Aug 18

UP CURSOR members with Ms. Reyna and Ms. Leah of Engglib2

UP Association of Computer Science Majors (UP CURSOR) headed by their current president, Ms. Jewel A. Pajarillo, donated 23 books on Engineering and CS subjects to Engglib2 last July 14, 2011.

The library extends their gratitude to the organization for their continued support.

The following is a breakdown of the donated books.

UP CURSOR’s Donations
1. Advanced engineering mathematics / Wylie, Clarence Raymond. 6th ed., 1995.
2. Philosophical analysis / Acuna, Andresito. 5th ed., 2001.
3. Software engineering : theory and practice / Pfleeger, Shari Lawrence. 2nd ed., 2001.
4. Conceptual physics / Paul G. Hewitt. 2002.
5. Object Windows how-to: the definitive Borland C₊₊ problem solver for Windows / Syck, Gary. 1993.
6. Chemistry / Wilbraham, Antony. 1997.
7. Biology for Philippine high schools : the relationships of living things / University of the Philippines National Science Development Board. 1965.
8. Sams teach yourself Macromedia Dreamweaver MX 2004 in 24 hours / Betsy Bruce. 2004.
9. Algebra 2 with trigonometry / Bettye C. Hall. 1993.
10. Java programming by example / Abe, Lesley. 2005.
11. Applications programming in ANSI C / Johnsonbaugh, Richard. 3rd ed., 1996.
12. Digital design / M. Morris Mano. 2nd ed., 1991.
13. Physics for scientists and engineers / Paul Allen Tipler. 4th ed., 1999. 3 Bounds
14. Elements of the theory of computation / Lewis, Harry R. 1981. (photocopy)
15. IT project / Estaris, Jay… et. al. 2005.
16. Roget’s desk thesaurus / O’Conner, Joyce, editor. 1995.
17. Discrete mathematics / Johnsonbaugh, Richard. 5th ed., 2001.
18. Software engineering / Solamo, Ma. Rowena C. 2006. (photocopy)
19. Database system concepts / Silberschatz, Abraham. 3rd ed. , 1999. (photocopy)
20. Computer networking : a top-down approach featuring the Internet / Kurose, James F. 2nd ed., 2003.
21. Concepts of programming languages / Sebesta, Robert W. 6th ed., 2004.
22. A book on C : programming in C / Kelley, Al. 4th ed., 1999.
23. Electronic devices and circuit theory / Boylestad, Robert L. 8th ed., 2002.

Interested individuals or organizations who would also like to donate to the library may call us at 981-8500 loc. 3251 or 434-8638 (telefax). You may also send us an e-mail at,

Aug 12

EEE Theses

System-level analog architecture design for WiMAX direct-conversion receivers in 90nm CMOS / Lendl Israel Makabenta Alunan (LG 995 2010 E64 A48)

Comparison of integrated LNA-mixer topologies for WiMAX applications in a standard 90-nm CMOS process / Michael Angelo G. Lorenzo (LG 995 2011 E64 L67)

A 10MHz 3rd order Butterworth Gm-C low-pass filter in a 90nm CMOS process / Sherwin Paul Roldan Almazan (LG 995 2011 E64 A46)

Implementation of a multiple beamformer for coarse localization of passive UHF RFID tags /Roy Repalda Flores (LG 995 2011 E64 F56)

Greenfield approach to the reference network benchmarking methodology for performance-based regulation of distribution utilities /Warren John B. Ong Pe (LG 995 2011 E64 O54)

Impact assessment of wind power penetration on the operating reserve of the Luzon grid /Dave Andrew F. Opiso (LG 995 2011 E64 O65)

A study of cache sub-ranking and block buffering as power reduction techniques for multiprocessor cache design /Jestoni V. Zarsuela (LG 995 2010 E64 Z37)

A no-arbitrage approach to pricing of Flexible Electricity Contracts considering transmission line rentals /Julius Eleazar A. Bunyi (LG 995 2011 E64 bB86)

Computer Science Theses

Analysis of electronic ballot transmission protocols in the applied pi calculus /Danny Francis Wuysang (LG 995 2011 C65 W89)

Combining task-and-role-based access control with multi-constraints for a medical workflow system /Ivy Joy G. Mallare (LG 995 2011 C65 M35)

Social network-aware P2P file distribution /Linda II M. Sarmiento (LG 995 2011 C65 S27)

Multi-objective evolutionary optimization of UVB phototherapy of psoriasis through a 3-dimensional agent-based model /Arjay Caburnay Cayetano (LG 995 2011 C65 C39)

A real-time web-based Delphi study on ICT integration in basic education : framework and implementation model /Kurt Junshean P. Espinosa (LG 995 2011 C65 E87)

Access control for video-based collaborative learning frameworks model /Mae Sincere S. Blanco (LG 995 2011 C65 B53)

Aug 11

Everyone is invited to visit the 32nd Manila International Book Fair (MIBF) on September 14-18, 2011 at the SMX Convention Center at The Mall of Asia, Pasay City. Exhibits will be open from 10am to 8 pm daily. Co-located events include The Best of Anime (BOA), Music Festival Manila 2011 (in conjunction with BOA), a conference on language and teaching and many more. Check-out the event’s official website at for complete details.

Drop by the Reference Section of Engineering Library II for your free entrance tickets.

Aug 1


Recommended by Dr. Adrian Roy L. Valdez
Elements of advanced engineering mathematics

Author Peter V. O’Neil
Place of Publication Australia
Date of Publication c2010
Publisher Cengage Learning

This book is intended to provide students with an efficient introduction and accessibility to ordinary and partial differential equations, linear algebra, vector analysis, Fourier analysis, and special functions and eigenfunction expansions, for their use as tools of inquiry and analysis in modeling and problem solving. It should also serve as preparation for further reading where this suits individual needs and interests. Although much of this material appears in “Advanced Engineering Mathematics, 6th edition”, Elements has been completely rewritten to provide a natural flow of the material in this shorter format. Many types of computations, such as construction of direction fields, or the manipulation Bessel functions and Legendre polynomials in writing eigenfunction expansions, require the use of software packages. A short MAPLE primer is included as Appendix B. This is designed to enable the student to quickly master the use of MAPLE for such computations.

Recommended by Dr. Henry Adorna
The space and motion of communicating agents

Author Robin Milner
Place of Publication Cambridge
Date of Publication c2009
Publisher Cambridge University Press

The world is increasingly populated with interactive agents distributed in space, real or abstract. These agents can be artificial, as in computing systems that manage and monitor traffic or health; or they can be natural, e.g. communicating humans, or biological cells. It is important to be able to model networks of agents in order to understand and optimise their behaviour. Robin Milner describes in this book just such a model, by presenting a unified and rigorous structural theory, based on bigraphs, for systems of interacting agents. This theory is a bridge between the existing theories of concurrent processes and the aspirations for ubiquitous systems, whose enormous size challenges our understanding. The book is reasonably self-contained mathematically, and is designed to be learned from: examples and exercises abound, solutions for the latter are provided. Like Milner’s other work, this is destined to have far-reaching and profound significance.

Recommended by Prof. Wilson Tan
Operating systems : a spiral approach
(CS 140)

Authors Ramez Elmasri, A. Gil Carrick, David Levine
Place of Publication Boston
Date of Publication c2010
Publisher McGraw-Hill Higher Education

Elmasri, Levine, and Carrick’s ‘spiral approach’ to teaching operating systems develops student understanding of various OS components early on and helps students approach the more difficult aspects of operating systems with confidence. While operating systems have changed dramatically over the years, most OS books use a linear approach that covers each individual OS component in-depth, which is difficult for students to follow and requires instructors to constantly put materials in context. Elmasri, Levine, and Carrick do things differently by following an integrative or ‘spiral’ approach to explaining operating systems. The spiral approach alleviates the need for an instructor to ‘jump ahead’ when explaining processes by helping students ‘completely’ understand a simple, working, functional system as a whole in the very beginning. This is more effective pedagogically, and it inspires students to continue exploring more advanced concepts with confidence.

Recommended by Dr. Adrian Roy L. Valdez
R programming for bioinformatics

Author Robert Gentleman
Place of Publication Boca Raton, Fla.
Date of Publication c2009
Publisher CRC Press

Due to its data handling and modeling capabilities as well as its flexibility, R is becoming the most widely used software in bioinformatics. “R Programming for Bioinformatics” explores the programming skills needed to use this software tool for the solution of bioinformatics and computational biology problems. Drawing on the author’s first-hand experiences as an expert in R, the book begins with coverage on the general properties of the R language, several unique programming aspects of R, and object-oriented programming in R. It presents methods for data input and output as well as database interactions. The author also examines different facets of string handling and manipulations, discusses the interfacing of R with other languages, and describes how to write software packages. He concludes with a discussion on the debugging and profiling of R code. With numerous examples and exercises, this practical guide focuses on developing R programming skills in order to tackle problems encountered in bioinformatics and computational biology.

Recommended by Dr. Susan Festin
Guide to wireless mesh networks

Editors Sudip Misra, Subhas Chandra Misra, Isaac Woungang
Place of Publication London
Date of Publication c2009
Publisher Springer

Wireless Mesh Networks (WMN) is considered to be a key technology for future generation wireless networks. However even though WMNs hold great promises for our future, there are several challenges that need to be addressed. This handbook provides a comprehensive guide on new ideas and results in wireless mesh networks research. Written by some of the prominent researchers in this field, this book provides an invaluable reference to the state-of-the-art in WMS for researchers and practitioners. It is also an ideal text for graduate students wishing to learn more about the topic.

Recommended by Dr. Susan Festin
Managing information security

Editor John R. Vacca
Place of Publication Burlington, Mass.
Date of Publication c2010
Publisher Elsevier

“Managing Information Security” offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors’ respective areas of expertise. The chapters are contributed by leaders in the field covering foundational and practical aspects of information security management, and allowing the reader to develop a new level of technical expertise found nowhere else. The comprehensive coverage by leading experts allows the reader to put current technologies to work. It presents methods of analysis and problem solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions.

Recommended by Dr. Susan Festin
Security in a Web 2.0+ world : a standards based approach

Editor John R. Vacca
Place of Publication Chichester, West Sussex
Date of Publication c2009
Publisher Wiley

Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security policy decisions to engineers who design ICT systems – a guide to information security and standards in the Web 2.0+ era. It provides an understanding of IT security in the converged world of communications technology based on the Internet Protocol. Many companies are currently applying security models following legacy policies or ad-hoc solutions. A series of new security standards (ISO/ITU) allow security professionals to talk a common language. By applying a common standard, security vendors are able to create products and services that meet the challenging security demands of technology further diffused from the central control of the local area network. Companies are able to prove and show the level of maturity of their security solutions based on their proven compliance of the recommendations defined by the standard. Carlos Solari and his team present much needed information and a broader view on why and how to use and deploy standards. They set the stage for a standards-based approach to design in security, driven by various factors that include securing complex information-communications systems, the need to drive security in product development, the need to better apply security funds to get a better return on investment. Security applied after complex systems are deployed is at best a patchwork fix. Concerned with what can be done now using the technologies and methods at our disposal, the authors set in place the idea that security can be designed in to the complex networks that exist now and for those in the near future. Web 2.0 is the next great promise of ICT – we still have the chance to design in a more secure path.

Recommended by Dr. Henry Adorna
Algebraic codes on lines, planes, and curves
(CS 297)

Author Richard E. Blahut
Place of Publication Cambridge
Date of Publication c2008
Publisher Cambridge Univ. Press

The past few years have witnessed significant developments in algebraic coding theory. This book provides an advanced treatment of the subject from an engineering perspective, covering the basic principles and their application in communications and signal processing. Emphasis is on codes defined on the line, on the plane, and on curves, with the core ideas presented using commutative algebra and computational algebraic geometry made accessible using the Fourier transform. Starting with codes defined on a line, a background framework is established upon which the later chapters concerning codes on planes, and on curves, are developed. The decoding algorithms are developed using the standard engineering approach applied to those of Reed-Solomon codes, enabling them to be evaluated against practical applications. Integrating recent developments in the field into the classical treatment of algebraic coding, this is an invaluable resource for graduate students and researchers in telecommunications and applied mathematics.

Recommended by Dr. Henry Adorna
Mathematical analysis of evolution, information, and complexity
(CS 297)

Editors Wolfgang Arendt and Wolfgang P. Schleich.
Place of Publication Weinheim
Date of Publication c2009
Publisher Wiley-VCH

Mathematical Analysis of Evolution, Information, and Complexity deals with the analysis of evolution, information and complexity. The time evolution of systems or processes is a central question in science, this text covers a broad range of problems including diffusion processes, neuronal networks, quantum theory and cosmology. Bringing together a wide collection of research in mathematics, information theory, physics and other scientific and technical areas, this new title offers elementary and thus easily accessible introductions to the various fields of research addressed in the book.

Java programming : from problem analysis to program design, 4th ed.

Author D.S. Malik
Place of Publication Boston, Mass.
Date of Publication c2010
Publisher Course Technology Cengage Learning

This is the latest book on Java programming from Cengage Learning. Table of Contents: 1. An Overview of Computers and Programming Languages. 2. Basic Elements of Java. 3. Introduction to Objects and Input/Output. 4. Control Structures I (Selection). 5. Control Structures II (Repetition). 6. Graphical User Interface (GUI) and Object-Oriented Design (OOD). 7. User-Defined Methods. 8. User-Defined Classes. 9. Arrays. 10. Inheritance and Polymorphism. 11. Handling Exceptions and Events. 12. Advanced GUIs and Graphics. 13. Recursion. 14. Searching and Sorting Algorithms. Appendices. Java Reserved Words. Operator Precedence. Character Sets. Additional Java Topics. Enumeration Types. Answers to Odd Numbered Exercises.

Architecture and principles of systems engineering

Authors C.E. Dickerson, D.N. Mavris
Place of Publication Boca Raton, Fla.
Date of Publication c2010
Publisher CRC Press

The emergence of Model Based Architecture (MDA ) and recent initiatives for model-based systems engineering (MBSE) will play heavily in how the practice of architecture and systems engineering evolves over the next several years. Rooted in the long-standing practices of engineering, science, and mathematics, this book gives readers the foundation and elementary methods to step into the domain of model-based architecture and systems engineering practices. It explores the fundamentals of systems architecture, describes how it fits into systems engineering, explains the role of a systems architect, and provides succinct recommendations on how systems architecture should be practiced.

NEW RESERVE BOOKS (Additional Copies)

Recommended by Dr. Susan Festin and Prof. Adrian Angeles
(CS 260, CS 112)
Software engineering : a practitioner’s approach, 7th ed.

Author Roger S. Pressman
Place of Publication Boston
Date of Publication c2010
Publisher McGraw-Hill Higher Education

For almost three decades, Roger Pressman’s “Software Engineering: A Practitioner’s Approach” has been the world’s leading textbook in software engineering. The new seventh edition represents a major restructuring and update of previous editions, solidifying the book’s position as the most comprehensive guide to this important subject. The seventh edition of “Software Engineering: A Practitioner’s Approach” has been designed to consolidate and restructure the content introduced over the past two editions of the book. The chapter structure will return to a more linear presentation of software engineering topics with a direct emphasis on the major activities that are part of a generic software process. Content will focus on widely used software engineering methods and will de-emphasize or completely eliminate discussion of secondary methods, tools and techniques. The intent is to provide a more targeted, prescriptive, and focused approach, while attempting to maintain “SEPA”‘s reputation as a comprehensive guide to software engineering. The book will be organized in five (5) parts – Process, Modeling, Quality Management, Project Management, and Advanced Topics. The chapter count will remain at 32, unchanged from the sixth edition. However, eight new chapters have been developed and another six chapters have undergone major or moderate revisions. The remaining chapters have undergone minor edits/updates.

Recommended by Dr. Susan Festin
Software engineering, 9th ed.

Author Ian Sommerville
Place of Publication Boston
Date of Publication c2011
Publisher Pearson

Intended for a sophomore/junior level course in software engineering, the 9th edition of Software Engineering presents a broad perspective of software engineering, focusing on the processes and techniques fundamental to the creation of reliable, software systems. Increased coverage of agile methods and software reuse, along with coverage of ‘traditional’ plan-driven software engineering, gives readers the most up-to-date view of the field currently available. Practical case studies, a full set of easy-to-access supplements, and extensive web resources make teaching the course easier than ever. The book is now structured into four parts: 1: Introduction to Software Engineering 2: Dependability and Security 3: Advanced Software Engineering 4: Software Engineering Management