhyay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
LDPC Decoders: Acceleration / Joao Andrade, Gabriel Falcao, Vitor Silva, Shinichi Yamagiwa,
and Leonel Sousa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
Languages
Concurrency: Concepts / Matthew J. Sottile, Timothy G. Mattson, and Craig E. Rasmussen . . . . . . . . . . . 246
Languages / Edna E. Reiter and Clayton Matthew Johnson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
Languages: Domain-Specific / Vassilios Karakoidas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
Learning and Teaching Programming / Anthony Robins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
Programming Languages: Concurrency / Matthew J. Sottile, Timothy G. Mattson, and Craig E.
Rasmussen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
XML and Other Metadata Languages / William Hugh Murray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 880
Mathematics
Classes: NP and NP-Complete / Edna E. Reiter and Clayton Matthew Johnson . . . . . . . . . . . . . . . . . . . . . . . 216
Mathematics of Computer Security / D. Mukhopadhyay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Counting: Basics / Rebecca Grasser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Digital Geometry / Petra Wiederhold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Discrete Fourier Transform / Dave K. Kythe and Prem K. Kythe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Fuzzy Set Theory / Donald Kraft, Gloria Bordogna, and Gabriella Pasi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Fuzzy Sets and Fuzzy Logic / Apostolos Syropoulos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Modeling: Sparse / Irina Rish and Genady Ya. Grabarnik . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
Set Theory / Edna E. Reiter and Clayton Matthew Johnson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 716
Turing Machines / Edna E. Reiter and Clayton Matthew Johnson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
Turing Machines: Completeness / Edna E. Reiter and Clayton Matthew Johnson . . . . . . . . . . . . . . . . . . . . . 757
Undecidability / Edna E. Reiter and Clayton Matthew Johnson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
Undecidability and Reducibility / Edna E. Reiter and Clayton Matthew Johnson . . . . . . . . . . . . . . . . . . . . . . 803
Networks
Ad Hoc Networks: Technologies / Marco Conti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Bluetooth Systems / William Stallings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
CDMA Networks / Tero Ojanperä and Steven D. Gray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Cellular Systems / Lal C. Godara . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Distributed Sensor Actuator Networks / Shivakumar Sastry and S. Sitharama Iyengar . . . . . . . . . . . . . . . . 409
Topical Table of Contents xxiii
Mobile Ad Hoc Networks / Jonathan Loo, Shafiullah Khan and Ali Naser Al-Khwildi . . . . . . . . . . . . . . . . . 598
Social Context Computing: Wireless Networking / Gary K.W. Wong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
Wireless Embedded Systems: Secure Design / Ilker Onat and Ali Miri . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Wireless LANs (WLANs) / Suresh Singh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
Wireless LANs (WLANs): IEEE 802.11 / José Antonio Garcia-Macias and Leyla Toumi . . . . . . . . . . . . . 852
Wireless Networks: VoIP Service / Sajal K. Das and Kalyan Basu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
Wireless Sensor Networks (WSNs) / Gopal Racherla . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
Societal Implications
American National Standards Institute (ANSI) / Jana Zabinski . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Disabilities: Assistive Technology Design / Jo Lumsden, Lilit Hakobyan, Rock Leung, and
Dympna O’Sullivan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Disabilities, Users with / Pradipta Biswas, and Peter Olaf Looms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Ethics / Michael James Heron . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Human–Robot Interaction / Giovanni Piumatti, Maria Luce Lupetti, and Fabrizio Lamberti . . . . . . . . . . . 487
Social Media: Trends, Events, and Influential Users / Theodoros Semertzidis, Christos
Athanasiadis, Michael Gerassimos Strintzis and Petros Daras . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
Women in Computer Science: Deterrents / Sylvia Beyer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871
Preface
So, how does one go about building an encyclopedia? The most effective way is through a
divide-and-conquer approach. Therefore I composed an Editorial Board with members
who had expertise along the major knowledge areas of computing according to Associa-
tion for Computing Machinery’s Computing Classification System, that is:
• General and reference
• Hardware
• Computer systems organization
• Networks
• Software and its engineering
• Theory of computation
• Mathematics of computing
• Information systems
• Security and privacy
• Human-centered computing
• Computing methodologies
• Applied computing
• Social and professional topics
• People, technologies and companies
I am delighted and lucky to have recruited an outstanding group of experts in their
respective fields to comprise the Editorial Board listed previously.
The Editorial Board members were responsible for, in consultation with and the
approval of the Editor in Chief (EIC):
• Identifying articles for each of the sub-areas in their knowledge areas;
• Identifying and recruiting expert authors to write these articles;
• Organizing peer reviews of these articles;
• Collecting and editing these articles as appropriate;
• Submitting the reviewed and edited articles to the EIC for final approval and
compilation.
The task of finding authors was not easy. Teasing small entries for a dictionary is much
easier than extracting substantial articles for an encyclopedia, and experts are always
busy. Therefore there were many false starts and stops, searches for new authors when
necessary, and the need for constant encouragements. As the articles begin to be delivered
by the authors, peer reviews for the articles needed to be organized. Finding expert peer
reviewers, who are also busy, wasn’t always easy. The articles and review reports were
then returned to the authors for revision, and in many cases, another round of reviews.
The process was not dissimilar to editing a special issue of a scholarly journal, only mag-
nified by a factor of 20. The final articles then needed to be edited by expert copy editors,
then returned to the authors for another check. The EIC conducted one final check.
In some cases, in order to round out coverage, we mined content from other books pub-
lished by Taylor & Francis and restructured that content to encyclopedia articles. This step
was also time consuming as it required an analysis of hundreds of books in the T&F
library. It should be no surprise, then, the process of building this Encyclopedia, from start
to finish, took four years.
xxv
xxvi Preface
I hope you are pleased with the result. This Encyclopedia is the result of the work of
more than 200 expert contributors and reviewers from industry and academia across
the globe. We tried to be as correct and comprehensive as possible, but of course, in a
work of this grand scope there are bound to be holes in coverage, as well as typographical,
possibly even factual errors, I take full responsibility for these errors, and hope that you
will contact me at ecst@taylorandfrancis.com to notify me of any.
The good news is that this Encyclopedia is a perpetual project – the online version will
be updated regularly, and new print editions are anticipated. These updated versions allow
for ongoing augmentation of the Encyclopedia, to keep pace with the rapid changes in
computing hardware, software, systems and applications. My intention is to keep this
Encyclopedia as relevant and fresh as possible. If you have an idea for a new or revised
article for the encyclopedia, please send me your thoughts. If you feel qualified to write an
article, please send me a proposal along with your qualifications and will consider them
and respond promptly.
The Target readership for this Encyclopedia includes computer scientists, computer
engineers computing professionals, managers, software professionals, and other technol-
ogy professionals. I also expect the Encyclopedia to find its way into many library data-
bases. Finally, I hope that this Encyclopedia will be added to the reading list for
Information Science undergraduate and graduate students.
Acknowledgments
xxvii
Another random document with
no related content on Scribd:
The place became, from about the middle of the eighteenth
century, a favourite resort of London anglers and swimmers, and
many London merchants and persons of good position were among
the subscribers. An annual payment of one guinea entitled
subscribers to the use of the baths, and to the diversion of “angling
and skating at proper seasons.” Occasional visitors paid two shillings
each time of bathing.
THE PLEASURE BATH, PEERLESS POOL, CITY
ROAD.
TERMS OF SUBSCRIPTION.
PLEASURE BATH
£. s. d.
Month 0 9 0
Two Months 0 16 0
Year 1 1 0
Single Bathe 0 1 0
with Towels
and Box
Ditto without 0 0 0
COLD BATH
£. s. d.
Month 0 10 0
Two Months 0 17 0
Year 1 10 0
Single Bathe 0 1 0
The City Road is the line from all parts of the West
End to the City. Omnibuses pass both ways nearly every
minute throughout the day.
1, Bath Buildings Entrance—2, Baldwyn Street
Entrance—3, Cold Bath—4, Pleasure Bath—5, Dressing
Boxes—6, Shrubberies.
BILL OF PEERLESS POOL. Circ. 1846.
About 1805 Mr. Joseph Watts (father of Thomas Watts, the well-
known Keeper of Printed Books at the British Museum) obtained a
lease of the place from St. Bartholomew’s Hospital at a rental of
£600 per annum, and eventually saw his way to a profit by building
on part of the ground. He drained the fish-pond which lay due east
and west, and built the present Baldwin Street on the site. The old-
fashioned house inhabited by Kemp, which stood in a garden and
orchard of apple and pear trees overlooking the west end of the fish-
pond, Watts pulled down, erecting Bath Buildings on the spot.[81]
The pleasure bath and the cold bath he, however, continued to open
to the public at a charge of one shilling, and Hone gives a pleasant
description of it as it was (still in Watts’s proprietorship) in 1826. “Its
size,” he says, “is the same as in Kemp’s time, and trees enough
remain to shade the visitor from the heat of the sun while on the
brink.” “On a summer evening it is amusing to survey the conduct of
the bathers; some boldly dive, others ‘timorous stand,’ and then
descend, step by step, ‘unwilling and slow’; choice swimmers attract
attention by divings and somersets, and the whole sheet of water
sometimes rings with merriment. Every fine Thursday and Saturday
afternoon in the summer, columns of blue-coat boys, more than
three score in each, headed by their respective beadles, arrive, and
some half strip themselves ere they reach their destination; the rapid
plunges they make into the Pool, and their hilarity in the bath, testify
their enjoyment of the tepid fluid.”
The Pool was still frequented in 1850,[82] but at a later time was
built over. Its name is kept locally in remembrance by Peerless
Street, the second main turning on the left of the City Road, just
beyond Old Street, in coming from the City. This street was formerly
called Peerless Row, and formed the northern boundary of the
ground laid out by Kemp.[83]
[Maitland’s Hist. of London, i. p. 84, ff.; Dodsley’s London,
“Peerless Pool”; Noorthouck’s London, p. 756, ff.; Trusler’s London
Adviser (1786), p. 124; Hone’s Every Day Book, i. p. 970, ff.;
Pennant’s London, p. 268; Wheatley’s London P. and P. iii. s.v.;
newspaper cuttings, &c., W. Coll.]
VIEWS.
1. Two woodcuts (pleasure bath and fish-pond) from drawings, circ.
1826, by John Cleghorn in Hone’s Every Day Book (cited above).
2. View of Peerless Pool Bath and Gardens in 1848; coloured
drawing by Read. Crace, Cat., p. 608, No. 9.
3. The Pleasure Bath, Peerless Pool. An advertisement bill with
woodcut of the bath, surrounded by trees and shrubberies, and a plan
of the vicinity (1846?), W. Coll.; cp. Crace, Cat., p. 608, No. 8.
THE SHEPHERD AND SHEPHERDESS, CITY ROAD
MARYLEBONE GROUP
MARYLEBONE GARDENS
VIEWS.
1. A view of Marybone Gardens and orchestra, J. Donnowell del.
1755; published by J. Tinney. Crace, Cat. p. 566, No. 74.
2. Modifications of 1, published by R. Sayer, 1755, and by Bowles
and Carver. Crace, Cat. p. 566, Nos. 75, 76. Also 1761, published by
J. Ryall [W. Coll.].
3. Views of Rose of Normandy. Crace, Cat. p. 566, Nos. 79–81; p.
567, No. 82.
THE QUEEN’S HEAD AND ARTICHOKE
VIEWS.
1. A water-colour drawing by Findlay, 1796. Crace, Cat. p. 569, No.
104; cp. an engraving of the inn in Walford, v. p. 258, and a small
sketch in Clinch’s Marylebone, p. 45 (dated 1796).
2. An engraving published in Gent. Mag. 1819, pt. 2, p. 401;
reproduced in Clinch’s Marylebone, facing p. 40.
THE JEW’S HARP HOUSE AND TEA GARDENS
VIEWS.
The Jew’s Harp public-house in Marylebone Park. A water-colour
drawing by Bigot, 1794. Crace, Cat. p. 569, No. 106; cp. a sketch in
Clinch’s Marylebone, p. 48.
THE YORKSHIRE STINGO
VIEWS.
1. “The Yorkshire Stingo in 1770,” a small sketch in Clinch’s
Marylebone, p. 46, showing the tavern and the entrance to the tea-
gardens.
2. View of the new County Court and the Baths and the Wash-
Houses, built upon the ground of the late tea-gardens, &c., of the
Yorkshire Stingo Tavern. A woodcut, 1849. Crace, Cat. p. 567, No. 89.
BAYSWATER TEA GARDENS
and in this garden he grew the plants for his wonderful Water
Dock Essence and Balm of Honey.
Hill died in 1775, and his garden was (some years before 1795)
turned into a place of amusement, known as the Bayswater Tea
Gardens, and much frequented by the denizens of Oxford Street and
neighbourhood.[124] Views of 1796 show the boxes and arbours, and
a family party, more plebeian than that in George Morland’s “Tea
Garden,” in full enjoyment of their tea. Waiters are bustling about
with huge kettles crying “’Ware kettle, scaldings!”
The Bayswater Tea Gardens are mentioned in the Picture of
London, 1823–1829, among those frequented by Londoners of the
middle classes. From about 1836 they appear to have been called
the Flora Tea Gardens, Bayswater.