Table of contents for issues of Lecture Notes in Computer Science

Last update: Tue Feb 4 14:03:33 MST 2014                Valid HTML 3.2!

Volume 1186, 1997
Volume 1188, 1997
Volume 1189, 1997
Volume 1190, 1997
Volume 1192, 1997
Volume 1193, 1997
Volume 1195, 1997
Volume 1196, 1997
Volume 1197, 1997
Volume 1198, 1997
Volume 1199, 1997
Volume 1200, 1997
Volume 1201, 1997
Volume 1202, 1997
Volume 1203, 1997
Volume 1204, 1997
Volume 1205, 1997
Volume 1206, 1997
Volume 1207, 1997
Volume 1208, 1997
Volume 1209, 1997
Volume 1210, 1997
Volume 1211, 1997
Volume 1212, 1997
Volume 1213, 1997
Volume 1214, 1997
Volume 1215, 1997
Volume 1216, 1997
Volume 1217, 1997
Volume 1218, 1997
Volume 1219, 1997
Volume 1220, 1997
Volume 1221, 1997
Volume 1222, 1997
Volume 1223, 1997
Volume 1224, 1997
Volume 1225, 1997
Volume 1226, 1997
Volume 1230, 1997
Volume 1231, 1997
Volume 1232, 1997
Volume 1233, 1997
Volume 1234, 1997
Volume 1235, 1997
Volume 1236, 1997
Volume 1237, 1997
Volume 1238, 1997
Volume 1239, 1997
Volume 1240, 1997
Volume 1241, 1997
Volume 1242, 1997
Volume 1243, 1997
Volume 1244, 1997
Volume 1245, 1997
Volume 1247, 1997
Volume 1248, 1997
Volume 1249, 1997
Volume 1250, 1997
Volume 1251, 1997
Volume 1252, 1997
Volume 1253, 1997
Volume 1254, 1997
Volume 1255, 1997
Volume 1256, 1997
Volume 1257, 1997
Volume 1258, 1997
Volume 1259, 1997
Volume 1260, 1997
Volume 1262, 1997
Volume 1263, 1997
Volume 1264, 1997
Volume 1265, 1997
Volume 1266, 1997
Volume 1267, 1997
Volume 1268, 1997
Volume 1270, 1997
Volume 1271, 1997
Volume 1272, 1997
Volume 1273, 1997
Volume 1274, 1997
Volume 1275, 1997
Volume 1276, 1997
Volume 1277, 1997
Volume 1278, 1997
Volume 1279, 1997
Volume 1280, 1997
Volume 1281, 1997
Volume 1282, 1997
Volume 1283, 1997
Volume 1284, 1997
Volume 1285, 1997
Volume 1286, 1997
Volume 1287, 1997
Volume 1288, 1997
Volume 1289, 1997
Volume 1290, 1997
Volume 1291, 1997
Volume 1292, 1997
Volume 1293, 1997
Volume 1294, 1997
Volume 1295, 1997
Volume 1296, 1997
Volume 1297, 1997
Volume 1298, 1997
Volume 1299, 1997


Lecture Notes in Computer Science
Volume 1186, 1997

                   S. Abiteboul   Querying semi-structured data  . . . . . 1
                 C. Chekuri and   
                   A. Rajaraman   Conjunctive query containment revisited  56
                  G. Grahne and   
                N. Spyratos and   
                     D. Sramate   Semantics and containment of queries
                                  with internal and external conjunctions  71
                        N. Huyn   Efficient complete local tests for
                                  conjunctive query constraints with
                                  negation . . . . . . . . . . . . . . . . 83
                       H. Gupta   Selection of views to materialize in a
                                  data warehouse . . . . . . . . . . . . . 98
                    J. Flum and   
             M. Kubierschky and   
                  B. Ludaescher   Total and partial well-founded Datalog
                                  coincide . . . . . . . . . . . . . . . . 113
                    G. Dong and   
                  L. Libkin and   
                        L. Wong   Local properties of query languages  . . 140
                  N. Bidoit and   
                     S. Maabout   A model theoretic approach to update
                                  rule programs  . . . . . . . . . . . . . 173
                  J. Bailey and   
               L. Crnogorac and   
           K. Ramamohanarao and   
                H. Soendergaard   Abstract interpretation of active rules
                                  and its use in termination analysis  . . 188
                  J. Bailey and   
                    G. Dong and   
               K. Ramamohanarao   Structural issues in active rule systems 203
               D. Gunopulos and   
                 H. Mannila and   
                      S. Saluja   Discovering all most specific sentences
                                  by randomized algorithms . . . . . . . . 215
                  D. Wodtke and   
                      G. Weikum   A formal foundation for distributed work
                                  flow execution based on state charts . . 230
                   R. Fagin and   
                  E. L. Wimmers   Incorporating user preferences in
                                  multimedia queries . . . . . . . . . . . 247
               S. Abiteboul and   
                       V. Vianu   Queries and computation on the Web . . . 262
                M. Benedikt and   
                  H. J. Keisler   Expressive power of unary counters . . . 291
               A. Kawaguchi and   
                 D. Lieuwen and   
                  I. Mumick and   
                       D. Quass   Concurrency control theory for deferred
                                  materialized views . . . . . . . . . . . 306
                  U. Halici and   
                 B. Arpinar and   
                       A. Dogac   Serializability of nested transactions
                                  in multidatabases  . . . . . . . . . . . 321
                 P. Buneman and   
                S. Davidson and   
               M. Fernandez and   
                       D. Suciu   Adding structure to unstructured data    336
               S. Abiteboul and   
                   S. Cluet and   
                        T. Milo   Correspondence and translation for
                                  heterogeneous data . . . . . . . . . . . 351
                Y. Ishihara and   
                    H. Seki and   
                         M. Ito   Type-consistency problems for queries in
                                  object-oriented databases  . . . . . . . 364
           K. Abdel-Ghaffar and   
                   A. El Abbadi   Optimal allocation of two-dimensional
                                  data . . . . . . . . . . . . . . . . . . 409
                   L. Colby and   
                      L. Libkin   Tractable iteration mechanisms for bag
                                  languages  . . . . . . . . . . . . . . . 461


Lecture Notes in Computer Science
Volume 1188, 1997

                    R. R. Yager   Constructing Prioritized Fuzzy Models    1
                      N. Hurley   The Use of Fuzzy Representation in a CBR
                                  System for Mesh Design . . . . . . . . . 29
                  M. Bonner and   
                   S. Mayer and   
                   A. Raggl and   
                       W. Slany   FLIP++: A Fuzzy Logic Inference
                                  Processor Library  . . . . . . . . . . . 44
                 C. S. Herrmann   Fuzzy Logic as Interfacing Technique in
                                  Hybrid AI-Systems  . . . . . . . . . . . 69
              J. F. Baldwin and   
                   T. P. Martin   Extracting Knowledge from Data Using an
                                  Intelligent Fuzzy Data Browser . . . . . 81
                         S. Abe   Fuzzy Systems with Learning Capability   101
          A. Cannavacciuolo and   
                 G. Capaldo and   
                  A. Ventre and   
                       A. Volpe   Searching for the Organizational Memory
                                  Using Fuzzy Modeling . . . . . . . . . . 144
                       I. Bloch   Fuzzy Geodesic Distance in Images  . . . 153
                M. C. Clark and   
                 L. O. Hall and   
              D. B. Goldgof and   
                 M. S. Silbiger   Using Fuzzy Information in Knowledge
                                  Guided Segmentation of Brain Tumors  . . 167
                K. H. L. Ho and   
                     N. Ohnishi   FEDGE --- Fuzzy Edge Detection by Fuzzy
                                  Categorization and Classification of
                                  Edges  . . . . . . . . . . . . . . . . . 182
                  H. W. Guesgen   Towards Hybrid Spatial Reasoning . . . . 197
                   J. Gasos and   
                      A. Martin   Mobile Robot Localization Using Fuzzy
                                  Maps . . . . . . . . . . . . . . . . . . 207
                  D. Dubois and   
                       H. Prade   Towards Possibilistic Decision Theory    240
                  T. Bilgic and   
                 I. B. Tuerksen   Measurement-Theoretic Frameworks for
                                  Fuzzy Set Theory . . . . . . . . . . . . 252
         B. Bouchon-Meunier and   
                    L. Valverde   A Resemblance Approach to Analogical
                                  Reasoning Functions  . . . . . . . . . . 266


Lecture Notes in Computer Science
Volume 1189, 1997

                  Marc Joye and   
        Jean-Jacques Quisquater   Protocol Failures for RSA-Like Functions
                                  Using Lucas Sequences and Elliptic
                                  Curves . . . . . . . . . . . . . . . . . 93--100
                  B. Crispo and   
                       M. Lomas   A Certification Scheme for Electronic
                                  Commerce . . . . . . . . . . . . . . . . 19
                E. Fujisaki and   
                     T. Okamoto   Practical Escrow Cash System . . . . . . 33
                R. Anderson and   
               C. Manifavas and   
                  C. Sutherland   NetCard --- A Practical Electronic-Cash
                                  System . . . . . . . . . . . . . . . . . 49
                     D. Wheeler   Transactions Using Bets  . . . . . . . . 89
                  R. Cramer and   
                I. Damgaard and   
                 T. P. Pedersen   Efficient and Provable Secure
                                  Amplifications . . . . . . . . . . . . . 101
                   T. W. Cusick   A Comparison of RSA and the
                                  Naccache-Stern Public-Key Cryptosystem   111
                  B. S. Kaliski   IEEE P1363: A Standard for RSA,
                                  Diffie--Hellman and Elliptic-Curve
                                  Cryptography [Abstract]  . . . . . . . . 117
               M. Burmester and   
                  Y. G. Desmedt   Efficient and Secure Conference-Key
                                  Distribution . . . . . . . . . . . . . . 119
              Chae Hoon Lim and   
                  Pil Joong Lee   Directed Signatures and Application to
                                  Threshold Cryptosystems  . . . . . . . . 131
                    L. Chen and   
                D. Gollmann and   
                 C. J. Mitchell   Key Escrow in Mutually Mistrusting
                                  Domains  . . . . . . . . . . . . . . . . 139
                B. Schneier and   
                      J. Kelsey   Automatic Event-Stream Notarization
                                  Using Digital Signature  . . . . . . . . 155--169
            B. Christianson and   
                 W. S. Harbison   Why Isn't Trust Transitive?  . . . . . . 171
               S.-C. Chuang and   
                     D. Greaves   Securing Residential Asynchronous
                                  Transfer Mode Networks . . . . . . . . . 177


Lecture Notes in Computer Science
Volume 1190, 1997

               M. Abellanas and   
                  J. Garcia and   
               G. Hernandez and   
                         M. Noy   Bipartite Embeddings of Trees in the
                                  Plane  . . . . . . . . . . . . . . . . . 1
               M. Alzohairi and   
                       I. Rival   Series-Parallel Planar Ordered Sets Have
                                  Pagenumber Two . . . . . . . . . . . . . 11
                    P. Bose and   
                    A. Dean and   
              J. Hutchinson and   
                     T. Shermer   On Rectangle Visibility Graphs . . . . . 25
               S. Bridgeman and   
                    A. Garg and   
                    R. Tamassia   A Graph Drawing and Translation Service
                                  on the WWW . . . . . . . . . . . . . . . 45
              T. Calamoneri and   
                    A. Sterbini   Drawing $2$-, $3$- and $4$-colorable
                                  Graphs in $ O(n^2) $ Volume  . . . . . . 53
                    T. Chan and   
             M. T. Goodrich and   
             S. R. Kosaraju and   
                    R. Tamassia   Optimizing Area and Aspect Ratio in
                                  Straight-Line Orthogonal Tree Drawings   63
             G. Di Battista and   
                    A. Garg and   
                  G. Liotta and   
                      A. Parise   Drawing Directed Acyclic Graphs: An
                                  Experimental Study . . . . . . . . . . . 76
               U. Dogrusoez and   
                  B. Madden and   
                      P. Madden   Circular Layout in the Graph Layout
                                  Toolkit  . . . . . . . . . . . . . . . . 92
                   P. Eades and   
                     Q. W. Feng   Multilevel Visualization of Clustered
                                  Graphs . . . . . . . . . . . . . . . . . 101
                   P. Eades and   
                 Q. W. Feng and   
                         X. Lin   Straight-Line Drawing Algorithms for
                                  Hierarchical Graphs and Clustered Graphs 113
                   P. Eades and   
                   J. Marks and   
                       S. North   Graph-Drawing Contest Report . . . . . . 129
                   P. Eades and   
                A. Symvonis and   
                  S. Whitesides   Two Algorithms for Three Dimensional
                                  Orthogonal Graph Drawing . . . . . . . . 139
              U. Foessmeier and   
                    G. Kant and   
                    M. Kaufmann   2-Visibility Drawings of Planar Graphs   155
                       A. Frick   Upper Bounds on the Number of Hidden
                                  Nodes in Sugiyama's Algorithm  . . . . . 169
                   A. Frick and   
                  C. Keskin and   
                   V. Vogelmann   Integration of Declarative Approaches    184
                    A. Garg and   
                    R. Tamassia   GIOTTO3D: A System for Visualizing
                                  Hierarchical Structures in $3$D  . . . . 193
                    A. Garg and   
                    R. Tamassia   A New Minimum Cost Flow Algorithm with
                                  Applications to Graph Drawing  . . . . . 201
                      W. He and   
                    K. Marriott   Constrained Graph Layout . . . . . . . . 217
                     M. Himsolt   The Graphlet System  . . . . . . . . . . 233
             K. G. Kakoulis and   
                   I. G. Tollis   On the Edge Label Placement Problem  . . 241
              K. Wittenburg and   
                    L. Weitzman   Qualitative Visualization of Processes:
                                  Attributed Graph Layout and Focusing
                                  Techniques . . . . . . . . . . . . . . . 401


Lecture Notes in Computer Science
Volume 1192, 1997

                  M. Comini and   
                    G. Levi and   
                  M. C. Meo and   
                    G. Vitiello   Proving Properties of Logic Programs by
                                  Abstract Diagnosis . . . . . . . . . . . 22
             L.-A. Fredlund and   
               J. Koistinen and   
                       F. Orava   Formalising and Prototyping a Concurrent
                                  Object-Based Language  . . . . . . . . . 116
                  P. Fradet and   
                  D. Le Metayer   Type Checking for a Multiset Rewriting
                                  Language . . . . . . . . . . . . . . . . 126
                  T. Amtoft and   
                 F. Nielson and   
              H. R. Nielson and   
                      J. Ammann   Polymorphic Subtyping for Effect
                                  Analysis: The Dynamic Semantics  . . . . 172
                     R. Cridlig   Implementing a Static Analyzer of
                                  Concurrent Programs: Problems and
                                  Perspectives . . . . . . . . . . . . . . 244
                     K.-F Faxen   Polyvariance, Polymorphism, and Flow
                                  Analysis . . . . . . . . . . . . . . . . 260
                 R. Wilhelm and   
                     M. Alt and   
                  F. Martin and   
                       M. Raber   Parallel Implementation of Functional
                                  Languages  . . . . . . . . . . . . . . . 279
                  P. Degano and   
                J.-V. Loddo and   
                      C. Priami   Mobile Processes with Local Clocks . . . 296
               R. De Nicola and   
                    R. Pugliese   Testing Semantics of Asynchronous
                                  Distributed Programs . . . . . . . . . . 320
                  P. Degano and   
                  C. Priami and   
                    L. Leth and   
                     B. Thomsen   Analysis of FACILE Programs  . . . . . . 345
            N. De Francesco and   
                 A. Santone and   
                     G. Vaglini   A Non-Standard Semantics for Generating
                                  Reduced Transition Systems . . . . . . . 370


Lecture Notes in Computer Science
Volume 1193, 1997

                S. Franklin and   
                    A. Graesser   Is it an Agent, or Just a Program?: A
                                  Taxonomy for Autonomous Agents . . . . . 21
               C. Castelfranchi   To Be or Not to Be an Agent  . . . . . . 37
                  M. Wooldridge   Agents as a Rorschach Test: A Response
                                  to Franklin and Graesser . . . . . . . . 47
                      M. Fisher   If $Z$ Is the Answer, What Could the
                                  Question Possibly Be?  . . . . . . . . . 65
                      G. Wagner   Practical Theory and Theory-Based
                                  Practice . . . . . . . . . . . . . . . . 67
              A. F. Dragoni and   
                    P. Giorgini   Belief Revision Through the
                                  Belief-Function Formalism in a
                                  Multi-Agent Environment  . . . . . . . . 103
             M. Benerecetti and   
                 A. Cimatti and   
             E. Giunchiglia and   
                 F. Giunchiglia   Formal Specification of Beliefs in
                                  Multi-Agent Systems  . . . . . . . . . . 117
                 F. Brazier and   
                  C. Jonker and   
                       J. Treur   Formalisation of a Cooperation Model
                                  Based on Joint Intentions  . . . . . . . 141
                 P. Bretier and   
                       D. Sadek   A Rational Agent as the Kernel of a
                                  Cooperative Spoken Dialogue System:
                                  Implementing a Logical Theory of
                                  Interaction  . . . . . . . . . . . . . . 189
                  F. Dignum and   
                  B. Van Linder   Modelling Social Agents: Communication
                                  as Action  . . . . . . . . . . . . . . . 205
                    D. Zeng and   
                      K. Sycara   How Can an Agent Learn to Negotiate? . . 233
              L. M. Botelho and   
                      H. Coelho   Emotion-Based Attention Shift in
                                  Autonomous Agents  . . . . . . . . . . . 277
                       D. Davis   Reactive and Motivational Agents:
                                  Towards a Collective Minder  . . . . . . 309
              M. Barbuceanu and   
                         M. Fox   The Design of a Coordination Language
                                  for Multi-Agent Systems  . . . . . . . . 341
                  M. Wooldridge   A Knowledge-Theoretic Semantics for
                                  Concurrent METATEM . . . . . . . . . . . 357


Lecture Notes in Computer Science
Volume 1195, 1997

               N. I. Badler and   
                B. D. Reich and   
                   B. L. Webber   Towards Personalities for Animated
                                  Agents with Reactive and Planning
                                  Behaviors  . . . . . . . . . . . . . . . 43
                    A. Goldberg   IMPROV: A System for Real-Time Animation
                                  of Behavior-Based Interactive Synthetic
                                  Actors . . . . . . . . . . . . . . . . . 58
                B. Blumberg and   
                     T. Galyean   Multi-level Control for Animated
                                  Autonomous Agents: Do the Right
                                  Thing\ldots Oh, Not That . . . . . . . . 74
                   D. Blair and   
                       T. Meyer   Tools for an Interactive Virtual Cinema  83
              B. Hayes-Roth and   
                R. Van Gent and   
                       D. Huber   Acting in Character  . . . . . . . . . . 92


Lecture Notes in Computer Science
Volume 1196, 1997

              P. G. Akishin and   
              I. V. Puzynin and   
                  Y. S. Smirnov   The Newtonian Continuation Method for
                                  Numerical Study of $3$D Polaron Problem  1
           I. V. Amirkhanov and   
              I. V. Puzynin and   
             T. P. Puzynina and   
                   T. A. Strizh   CANM in Numerical Investigation of QCD
                                  Problems . . . . . . . . . . . . . . . . 9
                  P. Amodio and   
                      F. Mazzia   Parallel Iterative Solvers for Banded
                                  Linear Systems . . . . . . . . . . . . . 17
              A. B. Andreev and   
                  T. D. Todorov   Finite Element Approximations of Some
                                  Central Curves . . . . . . . . . . . . . 25
               E. A. Ayrian and   
                  A. V. Fedorov   Utilization of CANM for Magnetic Field
                                  Calculation  . . . . . . . . . . . . . . 34
            I. B. Bazhlekov and   
               M. G. Koleva and   
                 D. P. Vasileva   Numerical Algorithm for Simulation of
                                  Coupled Heat-Mass Transfer and Chemical
                                  Reaction in Two-Phase Steady Flow  . . . 38
                R. H. Bisseling   Basic Techniques for Numerical Linear
                                  Algebra on Bulk Synchronous Parallel
                                  Computers  . . . . . . . . . . . . . . . 46
                    I. Braianov   Convergence of a Crank--Nicolson
                                  Difference Scheme for Heat Equations
                                  with Interface in the Heat Flow and
                                  Concentrated Heat Capacity . . . . . . . 58
                  J. Brandt and   
             J. Christensen and   
                   I. Dimov and   
                    K. Georgiev   Treatment of Large Air Pollution Models  66
                    L. Brugnano   Boundary Value Methods for the Numerical
                                  Approximation of Ordinary Differential
                                  Equations  . . . . . . . . . . . . . . . 78
                 R. H. Chan and   
                  C. Cheung and   
                         H. Sun   Fast Algorithms for Problems on Thermal
                                  Tomography . . . . . . . . . . . . . . . 90
                     T. C. Chen   Convergence in Iterative Polynomial
                                  Root-Finding . . . . . . . . . . . . . . 98
                 C. Clavero and   
                J. C. Jorge and   
                 F. Lisbona and   
                 G. I. Shishkin   Splitting Time Methods and One
                                  Dimensional Special Meshes for
                                  Reaction-Diffusion Parabolic Problems    106
              G. F. Corliss and   
                A. Griewank and   
             P. Henneberger and   
                   G. Kirlinger   High-Order Stiff ODE Solvers via
                                  Automatic Differentiation and Rational
                                  Prediction . . . . . . . . . . . . . . . 114
                F. Di Benedetto   The Use of Discrete Sine Transform in
                                  Computations with Toeplitz Matrices  . . 126
             S. C. Di Marco and   
              R. L. V. Gonzalez   A Finite State Stochastic Minimax
                                  Optimal Control Problem with Infinite
                                  Horizon  . . . . . . . . . . . . . . . . 134
            N. S. Dimitrova and   
                  C. P. Ullrich   Verified Solving of Linear Systems with
                                  Uncertainties in MAPLE . . . . . . . . . 142
                I. T. Dimov and   
              A. N. Karaivanova   Iterative Monte Carlo Algorithms for
                                  Linear Algebra Problems  . . . . . . . . 150
                E. G. D'yakonov   Operator Problems in Strengthened
                                  Sobolev Spaces and Numerical Methods for
                                  Them . . . . . . . . . . . . . . . . . . 161
                  L. Elsner and   
                       T. Szulc   Convex Combinations of
                                  Matrices-Nonsingularity and Schur
                                  Stability  . . . . . . . . . . . . . . . 170
             S. S. Filippov and   
            Y. V. Sanochkin and   
           A. Y. Sogomonyan and   
                 A. V. Tygliyan   Numerical Solution of a BVP in
                                  Hydrodynamics (Thermocapillary
                                  Convection)  . . . . . . . . . . . . . . 176
                B. Hoermann and   
                  C. P. Ullrich   Componentwise Error Bounds and Direct
                                  Linear System Solving  . . . . . . . . . 184
                   I. G. Ivanov   A Method for Solving the Spectral
                                  Problem for Complex Matrices . . . . . . 192
                B. S. Jovanovic   Interpolation Technique and Convergence
                                  Rate Estimates for Finite Difference
                                  Method . . . . . . . . . . . . . . . . . 200
                    J. Kamm and   
                     J. G. Nagy   Least Squares and Total Least Squares
                                  Methods in Image Restoration . . . . . . 212
                A. Karageorghis   Conforming Spectral Domain Decomposition
                                  Schemes  . . . . . . . . . . . . . . . . 220
                M. Kaschiev and   
              D. Koulova-Nenova   Newton's Method for Solution of One
                                  Complex Eigenvalue Problem . . . . . . . 227
                V. A. Kaschieva   Calculation of Bifurcation States in the
                                  Circle Josefsson's Conversion  . . . . . 236
         D. Barrera Rosillo and   
        M. J. Ibathez Perez and   
               A. Lopez Carmona   Compactly Supported Fundamental
                                  Functions for Bivariate Hermite Spline
                                  Interpolation and Triangular Finite
                                  Elements of HCT Type . . . . . . . . . . 414
                   L. G. Vulkov   Applications of Steklov-Type Eigenvalue
                                  Problems to Convergence of Difference
                                  Schemes for Parabolic and Hyperbolic
                                  Equations with Dynamical Boundary
                                  Conditions . . . . . . . . . . . . . . . 557
             P. S. Williams and   
                    T. E. Simos   Two-Step P-stable Methods with Phase-Lag
                                  of Order Infinity for the Numerical
                                  Solution of Special Second Order Initial
                                  Value Problems . . . . . . . . . . . . . 565
                  P. Y. Yalamov   Notes on the Classification of Numerical
                                  Algorithms with Respect to Their
                                  Stability to Roundoff Errors . . . . . . 573
                        T. Yang   New IMGS-based Preconditioners for Least
                                  Squares Problems . . . . . . . . . . . . 581
                 I. Zheleva and   
              V. Kambourova and   
                P. Dimitrov and   
                       R. Rusev   Numerical Algorithm for Studying
                                  Heat-Transfer in a Glass Melting Furnace 589
                 I. Zheleva and   
              V. Kambourova and   
                P. Dimitrov and   
                       R. Rusev   Identification of the Heat-Transfer in a
                                  Glass Melting Furnace  . . . . . . . . . 596


Lecture Notes in Computer Science
Volume 1197, 1997

                      A. C. Yao   Hypergraphs and Decision Trees . . . . . 1
                P. Alimonti and   
                  T. Calamoneri   Improved Approximations of Independent
                                  Dominating Set in Bounded Degree Graphs  2
                   L. Babel and   
                      S. Olariu   A New Characterization of P4-connected
                                  Graphs . . . . . . . . . . . . . . . . . 17
                M. Bauderon and   
                     H. Jacquet   Node Rewriting in Hypergraphs  . . . . . 31
                 S. L. Bezrukov   On $k$-partitioning the $n$-cube . . . . 44
              A. Broadwater and   
                     K. Efe and   
                   A. Fernandez   Embedding Complete Binary Trees in
                                  Product Graphs . . . . . . . . . . . . . 56
                    K. Brys and   
                        Z. Lonc   Clique and Anticlique Partitions of
                                  Graphs . . . . . . . . . . . . . . . . . 67
                 C. C. Chen and   
                        J. Chen   Optimal Parallel Routing in Star Graphs  73
                S. Cicerone and   
                D. Frigioni and   
                   U. Nanni and   
                    F. Pugliese   Counting Edges in a Dag  . . . . . . . . 85
                  O. Ciotti and   
             F. Parisi-Presicce   Closure Properties of Context-Free
                                  Hyperedge Replacement Systems  . . . . . 101
               P. Crescenzi and   
                       P. Penna   Upward Drawings of Search Trees  . . . . 114
                    K. Diks and   
                     T. Hagerup   More General Parallel Tree Contraction:
                                  Register Allocation and Broadcasting in
                                  a Tree . . . . . . . . . . . . . . . . . 126
                    K. Diks and   
                        A. Pelc   System Diagnosis with Smallest Risk of
                                  Error  . . . . . . . . . . . . . . . . . 141
                  H. N. Djidjev   Efficient Algorithms for Shortest Path
                                  Queries in Planar Digraphs . . . . . . . 151
               F. F. Dragan and   
                 F. Nicolai and   
                 A. Brandstaedt   LexBFS-Orderings and Powers of Graphs    166
                     J. Gustedt   Efficient Union-Find for Planar Graphs
                                  and Other Sparse Graph Classes . . . . . 181
                S. Hartmann and   
           M. W. Schaeffter and   
                   A. S. Schulz   Switchbox Routing in VLSI Design:
                                  Closing the Complexity Gap . . . . . . . 196
                  M. Hurfin and   
                      M. Raynal   Detecting Diamond Necklaces in Labeled
                                  DAGs (A Problem from Distributed
                                  Debugging) . . . . . . . . . . . . . . . 211
                        W. Kahl   Algebraic Graph Derivations for
                                  Graphical Calculi  . . . . . . . . . . . 224
                      D. Kaller   Definability Equals Recognizability of
                                  Partial 3-Trees  . . . . . . . . . . . . 239
                    X. Zhou and   
               M. A. Kashem and   
                   T. Nishizeki   Generalized Edge-Rankings of Trees . . . 390


Lecture Notes in Computer Science
Volume 1198, 1997

                  S. N. K. Watt   Artificial Societies and Psychological
                                  Agents . . . . . . . . . . . . . . . . . 27
               N. J. Davies and   
                   R. Weeks and   
                   M. C. Revett   Information Agents for the World Wide
                                  Web  . . . . . . . . . . . . . . . . . . 81
                   L. Foner and   
                 I. B. Crabtree   Multi-Agent Matchmaking  . . . . . . . . 100
                        D. Fisk   An Application of Social Filtering to
                                  Movie Recommendation . . . . . . . . . . 116
                  A. Chavez and   
              D. Dreilinger and   
                 R. Guttman and   
                        P. Maes   A Real-Life Experiment in Creating an
                                  Agent Marketplace  . . . . . . . . . . . 160
                    L. A. Zadeh   The Roles of Fuzzy Logic and Soft
                                  Computing in the Conception, Design and
                                  Deployment of Intelligent Systems  . . . 183
                  B. Azvine and   
                  N. Azarmi and   
                     K. C. Tsui   An Introduction to Soft Computing --- A
                                  Tool for Building Intelligent Systems    191
              J. F. Baldwin and   
                   T. P. Martin   Basic Concepts of a Fuzzy Logic Data
                                  Browser with Applications  . . . . . . . 211


Lecture Notes in Computer Science
Volume 1199, 1997

                   A. Davis and   
                 M. Swanson and   
                      M. Parker   Efficient Communication Mechanisms for
                                  Cluster Based Parallel Computing . . . . 1
           S. N. Damianakis and   
                C. Dubnicki and   
                   E. W. Felten   Stream Sockets on SHRIMP . . . . . . . . 16
                  D. C. DiNucci   A Simple and Efficient Process and
                                  Communication Abstraction for Network
                                  Operating Systems  . . . . . . . . . . . 31
                       B. Abali   A Deadlock Avoidance Method for Computer
                                  Networks . . . . . . . . . . . . . . . . 61
         M. G. H. Katevenis and   
               P. Vatsolaki and   
                D. Serpanos and   
                    E. Markatos   ATLAS-I: A Single-Chip ATM Switch for
                                  NOWs . . . . . . . . . . . . . . . . . . 88
                B. Dimitrov and   
                        V. Rego   Arachne: A Portable Threads Library
                                  Supporting Migrant Threads on
                                  Heterogeneous Network Farms  . . . . . . 102
                     S. Kim and   
                    M. Hyun and   
                         S. Lee   Transparent Treatment of Remote Pointers
                                  Using IPC Primitive in RPC Systems . . . 115
                  J. Bonney and   
               R. Ramanujan and   
                  A. Ahamad and   
                    S. Takkella   Distributed Hardware Support for Process
                                  Synchronization in NSM Workstation
                                  Clusters . . . . . . . . . . . . . . . . 144
                    M. Kaddoura   Load Balancing for Regular Data-Parallel
                                  Applications on Workstation Network  . . 173
                     H. Bal and   
                  R. Hofman and   
                    K. Verstoep   A Comparison of Three High Speed
                                  Networks for Parallel Cluster Computing  184
                J. C. Gomez and   
                    V. Rego and   
                 V. S. Sunderam   CLAM: Connection-less, Lightweight, and
                                  Multiway Communication Support for
                                  Distributed Computing  . . . . . . . . . 227
               H. Yamashita and   
                  T. Suguri and   
               S. Kinoshita and   
                       Y. Okada   Network-wide Cooperative Computing
                                  Architecture (NCCA)  . . . . . . . . . . 241
           N. Chrisochoides and   
                I. Kodukula and   
                     K. Pingali   Data Movement and Control Substrate for
                                  Parallel Scientific Computing  . . . . . 256


Lecture Notes in Computer Science
Volume 1200, 1997

                   G. S. Brodal   Predecessor Queries in Dynamic Integer
                                  Sets . . . . . . . . . . . . . . . . . . 21
            P. G. Franciosa and   
                D. Frigioni and   
                     R. Giaccio   Semi-Dynamic Shortest Paths and
                                  Breadth-First Search in Diagraphs  . . . 33
               J. Hromkovic and   
                 S. Seibert and   
                       T. Wilke   Translating Regular Expressions into
                                  Small curly epsilon-Free
                                  Nondeterministic Finite Automata . . . . 55
                  C. Fiorio and   
                     J. Gustedt   Memory Management for Union-Find
                                  Algorithms . . . . . . . . . . . . . . . 67
                  H. Hempel and   
                    G. Wechsung   The Operators min and max on the
                                  Polynomial Hierarchy . . . . . . . . . . 93
                 H. Buhrman and   
                     L. Fortnow   Resource-Bounded Kolmogorov Complexity
                                  Revisited  . . . . . . . . . . . . . . . 105
                   P. Duris and   
               J. Hromkovic and   
             J. D. P. Rolim and   
                   W. Schnitger   Las Vegas Versus Determinism for One-way
                                  Communication Complexity, Finite
                                  Automata, and Polynomial-time
                                  Computations . . . . . . . . . . . . . . 117
       C. Bertram-Kretzberg and   
                     H. Lefmann   MODp-tests, Almost Independence and
                                  Small Probability Spaces . . . . . . . . 141
               L. De Alfaro and   
                   A. Kapur and   
                       Z. Manna   Hybrid Diagrams: A Deductive-Algorithmic
                                  Approach to Hybrid System Verification   153
                   L. De Alfaro   Temporal Logics for the Specification of
                                  Performance and Reliability  . . . . . . 165
                   C. Weise and   
                     D. Lenzkes   Efficient Scaling-Invariant Checking of
                                  Timed Bisimulation . . . . . . . . . . . 177
              M. Dietzfelbinger   Gossiping and Broadcasting versus
                                  Computing Functions in Networks  . . . . 189
                       S. Waack   On the Descriptive and Algorithmic Power
                                  of Parity Ordered Binary Decision
                                  Diagrams . . . . . . . . . . . . . . . . 201
                    J. Case and   
                  E. Kinber and   
                  A. Sharma and   
                     F. Stephan   On the Classification of Computable
                                  Languages  . . . . . . . . . . . . . . . 225
               G. Kern-Isberner   A Conditional-Logical Approach to
                                  Minimum Cross-Entropy  . . . . . . . . . 237
                 E. Graedel and   
                    M. Otto and   
                       E. Rosen   Undecidability Results on Two-Variable
                                  Logics . . . . . . . . . . . . . . . . . 249
                 S. Gaubert and   
                        M. Plus   Methods and Applications of (max,$+$ )
                                  Linear Algebra . . . . . . . . . . . . . 261
               J. Goldstine and   
                   H. Leung and   
                    D. Wotschke   Measuring Nondeterminism in Pushdown
                                  Automata . . . . . . . . . . . . . . . . 295
            E. Hemaspaandra and   
         L. A. Hemaspaandra and   
                      H. Hempel   A Downward Translation in the Polynomial
                                  Hierarchy  . . . . . . . . . . . . . . . 319
                   M. Flaremini   Deadlock-Free Interval Routing Schemes   351
                    C. Karg and   
                 J. Koebler and   
                     R. Schuler   The Complexity of Generating Test
                                  Instances  . . . . . . . . . . . . . . . 375
               A. E. Andrew and   
          A. E. F. Clementi and   
                 J. D. P. Rolim   Efficient Construction of Hitting Sets
                                  for Systems of Linear Functions  . . . . 387
                   I. Biehl and   
                       B. Meyer   Protocols for Collusion-Secure
                                  Asymmetric Fingerprinting  . . . . . . . 399
                G. Cattaneo and   
                E. Formenti and   
                 G. Manzini and   
                     L. Margara   On Ergodic Linear Cellular Automata over
                                  $ Z m $  . . . . . . . . . . . . . . . . 427
              J. O. Durand-Lose   Intrinsic Universality of a
                                  $1$-Dimensional Reversible Cellular
                                  Automaton  . . . . . . . . . . . . . . . 439
                 J. F. Buss and   
             G. S. Frandsen and   
                  J. O. Shallit   The Computational Complexity of Some
                                  Problems of Linear Algebra . . . . . . . 451
                    E. Dahlhaus   Sequential and Parallel Algorithms on
                                  Compactly Represented Chordal and
                                  Strongly Chordal Graphs  . . . . . . . . 487
                R. Feldmann and   
                  B. Monien and   
              P. Mysliwietz and   
                    S. Tschoeke   A Better Upper Bound on the Bisection
                                  Width of de Bruijn Networks  . . . . . . 511
              J. Feigenbaum and   
                     M. Strauss   An Information-Theoretic Treatment of
                                  Random-Self-Reducibility . . . . . . . . 523
           J. M. Breutzmann and   
                     J. H. Lutz   Equivalence of Measures of Complexity
                                  Classes  . . . . . . . . . . . . . . . . 535
                 V. Auletta and   
                     M. Parente   Better Algorithms for Minimum Weight
                                  Vertex-Connectivity Problems . . . . . . 547
                 V. Diekert and   
                  P. Gastin and   
                       A. Petit   Removing curly epsilon-Transitions in
                                  Timed Automata . . . . . . . . . . . . . 583
                   O. Goldreich   Probabilistic Proof Systems --- A Survey 595


Lecture Notes in Computer Science
Volume 1201, 1997

                    Z. Artstein   Tutorial: The Lyapunov Method  . . . . . 2
            T. A. Henzinger and   
                   O. Kupferman   From Quantity to Quality . . . . . . . . 48
                  F. Boniol and   
         A. Burgueño and   
                    O. Roux and   
                        V. Rusu   Analysis of Slope-Parametric Hybrid
                                  Automata . . . . . . . . . . . . . . . . 75
                   R. Huuck and   
                Y. Lakhnech and   
                  L. Urbina and   
                      S. Engell   Comparing Timed C/E Systems with Timed
                                  Automata . . . . . . . . . . . . . . . . 81
                M. S. Hajji and   
                 J. M. Bass and   
               A. R. Browne and   
                  P. J. Fleming   Design Tools for Hybrid Control Systems  87
                 M. S. Branicky   On-line, Reflexive Constraint
                                  Satisfaction for Hybrid Systems: First
                                  Steps  . . . . . . . . . . . . . . . . . 93
                  A. Cerone and   
                A. J. Cowie and   
                G. J. Milne and   
                  P. A. Moseley   Modeling a Time-Dependent Protocol Using
                                  the Circal Process Algebra . . . . . . . 124
               E. Dolginova and   
                       N. Lynch   Safety Verification for Automated
                                  Platoon Maneuvers  . . . . . . . . . . . 154
                  M. Archer and   
                   C. Heitmeyer   Verifying Hybrid Systems Modeled as
                                  Timed Automata . . . . . . . . . . . . . 171
                J.-M. Flaus and   
                    G. Ollagnon   Hybrid Flow Nets for Hybrid Processes
                                  Modeling and Control . . . . . . . . . . 213
                       P. Caspi   What Can We Learn from Synchronous
                                  Data-Flow Languages? . . . . . . . . . . 255
                  S. Bornot and   
                     J. Sifakis   Relating Time Progress and Deadlines in
                                  Hybrid Systems . . . . . . . . . . . . . 286
                          Q. Xu   Semantics and Verification of Extended
                                  Phase Transition Systems in Duration
                                  Calculus . . . . . . . . . . . . . . . . 301
                   C. Weise and   
                     D. Lenzkes   Weak Refinement for Modal Hybrid Systems 316
                   V. Gupta and   
            T. A. Henzinger and   
                  R. Jagadeesan   Robust Timed Automata  . . . . . . . . . 331
                  E. Asarin and   
                   M. Bozga and   
                 A. Kerbrat and   
                       O. Maler   Data-Structures for the Verification of
                                  Timed Automata . . . . . . . . . . . . . 346
                   D. Kapur and   
             R. K. Shyamasundar   Synthesizing Controllers for Hybrid
                                  Systems  . . . . . . . . . . . . . . . . 361
                 M. Heymann and   
                     F. Lin and   
                       G. Meyer   Control Synthesis for a Class of Hybrid
                                  Systems Subject to Configuration-Based
                                  Safety Constraints . . . . . . . . . . . 376
             B. De Schutter and   
                     B. De Moor   Generalized Linear Complementarity
                                  Problems and the Analysis of
                                  Continuously Variable Systems and
                                  Discrete Event Systems . . . . . . . . . 409


Lecture Notes in Computer Science
Volume 1202, 1997

                  M. Wooldridge   Issues in Agent-Based Software
                                  Engineering  . . . . . . . . . . . . . . 1
                 S. Bergamaschi   Extraction of Informations from Highly
                                  Heterogeneous Source of Textual Data . . 42
                 H.-D. Burkhard   Cases, Information, and Agents . . . . . 64
                  L. Kerschberg   Knowledge Rovers: Cooperative
                                  Intelligent Agent Support for Enterprise
                                  Information Architectures  . . . . . . . 79
                      G. Vossen   The CORBA Specification for Cooperation
                                  in Heterogeneous Information Systems . . 101
              M. Berndtsson and   
            S. Chakravarthy and   
                       B. Lings   Result Sharing Among Agents Using
                                  Reactive Rules . . . . . . . . . . . . . 126
                   G. Babin and   
                  Z. Maamar and   
                  B. Chaib-Draa   Metadatabase Meets Distributed AI  . . . 138
                      E. Haneke   `Learning' Based Filtering of Text
                                  Information Using Simple Interest
                                  Profiles . . . . . . . . . . . . . . . . 171
                   N. Zhong and   
                Y. Kakemoto and   
                      S. Ohsuga   An Organized Society of Autonomous
                                  Knowledge Discovery Agents . . . . . . . 183
                     W. Cao and   
                 C.-G. Bian and   
                  G. Hartvigsen   Achieving Efficient Cooperation in a
                                  Multi-Agent System: The Twin-Base
                                  Modelling  . . . . . . . . . . . . . . . 210
                  W. C. Jamison   Approaching Interoperability for
                                  Heterogeneous Multiagent Systems Using
                                  High Order Agencies  . . . . . . . . . . 222
              R. H. Bordini and   
             J. A. Campbell and   
                      R. Vieira   Ascription of Intensional Ontologies in
                                  Anthropological Descriptions of
                                  Multi-Agent Systems  . . . . . . . . . . 235
                      G. Wagner   Multi-Level Security in Multiagent
                                  Systems  . . . . . . . . . . . . . . . . 272


Lecture Notes in Computer Science
Volume 1203, 1997

                     G. Bilardi   Algorithms and Data Structures for
                                  Control Dependence and Related Compiler
                                  Problems . . . . . . . . . . . . . . . . 1
                    G. Even and   
                        S. Even   Embedding Interconnection Networks in
                                  Grids via the Layered Cross Product  . . 3
                  Y. Dinitz and   
                       Z. Nutov   Finding Optimum $k$-vertex Connected
                                  Spanning Subgraphs: Improved
                                  Approximation Algorithms for $ k = 3, 4,
                                  5 $  . . . . . . . . . . . . . . . . . . 13
                      K. Jansen   The Optimum Cost Chromatic Partition
                                  Problem  . . . . . . . . . . . . . . . . 25
                 S. Khuller and   
                   R. Pless and   
                 Y. J. Sussmann   Fault Tolerant $K$-Center Problems . . . 37
            E. Hemaspaandra and   
         L. A. Hemaspaandra and   
                      H. Hempel   R0S0N1-tt(NP) Distinguishes Robust
                                  Many-One and Turing Completeness . . . . 49
                S. Caporaso and   
                    M. Zito and   
                  N. Galesi and   
                      E. Covino   Syntactic Characterization in LISP of
                                  the Polynomial Complexity Classes and
                                  Hierarchy  . . . . . . . . . . . . . . . 61
                   U. Feige and   
                     G. Rayzman   On the Drift of Short Schedules  . . . . 74
                   F. Gomez and   
               S. Ramaswami and   
                   G. Toussaint   On Removing Non-degeneracy Assumptions
                                  in Computational Geometry  . . . . . . . 86
                 F. D'Amore and   
            P. G. Franciosa and   
                 R. Giaccio and   
                      M. Talamo   Maintaining Maxima under Boundary
                                  Updates  . . . . . . . . . . . . . . . . 100
                   A. Datta and   
             K. Krithivasan and   
                     T. Ottmann   An Optimal Algorithm for One-Separation
                                  of a Set of Isothetic Polygons . . . . . 110
              U. Foessmeier and   
                    M. Kaufmann   Nice Drawings for Planar Bipartite
                                  Graphs . . . . . . . . . . . . . . . . . 122
                    A. Amir and   
                         E. Dar   An Improved Deterministic Algorithm for
                                  Generalized Random Sampling  . . . . . . 159
                     C. Domingo   Polynomial Time Algorithms for Some
                                  Self-Duality Problems  . . . . . . . . . 171
               P. Ferragina and   
                  R. Grossi and   
                  M. Montangero   A Note on Updating Suffix Tree Labels    181
                   S. Hanke and   
                 T. Ottmann and   
           E. Soisalon-Soininen   Relaxed Balanced Red-Black Trees . . . . 193
                   P. Damaschke   The Algorithmic Complexity of Chemical
                                  Threshold Testing  . . . . . . . . . . . 205
              J. Katajainen and   
                   J. L. Traeff   A Meticulous Analysis of Mergesort
                                  Programs . . . . . . . . . . . . . . . . 217
                G. Cattaneo and   
                 M. Finelli and   
                     L. Margara   Topological Chaos for Elementary
                                  Cellular Automata  . . . . . . . . . . . 241
                  A. Bernasconi   On the Complexity of Balanced Boolean
                                  Functions  . . . . . . . . . . . . . . . 253
         L. A. Hemaspaandra and   
                   J. Rothe and   
                    G. Wechsung   On Sets with Easy Certificates and the
                                  Existence of One-Way Permutations  . . . 264
                K. Yamazaki and   
           H. L. Bodlaender and   
              B. De Fluiter and   
                 D. M. Thilikos   Isomorphism for Graphs of Bounded
                                  Distance Width . . . . . . . . . . . . . 276
                P. Alimonti and   
                        V. Kann   Hardness of Approximating Problems on
                                  Cubic Graphs . . . . . . . . . . . . . . 288
                       M.-Y Kao   Tree Contractions and Evolutionary Trees 299


Lecture Notes in Computer Science
Volume 1204, 1997

                        G. Goos   From Programming Languages to Program
                                  Construction . . . . . . . . . . . . . . 1
                    K. J. Gough   Multi-language, Multi-target Compiler
                                  Development: Evolution of the Gardens
                                  Point Compiler Project . . . . . . . . . 17
                K. J. Gough and   
                     H. Klaeren   Executable Assertions and Separate
                                  Compilation  . . . . . . . . . . . . . . 41
                  S. Collin and   
                  D. Colnet and   
                      O. Zendra   Type Inference for Late Binding: The
                                  SmallEiffel Compiler . . . . . . . . . . 67
                        W. Weck   An Abstract Data Type for Freezable
                                  Lists and DAGs . . . . . . . . . . . . . 112
                         M. Hof   Just-in-Time Stub Generation . . . . . . 197
                   J. Gutknecht   Do the Fish Really Need Remote Control?
                                  A Proposal for Self-Active Objects in
                                  Oberon . . . . . . . . . . . . . . . . . 207
              A. R. Disteli and   
                       P. Reali   Combining Oberon with Active Objects . . 221
                  M. Evered and   
                J. L. Keedy and   
             A. Schmolitzky and   
                      G. Menger   How Well Do Inheritance Mechanisms
                                  Support Inheritance Concepts?  . . . . . 252
              Sho'ji Suzuki and   
             Tatsunori Kato and   
           Hiroshi Ishizuka and   
         Yasutake Takahashi and   
                Eiji Uchibe and   
                   Minoru Asada   An Application of Vision-Based Learning
                                  in RoboCup for a Real Robot with an
                                  Omnidirectional Vision System and the
                                  Team Description of Osaka University
                                  ``Trackies'' . . . . . . . . . . . . . . 316
               U. W. Eisenecker   Generative Programming (GP) with C++ . . 351
                      E. Zeller   Seamless Integration of Online Services
                                  in the Oberon Document System  . . . . . 366


Lecture Notes in Computer Science
Volume 1205, 1997

             M. Bro-Nielsen and   
                 C. Gramkow and   
                    S. Kreiborg   Non-rigid image registration using bone
                                  growth model . . . . . . . . . . . . . . 3
                J. Declerck and   
                 J. Feldmar and   
                      N. Ayache   Definition of a $4$D continuous polar
                                  transformation for the tracking and the
                                  analysis of LV motion  . . . . . . . . . 33
                T. N. Jones and   
                  D. N. Metaxas   Segmentation using deformable models
                                  with affinity-based localization . . . . 53
                  J. C. Gee and   
               D. R. Haynor and   
              L. Le Briquer and   
                   R. K. Bajcsy   Advances in elastic matching theory and
                                  its implementation . . . . . . . . . . . 63
                 J. J. Jacq and   
                        C. Roux   Automatic detection of articular
                                  surfaces in $3$D image through minimal
                                  subset random sampling . . . . . . . . . 73
                  H. Delingette   Decimation of iso-surfaces with
                                  deformable models  . . . . . . . . . . . 83
                    U. Bite and   
                P. Yugueros and   
                S. TerKonda and   
                     D. D'Souza   Comparative estimation of orbital three
                                  dimensional CT measurements utilizing
                                  ANALYZE[TM]  . . . . . . . . . . . . . . 93
                 A. Hamadeh and   
                     P. Cinquin   Kinematic study of lumbar spine using
                                  functional radiographies and $3$D/$2$D
                                  registration . . . . . . . . . . . . . . 109
                   J. Weese and   
                T. M. Buzug and   
                  C. Lorenz and   
                   C. Fassnacht   An approach to $2$D/$3$D registration of
                                  a vertebra in $2$D X-ray fluoroscopies
                                  with $3$D CT images  . . . . . . . . . . 119
                 Y. Feldmar and   
               G. Malandain and   
                  N. Ayache and   
             S. Fernandez-Vidal   Matching $3$D MR angiography data and
                                  $2$D X-ray angiograms  . . . . . . . . . 129
                R. E. Ellis and   
                D. J. Fleet and   
               J. T. Bryant and   
                       J. Rudan   A method for evaluating CT-based
                                  surgical registration  . . . . . . . . . 141
                    J. West and   
          J. M. Fitzpatrick and   
                 M. Y. Wang and   
                   B. M. Dawant   Retrospective intermodality registration
                                  techniques: surface-based versus
                                  volume-based . . . . . . . . . . . . . . 151
                 M. Bro-Nielsen   Rigid registration of CT, MR and
                                  cryosection images using a GLCM
                                  framework  . . . . . . . . . . . . . . . 171
                A. Bhalerao and   
               C.-F. Westin and   
                     R. Kikinis   Unwrapping phase in $3$D MR phase
                                  contrast angiograms  . . . . . . . . . . 193
                T. M. Buzug and   
                   J. Weese and   
               C. Fassnacht and   
                      C. Lorenz   Image registration: convex weighting
                                  functions for histogram-based similarity
                                  measures . . . . . . . . . . . . . . . . 203
                   V. Juhan and   
                B. Nazarian and   
                 K. Malkani and   
                       R. Bulot   Geometrical modeling of abdominal aortic
                                  aneurysms  . . . . . . . . . . . . . . . 243
                     T. Berlage   Augmented reality for diagnosis based on
                                  ultrasound images  . . . . . . . . . . . 253
             G. Champleboux and   
                       D. Henry   Parametric two-dimensional B-spline
                                  representation of vein and artery from
                                  2.5D echography used to aid virtual
                                  echography . . . . . . . . . . . . . . . 263
                O. Chavanon and   
                   C. Barbe and   
                 J. Troccaz and   
                      L. Carrat   Computer-ASsisted PERicardial punctures:
                                  animal feasability study . . . . . . . . 285
                 A. Bzostek and   
               S. Schreiner and   
               A. C. Barnes and   
                  J. A. Cadeddu   An automated system for precise
                                  percutaneous access of the renal
                                  collecting system  . . . . . . . . . . . 299
                 L. M. Auer and   
                    D. Auer and   
                J. F. Knoplioch   Virtual endoscopy for planning and
                                  simulation of minimally invasive
                                  neurosurgery . . . . . . . . . . . . . . 315
              T. M. Gorodia and   
               R. H. Taylor and   
                     L. M. Auer   Robot-assisted minimally invasive
                                  neurosurgical procedures: first
                                  experimental experience  . . . . . . . . 319
                  K. Darabi and   
             K. D. M. Resch and   
                 J. Weinert and   
                  U. Jendrysiak   Real and simulated endoscopy of
                                  neurosurgical approaches in an
                                  anatomical model . . . . . . . . . . . . 323
                  R. Hauser and   
              B. Westermann and   
                      R. Probst   Non-invasive $3$D patient registration
                                  for image-guided intranasal surgery ---
                                  experimental and clinical results  . . . 327
            M. E. Bellemare and   
                 P. Haigron and   
                J. L. Coatrieux   Toward an active three dimensional
                                  navigation system in medical imaging . . 337
               A.-C. Jambon and   
                  P. Dubois and   
                       S. Karpf   A low-cost training simulator for
                                  initial formation in gynecologic
                                  laparoscopy  . . . . . . . . . . . . . . 347
                  G.-Q. Wei and   
                  K. Arbter and   
                   G. Hirzinger   Automatic tracking of laparoscopic
                                  instruments by color coding  . . . . . . 357
                  S. Gibson and   
                 J. Samosky and   
                     A. Mor and   
                       C. Fyock   Simulating arthroscopic knee surgery
                                  using volumetric object representations,
                                  real-time volume rendering and haptic
                                  feedback . . . . . . . . . . . . . . . . 369
                    J. Kaye and   
              D. N. Metaxas and   
                 F. P. Primiano   A $3$D virtual environment for modeling
                                  mechanical cardiopulmonary interactions  389
               J. W. Berger and   
             M. E. Leventon and   
                    N. Hata and   
                       W. Wells   Design considerations for a
                                  computer-vision-enabled ophthalmic
                                  augmented reality environment  . . . . . 399
                    I. Bricault   A fast morphology-based registration ---
                                  application to computer-assisted
                                  bronchoscopy . . . . . . . . . . . . . . 417
              D. L. G. Hill and   
               C. R. Maurer and   
                 M. Y. Wang and   
                 R. J. Maciunas   Estimation of intraoperative brain
                                  surface movement . . . . . . . . . . . . 449
              R. D. Bucholz and   
                  D. D. Yeh and   
                J. Trobaugh and   
                L. L. McDurmont   The correction of stereotactic
                                  inaccuracy caused by brain shift using
                                  an intraoperative ultrasound device  . . 459
             G. J. Ettinger and   
             M. E. Leventon and   
           W. E. L. Grimson and   
                     R. Kikinis   Experimentation with a transcranial
                                  magnetic stimulation system for
                                  functional brain mapping . . . . . . . . 477
                V. Bouchard and   
                 P. Cinquin and   
                  L. Desbat and   
     A. François Joubert   A priori registration of SPECT
                                  projections and MR/CT images for SPECT
                                  reconstruction improvement . . . . . . . 491
        A. C. F. Colchester and   
                    J. Zhao and   
                 N. Dorward and   
                      G. Subsol   Comparison of phantom target
                                  localization by frame-based stereotaxy
                                  and using the VISLAN system  . . . . . . 501
                   G. Alusi and   
                  A. C. Tan and   
               A. D. Linney and   
                       K. Raoof   Three dimensional tracking with
                                  ultrasound for augmented reality
                                  applications in skull base surgery . . . 511
                 N. Glossop and   
                          R. Hu   Effects of tracking adjacent vertebral
                                  bodies during image guided pedicle screw
                                  surgery  . . . . . . . . . . . . . . . . 531
                   A. Bauer and   
                 M. Boerner and   
                      A. Lahmer   Robodoc --- animal experiment and
                                  clinical evaluation  . . . . . . . . . . 561
               D. M. Kahler and   
                        R. Zura   Evaluation of a computer integrated
                                  surgical technique for percutaneous
                                  fixation of transverse acetabular
                                  fractures  . . . . . . . . . . . . . . . 565
                 B. Jaramaz and   
                   C. Nikou and   
                D. A. Simon and   
                  A. M. DiGioia   Range of motion after total hip
                                  arthroplasty: experimental verification
                                  of the analytical simulator  . . . . . . 573
                      R. Hu and   
                 N. Glossop and   
                  D. Steven and   
                      J. Randle   Accuracy of image guided placement of
                                  iliosacral lag screws  . . . . . . . . . 593
                    J. Gong and   
                R. Baechler and   
                    M. Sati and   
                    L.-P. Nolte   Restricted surface matching: a new
                                  approach to registration in computer
                                  assisted surgery . . . . . . . . . . . . 597
                   M. Fadda and   
                D. Bertelli and   
                S. Martelli and   
                    M. Marcacci   Computer assisted planning for total
                                  knee arthroplasty  . . . . . . . . . . . 619
                S. A. Banks and   
                A. Z. Banks and   
              T. V. S. Klos and   
                     F. F. Cook   A simple fluoroscopy based technique for
                                  assessing $3$D knee kinematics before,
                                  during, and after surgery  . . . . . . . 639
              P.-Y. Bondiau and   
                   G. Malandain   Eye reconstruction and CT-retinography
                                  fusion for proton treatment planning of
                                  ocular diseases  . . . . . . . . . . . . 705
                   S. Erbse and   
             K. Radermacher and   
                   M. Anton and   
                         G. Rau   Development of an automatic surgical
                                  holding system based on ergonomic
                                  analysis . . . . . . . . . . . . . . . . 737
               S. J. Harris and   
                  W. J. Lin and   
                  K. L. Fan and   
                  R. D. Hibberd   Experiences with robotic systems for
                                  knee surgery . . . . . . . . . . . . . . 757
                  G. Brandt and   
             K. Radermacher and   
                S. Lavallee and   
                  H.-W. Staudte   A compact robot for image-guided
                                  orthopedic surgery: concept and
                                  preliminary results  . . . . . . . . . . 767
             M. C. Carrozza and   
                L. Lencioni and   
                 B. Magnani and   
                 S. D'Attanasio   The development of a microrobot system
                                  for colonoscopy  . . . . . . . . . . . . 779
              W. Freysinger and   
               M. J. Truppe and   
               A. R. Gunkel and   
                 W. L. Thumfart   Interactive telepresence and augmented
                                  reality in ENT surgery: interventional
                                  video tomography . . . . . . . . . . . . 817


Lecture Notes in Computer Science
Volume 1206, 1997

                 D. E. Benn and   
                M. S. Nixon and   
                   J. N. Carter   Robust Eye Centre Extraction Using the
                                  Hough Transform  . . . . . . . . . . . . 3
                 K. N. Choi and   
             A. D. J. Cross and   
                  E. R. Hancock   Localising Facial Features with Matched
                                  Filters  . . . . . . . . . . . . . . . . 11
                 S. Fischer and   
                         B. Duc   Shape Normalisation for Face Recognition 21
                C. Kervrann and   
                 F. Davoine and   
                   P. Perez and   
                          H. Li   Generalized Likelihood Ratio-based Face
                                  Detection and Extraction of Mouth
                                  Features . . . . . . . . . . . . . . . . 27
                 T. Coianiz and   
                   L. Torresani   Analysis and Encoding of Lip Movements   53
                H. Wechsler and   
                  V. Kakkad and   
                   J. Huang and   
                       S. Gutta   Automatic Video-based Person
                                  Authentication Using the RBF Network . . 85
                  D. Cunado and   
                M. S. Nixon and   
                   J. N. Carter   Using Gait as a Biometric, via
                                  Phase-weighted Magnitude Spectra . . . . 95
                    L. Hong and   
                    A. Jain and   
                S. Pankanti and   
                       R. Bolle   Identity Authentication Using
                                  Fingerprints . . . . . . . . . . . . . . 103
                  K. Etemad and   
                   R. Chellappa   Discriminant Analysis for Recognition of
                                  Human Face Images  . . . . . . . . . . . 127
                 C. Beumier and   
                     M. Acheroy   Automatic Profile Identification . . . . 145
                     Y. Dai and   
                      Y. Nakano   Recognition of Facial Images with Low
                                  Resolution Using a Hopfield Memory Model 153
                 A. Gebhart and   
                      T. Eppler   Exclusion of Photos and New Segmentation
                                  Algorithms for the Automatic Face
                                  Recognition  . . . . . . . . . . . . . . 161
                L. Besacier and   
                 J.-F. Bonastre   Subband Approach for Automatic Speaker
                                  Recognition: Optimal Division of the
                                  Frequency Domain . . . . . . . . . . . . 195
                 D. Charlet and   
                      D. Jouvet   Optimizing Feature Set for Speaker
                                  Verification . . . . . . . . . . . . . . 203
                R. A. Finan and   
              A. T. Sapeluk and   
                   R. I. Damper   VQ Score Normalisation for
                                  Text-dependent and Text-independent
                                  Speaker Recognition  . . . . . . . . . . 211
                       S. Furui   Recent Advances in Speaker Recognition   237
                S. Hayakawa and   
                  K. Takeda and   
                     F. Itakura   Speaker Identification Using Harmonic
                                  Structure of LP-residual Spectrum  . . . 253
                L. E. Julia and   
                 L. P. Heck and   
                   A. J. Cheyer   A Speaker Identification Agent . . . . . 261
               E. S. Biguen and   
                  J. Biguen and   
                     B. Duc and   
                     S. Fischer   Expert Conciliation for Multi Modal
                                  Person Authentication Systems by
                                  Bayesian Statistics  . . . . . . . . . . 291
               U. Dieckmann and   
          P. Plankensteiner and   
             R. Schamburger and   
                      B. Froeba   SESAM: A Biometric Person Identification
                                  System Using Sensor Fusion . . . . . . . 301
                     B. Duc and   
                  G. Maitre and   
                 S. Fischer and   
                       J. Bigun   Person Authentication by Fusing Face and
                                  Speech Information . . . . . . . . . . . 311
                 P. Jourlin and   
                 J. Luettin and   
                  D. Genoud and   
                     H. Wassner   Acoustic-labial Speaker Verification . . 319
              C. B. Bargale and   
               S. Chaudhuri and   
               P. Bhattacharyya   Development of an Audio-visual Database
                                  System for Human Identification  . . . . 345
                 F. Davoine and   
                      H. Li and   
                 R. Forchheimer   Video Compression and Person
                                  Authentication . . . . . . . . . . . . . 353
                     M. Doi and   
                    Q. Chen and   
                    K. Sato and   
                     K. Chihara   Lock-control System Using Face
                                  Identification . . . . . . . . . . . . . 361
              D. Ferralasco and   
                 R. Ferrari and   
                  M. Tistarelli   A System for Automatic Face Recognition  369
               M. H. George and   
                     R. A. King   Time Encoded Signal Processing and
                                  Recognition for Reduced Data, High
                                  Performance Speaker Verification
                                  Architectures  . . . . . . . . . . . . . 377
                   D. James and   
               H.-P. Hutter and   
                      F. Bimbot   The CAVE Speaker Verification Project
                                  --- Experiments on the YOHO and SESP
                                  Corpora  . . . . . . . . . . . . . . . . 385


Lecture Notes in Computer Science
Volume 1207, 1997

                I. J. Hayes and   
              R. G. Nickson and   
                 P. A. Strooper   Refining Specifications to Logic
                                  Programs . . . . . . . . . . . . . . . . 1
                L. Fribourg and   
                  J. Richardson   Symbolic Verification with Gap-Order
                                  Constraints  . . . . . . . . . . . . . . 20
                 A. Cortesi and   
             B. Le Charlier and   
                       S. Rossi   Specification-Based Automatic
                                  Verification of Prolog Programs  . . . . 38
              J. Joergensen and   
                M. Leuschel and   
                     B. Martens   Conjunctive Partial Deduction in
                                  Practice . . . . . . . . . . . . . . . . 59
                   A. Bossi and   
                       N. Cocco   Replacement Can Preserve Termination . . 104
                  J. Brunekreef   A Transformation Tool for Pure Prolog
                                  Programs . . . . . . . . . . . . . . . . 130
                L. Fribourg and   
                       H. Olsen   Reductions of Petri Nets and Unfolding
                                  of Propositional Logic Programs  . . . . 187
                   F. Benoy and   
                        A. King   Inferring Argument Size Relationships
                                  with CLP(R)  . . . . . . . . . . . . . . 204
            T. S. Gegg-Harrison   Extensible Logic Program Schemata  . . . 256
                   A. Brogi and   
                    S. Contiero   Specialising Meta-Level Compositions of
                                  Logic Programs . . . . . . . . . . . . . 275
                 P. M. Dung and   
             R. A. Kowalski and   
                        F. Toni   Synthesis of Proof Procedures for
                                  Default Reasoning  . . . . . . . . . . . 313


Lecture Notes in Computer Science
Volume 1208, 1997

                     M. Warmuth   Sample compression, learnability, and
                                  the Vapnik--Chervonenkis dimension . . . 1
                  A. Beimel and   
                 E. Kushilevitz   Learning boxes in high dimension . . . . 3
                D. Guijarro and   
                   V. Lavin and   
                    V. Raghavan   Learning monotone term decision lists    16
              N. H. Bshouty and   
                   C. Tamon and   
                   D. K. Wilson   Learning matrix functions over rings . . 27
                  Y. Freund and   
                     Y. Mansour   Learning under persistent drift  . . . . 109
            N. Cesa-Bianchi and   
                 P. Fischer and   
                  E. Shamir and   
                    H. U. Simon   Randomized hypotheses and minimum
                                  disagreement hypotheses for learning
                                  with noise . . . . . . . . . . . . . . . 119
                D. Helmbold and   
                    S. Kwek and   
                        L. Pitt   Learning when to trust which experts . . 134
               F. Bergadano and   
              N. H. Bshouty and   
                   C. Tamon and   
                  S. Varricchio   On learning branching programs and small
                                  depth circuits . . . . . . . . . . . . . 150
                  J. Castro and   
                D. Guijarro and   
                       V. Lavin   Learning nearly monotone $k$-term DNF    162
                  A. Birkendorf   On fast and simple algorithms for
                                  finding maximal subarrays and
                                  applications in learning theory  . . . . 198
                P. Bartlett and   
                  T. Linder and   
                      G. Lugosi   A minimax lower bound for empirical
                                  quantizer design . . . . . . . . . . . . 210
                     L. Gurvits   Linear algebraic proofs of VC-dimension
                                  based inequalities . . . . . . . . . . . 238
                  J. Baxter and   
                    P. Bartlett   A result relating convex $n$-widths to
                                  covering numbers with some applications
                                  to neural networks . . . . . . . . . . . 251
                J. Barzdins and   
               R. Freivalds and   
                    C. H. Smith   Learning formulae from elementary facts  272
                    J. Case and   
                    S. Jain and   
                       M. Suraj   Control structures in hypothesis spaces:
                                  the influence on learning  . . . . . . . 286
                A. Ambainis and   
                    S. Jain and   
                      A. Sharma   Ordinal mind change complexity of
                                  language identification  . . . . . . . . 301
                S. Kaufmann and   
                     F. Stephan   Robust learning with infinite additional
                                  information  . . . . . . . . . . . . . . 316


Lecture Notes in Computer Science
Volume 1209, 1997

              S. Cranefield and   
                      M. Purvis   An Agent-Based Architecture for Software
                                  Tool Coordination  . . . . . . . . . . . 44
                    J. Bell and   
                       Z. Huang   Dynamic Goal Hierarchies . . . . . . . . 88
                 L. Cavedon and   
                     A. Rao and   
                      G. Tidhar   Social and Individual Commitment . . . . 152
                   M. Clark and   
                   K. Irwig and   
                      W. Wobcke   Emergent Properties of Teams of Agents
                                  in the Tileworld . . . . . . . . . . . . 164
                         A. Ito   How do Autonomous Agents Solve Social
                                  Dilemmas?  . . . . . . . . . . . . . . . 177


Lecture Notes in Computer Science
Volume 1210, 1997

                       Y. Akama   A lambda-to-CL translation for strong
                                  normalization  . . . . . . . . . . . . . 1
                   G. Belle and   
                       E. Moggi   Typed intermediate languages for shape
                                  analysis . . . . . . . . . . . . . . . . 11
                 S. Berardi and   
                      L. Boerio   Minimum information code in a pure
                                  functional language with data types  . . 30
                    V. Bono and   
                    M. Bugliesi   Matching constraints for the lambda
                                  calculus of objects  . . . . . . . . . . 46
                  M. Brandt and   
                    F. Henglein   Coinductive axiomatization of recursive
                                  type equality and subtyping  . . . . . . 63
                    T. Brauener   A simple adequate categorical model for
                                  PCF  . . . . . . . . . . . . . . . . . . 82
                 A. Bucciarelli   Logical reconstruction of bi-domains . . 99
                     J. Courant   A module calculus for Pure Type Systems  112
                 F. Damiani and   
                    P. Giannini   An inference algorithm for strictness    129
              J. Despeyroux and   
                F. Pfenning and   
                  C. Schuermann   Primitive recursion for higher-order
                                  abstract syntax  . . . . . . . . . . . . 147
                       N. Ghani   Eta-expansions in dependent type theory
                                  --- the calculus of constructions  . . . 164
                S. Guerrini and   
                 S. Martini and   
                      A. Masini   Proof nets, garbage, and computations    181
                    M. Hasegawa   Recursion from cyclic sharing: traced
                                  monoidal categories and models of cyclic
                                  lambda calculi . . . . . . . . . . . . . 196
                    H. Herbelin   Games and weak-head reduction for
                                  classical PCF  . . . . . . . . . . . . . 214
                          H. Xi   Weak and strong beta normalisations in
                                  typed lambda-calculi . . . . . . . . . . 390


Lecture Notes in Computer Science
Volume 1211, 1997

                     J. Fox and   
                   N. Johns and   
                 A. Rahmanzadeh   Protocols for Medical Procedures and
                                  Therapies: A Provisional Description of
                                  the PROforma Language and Tools  . . . . 21
              B. De Carolis and   
                  G. Rumolo and   
                     V. Cavallo   User-Adapted Multimedia Explanations in
                                  a Clinical Guidelines Consultation
                                  System . . . . . . . . . . . . . . . . . 62
                  C. Gordon and   
                 P. Johnson and   
                   C. Waite and   
                      M. Veloso   Algorithm and Care Pathway: Clinical
                                  Guidelines and Healthcare Processes  . . 66
                   B. Zupan and   
                    S. Dzeroski   Acquiring and Validating Background
                                  Knowledge for Machine Learning Using
                                  Function Decomposition . . . . . . . . . 86
                S. Dzeroski and   
                G. Potamias and   
               V. Moustakis and   
                   G. Charissis   Automated Revision of Expert Rules for
                                  Treating Acute Abdominal Pain in
                                  Children . . . . . . . . . . . . . . . . 98
           J. P. Du Plessis and   
                   C. J. Tolmie   Knowledge Acquisition by the Domain
                                  Expert Using the Tool HEMATOOL . . . . . 122
                   I. Zelic and   
               I. Kononenko and   
                  N. Lavrac and   
                        V. Vuga   Machine Learning Applied to Diagnosis of
                                  Sport Injuries . . . . . . . . . . . . . 138
              B. Cremilleux and   
                      C. Robert   A Theoretical Framework for Decision
                                  Trees in Uncertain Domains: Application
                                  to Medical Data Sets . . . . . . . . . . 145
                 G. Bologna and   
                    A. Rida and   
                  C. Pellegrini   Intelligent Assistance for Coronary
                                  Heart Disease Diagnosis: A Comparison
                                  Study  . . . . . . . . . . . . . . . . . 199
            A. Geissbuehler and   
               R. A. Miller and   
                    W. W. Stead   The Clinical Spectrum of
                                  Decision-Support in Oncology with a Case
                                  Report of a Real World System  . . . . . 235
              M.-C. Jaulent and   
                C. Le Bozec and   
                E. Zapletal and   
                    P. Degoulet   A Case-Based Reasoning Method for
                                  Computer-Assisted Diagnosis in
                                  Histopathology . . . . . . . . . . . . . 239
                    J. Cruz and   
                    P. Barahona   A Causal-Functional Model Applied to EMG
                                  Diagnosis  . . . . . . . . . . . . . . . 249
                G. Zahlmann and   
                  M. Scherf and   
                      A. Wegner   A Neuro-Fuzzy-Classifier for a
                                  Knowledge-Based Glaucoma Monitor . . . . 273
                  M. Hauskrecht   Dynamic Decision Making in Stochastic
                                  Partially Observable Medical Domains:
                                  Ischemic Heart Disease Example . . . . . 296
                D. Ziebelin and   
                        A. Vila   Metrical Planning Environment  . . . . . 343
                F. De Rosis and   
                  F. Grasso and   
                    D. C. Berry   Strengthening Argumentation in Medical
                                  Explanations by Text Plan Revision . . . 349
               J. C. Wagner and   
                   C. Lovis and   
                 R. H. Baud and   
                 J.-R. Scherrer   Medical Concept Systems, Lexicons and
                                  Natural Language Generation  . . . . . . 398
                 N. Bianchi and   
                 P. Bottoni and   
                  C. Garbay and   
                      P. Mussio   Distributed Plan Construction and
                                  Execution for Medical Image
                                  Interpretation . . . . . . . . . . . . . 405
                J.-P. Draye and   
                  G. Cheron and   
                 D. Pavisic and   
                      G. Libert   Improved Identification of the Human
                                  Shoulder Kinematics with Muscle
                                  Biological Filters . . . . . . . . . . . 417
                 A. Boucher and   
                   A. Doisy and   
                   X. Ronot and   
                      C. Garbay   A Society of Goal-Oriented Agents for
                                  the Analysis of Living Cells . . . . . . 429
                  B. Gibaud and   
                S. Garlatti and   
                C. Barillot and   
                       E. Faure   Methodology for the Design of Digital
                                  Brain Atlases  . . . . . . . . . . . . . 441
                   D. Cosic and   
                    S. Loncaric   Rule-Based Labeling of CT Head Image . . 453
                    T. Derr and   
                     T. Els and   
                 M. Gyngell and   
                   D. Leibfritz   Characterisation of Tumorous Tissue in
                                  Rat Brain by in Vitro Magnetic Resonance
                                  Spectroscopy and Artificial Neural
                                  Networks . . . . . . . . . . . . . . . . 457
           E. Christodoulou and   
                 E. T. Keravnou   Meta-Level Learning in a Hybrid
                                  Knowledge-Based Architecture . . . . . . 467
                R. Bellazzi and   
                   L. Ironi and   
             R. Guglielmann and   
                  M. Stefanelli   Learning from Data Through the
                                  Integration of Qualitative Models and
                                  Fuzzy Systems  . . . . . . . . . . . . . 501
                    M. Bull and   
                   G. Kundt and   
                       L. Gierl   Case-Based Reasoning and Statistics for
                                  Discovering and Forecasting of Epidemics 513


Lecture Notes in Computer Science
Volume 1212, 1997

                C. L. Heitmeyer   Formal Methods: A Panacea or Academic
                                  Poppycock? . . . . . . . . . . . . . . . 3
               M. A. Hewitt and   
           C. M. O'Halloran and   
                  C. T. Sennett   Experiences with PiZA, an Animator for Z 37
                   S. Helke and   
               T. Neustupny and   
                      T. Santen   Automating Test Case Generation from Z
                                  Specifications with Isabelle . . . . . . 52
                     J. A. Hall   Taking Z Seriously . . . . . . . . . . . 89
                  K. Achatz and   
                     W. Schulte   A Formal OO Method Inspired by Fusion
                                  and Object-Z . . . . . . . . . . . . . . 92
                    J. Hall and   
                      A. Martin   W Reconstructed  . . . . . . . . . . . . 115
                 E. Boerger and   
                    S. Mazzanti   A Practical Method for Rigorously
                                  Controllable Hardware Design . . . . . . 151
                      M. Butler   An Approach to the Design of Distributed
                                  Systems with B AMN . . . . . . . . . . . 223
                    A. S. Evans   An Improved Recipe for Specifying
                                  Reactive Systems in Z  . . . . . . . . . 275
               M. D'Inverno and   
                          M. Hu   A Z Specification of the Soft-Link
                                  Hypertext Model  . . . . . . . . . . . . 297
                   J. Jacky and   
                   J. Unger and   
                 M. Patrick and   
                        D. Reid   Experience with Z Developing a Control
                                  Program for a Radiation Therapy Machine  317
              P. Ciancarini and   
                     C. Mascolo   Analyzing and Refining an Architectural
                                  Style  . . . . . . . . . . . . . . . . . 349
                 J. Derrick and   
                  E. Boiten and   
                  H. Bowman and   
                       M. Steen   Weak Refinement in Z . . . . . . . . . . 369
                    J. P. Bowen   Select Z Bibliography  . . . . . . . . . 391
                    J. P. Bowen   Comp.specification.z and Z FORUM
                                  Frequently Asked Questions . . . . . . . 425


Lecture Notes in Computer Science
Volume 1213, 1997

                    M. W. Davis   Complexity Formalisms, Order and
                                  Disorder in the Structure of Art . . . . 3
                   A. Imada and   
                       K. Araki   Searching Real-Valued Synaptic Weights
                                  of Hopfield's Associative Memory Using
                                  Evolutionary Programming . . . . . . . . 13
                    G. B. Fogel   The Application of Evolutionary
                                  Computation to Selected Problems in
                                  Molecular Biology  . . . . . . . . . . . 23
                   C. Clack and   
                          T. Yu   Performance-Enhanced Genetic Programming 87
                 P. J. Angeline   Comparing Subtree Crossover with
                                  Macromutation  . . . . . . . . . . . . . 101
                 S.-H. Chen and   
                       C.-H Yeh   Modeling Speculators with Genetic
                                  Programming  . . . . . . . . . . . . . . 137
                     X. Yao and   
                         Y. Liu   Fast Evolution Strategies  . . . . . . . 151
                D. Delahaye and   
                    A. R. Odoni   Airspace Congestion Smoothing by
                                  Stochastic Optimization  . . . . . . . . 163
                  G. Dozier and   
                   J. Bowen and   
                A. Homaifar and   
                   A. Esterline   Solving Static and Dynamic Fuzzy
                                  Constraint Networks Using Evolutionary
                                  Hill-Climbing  . . . . . . . . . . . . . 189
                 J.-M. Yang and   
                 Y.-P. Chen and   
                J.-T. Horng and   
                      C.-Y. Kao   Applying Family Competition to Evolution
                                  Strategies for Constrained Optimization  201
                B. S. Hadad and   
                     C. F. Eick   Supporting Polyploidy in Genetic
                                  Algorithms Using Dominance Vectors . . . 223
                H.-G. Beyer and   
                    D. B. Fogel   A Note on the Escape Probabilities for
                                  Two Alternative Methods of Selection
                                  Under Gaussian Mutation  . . . . . . . . 265
                  T. M. English   Some Geometric and Algebraic Results on
                                  Crossover  . . . . . . . . . . . . . . . 285
                     X. Yao and   
                     G. Lin and   
                         Y. Liu   An Analysis of Evolutionary Algorithms
                                  Based on Neighborhood and Step Sizes . . 297
                 P. J. Angeline   Tracking Extrema in Dynamic Environments 335
             K. Chellapilla and   
                    D. B. Fogel   Exploring Self-Adaptive Methods to
                                  Improve the Efficiency of Generating
                                  Approximate Solutions to Traveling
                                  Salesman Problems Using Evolutionary
                                  Programming  . . . . . . . . . . . . . . 361
             K. Chellapilla and   
                D. B. Fogel and   
                      S. S. Rao   Gaining Insight into Evolutionary
                                  Programming Through Landscape
                                  Visualization: An Investigation into IIR
                                  Filtering  . . . . . . . . . . . . . . . 407


Lecture Notes in Computer Science
Volume 1214, 1997

                       C. Boehm   Theoretical Computer Science and
                                  Software Science: The Past, the Present
                                  and the Future . . . . . . . . . . . . . 3
                   H. Ehrig and   
                        B. Mahr   Future Trends of TAPSOFT . . . . . . . . 6
                A. Bouhoula and   
            J.-P. Jouannaud and   
                    J. Meseguer   Specification and Proof in Membership
                                  Equational Logic . . . . . . . . . . . . 67
               E. Astesiano and   
                      G. Reggio   Formalism and Method . . . . . . . . . . 93
                  T. Yamada and   
                J. Avenhaus and   
             C. Loria-Saenz and   
                  A. Middeldorp   Logicality of Conditional Rewrite
                                  Systems  . . . . . . . . . . . . . . . . 141
                I. Biermann and   
                       B. Rozoy   Reliable Generalized and Context
                                  Dependent Commutation Relations  . . . . 165
                   Y. Andre and   
                      F. Bossut   Word-into-Trees Transducers with Bounded
                                  Difference . . . . . . . . . . . . . . . 177
              E. A. Emerson and   
                  R. J. Trefler   Generalized Quantitative Temporal
                                  Reasoning: An Automata-Theoretic
                                  Approach . . . . . . . . . . . . . . . . 189
               D. Beauquier and   
                   A. Slissenko   The Railroad Crossing Problem: Towards
                                  Semantics of Timed Algorithms and Their
                                  Model-Checking in High-Level Languages   201--212
                 J. M. Ilie and   
                       K. Ajami   Model Checking Through Symbolic
                                  Reachability Graph . . . . . . . . . . . 213
                    E. Goubault   Optimal Implementation of Wait-Free
                                  Binary Relations . . . . . . . . . . . . 225
                   A. Geser and   
              A. Middeldorp and   
                E. Ohlebush and   
                     H. Zantema   Relative Undecidability in the
                                  Termination Hierarchy of Single Rewrite
                                  Rules  . . . . . . . . . . . . . . . . . 237
                   T. Genet and   
                     I. Gnaedig   Termination Proofs Using gpo Ordering
                                  Constraints  . . . . . . . . . . . . . . 249
                    T. Arts and   
                       J. Giesl   Automatically Proving Termination Where
                                  Simplification Orderings Fail  . . . . . 261
                M. Baldamus and   
                      J. Dingel   Modal Characterization of Weak
                                  Bisimulation for Higher-Order Processes  285
                 A. Amaniss and   
                 M. Hermann and   
                      D. Lugiez   Set Operations for Recurrent Term
                                  Schematizations  . . . . . . . . . . . . 333
          P. Arenas-Sanchez and   
          M. Rodriguez-Artalejo   A Semantic Framework for Functional
                                  Logic Programming with Algebraic
                                  Polymorphic Types  . . . . . . . . . . . 453
                    V. Bono and   
                M. Bugliesi and   
      M. Dezani-Ciancaglini and   
                     L. Liquori   Subtyping Constraints for Incomplete
                                  Objects  . . . . . . . . . . . . . . . . 465
                  F. Alessi and   
                  P. Baldan and   
                     F. Honsell   Partializing Stone Spaces Using SFP
                                  Domains  . . . . . . . . . . . . . . . . 478
             J. L. Fiadeiro and   
                       A. Lopes   Semantics of Architectural Connectors    505
             H. R. Andersen and   
              J. Staunstrup and   
                     N. Maretti   A Comparison of Modular Verification
                                  Techniques . . . . . . . . . . . . . . . 550
                 D. Volpano and   
                       G. Smith   A Type-Based Approach to Program
                                  Security . . . . . . . . . . . . . . . . 607
                     J. Courant   An Applicative Module Calculus . . . . . 622
                    P. Iyer and   
                   M. Narasimha   Probabilistic Lossy Channel Systems  . . 667
                   M. Abadi and   
                 K. R. M. Leino   A Logic of Object-Oriented Programs  . . 682
               R. De Nicola and   
                 G. Ferrari and   
                    R. Pugliese   Locality Based Linda: Programming with
                                  Explicit Localities  . . . . . . . . . . 712
                J. B. Wells and   
                  A. Dimock and   
                  R. Muller and   
                      F. Turbak   A Typed Intermediate Language for
                                  Flow-Directed Compilation  . . . . . . . 757
                      B. Jacobs   Behaviour-Refinement of Coalgebraic
                                  Specifications with Coinductive
                                  Correctness Proofs . . . . . . . . . . . 787
                 S. Bonnier and   
                       T. Heyer   COMPASS: A Comprehensible Assertion
                                  Method . . . . . . . . . . . . . . . . . 803
                  M. Heisel and   
                        N. Levy   Using LOTOS Patterns to Characterize
                                  Architectural Styles . . . . . . . . . . 818
                    M. R. Donat   Automating Formal Specification-Based
                                  Testing  . . . . . . . . . . . . . . . . 833
            F. W. Von Henke and   
                  M. Luther and   
                    M. Strecker   Typelab: An Environment for Modular
                                  Program Development  . . . . . . . . . . 851
                 K. Didrich and   
                       T. Klein   DOSFOP --- A Documentation Tool for the
                                  Algebraic Programming Language Opal  . . 875
                       P. Caron   AG: A Set of Maple Packages for Symbolic
                                  Computing of Automata and Semigroups . . 879


Lecture Notes in Computer Science
Volume 1215, 1997

                   D. M. Falcao   High Performance Computing in Power
                                  System Applications  . . . . . . . . . . 1
                J. Dongarra and   
                  S. Browne and   
                    H. Casanova   Providing Access to High Performance
                                  Computing Technologies . . . . . . . . . 24--34
                  D. Coltuc and   
                   J.-M. Becker   Scan-Directional Architectures . . . . . 35
             J.-L. Dekeyser and   
                B. Kokoszko and   
              J.-L. Levaire and   
                     P. Marquet   Irregular Data-Parallel Objects in C++   65
                J. C. Alves and   
                    A. Puga and   
              L. Corte-Real and   
                    J. S. Matos   ProHos-1: A Vector Processor for the
                                  Efficient Estimation of Higher-Order
                                  Moments  . . . . . . . . . . . . . . . . 96
                M. J. Dayde and   
                     I. S. Duff   The Use of Computational Kernels in Full
                                  and Sparse Linear Solvers, Efficient
                                  Code Design on High-Performance RISC
                                  Processors . . . . . . . . . . . . . . . 108--139
                   S. Domas and   
                     F. Tisseur   Parallel Implementation of a Symmetric
                                  Eigensolver Based on the Yau and Lu
                                  Method . . . . . . . . . . . . . . . . . 140
               J. I. Aliaga and   
               V. Hernandez and   
                    J. L. Perez   A Parallel Implementation of the General
                                  Lanczos Method on the Cray T3D . . . . . 168
               P. J. Coelho and   
               J. Goncalves and   
                        P. Novo   Parallelization of the
                                  Discrete-Ordinates Method: Two Different
                                  Approaches . . . . . . . . . . . . . . . 222
          L. M. R. Carvalho and   
              J. M. L. M. Palma   Parallelization of a CFD Code Using PVM
                                  and Domain Decomposition Techniques  . . 247
          F. Dias D'Almeida and   
              P. B. Vasconcelos   Preconditioners for Nonsymmetric Linear
                                  Systems in Domain Decomposition Applied
                                  to a Coupled Discretization of
                                  Navier--Stokes Equations . . . . . . . . 295
                 T. Calonge and   
                  L. Alonso and   
                   R. Ralha and   
                  A. L. Sanchez   Parallel Implementation of Non-recurrent
                                  Neural Networks  . . . . . . . . . . . . 313
               V. Hernandez and   
            E. S. Quintana-Orti   Stabilizing Large Control Linear Systems
                                  on Multicomputers  . . . . . . . . . . . 338
            J. C. Fernandez and   
         L. Peñalver and   
                M. Sobejano and   
                    J. Martinez   An Interface Based on Transputers to
                                  Simulate the Dynamic Equation of Robot
                                  Manipulators Using Parallel Computing    365
                D. B. Heras and   
            J. C. Cabaleiro and   
                  V. Blanco and   
                      P. Costas   Principal Component Analysis on Vector
                                  Computers  . . . . . . . . . . . . . . . 416


Lecture Notes in Computer Science
Volume 1216, 1997

                     J. Dix and   
              L. M. Peteira and   
                T. Przymusinski   Prolegomena to Logic Programming for
                                  Non-Monotonic Reasoning  . . . . . . . . 1
                     A. Bochman   On Logics and Semantics for General
                                  Logic Programs . . . . . . . . . . . . . 37
                    X. Wang and   
                  J.-H. You and   
                     L.-Y. Yuan   Nonmonotonic Reasoning by Monotonic
                                  Inferences + Priority Constraints  . . . 91
              J. J. Alferes and   
                  L. M. Pereira   Update-Programs Can Update Programs  . . 110
                 M. Baldoni and   
                L. Giordano and   
                A. Martelli and   
                       V. Patti   An Abductive Procedure for Reasoning
                                  about Actions in Modal LP  . . . . . . . 132
                  N. Bidoit and   
                     S. Maabout   Update Rule Programs Versus Revision
                                  Programs . . . . . . . . . . . . . . . . 151
                   S. Brass and   
                S. Zukowski and   
                     H. Freitag   Transformation-Based Bottom-Up
                                  Computation of the Well-Founded Model    171
                     J. Dix and   
                 F. Stolzenburg   Computation of Non-Ground Disjunctive
                                  Well-Founded Semantics with Constraint
                                  Logic Programming  . . . . . . . . . . . 202


Lecture Notes in Computer Science
Volume 1217, 1997

                       G. Berry   Hardware and Software Synthesis,
                                  Optimization, and Verification from
                                  Esterel Programs . . . . . . . . . . . . 1
               R. Drechsler and   
                  B. Becker and   
                    S. Ruppertz   Manipulation Algorithms for K0*BMDs  . . 4
              E. A. Emerson and   
                     S. Jha and   
                       D. Peled   Combining Partial Order and Symmetry
                                  Reductions . . . . . . . . . . . . . . . 19
             H. R. Andersen and   
              J. Staunstrup and   
                     N. Maretti   Partial Model Checking with ROBDDs . . . 35
                   B. Grahlmann   The Reference Component of PEP . . . . . 65
                  R. J. Boulton   A Tool to Support Formal Reasoning about
                                  Computer Languages . . . . . . . . . . . 81
           M. Von der Beeck and   
                   V. Braun and   
                 A. Classen and   
                   A. Dannecker   Graphs in METAFrame: The Unifying Power
                                  of Polymorphism  . . . . . . . . . . . . 112
                    P. Kelb and   
                T. Margaria and   
                 M. Mendler and   
                 C. Gsottberger   MOSEL: A Flexible Toolset for Monadic
                                  Second-Order Logic . . . . . . . . . . . 183
                      K. Jensen   A Brief Introduction to Coloured Petri
                                  Nets . . . . . . . . . . . . . . . . . . 203
             S. Christensen and   
           J. B. Joergensen and   
               L. M. Kristensen   Design/CPN --- A Computer Tool for
                                  Coloured Petri Nets  . . . . . . . . . . 209
            H. Ben-Abdallah and   
                        S. Leue   Syntactic Detection of Process
                                  Divergence and Non-local Choice in
                                  Message Sequence Charts  . . . . . . . . 259
                 G. Ferrari and   
                   G. Ferro and   
                   S. Gnesi and   
                   U. Montanari   An Automata Based Verification
                                  Environment for Mobile Processes . . . . 275
                B. Boigelot and   
                   P. Godefroid   Automatic Synthesis of Specifications
                                  from the Dynamic Observation of Reactive
                                  Programs . . . . . . . . . . . . . . . . 321
               L. De Alfaro and   
                   Z. Manna and   
                H. B. Sipma and   
                    T. E. Uribe   Visual Verification of Reactive Systems  334
                  A. Engels and   
                   L. Feijs and   
                        S. Mauw   Test Generation for Intelligent Networks
                                  Using Model Checking . . . . . . . . . . 384
            P. R. D'Argenio and   
               J.-P. Katoen and   
                 T. C. Ruys and   
                    J. Tretmans   The Bounded Retransmission Protocol Must
                                  Be on Time!  . . . . . . . . . . . . . . 416


Lecture Notes in Computer Science
Volume 1218, 1997

                     H. Bordihn   A Grammatical Approach to the LBA
                                  Problem  . . . . . . . . . . . . . . . . 1
                  H. Fernau and   
                      M. Holzer   Conditional Context-Free Languages of
                                  Finite Index . . . . . . . . . . . . . . 10
                P. R. J. Asveld   Controlled Fuzzy Parallel Rewriting  . . 49
                 P. Bottoni and   
                   G. Mauri and   
                      P. Mussio   On Controlling Rewriting by Properties
                                  of Strings and Symbols . . . . . . . . . 71
                  H. Fernau and   
                      R. Freund   Accepting Array Grammars with Control
                                  Mechanisms . . . . . . . . . . . . . . . 95
                  P. Jancar and   
                    F. Mraz and   
                  M. Platek and   
                       J. Vogel   On Restarting Automata with Rewriting    119
               T. Balanescu and   
               H. Georgescu and   
                    M. Gheorghe   Grammar Systems with Counting Derivation
                                  and Dynamical Priorities . . . . . . . . 150
                  S. Dumitrescu   Characterization of RE Using CD Grammar
                                  Systems with Two Registers and RL Rules  167
                     O. Waetjen   On Cooperating Distributed Uniformly
                                  Limited L Systems  . . . . . . . . . . . 178
                        M. Amin   A Note on the Incomparability of the EOL
                                  Family with Certain Families of
                                  Languages Generated by Cooperating
                                  Grammar Systems  . . . . . . . . . . . . 217
                     J. Kelemen   Colonies as Models of Reactive Systems   220
              K. Abrahamson and   
                     L. Cai and   
                      S. Gordon   A Grammar Characterization of
                                  Logarithmic-Space Computation  . . . . . 247
                       S. Bruda   On the Computational Complexity of
                                  Context-Free Parallel Communicating
                                  Grammar Systems  . . . . . . . . . . . . 256
                       A. Chitu   PC Grammar Systems Versus Some
                                  Non-Context-Free Constructions from
                                  Natural and Artificial Languages . . . . 278
        M. D. Jimenez-Lopez and   
                 C. Martin-Vide   Grammar Systems for the Description of
                                  Certain Natural Language Facts . . . . . 288
            E. Csuhaj-Varju and   
                     A. Salomaa   Networks of Parallel Language Processors 299
                 C. Zandron and   
                C. Ferretti and   
                       G. Mauri   A Reduced Distributed Splicing System
                                  for RE Languages . . . . . . . . . . . . 319
                   G. Georgescu   On the Generative Capacity of Splicing
                                  Grammar Systems  . . . . . . . . . . . . 330
               J. Hromkovic and   
                  J. Karhumaeki   Two Lower Bounds on Computational
                                  Complexity of Infinite Words . . . . . . 366
                V. E. Cazanescu   The Structure of the Basic Morphisms . . 422
                  M. Holzer and   
                     K.-J Lange   On the Complexity of Iterated Insertions 440
                        L. Ilie   The Decidability of the Generalized
                                  Confluence Problem for Context-Free
                                  Languages  . . . . . . . . . . . . . . . 454


Lecture Notes in Computer Science
Volume 1219, 1997

                   M. Baldi and   
                     S. Gai and   
                       G. Picco   Exploiting Code Mobility in
                                  Decentralized and Flexible Network
                                  Management . . . . . . . . . . . . . . . 13
                  C. Ghezzi and   
                       G. Vigna   Mobile Code Paradigms and Technologies   39
                    D. Wong and   
                N. Paciorek and   
                   T. Walsh and   
                     J. DiCelie   Concordia: An Infrastructure for
                                  Collaborating Mobile Agents  . . . . . . 86
                   D. Chang and   
                      S. Covaci   The OMG Mobile Agent Facility: A
                                  Submission . . . . . . . . . . . . . . . 98
                   L. Hurst and   
              P. Cunningham and   
                      F. Somers   Mobile Agents --- Smart Messages . . . . 111
                 J. Baumann and   
                    F. Hohl and   
             N. Radouniklis and   
                   K. Rothermel   Communication Concepts for Mobile Agent
                                  Systems  . . . . . . . . . . . . . . . . 123
                  P. Doemel and   
                 A. Lingnau and   
                     O. Drobnik   Mobile Agent Interaction in
                                  Heterogeneous Environments . . . . . . . 136
                    T. Chia and   
                    S. Kannapan   Strategically Mobile Agents  . . . . . . 149
                 W. E. Chen and   
                     C. R. Leng   A Novel Mobile Agent Search Algorithm    162
                M. Williams and   
                     A. Bendiab   A Toolset for Architecture Independent,
                                  Reconfigurable, Multi-Agent Systems  . . 210


Lecture Notes in Computer Science
Volume 1220, 1997

                  Peter Brezany   Input/Output Intensive Massively
                                  Parallel Computing: Language Support,
                                  Automatic Parallelization, Advanced
                                  Optimization, and Runtime Systems  . . . vi + 288


Lecture Notes in Computer Science
Volume 1221, 1997

                   P. Davidsson   Learning by Linear Anticipation in
                                  Multi-Agent Systems  . . . . . . . . . . 62
                      Y. Ye and   
                  J. K. Tsotsos   On the Collaborative Object Search Team:
                                  A Formulation  . . . . . . . . . . . . . 94
         A. L. Cetertick Bazzan   Evolution of Coordination as a Metaphor
                                  for Learning in Multi-Agent Systems  . . 117
              A. F. Dragoni and   
                    P. Giorgini   Learning Agents' Reliability Through
                                  Bayesian Conditioning: A Simulation
                                  Experiment . . . . . . . . . . . . . . . 151
                  W. Davies and   
                     P. Edwards   The Communication of Inductive
                                  Inferences . . . . . . . . . . . . . . . 223
               H. Friedrich and   
                  M. Kaiser and   
                 O. Rogalla and   
                    R. Dillmann   Learning and Communication in
                                  Multi-Agent Systems  . . . . . . . . . . 259


Lecture Notes in Computer Science
Volume 1222, 1997

                    L. Cardelli   Mobile Computation . . . . . . . . . . . 3
                   D. Chess and   
                C. Harrison and   
                 A. Kershenbaum   Mobile Agents: Are They a Good Idea? . . 25
                   J. Waldo and   
                   G. Wyant and   
                A. Wollrath and   
                     S. Kendall   A Note on Distributed Computing  . . . . 49
                  G. Cugola and   
                  C. Ghezzi and   
                G. P. Picco and   
                       G. Vigna   Analyzing Mobile Code Languages  . . . . 93
                 A. Acharya and   
             M. Ranganathan and   
                       J. Saltz   Sumatra: A Language for Resource-Aware
                                  Mobile Programs  . . . . . . . . . . . . 111
                  K. Bharat and   
                    L. Cardelli   Migratory Applications . . . . . . . . . 131
                        K. Kato   Safe and Secure Execution Mechanisms for
                                  Mobile Objects . . . . . . . . . . . . . 201
              P. Ciancarini and   
                       D. Rossi   Jada --- Coordination and Communication
                                  for Java Agents  . . . . . . . . . . . . 213
                 A. Acharya and   
                       J. Saltz   Dynamic Linking for Mobile Programs  . . 245
                       M. Franz   Adaptive Compression of Syntax Trees and
                                  Iterative Dynamic Code Optimization: Two
                                  Basic Technologies for Mobile Object
                                  Systems  . . . . . . . . . . . . . . . . 263
                      D. Duggan   A Type-Based Implementation of a
                                  Language with Distributed Scope  . . . . 277
                      P. Doemel   Interaction of Java and Telescript
                                  Agents . . . . . . . . . . . . . . . . . 295


Lecture Notes in Computer Science
Volume 1223, 1997

        M. A. T. Figueiredo and   
            J. M. N. Leitao and   
                     A. K. Jain   Adaptive Parametrically Deformable
                                  Contours . . . . . . . . . . . . . . . . 35
                     J.-P. Wang   Image Segmentation via Energy
                                  Minimization on Partitions with
                                  Connected Components . . . . . . . . . . 101
               X. Descombes and   
                  R. Morris and   
                 J. Zerubia and   
                     M. Berthod   Maximum Likelihood Estimation of Markov
                                  Random Field Parameters Using Markov
                                  Chain Monte Carlo Algorithms . . . . . . 133
               S. A. Barker and   
                P. J. W. Rayner   Unsupervised Image Segmentation Using
                                  Markov Random Field Models . . . . . . . 165
               A. L. Yuille and   
                    J. Coughlan   Twenty Questions, Focus of Attention,
                                  and A0*: A Theoretical Comparison of
                                  Optimization Strategies  . . . . . . . . 197
                 T. Hofmann and   
                 J. Puzicha and   
                  J. M. Buhmann   Deterministic Annealing for Unsupervised
                                  Texture Segmentation . . . . . . . . . . 213
             M. L. Williams and   
               R. C. Wilson and   
                  E. R. Hancock   Deterministic Search Strategies for
                                  Relational Graph Matching  . . . . . . . 261
                   Y. Zhong and   
                     A. K. Jain   Object Localization Using Color, Texture
                                  and Shape  . . . . . . . . . . . . . . . 279
               J. Hornegger and   
                     H. Niemann   Optimization Problems in Statistical
                                  Object Recognition . . . . . . . . . . . 311
           S. M. Bhandarkar and   
                        X. Zeng   Figure-Ground Separation: A Case Study
                                  in Energy Minimization via Evolutionary
                                  Computing  . . . . . . . . . . . . . . . 375
                  M. Gelgon and   
                    P. Bouthemy   A Region-Level Motion-Based Graph
                                  Representation and Labelling for
                                  Tracking a Spatial Image Partition . . . 409
                A. M. Finch and   
               R. C. Wilson and   
                  E. R. Hancock   An Expectation-Maximisation Approach to
                                  Graph Matching . . . . . . . . . . . . . 425
                R. Azencott and   
                      L. Younes   An Energy Minimization Method for
                                  Matching and Comparing Structured Object
                                  Representations  . . . . . . . . . . . . 441
                         P. Fua   Consistent Modelling of Terrain and
                                  Drainage Using Deformable Models . . . . 459
                  C. A. Glasbey   SAR Image Registration and Segmentation
                                  Using an Estimated DEM . . . . . . . . . 507
                F. Escolano and   
                 M. Cazorla and   
                D. Gallardo and   
                        R. Rizo   Deformable Templates for Tracking and
                                  Analysis of Intravascular Ultrasound
                                  Sequences  . . . . . . . . . . . . . . . 521
                  A. Branca and   
                  E. Stella and   
                    A. Distante   Motion Correspondence Through Energy
                                  Minimization . . . . . . . . . . . . . . 535


Lecture Notes in Computer Science
Volume 1224, 1997

                E. Armengol and   
                       E. Plaza   Induction of Feature Terms with INDIE    33
                    C. Baroglio   Exploiting Qualitative Knowledge to
                                  Enhance Skill Acquisition  . . . . . . . 49
                     P. Cichosz   Integrated Learning and Planning Based
                                  on Truncating Temporal Differences . . . 57
                L. De Raedt and   
        P. Idestam-Almquist and   
                      G. Sablon   aitch theta-subsumption for Structural
                                  Matching . . . . . . . . . . . . . . . . 73
                G. Demiroez and   
              H. Altay Guevenir   Classification by Voting Feature
                                  Intervals  . . . . . . . . . . . . . . . 85
                  J. Demsar and   
                   B. Zupan and   
                 M. Bohanec and   
                      I. Bratko   Constructing Intermediate Concepts by
                                  Decomposition of Real Functions  . . . . 93
               D. Gamberger and   
                      N. Lavrac   Conditions for Occam's Razor
                                  Applicability and Noise Elimination  . . 108
                        Y.-J Hu   Learning Different Types of New
                                  Attributes by Combining the Neural
                                  Network and Iterative Attribute
                                  Construction . . . . . . . . . . . . . . 124
                  A. Hutchinson   Metrics on Terms and Clauses . . . . . . 138
              Kai Ming Ting and   
                   Boon Toh Low   Model Combination in the
                                  Multiple-Data-Batches Scenario . . . . . 250
                  D. W. Aha and   
                D. Wettschereck   Case-Based Learning: Beyond
                                  Classification of Feature Vectors  . . . 329
               W. Daelemans and   
           A. Van den Bosch and   
                    T. Weijters   Empirical Learning of Natural Language
                                  Processing Tasks . . . . . . . . . . . . 337
                  M. Kaiser and   
               V. Klingspor and   
                   H. Friedrich   Human-Agent Interaction and Machine
                                  Learning . . . . . . . . . . . . . . . . 345


Lecture Notes in Computer Science
Volume 1225, 1997

                 R. Falessi and   
              M. P. Pensini and   
               G. Rovigatti and   
                    S. Taraglio   HIPERCLASS: High Performance Industrial
                                  Inspection and Defect Classification in
                                  Steel Industry . . . . . . . . . . . . . 21
                   C. Ferri and   
                  P. Contri and   
             P. Salvaneschi and   
                      G. Meloni   PIERS: A Parallel Integrated Environment
                                  for Reliability Evaluation of Structures 31
             A. G. Hoekstra and   
                   L. Dorst and   
                 M. Bergman and   
                   J. Lagerberg   High Performance Discrete Event
                                  Simulations to Evaluate Complex
                                  Industrial Systems . . . . . . . . . . . 41
                 S. Baldini and   
                  L. Giraud and   
                   L. Hamel and   
                  J. M. Jimenez   HIPERCOMBATS: A Parallel Industrial Tool
                                  for Two-Wheeler Suspensions Design . . . 51
                 J.-M. Jezequel   Using Scalable Distributed Computers in
                                  Telecommunications . . . . . . . . . . . 60
                  F. Guidec and   
                P. Calegari and   
                      P. Kuonen   Parallel Irregular Software for Wave
                                  Propagation Simulation . . . . . . . . . 84
               A. Bruckmann and   
               J. Haemmerle and   
                  M. Reichl and   
                         A. Uhl   Hybrid Fractal/Wavelet Image Compression
                                  in a High Performance Computing
                                  Environment  . . . . . . . . . . . . . . 117
              D. J. Hancock and   
                  R. J. Hubbold   Distributed Parallel Volume Rendering on
                                  Shared Memory Systems  . . . . . . . . . 157
                 R. Bigeard and   
                   M. Devel and   
                    J. Julliand   Parallelization of an Algorithm Used to
                                  Simulate Atomic Force Microscope Images  175
                 R. Keppens and   
                  S. Poedts and   
               P. M. Meijer and   
                J. P. Goedbloed   A Data Parallel Pseudo-spectral
                                  Semi-implicit Magnetohydrodynamics Code  190
             J. F. De Ronde and   
           G. D. Van Albada and   
                 P. M. A. Sloot   High Performance Simulation for
                                  Resonant-Mass Gravitational Radiation
                                  Antennas . . . . . . . . . . . . . . . . 200
                 W. Dzwinel and   
                 J. Dzwinel and   
                     K. Dzwinel   Development of Parallel Applications for
                                  MEGA-D --- System for Oil and Gas
                                  Prospecting  . . . . . . . . . . . . . . 223
             L. A. Drummond and   
              J. D. Farrara and   
              C. R. Mechoso and   
                      J. Z. Lou   Performance Optimization of an
                                  Atmospheric Model in Massively Parallel
                                  Computers  . . . . . . . . . . . . . . . 263
                     L. Jaschke   Parallel Simulation of an Ash Melting
                                  Furnace  . . . . . . . . . . . . . . . . 282
                M. Breitler and   
                    S. Hegi and   
              J.-D. Reymond and   
               N. S. Tuchschmid   High Performance Computations for an
                                  Optimal Portfolio Choice Problem . . . . 293
                   Y. Huang and   
                   W. F. McColl   A Two-Way BSP Algorithm for Tridiagonal
                                  Systems  . . . . . . . . . . . . . . . . 321
                  E. Issman and   
                      G. Degrez   Non-overlapping Preconditioners for a
                                  Parallel Implicit Navier--Stokes Solver  351
              E. De Sturler and   
                       D. Loher   Parallel Solution of Irregular, Sparse
                                  Matrix Problems Using High Performance
                                  Fortran  . . . . . . . . . . . . . . . . 360
                 T.-R. Yang and   
                      H.-X. Lin   The Improved Quasi-minimal Residual
                                  Method on Massively Distributed Memory
                                  Computers  . . . . . . . . . . . . . . . 389
                 T.-R. Yang and   
                      H.-X. Lin   Isoefficiency Analysis of CGLS Algorithm
                                  for Parallel Least Squares Problems  . . 452
                 G. Aloisio and   
                  M. Cafaro and   
                R. Williams and   
                     P. Messina   A Distributed Web-Based Metacomputing
                                  Environment  . . . . . . . . . . . . . . 480
                   M. Brune and   
                 J. Gehring and   
                   A. Reinefeld   A Lightweight Communication Interface
                                  for Parallel Programming Environments    503
                   M. Bubak and   
                  W. Ciesla and   
                        K. Sowa   Object-Oriented Library of Parallel
                                  Genetic Algorithms and Its
                                  Implementation on Networked Workstations
                                  and HP\slash Convex Exemplar . . . . . . 514
              J. J. Derksen and   
               J. L. Kooman and   
         H. E. A. Van den Akker   Parallel Fluid Flow Simulations by Means
                                  of a Lattice-Boltzmann Scheme  . . . . . 524
                  U. Dralle and   
                   A. Reinefeld   A Distributed Algorithm for Optimal
                                  Concurrent Communication and Load
                                  Balancing in Parallel Systems  . . . . . 588
                     A. Cox and   
                        A. Hall   A Real Time Kernel to Support the
                                  Transputer Programming Model . . . . . . 615
                   A. Barak and   
                     O. La'adan   Performance of the MOSIX Parallel System
                                  for a Cluster of PC's  . . . . . . . . . 624
                   R. Frank and   
                    H. Burkhart   Application Support by Software Reuse:
                                  The ALWAN Approach . . . . . . . . . . . 636
               V. De Florio and   
                G. Decomnck and   
                  R. Lauwereins   An Application-Level Dependable
                                  Technique for Farmer-Worker Parallel
                                  Programs . . . . . . . . . . . . . . . . 644
                 A. Corradi and   
                L. Leonardi and   
                  F. Zambonelli   Integration of Automated and User-Level
                                  Tools Toward Efficient Parallel Objects
                                  Allocation . . . . . . . . . . . . . . . 654
                 J. Hordijk and   
                   H. Corporaal   The Potential of Exploiting Coarse-Grain
                                  Task Parallelism from Sequential
                                  Programs . . . . . . . . . . . . . . . . 664
               N. Zingirian and   
                     M. Maresca   Scheduling Image Processing Program
                                  Activities on Instruction Level Parallel
                                  RISC Through Program Transformations . . 674
                    S. Boyd and   
                      K. Marcus   The Economic Addition of Functionality
                                  to a Network . . . . . . . . . . . . . . 688
                M. Dormanns and   
               W. Sprangers and   
                    H. Ertl and   
                     T. Bemmerl   A Programming Interface for NUMA
                                  Shared-Memory Clusters . . . . . . . . . 698
                 J. Cordsen and   
        W. Schroeder-Preikschat   On the Coexistence of Shared-Memory and
                                  Message-Passing in the Programming of
                                  Parallel Applications  . . . . . . . . . 718
               A. E. Doroshenko   Modeling Synchronization and
                                  Communication Abstractions for Dynamical
                                  Parallelization  . . . . . . . . . . . . 752
              J. M. D. Hill and   
               D. B. Skillicorn   Lessons Learned from Implementing BSP    762
                  H. W. Yau and   
                  G. C. Fox and   
                   K. A. Hawick   Evaluation of High Performance Fortran
                                  Through Application Kernels  . . . . . . 772
                   T. Fahringer   Effective Symbolic Analysis to Support
                                  Parallelizing Compilers and Performance
                                  Analysis . . . . . . . . . . . . . . . . 781
                E. W. Evans and   
              S. P. Johnson and   
              P. F. Leggett and   
                       M. Cross   Overlapped Communications Automatically
                                  Generated in a Parallelisation Tool  . . 801
                 P. Brezany and   
               A. Choudhary and   
                        M. Dang   Parallelization of Irregular Out-of-Core
                                  Applications for Distributed-Memory
                                  Systems  . . . . . . . . . . . . . . . . 811
                 C. Germain and   
           D. Gautier de Lahaut   Improving Irregular Parallel
                                  Communication Through Sorting  . . . . . 821
                   T. Fahringer   Estimating Cache Performance for
                                  Sequential and Data Parallel Programs    840
                  T. Cortes and   
                  S. Girona and   
                     J. Labarta   Avoiding the Cache-Coherence Problem in
                                  a Parallel/Distributed File System . . . 860
                    S. Haas and   
             D. A. Thornley and   
                     M. Zhu and   
                 R. W. Dobinson   The Macrame 1024 Node Switching Network  870
               I. Karkowski and   
                   H. Corporaal   Overcoming the Limitations of the
                                  Traditional Loop Parallelization . . . . 898
                    Q. Wang and   
                   Y. Yijun and   
                 E. D'Hollander   Visualizing the Iteration Space in PEFPT 908
                 F. Bianchi and   
                   E. Corno and   
              M. Rebaudengo and   
                M. Sonza Reorda   Boolean Function Manipulation on a
                                  Parallel System Using BDDs . . . . . . . 916
              D. T. Altilar and   
                   Y. Paker and   
                  A. V. Sahiner   A Parallel Architecture for Video
                                  Processing . . . . . . . . . . . . . . . 929
                 J. Gerlach and   
                    M. Sato and   
                    Y. Ishikawa   Experiences with the C++ Standard
                                  Template Library and MPI for a Parallel
                                  Particle Simulation Method . . . . . . . 961
             J. P. Gregoire and   
               J. D. Mattei and   
                     G. Simeoni   Parallelization of Estet-Astrid Code on
                                  Cray C98 . . . . . . . . . . . . . . . . 970
               P. Calafiura and   
                  G. Wirrer and   
             B. Panzer-Steindel   An Integrated Storage and Data
                                  Management System for a High Energy
                                  Physics Experiment . . . . . . . . . . . 975
                R. Baraglia and   
                   M. Bucci and   
                D. Circelli and   
                      R. Perego   On Designing Genetic Algorithms for
                                  Hypercube Machines . . . . . . . . . . . 980
                R. Baraglia and   
                 R. Ferrini and   
               D. Laforenza and   
                      A. Lagana   Metacomputing to Overcome the Power
                                  Limits of a Single Machine . . . . . . . 982
                F. Aglietti and   
               A. Bartolini and   
                C. Battista and   
                    S. Cabasino   The Teraflop Parallel Computer APEmille  991
               N. Fornasari and   
               G. Gazzaniga and   
                  S. Rovida and   
                      G. Sacchi   Domain Decomposition Techniques:
                                  Analysis of a Parallel Implementation on
                                  HP-Convex Exemplar Systems . . . . . . . 1000
                   M. Bubak and   
                  W. Funika and   
                   J. Moscinski   Performance Analysis Environment for
                                  Parallel Applications on Networked
                                  Workstations . . . . . . . . . . . . . . 1002
                 J. Galtier and   
                       P. Klein   A Parallel Preprocessor Applied to Fluid
                                  Dynamics Problems  . . . . . . . . . . . 1006
               K. D. Barnes and   
                  N. Ivezic and   
                    M. R. Leuze   Collaborative Management Environment: A
                                  Web-Based Management Tool  . . . . . . . 1010
                R. Chatagny and   
                     B. Chopard   Parallel Simulation of a Foreign
                                  Exchange Market Model  . . . . . . . . . 1012
                 G. Chochia and   
                        M. Cole   Recursive $3$D Mesh Indexing with
                                  Improved Locality  . . . . . . . . . . . 1014
                 R. Chrobak and   
                   M. Bubak and   
                J. Kitowski and   
                   J. Moscinski   Parallel FEM Simulation of Forging
                                  Processes on Workstations and HP\slash
                                  Convex Exemplar  . . . . . . . . . . . . 1018
                    W. Alda and   
                 W. Dzwinel and   
                J. Kitowski and   
                   J. Moscinski   High Performance Simulation of Thermal
                                  Convection Using Quasi-particle Approach 1022
              B. Di Martino and   
                  A. Mazzeo and   
                N. Mazzocca and   
                       S. Russo   Distributed Coordination in Optimization
                                  Algorithms . . . . . . . . . . . . . . . 1024
                  E. Dillon and   
       C. Gamboa dos Santos and   
                      J. Guyard   An Environment for Quick Design and
                                  Efficient Implementation of
                                  Message-Passing Applications . . . . . . 1026
               K. A. Hawick and   
                H. A. James and   
             K. J. Maciunas and   
                  F. A. Vaughan   An ATM-based Distributed High
                                  Performance Computing System . . . . . . 1032
               K. A. Hawick and   
                H. A. James and   
             K. J. Maciunas and   
                  F. A. Vaughan   Geographic Information Systems
                                  Applications on an ATM-based Distributed
                                  High Performance Computing System  . . . 1035
                   C. Ghiot and   
              J.-M. Beckets and   
                 G. Carabin and   
                  A. Dassargues   Sea Air Land Modeling Operational
                                  Network  . . . . . . . . . . . . . . . . 1040


Lecture Notes in Computer Science
Volume 1226, 1997

              J. J. Collins and   
                       M. Eaton   A Global Representation Scheme for
                                  Genetic Algorithms . . . . . . . . . . . 1
                  A. Agapie and   
                     D. Caragea   Genetic Algorithms, Schemata
                                  Construction and Statistics  . . . . . . 16
                 L. Boquete and   
                   R. Barea and   
                  R. Garcia and   
                        M. Mazo   Identification of Systems Using Radial
                                  Basis Networks Feedbacked with FIR
                                  Filters  . . . . . . . . . . . . . . . . 46
                  B. Butkiewicz   Position Control System with Fuzzy
                                  Microprocessor AL220 . . . . . . . . . . 74
                    M. M. Gupta   Fuzzy-Neural Computing Systems: Recent
                                  Developments and Future Directions . . . 82
                       K. Haese   Optimizing the Self-Organizing-Process
                                  of Topology Maps . . . . . . . . . . . . 92
                     O. Grigore   Syntactical Self-Organizing Map  . . . . 101
                 J. M. Dias and   
                  A. D. Correia   On-Line Learning Based on Adaptive
                                  Similarity and Fixed Size Rule Base  . . 110
               W. Eversheim and   
                 A. Roggatz and   
                    R. E. Young   Ability of Fuzzy Constraint Networks to
                                  Reduce the Dynamic of Changes in Product
                                  Development  . . . . . . . . . . . . . . 122
            C. M. Friedrich and   
                      C. Moraga   Using Genetic Engineering to Find
                                  Modular Structures and Activation
                                  Functions for Architectures of
                                  Artificial Neural Networks . . . . . . . 150
                 M. Giuclea and   
                      A. Agapie   Genetic Algorithms for Solving Systems
                                  of Fuzzy Relational Equations  . . . . . 162
                    C. Igel and   
                    K.-H. Temme   Chaining Syllogism Applied to Fuzzy
                                  IF-THEN Rules and Rule Bases . . . . . . 179
                      A. Dvorak   Computational Properties of Fuzzy Logic
                                  Deduction  . . . . . . . . . . . . . . . 189
                   N. Besli and   
                     E. Gul and   
                     M. Tuerker   Application of Fuzzy Control to
                                  Fed-Batch Yeast Fermentation . . . . . . 207
                  T. Fukuda and   
                   K. Shimojima   Adaptation, Learning and Evolutionary
                                  Computing for Intelligent Robots . . . . 217
       A. F. Gomez-Skarmeta and   
                 J. Piernas and   
                     M. Delgado   Fuzzy Clustering and Images Reduction    241
                B.-J. Falkowski   Predicates and Superimposed Coding: An
                                  Application to Image Recognition . . . . 250
                      S. Adrian   Fuzzy Modeling of Conceptual Spaces  . . 277
                 F. Benmakrouha   Construction of a Fuzzy Model with Few
                                  Examples . . . . . . . . . . . . . . . . 285
                B. De Baets and   
                   M. Mares and   
                      R. Mesiar   Fuzzy Zeroes and Indistinguishability of
                                  Real Numbers . . . . . . . . . . . . . . 299
                  A. Berger and   
           D. P. F. Moeller and   
                      M. Reuter   Detection of Sleep with New
                                  Preprocessing Methods for EEG Analyzing  304
               T. D. Gedeon and   
               R. A. Bustos and   
              B. J. Briedis and   
                   G. Greenleaf   Word-Concept Clusters in a Legal
                                  Document Collection  . . . . . . . . . . 329
                    L. J. Fogel   A Retrospective View and Outlook on
                                  Evolutionary Algorithms  . . . . . . . . 337
                   J. Zhang and   
                   A. Knoll and   
                       K. V. Le   A New Type of Fuzzy Logic System for
                                  Adaptive Modeling and Control  . . . . . 363
                 T. T. Binh and   
                        U. Korn   Scalar Optimization with Linear and
                                  Nonlinear Constraints Using Evolution
                                  Strategies . . . . . . . . . . . . . . . 381
                 E. Karakas and   
                H. Kueluenk and   
                E. Oezdemir and   
                      E. Oelcer   Design of Adaptive Fuzzy Controller for
                                  Bolu Highway Tunnel Ventilation System   403
                   I. Ciuca and   
                     J. A. Ware   Layered Neural Networks as Universal
                                  Approximators  . . . . . . . . . . . . . 411
                   M. Gerke and   
                       H. Hoyer   Fuzzy Backpropagation Training of Neural
                                  Networks . . . . . . . . . . . . . . . . 416
            I. I. Voutchkov and   
                    K. D. Velev   Identification of Waste Water Treatment
                                  Plant Using Neural Networks  . . . . . . 478
                A. Derdiyok and   
                   N. Inanc and   
                 V. Oebulur and   
                     H. Pastaci   Fuzzy Logic Based Control of Switched
                                  Reluctance Motor to Reduce Torque Ripple 484
                  S. Wagner and   
                    H.-D. Kochs   An Adjusted Evolutionary Algorithm for
                                  the Optimization of Fuzzy Controllers    517
             Adriana Agapie and   
               Alexandru Agapie   Economic Forecasting Using Genetic
                                  Algorithms . . . . . . . . . . . . . . . 543
                  J. Albert and   
                      J. Schoof   Interactive Genetic Algorithms and
                                  Evolution Based Cooperative
                                  Problem-Solving  . . . . . . . . . . . . 545
                  M. Alpbaz and   
                  Z. Zeybek and   
                  L. Oezbek and   
                       F. Aliev   A Fuzzy Model Based Control of Well
                                  Mixed Reactor with Cooling Jacket  . . . 546
                   H. Blume and   
                 O. Franzen and   
                     M. Schmidt   Optimizing Video Signal Processing
                                  Algorithms by Evolution Strategies . . . 547
                    I. Borgulya   An Example for Decision Support in
                                  Insurance  . . . . . . . . . . . . . . . 549
                 E. Damiani and   
                   M. G. Fugini   Fuzzy Identification of Distributed
                                  Components . . . . . . . . . . . . . . . 550
                 M. Englert and   
                   R. Trapp and   
                    R. De Klerk   Neural Control of a Nonlinear Elastic
                                  Two-Mass System  . . . . . . . . . . . . 553
              B. Freisleben and   
                    St. Strelen   A Learning Fuzzy System for Predicting
                                  Overshootings in Process Control . . . . 554
                 A. Halinka and   
                M. Szewczyk and   
                       B. Witek   ANN-based Power Unit Protective System   556
                 I. Hamburg and   
                       L. Marin   A Scheduling Problem with Multicriteria
                                  Evaluation . . . . . . . . . . . . . . . 558
                    R. Izak and   
                   K. Trott and   
                    T. Zahn and   
                       U. Markl   Hardware Implementation of a Mixed
                                  Analog-Digital Neural Network  . . . . . 560
              M. C. Jaulent and   
              V. Bombardiet and   
                   A. Bubel and   
                     J. Bremont   A Fuzzy Segmentation Method for Digital
                                  Substract Angiograms Analysis  . . . . . 561
               P. Wasiewicz and   
                     J. Mulawka   Genetic Programming in Optimization of
                                  Algorithms . . . . . . . . . . . . . . . 581
              M. Zivaljevic and   
                       B. Rasuo   Application of Fuzzy Logic in Solving
                                  Problems from the Area of Reliability
                                  and Maintenance of Aircraft Systems  . . 583
                   O. Georgieva   Fuzzy Control Design of an Activated
                                  Sludge Plant . . . . . . . . . . . . . . 593
                    S. Barabash   Use of Fuzzy Objects for Statistical
                                  Description of Discrete Systems with
                                  Complex Behavior . . . . . . . . . . . . 595
                  M. Cistelecan   On Applying Genetic Algorithms to an
                                  Intelligent Sliding-Mode Control System
                                  Training . . . . . . . . . . . . . . . . 598
                 P. Heirman and   
                    R. Serneels   Neural Networks and Edge Detection . . . 601


Lecture Notes in Computer Science
Volume 1230, 1997

                F. L. Bookstein   Quadratic Variation of Deformations  . . 15
              P. Chaturvedi and   
               M. F. Insana and   
                     T. J. Hall   Acoustic and Elastic Imaging to Model
                                  Disease-Induced Changes in Soft Tissue
                                  Structure  . . . . . . . . . . . . . . . 43
                   I. Buvat and   
             M. L. Bartlett and   
              A. N. Kitsiou and   
                   J. M. Carson   Using Spatial-Temporal Images for
                                  Analysis of Gated Cardiac Tomographic
                                  Data: The ``M-Mode'' Revisited . . . . . 85
                A. J. Worth and   
                  N. Makris and   
                J. W. Meyer and   
                 V. S. Caviness   Automated Segmentation of Brain Exterior
                                  in MR Images Driven by Empirical
                                  Procedures and Anatomical Knowledge  . . 99
                T. N. Jones and   
                  D. N. Metaxas   Automated $3$D Segmentation Using
                                  Deformable Models and Fuzzy Affinity . . 113
                 D. Fritsch and   
                S. M. Pizer and   
                      L. Yu and   
                     V. Johnson   Segmentation of Medical Image Objects
                                  Using Deformable Shape Loci  . . . . . . 127
              H. H. Barrett and   
                    C. K. Abbey   Bayesian Detection of Random Signals on
                                  Random Backgrounds . . . . . . . . . . . 155
                C. K. Abbey and   
                E. Clarkson and   
              H. H. Barrett and   
                  S. P. Mueller   Approximate Distributions for Maximum
                                  Likelihood and Maximum a Posteriori
                                  Estimates Under a Gaussian Noise Model   167
                 S. Aylward and   
                    S. M. Pizer   Continuous Gaussian Mixture Modeling . . 176
                   M. Yavuz and   
                  J. A. Fessler   New Statistical Models for
                                  Randoms-Precorrected PET Scans . . . . . 190
              P. J. Edwards and   
              D. L. G. Hill and   
               J. A. Little and   
                   D. J. Hawkes   Deformation for Image-Guided
                                  Interventions Using a Three Component
                                  Tissue Model . . . . . . . . . . . . . . 218
                  H. Benali and   
                   I. Buvat and   
                J. L. Anton and   
                   M. Pelegrini   Space-Time Statistical Model for
                                  Functional MRI Image Sequences . . . . . 285
                  A. S. Houston   Jackknifing a Normal Database for
                                  Regional Cerebral Blood Flow SPECT
                                  Obtained Using Principal Components  . . 299
               W. S. Kerwin and   
                   J. L. Prince   Generating $3$D Cardiac Material Markers
                                  Using Tagged MRI . . . . . . . . . . . . 313
                   T. S. Denney   Identification of Myocardial Tags in
                                  Tagged MR Images Without Prior Knowledge
                                  of Myocardial Contours . . . . . . . . . 327
                D. Atkinson and   
              D. L. G. Hill and   
            P. N. R. Stoyle and   
                  P. E. Summers   An Autofocus Algorithm for the Automatic
                                  Correction of Motion Artifacts in MR
                                  Images . . . . . . . . . . . . . . . . . 341
          P. A. Freeborough and   
                      N. C. Fox   Measurement of Global and Regional
                                  Cerebral Volume Changes By Integrating
                                  Boundary Shifts Between Registered
                                  Serial $3$D MR Scans . . . . . . . . . . 355
                    N. Duta and   
                       M. Sonka   Segmentation and Interpretation of MR
                                  Brain Images Using an Improved
                                  Knowledge-Based Active Shape Model . . . 375
                S. C. Joshi and   
                A. Banerjee and   
          G. E. Christensen and   
               J. G. Csernansky   Gaussian Random Fields on Sub-manifolds
                                  for Characterizing Brain Surfaces  . . . 381
                    Y. Hata and   
                 S. Kobashi and   
                 N. Kamiura and   
                    M. Ishikawa   Fuzzy Logic Approach to $3$D Magnetic
                                  Resonance Image Segmentation . . . . . . 387
                    D. Dean and   
             K. Subramanyan and   
                  J. Kamath and   
                F. L. Bookstein   Comparison of Traditional Brain
                                  Segmentation Tools with $3$D
                                  Self-Organizing Maps . . . . . . . . . . 393
                      C. Xu and   
                    D. Pham and   
                      J. Prince   Finding the Brain Cortex Using Fuzzy
                                  Segmentation, Isosurfaces, and
                                  Deformable Surface Models  . . . . . . . 399
              R. Zwiggelaar and   
                 T. C. Parr and   
            C. R. M. Boggis and   
                   S. M. Astley   Statistical Modelling of Lines and
                                  Structures in Mammograms . . . . . . . . 405
               D. L. Wilson and   
                    J. A. Noble   Segmentation of Cerebral Vessels and
                                  Aneurysms from MR Angiography Data . . . 423
                  S. Aharon and   
              B. M. Cameron and   
                     R. A. Robb   Computation of Efficient
                                  Patient-Specific Models from $3$D
                                  Medical Images: Use in Virtual Endoscopy
                                  and Surgery Rehearsal  . . . . . . . . . 429
                 G.-Z. Yang and   
                  D. M. Hansell   A Hybrid Approach for the Detection of
                                  Small Airways Disease from Computed
                                  Tomographic Images . . . . . . . . . . . 447
                S. P. Huang and   
              B. E. Chapman and   
           J. E. Muhlestein and   
                  D. D. Blatter   Computer Simulation of Convection and
                                  Diffusion Effects on Velocity
                                  Estimations from X-Ray Contrast Density
                                  Time Curves  . . . . . . . . . . . . . . 453
                    A. Hill and   
                A. D. Brett and   
                   C. J. Taylor   Automatic Landmark Identification Using
                                  a New Method of Non-rigid Correspondence 483
                  S. Cotton and   
                E. Claridge and   
                        P. Hall   Noninvasive Skin Imaging . . . . . . . . 501
                   R. Wolfe and   
                  D. Laurendeau   Modelling Interreflections in a System
                                  Based on the Differential Absorption of
                                  Light (DAL) for the Measurement of Range
                                  Images . . . . . . . . . . . . . . . . . 507
                 E. Bullitt and   
                     A. Liu and   
                 S. Aylward and   
                    S. M. Pizer   Reconstruction of the Intracerebral
                                  Vasculature from MRA and a Pair of
                                  Projection Views . . . . . . . . . . . . 537
              B. E. Chapman and   
             K. C. Goodrich and   
            A. L. Alexander and   
                  D. D. Blatter   Two Alternative Forced-Choice Evaluation
                                  of Vessel Visibility Increases Due to
                                  Zero-filled Interpolation in MR
                                  Angiography  . . . . . . . . . . . . . . 543
                E. Clarkson and   
                     H. Barrett   Bayesian Detection with Amplitude,
                                  Scale, Orientation and Position
                                  Uncertainty  . . . . . . . . . . . . . . 549


Lecture Notes in Computer Science
Volume 1231, 1997

                      A. Bonner   What Was Llull Up To?  . . . . . . . . . 1
             N. S. Bjoerner and   
                   Z. Manna and   
                H. B. Sipma and   
                    T. E. Uribe   Deductive Verification of Real-Time
                                  Systems Using STeP . . . . . . . . . . . 22
                        M. Broy   Refinement of Time . . . . . . . . . . . 44
                  S. Campos and   
                      E. Clarke   The Verus Language: Representing Time
                                  Efficiently with BDDs  . . . . . . . . . 64
                     A. Cau and   
                       H. Zedan   Refining Interval Temporal Logic
                                  Specifications . . . . . . . . . . . . . 79
                      H. Dierks   PLC-Automata: A New Class of
                                  Implementable Real-Time Automata . . . . 111
                P. R. D'Argenio   Regular Processes and Timed Automata . . 141
              K. Feyerabend and   
                       B. Josko   A Visual Formalism for Real-Time
                                  Requirement Specifications . . . . . . . 156
                      S. Yamane   Formal Specification and Verification
                                  Method of Concurrent and Distributed
                                  Systems by Restricted Timed Automata . . 169
                     M. Bertran   A Transformation of Monitor into
                                  Communication Synchronized Parallel
                                  Processes: A Systematic Refinement Step
                                  in Design  . . . . . . . . . . . . . . . 199
                 A. Fevrier and   
                    E. Najm and   
                  J.-B. Stefani   Contracts for ODP  . . . . . . . . . . . 216
                    R. Back and   
                  M. Buechi and   
                  E. Sekerinski   Action-Based Concurrency and
                                  Synchronization for Objects  . . . . . . 248
                 M. Bertran and   
          F. Alvarez-Cuevas and   
                       A. Duran   Communication Extended Abstract Types in
                                  the Refinement of Parallel Communicating
                                  Processes  . . . . . . . . . . . . . . . 263
         L. A. Galán and   
                 R. Peña   Verification and Refinement of
                                  Distributed Programs in a Fair Framework 280--294
                S. Goldsack and   
                    K. Lano and   
                        E. Durr   Specification and Refinement of
                                  Continuous Real-Time Systems . . . . . . 310
                        F. Wang   High-Level Execution Time Analysis . . . 325
                F. C. Gomez and   
        D. De Frutos Escrig and   
                     V. V. Ruiz   A Sound and Complete Proof System for
                                  Probabilistic Processes  . . . . . . . . 340
      C. Gregorio-Rodriguez and   
              L. Llana-Diaz and   
                  M. Nuthez and   
           Pedro Palao-Gostanza   Testing Semantics for a
                                  Probabilistic-Timed Process Algebra  . . 353
                  H. Bowman and   
                     J. Derrick   Extending LOTOS with Time: A True
                                  Concurrency Perspective  . . . . . . . . 383
             C. Hernalsteen and   
                     A. Fevrier   Introduction of a Suspend/Resume
                                  Operator in ET-LOTOS . . . . . . . . . . 400


Lecture Notes in Computer Science
Volume 1232, 1997

                      W. McCune   Well behaved search and the Robbins
                                  problem  . . . . . . . . . . . . . . . . 1--7
                       C. Lynch   Goal-directed completion using SOUR
                                  graphs . . . . . . . . . . . . . . . . . 8--22
                       D. Kapur   Shostak's congruence closure as
                                  completion . . . . . . . . . . . . . . . 23--37
                 U. Kuehler and   
                    C.-P. Wirth   Conditional equational specifications of
                                  data types with partial operations for
                                  inductive theorem proving  . . . . . . . 38--52
                    F. Otto and   
                 M. Katsura and   
                   Y. Kobayashi   Cross-sections for finitely presented
                                  monoids with decidable word problems . . 53--67
               A. Sattler-Klein   New undecidability results for finitely
                                  presented monoids  . . . . . . . . . . . 68--82
                        F. Otto   On the property of preserving regularity
                                  for string-rewriting systems . . . . . . 83--97
               E. Contejean and   
                  C. Marche and   
                 L. Rabehasaina   Rewrite systems for natural, integral,
                                  and rational arithmetic  . . . . . . . . 98--112
                L. Bachmair and   
                      A. Tiwari   $D$-bases for polynomial ideals over
                                  commutative Noetherian rings . . . . . . 113--127
                      G. Struth   On the word problem for free lattices    128--141
                   D. Kapur and   
                   G. Sivakumar   A total ground path ordering for proving
                                  termination of AC rewrite systems  . . . 142--156
                    T. Arts and   
                       J. Giesl   Proving innermost normalisation
                                  automatically  . . . . . . . . . . . . . 157--171
                     H. Zantema   Termination of context-sensitive
                                  rewriting  . . . . . . . . . . . . . . . 172--186
              M. Oyamaguchi and   
                        Y. Ohta   A new parallel closed condition for
                                  Church--Rosser of left-linear term
                                  rewriting systems  . . . . . . . . . . . 187--201
                  N. Dershowitz   Innocuous constructor-sharing
                                  combinations . . . . . . . . . . . . . . 202--216
           S. Perlo-Freeman and   
                     P. Proehle   Scott's conjecture is true, position
                                  sensitive weights  . . . . . . . . . . . 217--227
                      Y. Lafont   Two dimensional rewriting  . . . . . . . 228--229
                  D. Beeher and   
               P. De Groote and   
                      C. Retore   A complete axiomatisation for the
                                  inclusion of series-parallel partial
                                  orders . . . . . . . . . . . . . . . . . 230--240
                J. Marcinkowski   Undecidability of the first order theory
                                  of one-step right ground rewriting . . . 241--253
                    S. Vorobyov   The first-order theory of one step
                                  rewriting in linear Noetherian systems
                                  is undecidable . . . . . . . . . . . . . 254--268
                A. P. Tomas and   
                  M. Filgueiras   Solving linear Diophantine equations
                                  using the geometric structure of the
                                  solution space . . . . . . . . . . . . . 269--283
                      K. Schulz   A criterion for intractability of
                                  $E$-unification with free function
                                  symbols and its relevance for
                                  combination of unification algorithms    284--307
                     R. Statman   Effective reduction and conversion
                                  strategies for combinators . . . . . . . 299--307
                 V. Van Oostrom   Finite family developments . . . . . . . 308--322
                  C. Ringeissen   Prototyping combination of unification
                                  algorithms with the ELAN rule-based
                                  programming language . . . . . . . . . . 323--326
                      M. Goebel   The invariant package of MAS . . . . . . 327--334
                   E. Green and   
                   L. Heath and   
                      B. Keller   Opal: A system for computing
                                  noncommutative Gröbner bases  . . . . . . 331--334
                   K. Ogata and   
                  K. Ohhara and   
                   K. Futatsugi   TRAM: an abstract machine for
                                  order-sorted conditional term rewriting
                                  systems  . . . . . . . . . . . . . . . . 335--338


Lecture Notes in Computer Science
Volume 1233, 1997

                Johan Borst and   
            Lars R. Knudsen and   
                 Vincent Rijmen   Two Attacks on Reduced IDEA  . . . . . . 1
                Thilo Zieschang   Combinatorial Properties of Basic
                                  Encryption Operations  . . . . . . . . . 14
             David Naccache and   
                  Jacques Stern   A New Public-Key Cryptosystem  . . . . . 27
                  Dan Boneh and   
         Richard A. DeMillo and   
              Richard J. Lipton   On the Importance of Checking
                                  Cryptographic Protocols for Faults . . . 37--51
            Don Coppersmith and   
                     Adi Shamir   Lattice Attacks on NTRU  . . . . . . . . 52
                 Adam Young and   
                      Moti Yung   Kleptography: Using Cryptography Against
                                  Cryptography . . . . . . . . . . . . . . 62
              Ronald Cramer and   
      Ivan Bjerre Damgård   Fast and Secure Immunization Against
                                  Adaptive Man-in-the-Middle Impersonation 75
           Birgit Pfitzmann and   
                Michael Waidner   Anonymous Fingerprinting . . . . . . . . 88
              Ronald Cramer and   
            Rosario Gennaro and   
             Berry Schoenmakers   A Secure and Optimally Efficient
                                  Multi-Authority Election Scheme  . . . . 103
            Eric R. Verheul and   
         Henk C. A. van Tilborg   Binding ElGamal: A Fraud-Detectable
                                  Alternative to Key-Escrow Proposals  . . 119
              Ross Anderson and   
                    Michael Roe   The GCHQ Protocol and Its Problems . . . 134
               Thomas Johansson   Bucket Hashing with a Small Key Size . . 149
              Mihir Bellare and   
             Daniele Micciancio   A New Paradigm for Collision-Free
                                  Hashing: Incrementality at Reduced Cost  163
               Christian Cachin   Smooth Entropy and Rényi Entropy  . . . . 193
                 Ueli M. Maurer   Information-Theoretically Secure
                                  Secret-Key Agreement by NOT
                                  Authenticated Public Discussion  . . . . 209
                Jovan Dj. Golic   Linear Statistical Weakness of Alleged
                                  RC4 Keystream Generator  . . . . . . . . 226
                Jovan Dj. Golic   Cryptanalysis of Alleged A5 Stream
                                  Cipher . . . . . . . . . . . . . . . . . 239
                   Victor Shoup   Lower Bounds for Discrete Logarithms and
                                  Related Problems . . . . . . . . . . . . 256
             Roger Fischlin and   
               Claus P. Schnorr   Stronger Security Proofs for RSA and
                                  Rabin Bits . . . . . . . . . . . . . . . 267
              Mihir Bellare and   
           Markus Jakobsson and   
                      Moti Yung   Round-Optimal Zero-Knowledge Arguments
                                  Based on Any One-Way Function  . . . . . 280
          Claude Crépeau   Efficient Cryptographic Protocols Based
                                  on Noisy Channels  . . . . . . . . . . . 306
                  Stefan Brands   Rapid Demonstration of Linear Relations
                                  Connected by Boolean Operators . . . . . 318
            Gilles Brassard and   
          Claude Crépeau   Oblivious Transfers and Privacy
                                  Amplification  . . . . . . . . . . . . . 334
          Antoon Bosselaers and   
       René Govaerts and   
                Joos Vandewalle   SHA: A Design for Parallel
                                  Architectures? . . . . . . . . . . . . . 348
              Christof Paar and   
          Pedro Soria-Rodriguez   Fast Arithmetic Architectures for
                                  Public-Key Algorithms over Galois Fields
                                  \em GF$ ((2^n)^m) $  . . . . . . . . . . 363
                Reynald Lercier   Finding Good Random Elliptic Curves for
                                  Cryptosystems Defined over $ \mathbb
                                  {F}_{2^n} $  . . . . . . . . . . . . . . 379
                  Marc Fischlin   Incremental Cryptography and Memory
                                  Checkers . . . . . . . . . . . . . . . . 393
             Kaoru Kurosawa and   
           Thomas Johansson and   
             Douglas R. Stinson   Almost $k$-wise Independent Sample
                                  Spaces and Their Cryptologic
                                  Applications . . . . . . . . . . . . . . 409
                  Claude Carlet   More Correlation-Immune and Resilient
                                  Functions over Galois Fields and Galois
                                  Rings  . . . . . . . . . . . . . . . . . 422
             Kaoru Kurosawa and   
                  Takashi Satoh   Design of SAC/PC($l$ ) of Order $k$
                                  Boolean Functions and Three Other
                                  Cryptographic Criteria . . . . . . . . . 434--449
           Markus Jakobsson and   
                      Moti Yung   Distributed ``Magic Ink'' Signatures . . 450
               Jan L. Camenisch   Efficient and Generalized Group
                                  Signatures . . . . . . . . . . . . . . . 465
                 Niko Baric and   
               Birgit Pfitzmann   Collision-Free Accumulators and
                                  Fail-Stop Signature Schemes Without
                                  Trees  . . . . . . . . . . . . . . . . . 480
               Marc Girault and   
  Jean-François Misarsky   Selective Forgery of RSA Signatures
                                  Using Redundancy . . . . . . . . . . . . 495
                      Anonymous   Author Index . . . . . . . . . . . . . . 509


Lecture Notes in Computer Science
Volume 1234, 1997

                 S. Artemov and   
                 J. Davoren and   
                      A. Nerode   Topological Semantics for Hybrid Systems 1
                  G. Barthe and   
                M. H. Soerensen   Domain-Free Pure Type Systems  . . . . . 9
           O. V. Belegradek and   
         A. P. Stolboushkin and   
                 M. A. Taitslin   Generic Queries over Quasi-$o$-minimal
                                  Domains  . . . . . . . . . . . . . . . . 21
              M. A. Bukatin and   
                    J. S. Scott   Towards Computing Distances Between
                                  Programs via Scott Domains . . . . . . . 33
                       P. Clote   A Safe Recursion Scheme for Exponential
                                  Time . . . . . . . . . . . . . . . . . . 44
                   B. Courcelle   Finite Model Theory, Universal Algebra
                                  and Graph Grammars . . . . . . . . . . . 53
                 E. Dantsin and   
                    A. Voronkov   Complexity of Query Answering in Logic
                                  Databases with Complex Values  . . . . . 56
             M. I. Dekhtyar and   
                 A. J. Dikovsky   Recognition of Deductive Data Base
                                  Stability  . . . . . . . . . . . . . . . 67
                  S. M. Dudakov   The Concurrency Complexity for the Horn
                                  Fragment of Linear Logic . . . . . . . . 78
                      V. Durnev   Studying Algorithmic Problems for Free
                                  Semi-groups and Groups . . . . . . . . . 88
               R. Freivalds and   
                 G. Tervits and   
                R. Wiehagen and   
                       C. Smith   Learning Small Programs with Additional
                                  Information  . . . . . . . . . . . . . . 102
                 M. Gavrilovich   Cut Elimination for the Second Order
                                  Propositional Logic with Hilbert's
                                  symbol, Extensionality, and Full
                                  Comprehension  . . . . . . . . . . . . . 113
                   M. Golovanov   Finite Bases of Admissible Rules for the
                                  Logic S52C . . . . . . . . . . . . . . . 119
                   P. De Groote   An Algebraic Correctness Criterion for
                                  Intuitionistic Proof-Nets  . . . . . . . 130
                       D. Harel   Towards a Theory of Recursive Structures 141
                   B. Heinemann   On the Complexity of Prefix Formulas in
                                  Modal Logic of Subset Spaces . . . . . . 145
                          H. Xi   Simulating eta-expansions with $ \beta
                                  $-reductions in the Second-Order
                                  Polymorphic lambda-calculus  . . . . . . 399--409
                 R. E. Yavorsky   Logical Schemes for First Order Theories 410
                    V. Zakharov   Verification of PLTL Formulae by Means
                                  of Monotone Disjunctive Normal Forms . . 419


Lecture Notes in Computer Science
Volume 1235, 1997

                 R. Conradi and   
                 B. Westfechtel   Towards a Uniform Version Model for
                                  Software Configuration Management  . . . 1
            J. Buffenbarger and   
                      K. Gruell   What Have You Done for Me Lately?
                                  (Branches, Merges, and Change Logs)  . . 18
                    D. W. Weber   Change Sets Versus Change Packages:
                                  Comparing Implementations of
                                  Change-Based SCM . . . . . . . . . . . . 25
                 L. Wingerd and   
                     C. Seiwald   Constructing a Large Product with Jam    36
               J. Estublier and   
                    S. Dami and   
                      M. Amiour   High Level Process Modeling for SCM
                                  Systems  . . . . . . . . . . . . . . . . 81
                   J. X. Ci and   
               M. Poonawala and   
                    W. Tsai and   
                    A. K. Onoma   ScmEngine: A Distributed Software
                                  Configuration Management Environment on
                                  X.500  . . . . . . . . . . . . . . . . . 108
                 J. J. Hunt and   
                  F. Lamers and   
                  J. Reuter and   
                    W. F. Tichy   Distributed Configuration Management via
                                  Java and the World Wide Web  . . . . . . 161
               P. Froehlich and   
                       W. Nejdl   WebRC: Configuration Management for a
                                  Cooperation Tool . . . . . . . . . . . . 175
                       T. Kilpi   Product Management Requirements for SCM
                                  Discipline . . . . . . . . . . . . . . . 186
                 U. Asklund and   
                   B. Magnusson   A Case-Study of Configuration Management
                                  with ClearCase in an Industrial
                                  Environment  . . . . . . . . . . . . . . 201
                    I. Crnkovic   Experience with Change-Oriented SCM
                                  Tools  . . . . . . . . . . . . . . . . . 222


Lecture Notes in Computer Science
Volume 1236, 1997

              N. O. Bernsen and   
                L. Dybkjaer and   
                    H. Dybkjaer   User Errors in Spoken Human-Machine
                                  Dialogue . . . . . . . . . . . . . . . . 14
                   N. Dahlbaeck   Towards a Dialogue Taxonomy  . . . . . . 29
                   B. Grote and   
                   E. Hagen and   
                   A. Stein and   
                       E. Teich   Speech Production in Human-Machine
                                  Dialogue: A Natural Language Generation
                                  Perspective  . . . . . . . . . . . . . . 70
                  A. Abella and   
                M. K. Brown and   
                   B. Buntschuh   Development Principles for Dialog-Based
                                  Interfaces . . . . . . . . . . . . . . . 141
                 J. Barnett and   
                       M. Singh   Designing a Portable Spoken Dialogue
                                  System . . . . . . . . . . . . . . . . . 156
                   M. Araki and   
                     S. Doshita   Automatic Evaluation Environment for
                                  Spoken Dialogue Systems  . . . . . . . . 183
                   D. Gates and   
                   A. Lavie and   
                   L. Levin and   
                      A. Waibel   End-to-End Evaluation in JANUS: A
                                  Speech-to-speech Translation System  . . 195


Lecture Notes in Computer Science
Volume 1237, 1997

                  M. P. Wellman   Market-Aware Agents for a Multiagent
                                  World  . . . . . . . . . . . . . . . . . 1
                 Y. M. Ermoliev   Learning and Adoption Versus
                                  Optimization . . . . . . . . . . . . . . 2
               C. Castelfranchi   Limits of Strategic Rationality for
                                  Agents and M-A Systems . . . . . . . . . 3
                       M. Boman   Norms as Constraints on Real-Time
                                  Autonomous Agent Action  . . . . . . . . 36
              A. F. Dragoni and   
                P. Giorgini and   
                    M. Baffetti   Distributed Belief Revision vs. Belief
                                  Revision in a Multi-Agent Environment:
                                  First Results of a Simulation Experiment 45
                     E. De Jong   Multi-Agent Coordination by
                                  Communication of Evaluations . . . . . . 63
                  B. Chaib-draa   Causal Reasoning in Multi-Agent Systems  79
                  N. Glaser and   
                    P. Morignot   The Reorganization of Societies of
                                  Autonomous Agents  . . . . . . . . . . . 98
                  M. Fisher and   
                  M. Wooldridge   Distributed Problem-Solving as
                                  Concurrent Theorem Proving . . . . . . . 128
                    F. Ygge and   
                   H. Akkermans   Making a Case for Multi-Agent Systems    156
              L. Baerentzen and   
                   P. Avila and   
                 S. N. Talukdar   Learning Network Designs for
                                  Asynchronous Teams . . . . . . . . . . . 177
                  W. Joosen and   
                 S. Bijnens and   
                F. Matthijs and   
                      B. Robben   Building Multi-Agent Systems with
                                  CORRELATE  . . . . . . . . . . . . . . . 197
               C. M. Jonker and   
                       J. Treur   Modelling an Agent's Mind and Matter . . 210
           C. Castelfranchi and   
                     R. Falcone   Delegation Conflicts . . . . . . . . . . 234


Lecture Notes in Computer Science
Volume 1238, 1997

                  G. De Zen and   
                      L. Faglia   Video on Demand in an Integrated
                                  IN/B-ISDN Scenario . . . . . . . . . . . 5
                M. P. Evans and   
             K. T. Kettunen and   
            G. K. Blackwell and   
                  S. M. Furnell   Network Resource Adaptation in the
                                  DOLMEN Service Machine . . . . . . . . . 25
                 J. Huelamo and   
          H. Vanderstraeten and   
               J. C. Garcia and   
                       P. Coppo   A TINA based Prototype for a Multimedia
                                  Multiparty Mobility Service  . . . . . . 35
                    T. Choi and   
                     E. Son and   
                       K.-Y. Yu   DAVIC and The Internet Convergence: A
                                  Convergence Architecture Using WWW,
                                  JAVA, and CORBA  . . . . . . . . . . . . 77
                    H. Hussmann   Intelligent ATM Networks: Services and
                                  Realisation Alternatives . . . . . . . . 87
                    A. Dede and   
                 S. Arsenis and   
                   A. Tosti and   
                      F. Lucidi   OSAM Component Model, A key concept for
                                  the efficient design of future
                                  telecommunication systems  . . . . . . . 127
                  G. De Zen and   
                  L. Faglia and   
                H. Hussmann and   
              A. Van der Vekens   Proposal for an IN Switching State Model
                                  in an Integrated IN/B-ISDN Scenario  . . 179
                    J. Johansen   Harmonisation/Integration of B-ISDN and
                                  IN (EURESCOM project P506) . . . . . . . 189
                 Y. B. Choi and   
                        A. Tang   A Generic Service Order Handling
                                  Interface for the Cooperative Service
                                  Providers in the Deregulating and
                                  Competitive Telecommunications
                                  Environment  . . . . . . . . . . . . . . 211
                  U. Herzog and   
                    T. Magedanz   From IN toward TINA --- Potential
                                  Migration Steps  . . . . . . . . . . . . 219
                    V. Wade and   
                   D. Lewis and   
                M. Sheppard and   
                 M. Tschichholz   A Methodology for Developing Integrated
                                  Multi-domain Service Management Systems  245
                  S. Covaci and   
                      D. Dragan   Towards Harmonised Pan-European TMN
                                  Customer Care Solutions: Interoperable
                                  Trouble Ticketing Management Service . . 255
                 D. Griffin and   
                  G. Pavlou and   
                         T. Tin   Implementing TMN-like Management
                                  Services in a TINA Compliant
                                  Architecture: A Case Study on Resource
                                  Configuration Management . . . . . . . . 263
                C. Bleakley and   
                W. Donnelly and   
                A. Lindgren and   
                     H. Vuorela   TMN Specifications to Support
                                  Inter-Domain Exchange of Accounting,
                                  Billing and Charging Information . . . . 275
             L. H. Bjerring and   
                        P. Vorm   Domain Interoperability for Federated
                                  Connectivity Management  . . . . . . . . 293
                   A. Galis and   
                 C. Brianza and   
                   C. Leone and   
                   C. Salvatori   Towards Integrated Network Management
                                  for ATM and SDH Networks Supporting a
                                  Global Broadband Connectivity Management
                                  Service  . . . . . . . . . . . . . . . . 303
                    L. Deri and   
                         B. Ban   Static vs. Dynamic CMIP/SNMP Network
                                  Management using CORBA . . . . . . . . . 329
                  H. Dassow and   
                        G. Lehr   SNMP and TMN: Aspects of Migration and
                                  Integration  . . . . . . . . . . . . . . 339
                      G. Bogler   Internet --- New Inspiration for
                                  Telecommunications Management Network    359
              J. C. Francis and   
                        B. Diem   Towards Global Multimedia Mobility . . . 371
             E. P. Adamidis and   
                 G. Fleming and   
                    E. D. Sykas   Consistency Issues in the UMTS
                                  Distributed Database . . . . . . . . . . 403
                  F. Gagnon and   
                 D. Maillot and   
                  J. Oelnes and   
                     L. Hofseth   A Security Architecture for TMN
                                  Inter-Domain Management  . . . . . . . . 417
                    D. Whinnett   End User Acceptance of Security
                                  Technology for Electronic Commerce . . . 447
                    J. Fink and   
                   A. Kobsa and   
                     J. Schreck   Personalized Hypermedia Information
                                  Provision through Adaptive and Adaptable
                                  System Features: User Modelling, Privacy
                                  and Security Issues  . . . . . . . . . . 459
                    L. Deri and   
                     D. Manikis   VRML: Adding $3$D to Network Management  469


Lecture Notes in Computer Science
Volume 1239, 1997

                  K. Cooper and   
                 K. Kennedy and   
                    N. McIntosh   Cross-Loop Reuse Analysis and Its
                                  Application to Cache Optimizations . . . 1
                 E. Ayguade and   
                  J. Garcia and   
               M. L. Grande and   
                     J. Labarta   Data Distribution and Loop
                                  Parallelization for Shared-Memory
                                  Multiprocessors  . . . . . . . . . . . . 41
                 A. Yoshida and   
                    H. Kasahara   Data Localization Using Loop Aligned
                                  Decomposition for Macro-Dataflow
                                  Processing . . . . . . . . . . . . . . . 56
              B. Creusillet and   
                     F. Irigoin   Exact versus Approximate Array Region
                                  Analyses . . . . . . . . . . . . . . . . 86
                  T. Autrey and   
                       M. Wolfe   Initial Results for Glacial Variable
                                  Analysis . . . . . . . . . . . . . . . . 120
                        J. Fang   Compiler Algorithms on If-Conversion,
                                  Speculative Predicate Assignment and
                                  Predicated Code Optimizations  . . . . . 135
               V. Donaldson and   
                    J. Ferrante   Determining Asynchronous Pipeline
                                  Execution Times  . . . . . . . . . . . . 154
               D. A. Berson and   
                   P. Chang and   
                   R. Gupta and   
                    M. L. Soffa   Integrating Program Optimizations and
                                  Transformations with the Scheduling of
                                  Instruction Level Parallelism  . . . . . 207
                   P. Chang and   
                 D.-Y. Chen and   
                  Y.-F. Lee and   
                          Y. Wu   Bidirectional Scheduling: A New Global
                                  Code Scheduling Approach . . . . . . . . 222
              B. D. De Dinechin   Parametric Computation of Margins and of
                                  Minimum Cumulative Register Lifetime
                                  Dates  . . . . . . . . . . . . . . . . . 231
                   P. Diniz and   
                      M. Rinard   Lock Coarsening: Eliminating Lock
                                  Overhead in Automatically Parallelized
                                  Object-Based Programs  . . . . . . . . . 285
               R. Eigenmann and   
                    I. Park and   
                     M. J. Voss   Are Parallel Workstations the Right
                                  Target for Parallelizing Compilers?  . . 300
                         J. Xue   Communication-Minimal Tiling of Uniform
                                  Dependence Loops . . . . . . . . . . . . 330
                   R. Barua and   
                   D. Kranz and   
                     A. Agarwal   Communication-Minimal Partitioning of
                                  Parallel Loops and Data Arrays for
                                  Cache-Coherent Distributed-Memory
                                  Multiprocessors  . . . . . . . . . . . . 350
                 K. Kennedy and   
                       A. Sethi   Resource-Based Communication Placement
                                  Analysis . . . . . . . . . . . . . . . . 369
                 S. Chandra and   
                    J. R. Larus   HPF on Fine-Grain Distributed Shared
                                  Memory: Early Experience . . . . . . . . 450
               A. J. C. Bik and   
              H. A. G. Wijshoff   Simple Qualitative Experiments with a
                                  Sparse Compiler  . . . . . . . . . . . . 466
          B. L. Chamberlain and   
                 S.-E. Choi and   
                E. C. Lewis and   
                      L. Snyder   Factor-Join: A Unique Approach to
                                  Compiling Array Languages for Parallel
                                  Machines . . . . . . . . . . . . . . . . 481
                    A. John and   
                   J. C. Browne   Compilation of Constraint Systems to
                                  Procedural Parallel Programs . . . . . . 501
                     Arvind and   
                    A. Caro and   
              J.-W. Maessen and   
                      S. Aditya   A Multithreaded Substrate and
                                  Compilation Model for the Implicitly
                                  Parallel Language pH . . . . . . . . . . 519
                 L. V. Kale and   
                   J. Yelon and   
                      T. Knauff   Threads for Interoperable Parallel
                                  Programming  . . . . . . . . . . . . . . 534
                Y.-S. Hwang and   
                       J. Saltz   Side Effect Analysis on User-Defined
                                  Reduction Functions with Dynamic
                                  Pointer-Linked Data Structures . . . . . 594
                  M. Griebl and   
                    C. Lengauer   The Loop Parallelizer LooPo ---
                                  Announcement . . . . . . . . . . . . . . 603
         P. F. G. Dechering and   
            L. C. Breebaart and   
                F. Kuijlman and   
                C. Van Reeuwijk   A Generalized Forall Concept for
                                  Parallel Languages . . . . . . . . . . . 605


Lecture Notes in Computer Science
Volume 1240, 1997

                   J. De Felipe   Microcircuits in the Brain . . . . . . . 1
                  R. Alonso and   
          I. Lopez-Coviella and   
          F. Hernandez-Diaz and   
                       P. Abreu   Interactions Between Environmental and
                                  Hormonal Oscillations Induce Plastic
                                  Changes in a Simple Neuroendocrine
                                  Transducer . . . . . . . . . . . . . . . 72
          B. Aleksandrovsky and   
                F. Bruecher and   
                   G. Lynch and   
                     R. Granger   Neural Network Model of Striatal Complex 103
                T. J. Anastasio   Symmetry and Self-Organization of the
                                  Oculo-Motor Neural Integrator  . . . . . 116
       J. M. Delgado-Garcia and   
                  A. Gruart and   
              J. A. Domingo and   
                    J. A. Trigo   Quantal Neural Mechanisms Underlying
                                  Movement Execution and Motor Learning    124
                  E. Andreu and   
                 R. Pomares and   
                   B. Soria and   
           J. V. Sanchez-Andres   Balance Between Intercellular Coupling
                                  and Input Resistence as a Necessary
                                  Requirement for Oscillatory Electrical
                                  Activity in Pancreatic $ \beta $-Cells   146--153
                     I. Gonzalo   Allometry in the Justo Gonzalo's Model
                                  of the Sensorial Cortex  . . . . . . . . 169
                 V. Gimenez and   
       M. Perez-Castellanos and   
            J. Rios Carrion and   
                    F. De Mingo   Capacity and Parasitic Fixed Points
                                  Control in a Recursive Neural Network    217
                 M. Hilario and   
                        A. Rida   The Use of Prior Knowledge in Neural
                                  Network Configuration and Training . . . 227
            A. C. C. Coolen and   
                       L. Viana   Competition Between Feed-Forward and
                                  Lateral Information Processing in
                                  Layered Neural Networks  . . . . . . . . 257
                S.-I. Amari and   
                      N. Murata   Statistical Analysis of Regularization
                                  Constant --- From Bayes, MDL and NIC
                                  Points of View . . . . . . . . . . . . . 284
        M. Garcia Del Valle and   
         C. Garcia-Orellana and   
         F. J. Lopez-Aligue and   
              I. Acevedo-Sotoca   Generic Neural Network Model and
                                  Simulation Toolkit . . . . . . . . . . . 313
                    J. Feng and   
                       D. Brown   Viewing a Class of Neurodynamics on
                                  Parameter Space  . . . . . . . . . . . . 546
                    G. Joya and   
              M. A. Atencia and   
                    F. Sandoval   Hopfield Neural Network Applied to
                                  Optimization Problems: Some Theoretical
                                  and Simulation Results . . . . . . . . . 556
                   F. Gagne and   
                      C. Blaise   Predicting Toxicity of Complex Mixtures
                                  by Artificial Neural Networks  . . . . . 576
                  I. Grabec and   
                     S. Mandelj   Continuation of Chaotic Fields by RBFNN  597
                  A. Chinea and   
               J. M. Moreno and   
                J. Madrenas and   
                   J. Cabestany   Improving the Performance of Piecewise
                                  Linear Separation Incremental Algorithms
                                  for Practical Hardware Implementations   607
                 G. Bologna and   
                  C. Pellegrini   Accurate Decomposition of Standard MLP
                                  Classification Responses into Symbolic
                                  Rules  . . . . . . . . . . . . . . . . . 617
B. Guijarro-Berdiñas and   
         A. Alonso-Betanzos and   
           S. Prados-Mendez and   
            O. Fernandez-Chaves   A Hybrid Intelligent System for the
                                  Preprocessing of Fetal Heart Rate
                                  Signals in Antenatal Testing . . . . . . 628
                   L. A. Coward   The Pattern Extraction Architecture: A
                                  Connectionist Alternative to the Von
                                  Neumann Architecture . . . . . . . . . . 634
     J. Barahona Da Fonseca and   
     I. Barahona Da Fonseca and   
           J. Simoes Da Fonseca   Cognitive Processes in Social
                                  Interaction --- A Neural Networks
                                  Approach . . . . . . . . . . . . . . . . 660
             F. J. Corbacho and   
                    M. A. Arbib   Schema-Based Learning: Biologically
                                  Inspired Principles of Dynamic
                                  Organization . . . . . . . . . . . . . . 678
                       P. Ienne   Digital Connectionist Hardware: Current
                                  Problems and Future Challenges . . . . . 688
                    V. Beiu and   
                     T. De Pauw   Tight Bounds on the Size of Neural
                                  Networks for Classification Problems . . 743
                S. Draghici and   
                    I. K. Sethi   On the Possibilities of the Limited
                                  Precision Weights Neural Networks in
                                  Classification Problems  . . . . . . . . 753
              J. L. Bernier and   
                  J. Ortega and   
                      A. Prieto   A Modified Backpropagation Algorithm to
                                  Tolerate Weight Errors . . . . . . . . . 763
                    K. Asanovic   A Fast Kohonen Net Implementation for
                                  Spert-II . . . . . . . . . . . . . . . . 792
                 F. Colodro and   
                A. Torralba and   
                R. Gonzalez and   
                L. G. Franquelo   A Hardware Implementation of CNNs Based
                                  on Pulse Stream Techniques . . . . . . . 811
                 B. Granado and   
                       P. Garda   Evaluation of the CNAPS Neuro-Computer
                                  for the Simulation of MLPs with
                                  Receptive Fields . . . . . . . . . . . . 817
             R. G. Carvajal and   
                A. Torralba and   
                 F. Colodro and   
                L. G. Franquelo   AFAN, a Tool for the Automatic Design of
                                  Fuzzy and Neural Controllers . . . . . . 825
                 F. Colodro and   
                A. Torralba and   
                R. Gonzalez and   
                L. G. Franquelo   A Fully Stochastic Fuzzy Logic
                                  Controller . . . . . . . . . . . . . . . 834
                 A. Chebira and   
                  K. Madani and   
                     G. Mercier   Multi-neural Networks Hardware and
                                  Software Architecture: Application of
                                  the Divide To Simplify Paradigm DTS  . . 841
                M. Cottrell and   
                     P. Rousset   The Kohonen Algorithm: A Powerful Tool
                                  for Analyzing and Representing
                                  Multidimensional Quantitative and
                                  Qualitative Data . . . . . . . . . . . . 861
            A. Guerin-Dugue and   
                P. Teissier and   
             J.-L. Schwartz and   
                     J. Herault   Constrained Neural Network for
                                  Estimating Sensor Reliability in Sensors
                                  Fusion . . . . . . . . . . . . . . . . . 872
                  J. R. Alvarez   Structural Level Comparison of Two Basic
                                  Paradigms in Neural Computation  . . . . 892
             E. L. Barakova and   
                 I. Spaanenburg   Symmetry: Between Indecision and
                                  Equality of Choice . . . . . . . . . . . 903
                  J. Dopazo and   
                    H. Wang and   
                   J. M. Carazo   A New Type of Unsupervised Growing
                                  Neural Network for Biological Sequence
                                  Classification That Adopts the Topology
                                  of a Phylogenetic Tree . . . . . . . . . 932
             E. Braithwaite and   
                  J. Dripps and   
                    A. Lyon and   
                   A. F. Murray   Classification of the Onset of
                                  Respiratory Difficulties in Ventilation
                                  Assisted Neonates  . . . . . . . . . . . 942
                 R. J. Duro and   
                      J. Santos   ECG Beat Classification with Synaptic
                                  Delay Based Artificial Neural Networks   962
              F. Andrianasy and   
                     M. Milgram   Neural Network-Based Insulin Infusion
                                  Control for an Insulin-Pump, Using
                                  Discontinuous Blood Glucose Measurements 971
         A. Alonso-Betanzos and   
            E. Mosquera-Rey and   
           B. Baldonedo Del Rio   A Comparative Analysis of the Neonatal
                                  Prognosis Problem Using Artificial
                                  Neural Networks, Statistical Techniques
                                  and Certainty Management Techniques  . . 995
                     R. Eckhorn   Models of Visual Processing Derived from
                                  Cortical Microelectrode Recordings . . . 1005
                    G. Joya and   
                    F. Sandoval   Neural Networks Based Projectivity
                                  Invariant Recognition of Flat Patterns   1038
            J. M. Ferrandez and   
               D. Del Valle and   
                V. Rodellar and   
                       P. Gomez   A Biological Front-End Processing for
                                  Speech Recognition . . . . . . . . . . . 1058
        G. Hernandez Abrego and   
                   E. Monte and   
                  J. B. Maritho   Non Parametric Coding of Speech by Means
                                  of a MLP with Hints  . . . . . . . . . . 1068
                   C. Croll and   
                D. Pellerin and   
                     J. Herault   Multidimensional Filtering Inspired by
                                  Retino-cortical Projection: Application
                                  to Texture Segmentation  . . . . . . . . 1085
                   C.-H. Yi and   
              R. Schlabbach and   
                   H. Kroth and   
                        H. Klar   A New Bio-inspired Algorithm for Early
                                  Vision Edge Detection and Image
                                  Segmentation . . . . . . . . . . . . . . 1107
                   N. Ishii and   
                      K.-I Naka   Function of Biological Asymetrical
                                  Neural Networks  . . . . . . . . . . . . 1115
                  P. Hofman and   
                  J. Van Opstal   Identification of Spectral Features as
                                  Sound Localization Cues in the External
                                  Ear Acoustics  . . . . . . . . . . . . . 1126
                 F. Freitag and   
                       E. Monte   Phoneme Recognition by Means of
                                  Predictive Neural Networks . . . . . . . 1136
                     Y. Won and   
                  B.-H. Lee and   
                 Y.-C. Baek and   
                      J.-S. Lee   Shift-Invariant Fuzzy-Morphology Neural
                                  Network for Occluded Target Recognition  1144
                 M. Faundez and   
                   E. Monte and   
                   F. Vallverdu   A Comparative Study Between Linear and
                                  Nonlinear Speech Prediction  . . . . . . 1154
                    P. Kalocsai   Recognition Model with Extension Fields  1164
                 J. Brezmes and   
               N. Canyellas and   
                  E. Llobet and   
                    X. Vilanova   Application of Artificial Neural
                                  Networks to the Design and
                                  Implementation of Electronic Olfactory
                                  Systems  . . . . . . . . . . . . . . . . 1183
                    F. Diaz and   
            J. M. Ferrandez and   
                   P. Gomez and   
                    V. Rodellar   Spoken-Digit Recognition Using
                                  Self-Organizing Maps with Perceptual
                                  Pre-processing . . . . . . . . . . . . . 1203
         C. Garcia-Berdones and   
                 J. Narvaez and   
               U. Fernandez and   
                    F. Sandoval   A New QRS Detector Based on Neural
                                  Network  . . . . . . . . . . . . . . . . 1260
                   O. Bella and   
                  C. Cortes and   
                       A. Tomas   Application of Neural Networks for Local
                                  Modelization of the Boiler Furnace in
                                  Thermal Power Plants . . . . . . . . . . 1270
        P. Hernandez-Arauzo and   
            S. Lopez-Garcia and   
                   A. Bahamonde   Artificial Neural Networks for the
                                  Computation of Traffic Queues  . . . . . 1288
          P. Isasi-Vithuela and   
         J. M. Molina-Lopez and   
           A. Sanchis De Miguel   Unsupervised Neural Network for
                                  Forecasting Alarms in Hydroelectric
                                  Power Plant  . . . . . . . . . . . . . . 1298
                  T. Felzer and   
                P. Hartmann and   
                    K. Hohm and   
                   P. Marenbach   Motor Sequence Processing with an
                                  Artificial Learning System . . . . . . . 1307
                 E. Cervera and   
               A. P. Del Poblil   Integration of Self-Organizing Feature
                                  Maps and Reinforcement Learning in
                                  Robotics . . . . . . . . . . . . . . . . 1344
                R. Iglesias and   
             C. V. Regueiro and   
                  D. Correa and   
                       S. Barro   Implementation of a Basic Reactive
                                  Behavior in Mobile Robotics Through
                                  Artificial Neural Networks . . . . . . . 1364
           G. De Tremiolles and   
                 P. Tannhof and   
              B. Plougonven and   
                   C. Demarigny   Visual Probe Mark Inspection, Using
                                  Hardware Implementation of Artificial
                                  Neural Networks, in VLSI Production  . . 1374


Lecture Notes in Computer Science
Volume 1241, 1997

                Kristen Nygaard   GOODS to Appear on the Stage . . . . . . 1
    Paulo Sérgio Almeida   Balloon Types: Controlling Sharing of
                                  State in Data Types  . . . . . . . . . . 32
  Véronique Benzaken and   
                Xavier Schaefer   Static Integrity Constraint Management
                                  in Object-Oriented Database Programming
                                  Languages via Predicate Transformers . . 60
              Robert Miller and   
                 Anand Tripathi   Issues with Exception Handling in
                                  Object-Oriented Systems  . . . . . . . . 85
               Kim B. Bruce and   
              Leaf Petersen and   
                   Adrian Fiech   Subtyping is not a Good ``Match'' for
                                  Object-Oriented Languages  . . . . . . . 104
              Andreas Krall and   
                  Jan Vitek and   
              R. Nigel Horspool   Near Optimal Hierarchical Encoding of
                                  Types  . . . . . . . . . . . . . . . . . 128
                  Luigi Liquori   An Extended Theory of Primitive Objects:
                                  First Order System . . . . . . . . . . . 146
            Charlotte Pii Lunau   A Reflective Architecture for Process
                                  Control Applications . . . . . . . . . . 170
                    Mira Mezini   Dynamic Object Evolution without Name
                                  Collisions . . . . . . . . . . . . . . . 190
            Gregor Kiczales and   
               John Lamping and   
           Anurag Mendhekar and   
                Chris Maeda and   
             Cristina Lopes and   
        Jean-Marc Loingtier and   
                     John Irwin   Aspect-Oriented Programming  . . . . . . 220
                  Huw Evans and   
                  Peter Dickman   DRASTIC: A Run-Time Architecture for
                                  Evolving, Distributed, Persistent
                                  Systems  . . . . . . . . . . . . . . . . 243
                 Wade Holst and   
                  Duane Szafron   A General Framework for Inheritance
                                  Management and Method Dispatch in
                                  Object-Oriented Languages  . . . . . . . 276
             Tamiya Onodera and   
               Hiroaki Nakamura   Optimizing Smalltalk by Selector Code
                                  Indexing Can Be Practical  . . . . . . . 302
           J. C. Bicarregui and   
                 K. C. Lano and   
               T. S. E. Maibaum   Objects, Associations and Subsystems: A
                                  Hierarchical Approach to Encapsulation   324
                  Ruth Breu and   
              Ursula Hinkel and   
          Christoph Hofmann and   
               Cornel Klein and   
              Barbara Paech and   
             Bernhard Rumpe and   
               Veronika Thurner   Towards a Formalization of the Unified
                                  Modeling Language  . . . . . . . . . . . 344
                 Franz Puntigam   Coordination Requirements Expressed in
                                  Types for Active Objects . . . . . . . . 367
        Sophia Drossopoulou and   
                Susan Eisenbach   Java is Type Safe --- Probably . . . . . 389
             Christian Prehofer   Feature-Oriented Programming: A Fresh
                                  Look at Objects  . . . . . . . . . . . . 419
            Kresten Krab Thorup   Genericity in Java with Virtual Types    444
               Gert Florijn and   
              Marco Meijers and   
              Pieter van Winsen   Tool Support for Object-Oriented
                                  Patterns . . . . . . . . . . . . . . . . 472
            Matthias Meusel and   
        Krzysztof Czarnecki and   
             Wolfgang Köpf   A Model for Structuring User
                                  Documentation of Object- Oriented
                                  Frameworks Using Patterns and Hypertext  496
             Georg Odenthal and   
         Klaus Quibeldey-Cirkel   Using Patterns for Design and
                                  Documentation  . . . . . . . . . . . . . 511
                    Erich Gamma   Going Beyond Objects with Design
                                  Patterns . . . . . . . . . . . . . . . . 530
                      Anonymous   Author Index . . . . . . . . . . . . . . 531


Lecture Notes in Computer Science
Volume 1242, 1997

                K. Achtmann and   
              K.-H. Doering and   
                  R. Herher and   
                        G. Komp   An ATM-based Demonstration Model for
                                  Multimedia Services Using Different
                                  Access Networks  . . . . . . . . . . . . 1
                H. Hussmann and   
              F. J. Herrera and   
                R. Pasquali and   
                    P. Todorova   A Transnational IN/B-ISDN Integrated
                                  Network for the Provision of Multimedia
                                  Services . . . . . . . . . . . . . . . . 19
            B.-E. Johansson and   
              M. Andreasson and   
                  H. Flinck and   
                     M. Kalervo   Divide Your Systems to Conquer the
                                  Market . . . . . . . . . . . . . . . . . 37
                    A. Cole and   
                J. Robinson and   
                      C. Athwal   The Design and Implementation of a
                                  Multimedia System for the Interactive
                                  and Time-Synchronised Analysis of
                                  Vehicle Crash Tests  . . . . . . . . . . 79
              D. Waddington and   
                 C. Edwards and   
                   D. Hutchison   Resource Management for Distributed
                                  Multimedia Applications  . . . . . . . . 95
              C. Greenhalgh and   
                     S. Benford   A Multicast Network Architecture for
                                  Large Scale Collaborative Virtual
                                  Environments . . . . . . . . . . . . . . 113
                 E. De Hert and   
                R. Guarneri and   
                 S. Malmros and   
                       K. Start   Consensus Making Activities in Europe:
                                  The Example of Multimedia in ACTS  . . . 129
             J. F. Delaigle and   
         C. De Vleeschouwer and   
                  F. Goffin and   
                        B. Macq   Low Cost Watermarking Based on a Human
                                  Visual Model . . . . . . . . . . . . . . 153
                 S. Bessler and   
                   M. Hager and   
                    H. Benz and   
                 R. Mecklenburg   DIANE: A Multimedia Annotation System    183
              S. Antoniazzi and   
                  C. Ievola and   
                E. Marcozzi and   
                       R. Penzo   An Authoring and Run-Time Environment
                                  for Interactive Multimedia Services  . . 245
                 E. Badique and   
                    A. Barbagli   Tools for Multimedia Content Creation,
                                  Manipulation and Management: The ACTS
                                  Perspective  . . . . . . . . . . . . . . 261
                   R. Allan and   
                      C. Taylor   Interaction with Digital Broadcast
                                  Services Through a Terrestrial Return
                                  Channel  . . . . . . . . . . . . . . . . 277
                  F. Guirao and   
                 L. Van Noorden   The Work of ACTS in Interactive
                                  Distribution and Transmission: Towards
                                  Interoperable Interactive Multimedia
                                  Services . . . . . . . . . . . . . . . . 309
                  M. Brelot and   
                      G. Privat   Object Encapsulation of Multiscale Image
                                  Region Representations . . . . . . . . . 375
                 F. Hartung and   
                       B. Girod   Copyright Protection in Video Delivery
                                  Networks by Watermarking of
                                  Pre-compressed Video . . . . . . . . . . 423
                 C. Djeraba and   
                      H. Briand   Temporal and Interactive Relations in a
                                  Multimedia Database System . . . . . . . 457
         S. Christodoulakis and   
                  N. Pappas and   
               G. Kyriakaki and   
                Y. Maragoudakis   The KYDONIA Multimedia Information
                                  Server . . . . . . . . . . . . . . . . . 491
               D. Hutchison and   
              R. El-Marakby and   
                       L. Mathy   A Critique of Modern Internet Protocols:
                                  The Issue of Support for Multimedia  . . 507
                   R. Bolla and   
                M. Marchese and   
                   S. Zappatore   A Congestion Control Scheme for
                                  Multimedia Traffic in Packet Switching
                                  Best-Effort Networks . . . . . . . . . . 523
                      M. Alfano   User Requirements and Resource Control
                                  for Cooperative Multimedia Applications  537
                 D. De Lang and   
                P. Balsiger and   
             H. Eggenhuisen and   
                     P. Gardien   Swiss TopVision, the Trial With
                                  Interactive Content  . . . . . . . . . . 571
                      N. Harper   Consumer Interactivity in Cambridge  . . 581
                F. Carducci and   
                    R. Giubilei   ISIS Project --- Demonstration System
                                  and Pilot Trials . . . . . . . . . . . . 609
              S. Antoniazzi and   
                   G. Schapeler   An Open Software Architecture for
                                  Multimedia Consumer Terminals  . . . . . 621
                P. Charlton and   
                F. Espinoza and   
                 E. Mamdani and   
                      O. Olsson   Using an Asset Model for Integration of
                                  Agents and Multimedia to Provide an Open
                                  Service Architecture . . . . . . . . . . 635
              T. Zahariadis and   
                    A. Dede and   
                 I. Maffett and   
              G. Stassinopoulos   Telelearning: New Trends in Education
                                  Through Global Multimedia Networks . . . 681
                E. J. Gomez and   
                    P. Cano and   
                F. Del Pozo and   
                       H. Rahms   The BONAPARTE Telemedicine ATM
                                  Multimedia Applications  . . . . . . . . 693
                  H. Elbert and   
                  J. Enssle and   
                   M. Frank and   
               H. Hessenmueller   Multimedia Service Provisioning in the
                                  Munich Trial of the AMUSE Project  . . . 739


Lecture Notes in Computer Science
Volume 1243, 1997

                 J. Gunawardena   Recent developments in the mathematics
                                  of reactive systems  . . . . . . . . . . 1
            J. G. Henriksen and   
              P. S. Thiagarajan   A product version of dynamic linear time
                                  temporal logic . . . . . . . . . . . . . 45
                   M. Abadi and   
                   A. D. Gordon   Reasoning about cryptographic protocols
                                  in the Spi calculus  . . . . . . . . . . 59
                    R. Alur and   
                T. A. Henzinger   Modularity for timed and hybrid systems  74
             H. R. Andersen and   
                   S. Moerk and   
                M. U. Soerensen   A universal reactive machine . . . . . . 89
            J. C. M. Baeten and   
                 J. A. Bergstra   Bounded stacks, bags and queues  . . . . 104
                    G. Bhat and   
                       D. Peled   Adding partial orders to linear temporal
                                  logic  . . . . . . . . . . . . . . . . . 119
               A. Bouajjani and   
                 J. Esparza and   
                       O. Maler   Reachability analysis of pushdown
                                  automata: application to model-checking  135
                    N. Busi and   
                    G. M. Pinna   Synthesis of nets with inhibitor arcs    151
              R. Cleaveland and   
                G. Luettgen and   
                     M. Mendler   An algebraic theory of multiple clocks   166
                   H. Ehrig and   
                 R. Geisler and   
                    M. Klar and   
                     J. Padberg   Horizontal and vertical structuring
                                  techniques for statecharts . . . . . . . 181
                 C. Fournet and   
                  C. Laneve and   
                L. Maranget and   
                        D. Remy   Implicit typing a la ML for the
                                  join-calculus  . . . . . . . . . . . . . 196
                L. Fribourg and   
                       H. Olsen   Proving safety properties of infinite
                                  state systems by compilation into
                                  Presburger arithmetic  . . . . . . . . . 213
                   V. Gupta and   
              R. Jagadeesan and   
                    V. Saraswat   Probabilistic concurrent constraint
                                  programming  . . . . . . . . . . . . . . 243
                   D. Harel and   
               O. Kupferman and   
                    M. Y. Vardi   On the complexity of verifying
                                  concurrent transition systems  . . . . . 258
            T. A. Henzinger and   
               O. Kupferman and   
                 S. K. Rajamani   Fair simulation  . . . . . . . . . . . . 273
                  H. Wimmel and   
                      L. Priese   Algebraic characterization of Petri net
                                  pomset semantics . . . . . . . . . . . . 406


Lecture Notes in Computer Science
Volume 1244, 1997

                     A. Appriou   Multisensor Data Fusion in Situation
                                  Assessment Processes . . . . . . . . . . 1
                        S. Bell   Dependency Mining in Relational
                                  Databases  . . . . . . . . . . . . . . . 16
               S. Benferhat and   
                  D. Dubois and   
                       H. Prade   Syntactic Combination of Uncertain
                                  Information: A Possibilistic Approach    30
               S. Benferhat and   
                      L. Garcia   A Coherence-Based Approach to Default
                                  Reasoning  . . . . . . . . . . . . . . . 43
                   P. Bison and   
                G. Chemello and   
                  C. Sossai and   
                    G. Trainito   A Syntactical Approach to Data Fusion    58
                 C. Borgelt and   
                       R. Kruse   Some Experimental Results on Learning
                                  Probabilistic and Possibilistic Networks
                                  with Different Evaluation Measures . . . 71
                  L. Cholvy and   
                      A. Hunter   Information Fusion in Logic: A Brief
                                  Overview . . . . . . . . . . . . . . . . 86
                  D. Dubois and   
                       H. Prade   Focusing vs. Belief Revision: A
                                  Fundamental Distinction When Dealing
                                  with Generic Knowledge . . . . . . . . . 96
                J. Gebhardt and   
                       R. Kruse   Background and Perspectives of
                                  Possibilistic Graphical Models . . . . . 108
                       J. Woods   Just How Stupid Is Postmodernism?  . . . 154
                  L. Amgoud and   
                      C. Cayrol   Integrating Preference Orderings into
                                  Argument-Based Reasoning . . . . . . . . 159
                   B. Anrig and   
                  R. Haenni and   
                  J. Kohlas and   
                     N. Lehmann   Assumption-Based Modeling Using ABEL . . 171
                 P. Besnard and   
          J.-M. Guinnebault and   
                       E. Mayer   Propositional Quantification for
                                  Conditional Logic  . . . . . . . . . . . 183
                  R. Bissig and   
                  J. Kohlas and   
                     N. Lehmann   Fast-Division Architecture for
                                  Dempster-Shafer Belief Functions . . . . 198
               J. Delechamp and   
             B. Bouchon-Meunier   Graduality by Means of Analogical
                                  Reasoning  . . . . . . . . . . . . . . . 210
      F. Dupin De Saint-Cyr and   
                        J. Lang   Reasoning About Unpredicted Change and
                                  Explicit Time  . . . . . . . . . . . . . 223
                    U. Egly and   
                     H. Tompits   Non-elementary Speed-Ups in Default
                                  Reasoning  . . . . . . . . . . . . . . . 237
              J. Engelfriet and   
                       J. Treur   A Compositional Reasoning System for
                                  Executing Nonmonotonic Theories of
                                  Reasoning  . . . . . . . . . . . . . . . 252
                  D. Gabbay and   
                   O. Rodrigues   Structured Belief Bases: A Practical
                                  Approach to Prioritised Base Revision    267
                   K. Georgatos   Entrenchment Relations: A Uniform
                                  Approach to Nonmonotonicity  . . . . . . 282
                   B. Heinemann   A Modal Logic for Reasoning about
                                  Knowledge and Time on Binary Subset
                                  Trees  . . . . . . . . . . . . . . . . . 298
                      A. Herzig   How to Change Factual Beliefs Using Laws
                                  and Dependence Information . . . . . . . 311
                      A. Hunter   Using Default Logic for Lexical
                                  Knowledge  . . . . . . . . . . . . . . . 322
      P. H. Ibargueengoytia and   
                  S. Vadera and   
                    L. E. Sucar   A Layered, Anytime Approach to Sensor
                                  Validation . . . . . . . . . . . . . . . 336
                  N. Jitnah and   
                   A. Nicholson   treeNets: A Framework for Anytime
                                  Evaluation of Belief Networks  . . . . . 350
               G. Kern-Isberner   A Logically Sound Method for Uncertain
                                  Reasoning with Quantified Conditionals   365
                   F. Voorbraak   Combining Evidence under Partial
                                  Ignorance  . . . . . . . . . . . . . . . 574
                     E. Weydert   Rational Default Quantifier Logic  . . . 589
                       Y. Zhang   Disjunctive Update, Minimal Change, and
                                  Default Reasoning  . . . . . . . . . . . 600
               R. Demolombe and   
             A. J. I. Jones and   
                       J. Carmo   Toward a Uniform Logical Representation
                                  of Different Kinds of Integrity
                                  Constraints  . . . . . . . . . . . . . . 614


Lecture Notes in Computer Science
Volume 1245, 1997

          R. M. L. R. Carmo and   
          L. R. De Carvalho and   
       E. De Souza e. Silva and   
                    M. C. Diniz   TANGRAM-II: A performability modeling
                                  environment tool . . . . . . . . . . . . 6
                 H. De Meer and   
                   H. Sevcikova   PENELOPE: Dependability evaluation and
                                  the optimization of performability . . . 19
                  G. Ciardo and   
                    A. S. Miner   Storage alternatives for large
                                  structured state spaces  . . . . . . . . 44
             D. D. Deavours and   
                  W. H. Sanders   An efficient disk-based tool for solving
                                  very large Markov models . . . . . . . . 58
                  G. Bernat and   
                   A. Burns and   
                     A. Llamosi   Efficient transient overload tests for
                                  real-time systems  . . . . . . . . . . . 72
                  G. Hasslinger   Towards an analytical tool for
                                  performance modeling of ATM networks by
                                  decomposition  . . . . . . . . . . . . . 83
               A. E. Conway and   
                 S. B. Moon and   
                      P. Skelly   Synchronized two-way voice simulation
                                  for Internet phone performance analysis
                                  and evaluation . . . . . . . . . . . . . 108
                      R. German   SPNL: Processes as language-oriented
                                  building blocks of stochastic Petri nets 123
                  J. Dilley and   
               R. Friedrich and   
                     T. Jin and   
                       J. Rolia   Measurement tools and modeling
                                  techniques for evaluating WEB server
                                  performance  . . . . . . . . . . . . . . 155
                   M. Braun and   
                      G. Kotsis   Interval based workload characterization
                                  for distributed systems  . . . . . . . . 181
             J.-M. Fourneau and   
                  L. Mokdad and   
                    N. Pekergin   Bounding the loss rates in a multistage
                                  ATM switch . . . . . . . . . . . . . . . 193
                 S. Balsamo and   
                        I. Mura   On queue length moments in fork and join
                                  queuing networks with general service
                                  times  . . . . . . . . . . . . . . . . . 218


Lecture Notes in Computer Science
Volume 1247, 1997

              John G. P. Barnes   Ada 95 rationale: the language, the
                                  standard libraries . . . . . . . . . . . xii + 458


Lecture Notes in Computer Science
Volume 1248, 1997

                 J. Esparza and   
                      S. Melzer   Model Checking LTL Using Constraint
                                  Programming  . . . . . . . . . . . . . . 1
                   P. Habermehl   On the Complexity of the Linear-Time $
                                  \mu $-calculus for Petri Nets  . . . . . 102
                 W. Fraczak and   
                        E. Pelz   Improved Implementations via a New
                                  Structural Equivalence on Labelled Nets  117
                    T. Aura and   
                      J. Lilius   Time Processes for Time Petri Nets . . . 136
                  S. Haddad and   
                 P. Moreaux and   
                      G. Chiola   Efficient Handling of Phase-Type
                                  Distributions in Generalized Stochastic
                                  Petri Nets . . . . . . . . . . . . . . . 175
                       F. Bause   Analysis of Petri Nets with a Dynamic
                                  Priority Method  . . . . . . . . . . . . 215
             S. Christensen and   
                K. H. Mortensen   Teaching Coloured Petri Nets --- A
                                  Gentle Introduction to Formal Methods in
                                  a Distributed Systems Course . . . . . . 290
                 R. Boubour and   
                        C. Jard   Fault Detection in Telecommunication
                                  Networks Based on Petri Net
                                  Representation of Alarm Propagation  . . 367
             S. Christensen and   
         J. B. Jòrgensen   Analysing Bang and Olufsen's BeoLink[R]
                                  Audio/Video System Using Coloured Petri
                                  Nets . . . . . . . . . . . . . . . . . . 387
                    E. Best and   
                     T. Thielke   Orthogonal Transformations for Coloured
                                  Petri Nets . . . . . . . . . . . . . . . 447


Lecture Notes in Computer Science
Volume 1249, 1997

                       W.-T. Wu   The Char-Set Method and Its Applications
                                  to Automated Reasoning . . . . . . . . . 1
                  I. Durand and   
                  A. Middeldorp   Decidable Call by Need Computations in
                                  Term Rewriting . . . . . . . . . . . . . 4
                  F. Baader and   
                     C. Tinelli   A New Approach for Combining Decision
                                  Procedures for the Word Problem, and Its
                                  Connection to the Nelson-Oppen
                                  Combination Method . . . . . . . . . . . 19
                 M. P. Bonacina   The Clause-Diffusion Theorem Prover
                                  Peers-mcd  . . . . . . . . . . . . . . . 53
                 B. I. Dahn and   
                   J. Gehne and   
               T. Honigmann and   
                        A. Wolf   Integration of Automated and Interactive
                                  Theorem Proving in ILF . . . . . . . . . 57
                    A. Wolf and   
                    J. Schumann   ILF-SETHEO: Processing Model Elimination
                                  Proofs for Natural Language Output . . . 61
                 B. Fischer and   
                    J. Schumann   SETHEO Goes Software Engineering:
                                  Application of ATP to Software Reuse . . 65
                    L. Yang and   
                      H. Fu and   
                        Z. Zeng   A Practical Symbolic Algorithm for the
                                  Inverse Kinematics of 6R Manipulators
                                  with Simple Geometry . . . . . . . . . . 73
             N. S. Bjoerner and   
              M. E. Stickel and   
                    T. E. Uribe   A Practical Integration of First-Order
                                  Reasoning and Decision Procedures  . . . 101
                        U. Egly   Some Pitfalls of LK-to-LJ Translations
                                  and How to Avoid Them  . . . . . . . . . 116
                     K. Iwanuma   Lemma Matching for a PTTP-based Top-down
                                  Theorem Prover . . . . . . . . . . . . . 146
                R. Hasegawa and   
                   K. Inoue and   
                    Y. Ohta and   
                   M. Koshimura   Non-Horn Magic Sets to Incorporate
                                  Top-down Inference into Bottom-up
                                  Theorem Proving  . . . . . . . . . . . . 176
                 J. Harland and   
                         D. Pym   Resource-Distribution via Boolean
                                  Constraints  . . . . . . . . . . . . . . 222
                   M. Cryan and   
                      A. Ramsay   Constructing a Normal Form for Property
                                  Theory . . . . . . . . . . . . . . . . . 237
             C. Benzmueller and   
            L. Cheikhrouhou and   
                  D. Fehrer and   
                     A. Fiedler   omegaMEGA: Towards a Mathematical
                                  Assistant  . . . . . . . . . . . . . . . 252
                   D. Fuchs and   
                       M. Fuchs   CODE: A Powerful Prover for Problems of
                                  Condensed Detachment . . . . . . . . . . 260
             F. Giunchiglia and   
                  M. Roveri and   
                  R. Sebastiani   A New Method for Testing Decision
                                  Procedures in Modal Logics . . . . . . . 264
                       H. Zhang   SATO: An Efficient Propositional Prover  272
                  L. Dennis and   
                   A. Bundy and   
                       I. Green   Using a Generalisation Critic to Find
                                  Bisimulations for Coinductive Proofs . . 276
                  D. Hutter and   
                    M. Kohlhase   A Colored Version of the lambda-Calculus 291
               H. Ganzinger and   
                   C. Meyer and   
                  C. Weidenbach   Soft Typing for Ordered Resolution . . . 321
                  H. De Nivelle   A Classification of Non-Liftable Orders
                                  for Resolution . . . . . . . . . . . . . 336
                A. P. Felty and   
                     D. J. Howe   Hybrid Interactive Theorem Proving Using
                                  Nuprl and HOL  . . . . . . . . . . . . . 351
          K. A. Eastaughffe and   
                M. A. Ozols and   
                        A. Cant   Proof Tactics for a Theory of State
                                  Machines in a Graphical Environment  . . 366
              D. Von Oheimb and   
                 T. F. Gritzner   RALL: Machine-Supported Proofs for
                                  Relation Algebra . . . . . . . . . . . . 380
                   J. J. Hickey   Nuprl-Light: An Implementation Framework
                                  for Higher-Order Logics  . . . . . . . . 395
                 M. Kettner and   
                    N. Eisinger   The Tableau Browser SNARKS . . . . . . . 408
                  R. Bornat and   
                      B. Sufrin   Jape: A Calculator for Animating
                                  Proof-on-Paper . . . . . . . . . . . . . 412
                       M. Fuchs   Evolving Combinators . . . . . . . . . . 416
             G. Defourneaux and   
                     N. Peltier   Partial Matching for Analogy Discovery
                                  in Proofs and Counter-examples . . . . . 431
            J. Ehrensberger and   
                        C. Zinn   DIALOG: A System for Dialogue Logic  . . 446


Lecture Notes in Computer Science
Volume 1250, 1997

                    S. Ceri and   
                  P. Fraternali   The Story of the IDEA Methodology  . . . 1
                R. Wieringa and   
                  E. Dubois and   
                       S. Huyts   Integrating Semi-formal and Formal
                                  Requirements . . . . . . . . . . . . . . 19
                    O. Diaz and   
                    N. W. Paton   Stimuli and Business Policies as
                                  Modelling Constructs: Their Definition
                                  and Validation Through the Event
                                  Calculus . . . . . . . . . . . . . . . . 33
              D. Filippidou and   
                 P. Loucopoulos   Using Scenarios to Validate Requirements
                                  in a Plausibility-Centred Approach . . . 47
                 S. Jajodia and   
                     I. Ray and   
                      P. Ammann   Implementing Semantic-Based
                                  Decomposition of Transactions  . . . . . 75
                 S. Castano and   
               V. De Antonellis   A Multi-perspective Framework for the
                                  Analysis of Legacy Information Systems   117
                 L. Carrico and   
                   N. Guimaraes   Facilitating Analysis and Diagnosis in
                                  Organisations  . . . . . . . . . . . . . 131
                J. Altmeyer and   
               J. P. Riegel and   
              B. Schuermann and   
                    M. Schuetze   Application of a Generator-Based
                                  Software Development Method Supporting
                                  Model Reuse  . . . . . . . . . . . . . . 159
                 G. Brataas and   
               P. H. Hughes and   
             A. Sòlvberg   Performance Engineering of Human and
                                  Computerised Workflows . . . . . . . . . 187
                   J. Ebert and   
             R. Suettenbach and   
                         I. Uhe   Meta-CASE in Practice: A Case for KOGGE  203
                     J. Kaipala   Augmenting CASE Tools with Hypertext:
                                  Desired Functionality and Implementation
                                  Issues . . . . . . . . . . . . . . . . . 217
        P. Falcao Goncalves and   
              A. C. Salgado and   
                 S. Lemos Meira   Digital Neighbourhoods: Partitioning the
                                  Web for Information Indexing and
                                  Searching  . . . . . . . . . . . . . . . 289
               E. Dominguez and   
               M. A. Zapata and   
                       J. Rubio   A Conceptual Approach to Meta-Modelling  319
                 F. Cathala and   
                    P. Poncelet   Preserving Behaviour: Why and How  . . . 333
                 P. Bichler and   
                 G. Preuner and   
                     M. Schrefl   Workflow Transparency  . . . . . . . . . 423
               A. P. Barros and   
      A. H. M. Ter Hofstede and   
                   H. A. Proper   Towards Real-Scale Business Transaction
                                  Workflow Modelling . . . . . . . . . . . 437


Lecture Notes in Computer Science
Volume 1251, 1997

             B. Holzmueller and   
                E. Ploeedereder   Finite Unions for Ada 95 . . . . . . . . 1
                T. P. Baker and   
                       D. I. Oh   Ada Bindings for C Interfaces: Lessons
                                  Learned from the Florist Implementation  13
                  M. B. Feldman   An Ada 95 Sort Race Construction Set . . 23
              J. E. Cooling and   
                    N. Duff and   
                     J. Cooling   Computer Aided Teaching of Programming
                                  Languages: An Ada-specific Development   35
                  B. Dupouy and   
                 O. Hainque and   
                  L. Pautet and   
                     S. Tardieu   The SPIF Project . . . . . . . . . . . . 46
            S. S. Jovanovic and   
           D. M. Sotirovski and   
                 P. Van Aswegen   Developing Scripting Capabilities for an
                                  Ada-Based Simulator  . . . . . . . . . . 56
                 J. Wegener and   
                         I. Fey   Systematic Unit-Testing of Ada Programs  64
                      X. Franch   Including Non-functional Issues in
                                  Anna/Ada Programs for Automatic
                                  Implementation Selection . . . . . . . . 88
                    W. L. Yeung   Semantics-Based Support Tools for High
                                  Integrity Ada Software . . . . . . . . . 100
                     A. E. Bell   An Alternative Toolset for Analysis of
                                  Ada Programs . . . . . . . . . . . . . . 112
        M. Gonzalez Harbour and   
     J. J. Gutierrez Garcia and   
       J. C. Palencia Gutierrez   Implementing Application-Level Sporadic
                                  Server Schedulers in Ada 95  . . . . . . 125
             A. J. Wellings and   
                   A. Burns and   
                        O. Pazy   Task Termination in Ada 95 . . . . . . . 149
               W. Gellerich and   
                E. Ploeedereder   Parameter-Induced Aliasing and Related
                                  Problems Can Be Avoided  . . . . . . . . 161
               K. S. Cheung and   
                 K. O. Chow and   
                   T. Y. Cheung   Towards an Integration of Syntactic
                                  Constructs and Structural Features for
                                  Formalised Object-Oriented Methods . . . 173
                     J. English   The Dangers of Inheritance . . . . . . . 185
               V. M. Celier and   
              D. Sotirovski and   
                 C. J. Thompson   Code-Data Consistency in Ada . . . . . . 209
                  F. Guerra and   
                 J. Miranda and   
                 A. Alvarez and   
                     S. Arevalo   An Ada Library to Program Fault-Tolerant
                                  Distributed Applications . . . . . . . . 230
                 B. Dobbing and   
                 M. Richard-Foy   T-Smart --- Task-Safe, Minimal Ada
                                  Realtime Toolset . . . . . . . . . . . . 244
                 S. R. Waterman   Techniques for Testing Ada 95  . . . . . 278


Lecture Notes in Computer Science
Volume 1252, 1997

                    J. Weickert   A review of nonlinear diffusion
                                  filtering  . . . . . . . . . . . . . . . 3
                V. Caselles and   
                    B. Coll and   
                     J.-M Morel   Scale-space versus topographic map for
                                  natural images . . . . . . . . . . . . . 29
             S. N. Kalitzin and   
      B. M. Ter Haar Romeny and   
                M. A. Viergever   Invertible orientation bundles on $2$D
                                  scalar images  . . . . . . . . . . . . . 77
                L. Bretzner and   
                   T. Lindeberg   On the handling of spatial and temporal
                                  scales in feature tracking . . . . . . . 128
                     M. Fidrich   Following feature lines across scale . . 140
              F. J. Beckman and   
           E. T. P. Slijpen and   
                  W. J. Niessen   Supervised diffusion parameter selection
                                  for filtering SPECT brain images . . . . 164
                J. D. Furst and   
               R. S. Keller and   
               J. E. Miller and   
                    S. M. Pizer   Image loci are ridges in geometric
                                  spaces . . . . . . . . . . . . . . . . . 176
                  O. Coulon and   
                   I. Bloch and   
                  V. Frouin and   
                   J.-F. Mangin   Multiscale measures in linear
                                  scale-space for characterizing cerebral
                                  functional activations in $3$D PET
                                  difference images  . . . . . . . . . . . 188
              S. R. Arridge and   
                     A. Simmons   Multi-spectral probabilistic diffusion
                                  using Bayesian classification  . . . . . 224
                    J. Weickert   Recursive separable schemes for
                                  nonlinear diffusion filters  . . . . . . 260
                O. Faugeras and   
                     R. Keriven   Level set methods and the stereo problem 272
                  S. Abbasi and   
              F. Mokhtarian and   
                     J. Kittler   Reliable classification of chrysanthemum
                                  leaves through curvature scale space . . 284
                     K. Berkner   Reconstruction of self-similar functions
                                  from scale-space . . . . . . . . . . . . 311
                 H. Hontani and   
                     K. Deguchi   Multi-scale detection of characteristic
                                  figure structures using principal
                                  curvatures of image gray-level profile   315
                  P. Bajcsy and   
                       N. Ahuja   A new framework for hierarchical
                                  segmentation using similarity analysis   319
                M. J. Black and   
                  G. Sapiro and   
                D. Marimont and   
                      D. Heeger   Robust anisotropic diffusion:
                                  connections between robust statistics,
                                  line processing, and anisotropic
                                  diffusion  . . . . . . . . . . . . . . . 323
                  B. Fischl and   
                 E. L. Schwartz   Fast adaptive alternatives to nonlinear
                                  diffusion in image enhancement: Green's
                                  function approximators and nonlocal
                                  filters  . . . . . . . . . . . . . . . . 327
                   P. Forte and   
                   D. Greenhill   A scale-space approach to shape
                                  similarity . . . . . . . . . . . . . . . 333
                  R. Harvey and   
              J. A. Bangham and   
                      A. Bosson   Scale-space filters and their robustness 341
                   A. Imiya and   
                     R. Katsuta   Extraction of a structure feature from
                                  three-dimensional objects by scale-space
                                  analysis . . . . . . . . . . . . . . . . 353
                   J. Kacur and   
                      K. Mikula   Slowed anisotropic diffusion . . . . . . 357
                 N. Armande and   
              P. Montesinos and   
                       O. Monga   Thin nets extraction using a multi-scale
                                  approach . . . . . . . . . . . . . . . . 361


Lecture Notes in Computer Science
Volume 1253, 1997

               F. Argueello and   
                    N. Guil and   
                   J. Lopez and   
                        M. Amor   A Probabilistic Model for Best-First
                                  Search B and B Algorithms  . . . . . . . 49
              H. M. Buecker and   
                      M. Sauren   A Variant of the Biconjugate Gradient
                                  Method Suitable for Massively Parallel
                                  Computing  . . . . . . . . . . . . . . . 72
                    T. Yang and   
                      H.-X. Lin   Efficient Implementation of the Improved
                                  Quasi-minimal Residual Method on
                                  Massively Distributed Memory Computers   80
                  S. Dobson and   
                     D. Goodeve   Programming with Shared Data
                                  Abstractions . . . . . . . . . . . . . . 93
                R. Diekmann and   
           S. Muthukrishnan and   
           M. V. Nayakkankuppam   Engineering Diffusive Load Balancing
                                  Algorithms Using Experiments . . . . . . 111
                  K. Jansen and   
                      J. Reiter   A New Approximation Algorithm for the
                                  Register Allocation Problem  . . . . . . 135
                      T. Decker   Virtual Data Space --- A Universal Load
                                  Balancing Scheme . . . . . . . . . . . . 159
             S. C. Allmaier and   
                      G. Horton   Parallel Shared-Memory State-Space
                                  Exploration in Stochastic Modeling . . . 207
                A. Formella and   
                      J. Keller   Parallel Software Caches . . . . . . . . 219
                A. Baeumker and   
         F. Meyer auf der Heide   Communication Efficient Parallel
                                  Searching  . . . . . . . . . . . . . . . 233


Lecture Notes in Computer Science
Volume 1254, 1997

                   R. B. Hughes   Formal verification of digital systems,
                                  from ASICs to HW/SW codesign --- a
                                  pragmatic approach . . . . . . . . . . . 3
                     A. Boraelv   The industrial success of verification
                                  tools based on Stalmarck's method  . . . 7
                     R. Kaivola   Using compositional preorders in the
                                  verification of sliding window protocol  48
                  D. Cyrluk and   
                 O. Moeller and   
                       H. Ruess   An efficient decision procedure for the
                                  theory of fixed-sized bit-vectors  . . . 60
                    S. Graf and   
                       H. Saidi   Construction of abstract state graphs
                                  with PVS . . . . . . . . . . . . . . . . 72
                   G. Kamhi and   
               O. Weissberg and   
                     L. Fix and   
                   Z. Binyamini   Automatic datapath extraction for
                                  efficient usage of HDD . . . . . . . . . 95
                   C. Baier and   
                    H. Hermanns   Weak bisimulation for fully
                                  probabilistic processes  . . . . . . . . 119
                   D. Bolignano   Towards a mechanization of cryptographic
                                  protocol verification  . . . . . . . . . 131
                      K. Fisler   Containment of regular languages in
                                  non-regular timing diagram languages is
                                  decidable  . . . . . . . . . . . . . . . 155
                B. Boigelot and   
                  L. Bronne and   
                     S. Rassart   An improved reachability analysis method
                                  for strongly linear hybrid systems . . . 167
                   M. Bozga and   
                   O. Maler and   
                  A. Pnueli and   
                      S. Yovine   Some progress in the symbolic
                                  verification of timed automata . . . . . 179
                 A. Cimatti and   
             F. Giunchiglia and   
               P. Pecchiari and   
                      B. Pietra   A provably correct embedded verifier for
                                  the certification of safety critical
                                  software . . . . . . . . . . . . . . . . 202
                 G. Barrett and   
                     A. McIssac   Model checking in a microprocessor
                                  design project . . . . . . . . . . . . . 214
                       D. Harel   Some thoughts on statecharts, 13 years
                                  later  . . . . . . . . . . . . . . . . . 226
                  V. Gyuris and   
                   A. P. Sistla   On-the-fly model checking under fairness
                                  that exploits symmetry . . . . . . . . . 232
               R. H. Hardin and   
              R. P. Kurshan and   
               S. K. Shukla and   
                    M. Y. Vardi   A new heuristic for bad cycle detection
                                  using BDDs . . . . . . . . . . . . . . . 268
                    I. Beer and   
               S. Ben-David and   
                  U. Eisner and   
                       Y. Rodeh   Efficient detection of vacuity in ACTL
                                  formulas . . . . . . . . . . . . . . . . 279
                N. Immerman and   
                    M. Y. Vardi   Model checking and transitive-closure
                                  logic  . . . . . . . . . . . . . . . . . 291
                       G. Berry   Boolean and $2$-adic numbers based
                                  techniques for verifying synchronous
                                  designs  . . . . . . . . . . . . . . . . 303
                    G. Cece and   
                      A. Finkel   Programs with quasi-stable channels are
                                  effectively recognizable . . . . . . . . 304
                    W. Chan and   
                R. Anderson and   
                   P. Beame and   
                      D. Notkin   Combining constraint solving and
                                  symbolic model checking for a class of
                                  systems with non-linear constraints  . . 316
                    R. Alur and   
              R. K. Brayton and   
            T. A. Henzinger and   
                      S. Qadeer   Partial-order reduction in symbolic
                                  state space exploration  . . . . . . . . 340
                    J. Yuan and   
                    J. Shen and   
                 J. Abraham and   
                        A. Aziz   On combining formal and informal
                                  verification . . . . . . . . . . . . . . 376
                  T. Bultan and   
                  R. Gerber and   
                        W. Pugh   Symbolic model checking of infinite
                                  state systems using Presburger
                                  arithmetic . . . . . . . . . . . . . . . 400
                  Y. Kesten and   
                   O. Maler and   
                  M. Marcus and   
                      A. Pnueli   Symbolic model checking with rich
                                  assertional languages  . . . . . . . . . 424
                   B. Grahlmann   The PEP tool . . . . . . . . . . . . . . 440
                    P. Kelb and   
                T. Margaria and   
                 M. Mendler and   
                 C. Gsottberger   MOSEL: A sound and efficient tool for
                                  M2L(Str) . . . . . . . . . . . . . . . . 448
                  S. Campos and   
                  E. Clarke and   
                       M. Minea   The Verus Tool: A quantitative approach
                                  to the formal verification of real-time
                                  systems  . . . . . . . . . . . . . . . . 452
            T. A. Henzinger and   
                   P.-H. Ho and   
                    H. Wong-Toi   HYTECH: A model checker for hybrid
                                  systems  . . . . . . . . . . . . . . . . 460
                       A. Biere   mucke --- efficient mu-calculus model
                                  checking . . . . . . . . . . . . . . . . 468
                   P. Godefroid   VeriSoft: A tool for the automatic
                                  analysis of concurrent reactive software 476
                    I. Beer and   
               S. Ben-David and   
                  C. Eisner and   
                       D. Geist   RuleBase: Model checking at IBM  . . . . 480


Lecture Notes in Computer Science
Volume 1255, 1997

                        A. Barg   Minimum Distance Decoding Algorithms for
                                  Linear Codes . . . . . . . . . . . . . . 1
               L. Bernardin and   
                  M. B. Monagan   Efficient Multivariate Factorization
                                  over Finite Fields . . . . . . . . . . . 15
             P. Boyvalenkov and   
                       D. Danev   On Maximal Codes in Polynomial Metric
                                  Spaces . . . . . . . . . . . . . . . . . 29
                 M. Caboara and   
                   P. Conti and   
                    C. Traverso   Yet Another Ideal Decomposition
                                  Algorithm  . . . . . . . . . . . . . . . 39
                 G. Carra Ferro   A Resultant Theory for Ordinary
                                  Algebraic Differential Equations . . . . 55
                S. R. Costa and   
             J. R. Geronimo and   
                 R. Palazzo and   
               J. C. Interlando   The Symmetry Group of Z0nq in the Lee
                                  Space and the Zqn-Linear Codes . . . . . 66
                     S. Encheva   On Repeated-Root Cyclic Codes and the
                                  Two-Way Chain Condition  . . . . . . . . 78
          J. Von zur Gathen and   
                     M. Noecker   Exponentiation in Finite Fields: Theory
                                  and Practice . . . . . . . . . . . . . . 88
               D. Grigoriev and   
                   A. Slissenko   Computing Minimum-Link Path in a
                                  Homotopy Class amidst Semi-Algebraic
                                  Obstacles in the Plane . . . . . . . . . 114--129
             T. A. Gulliver and   
                      M. Harada   Certain Self-Dual Codes over Z4 and the
                                  Odd Leech Lattice  . . . . . . . . . . . 130
                T. Hoeholdt and   
             J. H. Van Lint and   
                   R. Pellikaan   Order Functions and Evaluation Codes . . 138
              K. J. Horadam and   
                A. A. I. Perera   Codes from Cocycles  . . . . . . . . . . 151
                    D. B. Jaffe   A Brief Tour of Split Linear Programming 164
                    F. Jean and   
                 P.-V. Koseleff   Elementary Approximation of Exponentials
                                  of Lie Polynomials . . . . . . . . . . . 174
                   J. M. Jensen   On the $q$-ary Image of Cyclic Codes . . 189
                  T. Kasami and   
                  T. Sugita and   
                    T. Fujiwara   The Split Weight ($ w L, w R $)
                                  Enumeration of Reed-Müller Codes for $
                                  {wL} + {wR} $, 2dmin . . . . . . . . . . 197
                     J. A. Wood   Extension Theorems for Linear Codes over
                                  Finite Rings . . . . . . . . . . . . . . 329
                     S. Xia and   
                          F. Fu   Nonperiodic Cyclic Equivalence Classes
                                  of Cyclic Codes and Algebraic
                                  Constructions of Cyclically Permutable
                                  Codes  . . . . . . . . . . . . . . . . . 341


Lecture Notes in Computer Science
Volume 1256, 1997

                  O. Carton and   
                      D. Perrin   The Wadge-Wegner Hierarchy of
                                  omega-rational Sets  . . . . . . . . . . 17
                      K. R. Apt   From Chaotic Iteration to Constraint
                                  Propagation  . . . . . . . . . . . . . . 36
                      B. Durand   Tilings and Quasiperiodicity . . . . . . 65
                 F. Bassino and   
                 M.-P. Beal and   
                      D. Perrin   Enumerative Sequences of Leaves in
                                  Rational Trees . . . . . . . . . . . . . 76
                     V. Bruyere   A Completion Algorithm for Codes with
                                  Bounded Synchronization Delay  . . . . . 87
              J. Karhumaeki and   
              W. Plandowski and   
                     F. Mignosi   The Expressibility of Languages and
                                  Relations by Word Equations  . . . . . . 98
                 M. Beaudry and   
                 F. Lemieux and   
                     D. Therien   Finite Loops Recognize Exactly the
                                  Regular Open Languages . . . . . . . . . 110
              P. Di Gianantonio   An Abstract Data Type for Real Numbers   121
                     O. Bournez   Some Bounds on the Computational Power
                                  of Piecewise Constant Derivative Systems 143
                Y. Gurevich and   
                    A. Voronkov   Monadic Simultaneous Rigid E-Unification
                                  and Related Problems . . . . . . . . . . 154
                   K. Weihrauch   Computability on the Probability
                                  Measures on the Borel Sets of the Unit
                                  Interval . . . . . . . . . . . . . . . . 166
              A. A. Andreev and   
          A. E. F. Clementi and   
                 J. D. P. Rolim   Worst-Case Hardness Suffices for
                                  Derandomization: A New Method for
                                  Hardness-Randomness Trade-offs . . . . . 177
                 H. Buhrman and   
                  S. Fenner and   
                     L. Fortnow   Results on Resource-Bounded Measure  . . 188
                     F. Ablayev   Randomization and Nondeterminism are
                                  Incomparable for Ordered Read-Once
                                  Branching Programs . . . . . . . . . . . 195
               B. Codenotti and   
                  F. Erguen and   
              P. S. Gemmell and   
                  S. Ravi Kumar   Checking Properties of Polynomials . . . 203
            E. Hemaspaandra and   
         L. A. Hemaspaandra and   
                       J. Rothe   Exact Analysis of Dodgson Elections:
                                  Lewis Carroll's 1876 Voting System is
                                  Complete for Parallel Access to NP . . . 214
                   K. Honda and   
                     N. Yoshida   Game Theoretic Analysis of Call-by-value
                                  Computation  . . . . . . . . . . . . . . 225
                R. Di Cosmo and   
                       N. Ghani   On Modular Properties of Higher Order
                                  Extensional lambda-Calculi . . . . . . . 237
                 A. Asperti and   
                      C. Laneve   On the Dynamics of Sharing Graphs  . . . 259
                 S. Alstrup and   
                    J. Holm and   
          K. De Lichtenberg and   
                      M. Thorup   Minimizing Diameters of Dynamic Trees    270
                     T. Hagerup   Dynamic Algorithms for Graphs of Bounded
                                  Treewidth  . . . . . . . . . . . . . . . 292
                          Y. Fu   A Proof Theoretical Approach to
                                  Communication  . . . . . . . . . . . . . 325
                 V. Diekert and   
            Y. Matiyasevich and   
                    A. Muscholl   Solving Trace Equations Using
                                  Lexicographical Normal Forms . . . . . . 336
                       T. Wilke   Star-Free Picture Expressions are
                                  Strictly Weaker than First-Order Logic   347
                    M. Bernardo   An Algebra-Based Method to Associate
                                  Rewards with EMPA Terms  . . . . . . . . 358
                 E. Caceres and   
                   F. Dehne and   
                A. Ferreira and   
                   P. Flocchini   Efficient Parallel Graph Algorithms for
                                  Coarse Grained Multicomputers and BSP    390
                    A. Ambainis   Upper Bound on the Communication
                                  Complexity of Private Information
                                  Retrieval  . . . . . . . . . . . . . . . 401
                   D. Harel and   
                   E. Singerman   Computation Paths Logic: An Expressive,
                                  yet Elementary, Process Logic  . . . . . 408
                 O. Burkart and   
                     B. Steffen   Model Checking the Full Modal
                                  Mu-Calculus for Infinite Sequential
                                  Processes  . . . . . . . . . . . . . . . 419
                   C. Baier and   
               E. M. Clarke and   
     V. Hartonas-Garmhausen and   
                 M. Kwiatkowska   Symbolic Model Checking for
                                  Probabilistic Processes  . . . . . . . . 430
              E. P. De Vink and   
             J. J. M. M. Rutten   Bisimulation for Probabilistic
                                  Transition Systems: A Coalgebraic
                                  Approach . . . . . . . . . . . . . . . . 460
                 M. Boreale and   
               R. De Nicola and   
                    R. Pugliese   Basic Observables for Processes  . . . . 482
              C. Kaklamanis and   
                P. Persiano and   
                T. Erlebach and   
                      K. Jansen   Constrained Bipartite Edge Coloring with
                                  Applications to Wavelength Routing . . . 493
                 L. Gargano and   
                    P. Hell and   
                    S. Perennes   Colouring Paths in Directed Symmetric
                                  Trees with Applications to WDM Routing   505
                  Y. Bartal and   
                    S. Leonardi   On-Line Routing in All-Optical Networks  516
                   T. Eilam and   
                M. Flammini and   
                        S. Zaks   A Complete Characterization of the Path
                                  Layout Construction Problem for ATM
                                  Networks with Given Hop Count and Load   527
                      P. Jancar   Bisimulation Equivalence is Decidable
                                  for One-Counter Processes  . . . . . . . 549
               A. Bouajjani and   
                   P. Habermehl   Symbolic Reachability Analysis of
                                  FIFO-Channel Systems with Nonregular
                                  Sets of Configurations . . . . . . . . . 560
                     W. Fokkink   Axiomatizations for the Perpetual Loop
                                  in Process Algebra . . . . . . . . . . . 571
            T. A. Henzinger and   
                    P. W. Kopke   Discrete-Time Control for Rectangular
                                  Hybrid Automata  . . . . . . . . . . . . 582
                  R. Grossi and   
                 G. F. Italiano   Efficient Splitting and Merging
                                  Algorithms for Order Decomposable
                                  Problems . . . . . . . . . . . . . . . . 605
                  S. Khanna and   
           S. Muthukrishnan and   
                      S. Skiena   Efficient Array Partitioning . . . . . . 616
           H. L. Bodlaender and   
                 D. M. Thilikos   Constructive Linear Time Algorithms for
                                  Branchwidth  . . . . . . . . . . . . . . 627
           Z. Khasidashvili and   
                     J. Glauert   The Geometry of Orthogonal Reduction
                                  Spaces . . . . . . . . . . . . . . . . . 649
                  M. Droste and   
                      P. Gastin   On Recognizable and Rational Formal
                                  Power Series in Partially Commuting
                                  Variables  . . . . . . . . . . . . . . . 682
                   J. Cassaigne   On a Conjecture of J. Shallit  . . . . . 693
                 Y. Frankel and   
                        M. Yung   On Characterizations of Escrow
                                  Encryption Schemes . . . . . . . . . . . 705
               A. De Santis and   
            G. Di Crescenzo and   
                    P. Persiano   Randomness-Efficient Non-Interactive
                                  Zero Knowledge . . . . . . . . . . . . . 716
                      K. Jansen   Approximation Results for the Optimum
                                  Cost Chromatic Partition Problem . . . . 727
                 A. Bar-Noy and   
                    G. Kortsarz   The Minimum Color Sum of Bipartite
                                  Graphs . . . . . . . . . . . . . . . . . 738
                      T. Fujito   A Primal-Dual Approach to Approximation
                                  of Node-Deletion Problems for Matroidal
                                  Properties . . . . . . . . . . . . . . . 749
                H. Broersma and   
                   T. Kloks and   
                 D. Kratsch and   
                     H. Mueller   Independent Sets in Asteroidal
                                  Triple-Free Graphs . . . . . . . . . . . 760
              R. Giacobazzi and   
                     F. Ranzato   Refining and Compressing Abstract
                                  Domains  . . . . . . . . . . . . . . . . 771
                        L. Dami   Labelled Reductions, Runtime Errors, and
                                  Operational Subsumption  . . . . . . . . 782
                    V. Kabanets   Recognizability Equals Definability for
                                  Partial $k$-Paths  . . . . . . . . . . . 805
                  R. Beigel and   
                          B. Fu   Molecular Computing, Bounded
                                  Nondeterminism, and Efficient Recursion  816
                P. L. Erdos and   
                M. A. Steel and   
              L. A. Szekely and   
                   T. J. Warnow   Constructing Big Trees from Short
                                  Sequences  . . . . . . . . . . . . . . . 827
              F. Buccafurri and   
                   S. Greco and   
                       D. Sacca   The Expressive Power of Unique Total
                                  Stable Model Semantics . . . . . . . . . 849


Lecture Notes in Computer Science
Volume 1257, 1997

                       J. Zeman   Peirce's Graphs  . . . . . . . . . . . . 12
                       M. Chein   The CORALI Project: From Conceptual
                                  Graphs to Conceptual Graphs via Labelled
                                  Graphs . . . . . . . . . . . . . . . . . 65
                   M. Chein and   
                  M.-L. Mugnier   Positive Nested Conceptual Graphs  . . . 95
                 M. Wermelinger   A Different Perspective on Canonicity    110
                   C. Faron and   
                 J.-B. Ganascia   Representation of Defaults and
                                  Exceptions in Conceptual Graphs
                                  Formalism  . . . . . . . . . . . . . . . 153
                G. Angelova and   
                   K. Bontcheva   Task-Dependent Aspects of Knowledge
                                  Acquisition: A Case Study in a Technical
                                  Domain . . . . . . . . . . . . . . . . . 183
                     J. P. Dick   Modeling Cause and Effect in Legal Text  244
                     C. Bos and   
                 B. Botella and   
                   P. Vanheeghe   Modeling and Simulating Human Behaviors
                                  with Conceptual Graphs . . . . . . . . . 275
                       R. Wille   Conceptual Graphs and Formal Concept
                                  Analysis . . . . . . . . . . . . . . . . 290
                  K. Biedermann   How Triadic Diagrams Represent
                                  Conceptual Structures  . . . . . . . . . 304
                   G. Ellis and   
                   S. Callaghan   Organization of Knowledge Using Order
                                  Factors  . . . . . . . . . . . . . . . . 342
                G. Kerdiles and   
                      E. Salvat   A Sound and Complete CG Proof Procedure
                                  Combining Projections with Analytic
                                  Tableaux . . . . . . . . . . . . . . . . 371
                  T. H. Cao and   
               P. N. Creasy and   
                    V. Wuwongse   Fuzzy Unification and Resolution Proof
                                  Procedure for Fuzzy Conceptual Graph
                                  Programs . . . . . . . . . . . . . . . . 386
                  T. H. Cao and   
                   P. N. Creasy   Universal Marker and Functional
                                  Relation: Semantics and Operations . . . 416
                I. Bournaud and   
                 J.-G. Ganascia   Accounting for Domain Knowledge in the
                                  Construction of a Generalization Space   446
                       O. Gerbe   Conceptual Graphs for Corporate
                                  Knowledge Repositories . . . . . . . . . 474
                  D. Genest and   
                       M. Chein   An Experiment in Document Retrieval
                                  Using Conceptual Graphs  . . . . . . . . 489
               M. A. Keeler and   
               L. F. Searle and   
                     C. Kloesel   PORT: A Testbed Paradigm for Knowledge
                                  Processing in the Humanities . . . . . . 505
                   P. Clark and   
                      B. Porter   Using Access Paths to Guide Inference
                                  with Conceptual Graphs . . . . . . . . . 521
                     A. De Moor   Applying Conceptual Graph Theory to the
                                  User-Driven Specification of Network
                                  Information Systems  . . . . . . . . . . 536
                  B. Garner and   
                    E. Tsui and   
                      D. Lukose   Deakin Toolset: Conceptual Graphs Based
                                  Knowledge Acquisition, Management, and
                                  Processing Tools . . . . . . . . . . . . 589
                G. Angelova and   
               S. Damyanova and   
               K. Toutanova and   
                   K. Bontcheva   Menu-Based Interfaces to Conceptual
                                  Graphs: The CGLex Approach . . . . . . . 603
                     W. R. Cyre   Knowledge Extractor: A Tool for
                                  Extracting Knowledge from Text . . . . . 607
                   G. Fuchs and   
                    R. Levinson   The CG Mars Lander . . . . . . . . . . . 611
                 R. P. Wolf and   
                 H. S. Delugach   PCCG: An Operational Tracked Grid for
                                  Creating Conceptual Graphs . . . . . . . 617


Lecture Notes in Computer Science
Volume 1258, 1997

                  O. Arieli and   
                       A. Avron   Four-Valued Diagnoses for Stratified
                                  Knowledge-Bases  . . . . . . . . . . . . 1
                    M. Baaz and   
                     A. Leitsch   Fast Cut-Elimination by Projection . . . 18
                  G. Barthe and   
                  P.-A. Mellies   On the Subject Reduction Property for
                                  Algebraic Type Systems . . . . . . . . . 34
              G. L. Cattani and   
                     G. Winskel   Presheaf Models for Concurrency  . . . . 58
                   V. Danos and   
                M. Pedicini and   
                     L. Regnier   Directed Virtual Reductions  . . . . . . 76
                 S. Dziembowski   Bounded-Variable Fixpoint Queries are
                                  PSPACE-complete  . . . . . . . . . . . . 89
                M. P. Fiore and   
                  G. D. Plotkin   An Extension of Models of Axiomatic
                                  Domain Theory to Models of Synthetic
                                  Domain Theory  . . . . . . . . . . . . . 129
                   A. Geser and   
              A. Middeldorp and   
               E. Ohlebusch and   
                     H. Zantema   Relative Undecidability in Term
                                  Rewriting  . . . . . . . . . . . . . . . 150
                     H. Geuvers   Extending Models of Second Order
                                  Predicate Logic to Models of Second
                                  Order Dependent Type Theory  . . . . . . 167
                       N. Ghani   Eta-Expansions in F0omega  . . . . . . . 182
                        R. Gore   Cut-Free Display Calculi for Relation
                                  Algebras . . . . . . . . . . . . . . . . 198
                       H. Imhof   Computational Aspects of Arity
                                  Hierarchies  . . . . . . . . . . . . . . 211
               A. Ingolfsdottir   Weak Semantics Based on Lighted Button
                                  Pressing Experiments . . . . . . . . . . 226
                   A. D. Yashin   New Intuitionistic Logical Constants:
                                  Undecidability of the Conservativeness
                                  Problem  . . . . . . . . . . . . . . . . 460


Lecture Notes in Computer Science
Volume 1259, 1997

                  I. Aleksander   Iconic Learning in Networks of Logical
                                  Neurons  . . . . . . . . . . . . . . . . 3
                W. W. Armstrong   Hardware Requirements for Fast
                                  Evaluation of Functions Learned by
                                  Adaptive Logic Networks  . . . . . . . . 17
                     X. Yao and   
                     T. Higuchi   Promises and Challenges of Evolvable
                                  Hardware . . . . . . . . . . . . . . . . 55
                   M. Goeke and   
                  M. Sipper and   
                   D. Mange and   
                    A. Stauffer   Online Autonomous Evolware . . . . . . . 96
               D. Keymeulen and   
                M. Durantez and   
                  K. Konaka and   
                   Y. Kuniyoshi   An Evolutionary Robot Navigation System
                                  Using a Gate-Level Evolvable Hardware    195
                J. Yamamoto and   
                       Y. Anzai   Autonomous Robot with Evolving Algorithm
                                  Based on Biological Systems  . . . . . . 220
                     H. Ito and   
                      T. Furuya   Memory-Based Neural Network and Its
                                  Application to a Mobile Robot with
                                  Evolutionary and Experience Learning . . 234
                      T. Ae and   
                H. Fukumoto and   
                   S. Hiwatashi   Special-Purpose Brainware Architecture
                                  for Data Processing  . . . . . . . . . . 289
                     H. Iba and   
                   M. Iwata and   
                     T. Higuchi   Machine Learning Approach to Gate-Level
                                  Evolvable Hardware . . . . . . . . . . . 327
              R. S. Zebulum and   
              M. A. Pacheco and   
                    M. Vellasco   Evolvable Systems in Hardware Design:
                                  Taxonomy, Survey and Applications  . . . 344
                J. Kazimierczak   From some Tasks to Biology and then to
                                  Hardware . . . . . . . . . . . . . . . . 359
                  L. Harvey and   
                    A. Thompson   Through the Labyrinth Evolution Finds a
                                  Way: A Silicon Ridge . . . . . . . . . . 406
                  T. Hikage and   
                   H. Hemmi and   
                   K. Shimohara   Hardware Evolution System Introducing
                                  Dominant and Recessive Heredity  . . . . 423
                    F. Gers and   
                    H. De Garis   CAM-Brain: A New Model for ATR's
                                  Cellular Automata Based Artificial Brain
                                  Project  . . . . . . . . . . . . . . . . 437
              F. H. Bennett and   
                 J. R. Koza and   
                   D. Andre and   
                    M. A. Keane   Evolution of a 60 Decibel Op Amp Using
                                  Genetic Programming  . . . . . . . . . . 455


Lecture Notes in Computer Science
Volume 1260, 1997

                   M. Biehl and   
                N. Klarlund and   
                       T. Rauhe   Algorithms for Guided Tree Automata  . . 6
                    R. Bone and   
                  C. Daguin and   
              A. Georgevail and   
                      D. Maurel   Time Series Forecasting by Finite-State
                                  Automata . . . . . . . . . . . . . . . . 26
                  M. Garzon and   
                    E. Eberbach   Dynamical Implementation of
                                  Nondeterministic Automata and Concurrent
                                  Systems  . . . . . . . . . . . . . . . . 35
                   J. Glenn and   
                     W. Gasarch   Implementing WSIS via Finite Automata    50
              J. H. Johnson and   
                        D. Wood   Instruction Computation in Subset
                                  Construction . . . . . . . . . . . . . . 64
                   B. W. Watson   FIRE Lite: FAs and REs in C++  . . . . . 167


Lecture Notes in Computer Science
Volume 1262, 1997

                     D. J. Abel   Spatial Internet Marketplaces: A Grand
                                  Challenge? . . . . . . . . . . . . . . . 3
                   M. Ester and   
              H.-P. Kriegel and   
                      J. Sander   Spatial Data Mining: A Database Approach 47
              E. P. F. Chan and   
                    J. N. H. Ng   A General and Efficient Implementation
                                  of Geometric Operators and Predicates    69
                 A. Belussi and   
                 E. Bertino and   
                     B. Catania   Manipulating Spatial Data in Constraint
                                  Databases  . . . . . . . . . . . . . . . 115
                J. Chomicki and   
                   P. Z. Revesz   Constraint-Based Interoperability of
                                  Spatiotemporal Databases . . . . . . . . 142
                Y.-W. Huang and   
                   M. Jones and   
            E. A. Rundensteiner   Improving Spatial Intersect Joins Using
                                  Symbolic Intersect Detection . . . . . . 165
                    X. Zhou and   
                 D. J. Abel and   
                     D. Truffet   Data Partitioning for Parallel Spatial
                                  Join Processing  . . . . . . . . . . . . 178
               C. Esperanca and   
                       H. Samet   Orthogonal Polygons as Bounding
                                  Structures in Filter-Refine Query
                                  Processing Strategies  . . . . . . . . . 197
                O. Balovnev and   
                 M. Breunig and   
                  A. B. Cremers   From GeoStore to GeoToolKit: The Second
                                  Step . . . . . . . . . . . . . . . . . . 223
                  G. Alonso and   
                       C. Hagen   Geo-Opera: Workflow Concepts for Spatial
                                  Processes  . . . . . . . . . . . . . . . 238
                   M. Erwig and   
                   M. Schneider   Vague Regions  . . . . . . . . . . . . . 298
                   V. Delis and   
                  T. Hadzilacos   On the Assessment of Generalisation
                                  Consistency  . . . . . . . . . . . . . . 321
                  C. H. Ang and   
                      T. C. Tan   New Linear Node Splitting Algorithm for
                                  R-trees  . . . . . . . . . . . . . . . . 339
                C. Aggarwal and   
                    J. Wolf and   
                      P. Yu and   
                     M. Epelman   The S-tree: An Efficient, Index for
                                  Multidimensional Objects . . . . . . . . 350


Lecture Notes in Computer Science
Volume 1263, 1997

                     B. A. Foss   Knowledge Discovery --- A Control Theory
                                  Perspective  . . . . . . . . . . . . . . 1
               C. L. Carter and   
             H. J. Hamilton and   
                     N. Cercone   Share Based Measures for Itemsets  . . . 14
            R. J. Hilderman and   
             H. J. Hamilton and   
            R. J. Kowalchuk and   
                     N. Cercone   Parallel Knowledge Discovery Using
                                  Domain Generalization Graphs . . . . . . 25
                    M. Bull and   
                   G. Kundt and   
                       L. Gierl   Discovering of Health Risks and
                                  Case-Based Forecasting of Epidemics in a
                                  Health Surveillance System . . . . . . . 68
                      S. Wrobel   An Algorithm for Multi-relational
                                  Discovery of Subgroups . . . . . . . . . 78
                     G. Das and   
               D. Gunopulos and   
                     H. Mannila   Finding Similar Time Series  . . . . . . 88
                 R. Feldman and   
                W. Kloesgen and   
              Y. Ben-Yehuda and   
                       G. Kedar   Pattern Based Browsing in Document
                                  Collections  . . . . . . . . . . . . . . 112
                  T. Elomaa and   
                       J. Rousu   Efficient Multisplitting on Numerical
                                  Data . . . . . . . . . . . . . . . . . . 178
          H. Andre-Joensson and   
                    D. Z. Badal   Using Signature Files for Querying
                                  Time-Series Data . . . . . . . . . . . . 211
                    A. Amir and   
                 R. Feldman and   
                       R. Kashi   A New and Versatile Method for
                                  Association Generation . . . . . . . . . 221
                J. C. Bioch and   
            O. Van der Meer and   
                    R. Potharst   Bivariate Decision Trees . . . . . . . . 232
                   R. Wirth and   
                 C. Shearer and   
                 U. Grimmer and   
                    T. Reinartz   Towards Process-Oriented Tool Support
                                  for KDD  . . . . . . . . . . . . . . . . 243
                    F. Gebhardt   Finding Spatial Clusters . . . . . . . . 277
             E. Boudaillier and   
                     G. Hebrail   Interactive Interpretation of
                                  Hierarchical Clustering  . . . . . . . . 288
                  A. A. Freitas   The Principle of Transformation between
                                  Efficiency and Effectiveness: Towards a
                                  Fair Evaluation of the
                                  Cost-Effectiveness of KDD Techniques . . 299
                       P. Berka   Recognizing Reliability of Discovered
                                  Knowledge  . . . . . . . . . . . . . . . 307
                R. J. Watts and   
               A. L. Porter and   
              S. Cunningham and   
                         D. Zhu   TOAS Intelligence Mining; Analysis of
                                  NLP and Computational Linguistics  . . . 323
                  H. Ahonen and   
                O. Heinonen and   
             M. Klemettinen and   
                  A. I. Verkamo   Mining in the Phrasal Frontier . . . . . 343
                 A. T. Bjorvand   Mining Time Series Using Rough Sets  . . 351
                   N. Zhong and   
                  S. Ohsuga and   
                     C. Liu and   
                    Y. Kakemoto   On Meta Levels of an Organized Society
                                  of KDD Agents  . . . . . . . . . . . . . 367
                    Y. Zhou and   
                      Y. Lu and   
                         C. Shi   Using Neural Network to Extract
                                  Knowledge from Database  . . . . . . . . 376
                    R. Grossman   A Tutorial Introduction to High
                                  Performance Data Mining  . . . . . . . . 395
               L. Carbonara and   
                 H. Roberts and   
                        B. Egan   Data Mining in the Telecommunications
                                  Industry . . . . . . . . . . . . . . . . 396


Lecture Notes in Computer Science
Volume 1264, 1997

                     G. Das and   
               R. Fleischer and   
               L. Gasieniec and   
                   D. Gunopulos   Episode Matching . . . . . . . . . . . . 12
                  P. Berman and   
               M. Karpinski and   
              L. L. Larmore and   
                  W. Plandowski   On the Complexity of Pattern Matching
                                  for Highly Compressed Two-Dimensional
                                  Texts  . . . . . . . . . . . . . . . . . 40
             A. S. Fraenkel and   
                 J. Simpson and   
                    M. Paterson   On Weak Circular Squares in Binary Words 76
               L. Gasieniec and   
                   P. Indyk and   
                      P. Krysta   External Inverse Pattern Matching  . . . 90
              M. Crochemore and   
                       R. Verin   Direct Construction of Compact Directed
                                  Acyclic Word Graphs  . . . . . . . . . . 116
                   M. Cryan and   
             L. A. Goldberg and   
                    C. Phillips   Approximation Algorithms for the
                                  Fixed-Topology Phylogenetic Number
                                  Problem  . . . . . . . . . . . . . . . . 130
                   S. Abdeddaim   On Incremental Computation of Transitive
                                  Closure and Greedy alignment . . . . . . 167
                    L. Arvestad   Aligning Coding DNA in the Presence of
                                  Frame-shift Errors . . . . . . . . . . . 180
                    T. Chen and   
                   S. S. Skiena   The-Based Data Structures for Sequence
                                  Assembly . . . . . . . . . . . . . . . . 206
                 A. Ben-Dor and   
                  G. Lancia and   
                  J. Perone and   
                        R. Ravi   Banishing Bias from Consensus Sequences  247
                       A. Dress   Iterative versus Simultaneous Multiple
                                  Sequence Alignment . . . . . . . . . . . 275


Lecture Notes in Computer Science
Volume 1265, 1997

                  J. Jaffar and   
                     B. Liu and   
                   R. H. C. Yap   Forward and backward chaining in
                                  constraint programming . . . . . . . . . 1
              F. Buccafurri and   
                   N. Leone and   
                       P. Rullo   Strong and weak constraints in
                                  disjunctive datalog  . . . . . . . . . . 2
                U. Zukowski and   
                   S. Brass and   
                     B. Freitag   Improving the alternating fixpoint: The
                                  transformation approach  . . . . . . . . 40
                    U. Egly and   
                     H. Tompits   Is non-monotonic reasoning always
                                  harder?  . . . . . . . . . . . . . . . . 60
                H. A. Blair and   
                  F. Dushin and   
                      P. Humenn   Simulations between programs as cellular
                                  automata . . . . . . . . . . . . . . . . 115
                    T. Janhunen   Separating disbeliefs from beliefs in
                                  autoepistemic reasoning  . . . . . . . . 132
                G.-Q. Zhang and   
                   W. C. Rounds   Power defaults . . . . . . . . . . . . . 152
                     A. Bochman   A study of Przymusinski's static
                                  semantics  . . . . . . . . . . . . . . . 170
                  P. A. Bonatti   Resolution for skeptical stable
                                  semantics  . . . . . . . . . . . . . . . 185
                   T. Eiter and   
                      J. Lu and   
             V. S. Subrahmanian   Computing non-ground representations of
                                  stable models  . . . . . . . . . . . . . 198
                    M. R. Karig   Industry needs for integrated
                                  information services . . . . . . . . . . 218
                  B. Buchberger   Computing, solving, proving: A report of
                                  the Theorema project . . . . . . . . . . 220
                     M. Gelfond   Towards a systematic approach to
                                  representing knowledge in declarative
                                  logic programming  . . . . . . . . . . . 222
              C. V. Damasio and   
                  L. M. Pereira   A paxaconsistent semantics with
                                  contradiction support detection  . . . . 224
                M. Dekhtyar and   
                A. Dikorsky and   
                    N. Spyratos   On conservative enforced updates . . . . 244
               C. Witteveen and   
                W. Van Der Hoek   A general framework for revising
                                  non-monotonic theories . . . . . . . . . 258
                   A. Brogi and   
                S. Contiero and   
                      F. Turini   Composing general logic programs . . . . 273
                   T. Eiter and   
                 G. Gottlob and   
                       H. Veith   Modular logic programming and
                                  generalized quantifiers  . . . . . . . . 289
                    A. H. Yahya   Generalized query answering in
                                  disjunctive deductive databases:
                                  Procedural and non-monotonic aspects . . 324
               C. Aravindan and   
                     J. Dix and   
                    I. Niemelae   DisLoP: Towards a disjunctive logic
                                  programming system . . . . . . . . . . . 341
              C. V. Damasio and   
              L. M. Pereira and   
                   M. Schroeder   REVISE: Logic programming and diagnosis  353
                   T. Eiter and   
                   N. Leone and   
                  C. Mateis and   
                     G. Pfeifer   A deductive system for non-monotonic
                                  reasoning  . . . . . . . . . . . . . . . 363
                U. Zukowski and   
                     B. Freitag   The deductive database system LOLA . . . 375
                A. C. Kakas and   
                     C. Mourlas   ACLP: Flexible solutions to complex
                                  problems . . . . . . . . . . . . . . . . 387
                  P.-T. Kandzia   Non-monotonic reasoning in FLORID  . . . 399


Lecture Notes in Computer Science
Volume 1266, 1997

                W. Cheetham and   
                        J. Graf   Case-Based Reasoning in Color Matching   1
               G. R. Finnie and   
               G. W. Wittig and   
               J.-M. Desharnais   Estimating Software Development Effort
                                  with Case-Based Reasoning  . . . . . . . 13
                 Marc Fuchs and   
                     Matt Fuchs   Applying Case-Based Reasoning to
                                  Automated Deduction  . . . . . . . . . . 23
                   P. Gomes and   
                       C. Bento   A Case-Based Approach for Elaboration of
                                  Design Requirements  . . . . . . . . . . 33
                J. Jarmulak and   
        E. J. H. Kerckhoffs and   
               P. P. Van't Veen   Case-Based Reasoning in an Ultrasonic
                                  Rail-Inspection System . . . . . . . . . 43
                         D. Joh   CBR in a Changing Environment  . . . . . 53
               R. Weber-Lee and   
               R. M. Barcia and   
             M. C. Da Costa and   
          I. W. Rodrigues Filho   A Large Case-Based Reasoner for Legal
                                  Cases  . . . . . . . . . . . . . . . . . 190
                       C. Wisdo   A Scalable Approach for Question-Based
                                  Indexing of Encyclopedic Texts . . . . . 200
                      M. T. Cox   An Explicit Representation of Reasoning
                                  Failures . . . . . . . . . . . . . . . . 211
                        G. Kamp   On the Admissibility of Concrete Domains
                                  for CBR Based on Description Logics  . . 223
                  I. Watson and   
                      S. Perera   The Evaluation of a Hierarchical Case
                                  Representation Using Context Guided
                                  Retrieval  . . . . . . . . . . . . . . . 255
                  D. W. Aha and   
                  L. A. Breslow   Refining Conversational Case Libraries   267
                J. L. Arcos and   
           R. Lopez de Mantaras   Perspectives: A Declarative Bias
                                  Mechanism for Case Retrieval . . . . . . 279
                 A. Bonzano and   
              P. Cunningham and   
                       B. Smyth   Using Introspective Learning to Improve
                                  Retrieval in CBR: A Case Study in Air
                                  Traffic Control  . . . . . . . . . . . . 291
            S. Brueninghaus and   
                   K. D. Ashley   Using Machine Learning for Assigning
                                  Indices to Textual Cases . . . . . . . . 303
                J. Daengdej and   
                      D. Lukose   How Case-Based Reasoning and Cooperative
                                  Query Answering Techniques Support
                                  RICAD? . . . . . . . . . . . . . . . . . 315
              J. J. Daniels and   
                 E. L. Rissland   What You Saw Is What You Want: Using
                                  Cases to Seed Information Retrieval  . . 325
                  K. Hanney and   
                    M. T. Keane   The Adaptation Knowledge Bottleneck: How
                                  to Ease it by Learning from Cases  . . . 359
                      M. T. Cox   Loose Coupling of Failure Explanation
                                  and Repair: Using Learning Goals to
                                  Sequence Learning Methods  . . . . . . . 425
                    C. Drummond   Using a Case-Base of Surfaces to
                                  Speed-Up Reinforcement Learning  . . . . 435
            A. D. Griffiths and   
                   D. G. Bridge   PAC Analyses of a `Similarity Learning'
                                  IBL Algorithm  . . . . . . . . . . . . . 445
                    N. Howe and   
                      C. Cardie   Examining Locally Varying Weights for
                                  Nearest Neighbor Algorithms  . . . . . . 455
                R. J. Aarts and   
                       J. Rousu   Qualitative Knowledge to Support
                                  Reasoning About Cases  . . . . . . . . . 489
                      A. An and   
                 N. Cercone and   
                        C. Chan   Integrating Rule Induction and
                                  Case-Based Reasoning to Enhance Problem
                                  Solving  . . . . . . . . . . . . . . . . 499
                R. Bergmann and   
                   W. Wilke and   
                  J. Schumacher   Using Software Process Modeling for
                                  Building a Case-Based Reasoning
                                  Methodology: Basic Approach and Case
                                  Study  . . . . . . . . . . . . . . . . . 509
                 L. K. Branting   Stratified Case-Based Reasoning in
                                  Non-refinable Abstraction Hierarchies    519
                  M. T. Cox and   
                   M. M. Veloso   Supporting Combined Human and Machine
                                  Planning: An Interface for Planning by
                                  Analogical Reasoning . . . . . . . . . . 531
           N. Karacapilidis and   
                 B. Trousse and   
                    D. Papadias   Using Case-Based Reasoning for
                                  Argumentation with Multiple Viewpoints   541
               S. R. Bhatta and   
                     A. K. Goel   An Analogical Theory of Creativity in
                                  Design . . . . . . . . . . . . . . . . . 565
                  D. Dubois and   
                  F. Esteva and   
                  P. Garcia and   
                        L. Godo   Fuzzy Modeling of Case-Based Reasoning
                                  and Decision . . . . . . . . . . . . . . 599
                    B. Faltings   Probabilistic Indexing for Case-Based
                                  Prediction . . . . . . . . . . . . . . . 611
                    R. R. Yager   Case-Based Reasoning, Fuzzy Systems
                                  Modeling and Solution Composition  . . . 633


Lecture Notes in Computer Science
Volume 1267, 1997

           Helena Handschuh and   
                  Henri Gilbert   $ \chi^2 $ Cryptanalysis of the SEAL
                                  Encryption Algorithm . . . . . . . . . . 1
               Carlo Harpes and   
                James L. Massey   Partitioning Cryptanalysis . . . . . . . 13
            Thomas Jakobsen and   
                Lars R. Knudsen   The Interpolation Attack on Block
                                  Ciphers  . . . . . . . . . . . . . . . . 28
              Kazumaro Aoki and   
            Kunio Kobayashi and   
                   Shiho Moriai   Best Differential Characteristic Search
                                  of FEAL  . . . . . . . . . . . . . . . . 41
                 Mitsuru Matsui   New Block Encryption Algorithm MISTY . . 54
                   Matthew Kwan   The Design of the ICE Encryption
                                  Algorithm  . . . . . . . . . . . . . . . 69
                      Anonymous   Advanced Encryption Standard, Draft
                                  Minimum Requirements and Evaluation
                                  Criteria . . . . . . . . . . . . . . . . 83--87
              Cunsheng Ding and   
             Valtteri Niemi and   
                Ari Renvall and   
                   Arto Salomaa   TWOPRIME: A Fast Stream Ciphering
                                  Algorithm  . . . . . . . . . . . . . . . 88
                  Markus Dichtl   On Nonlinear Filter Generators . . . . . 103
              Ross Anderson and   
          Charalampos Manifavas   Chameleon --- A New Kind of Stream
                                  Cipher . . . . . . . . . . . . . . . . . 107
            Kouichi Sakurai and   
                 Souichi Furuya   Improving Linear Cryptanalysis of LOKI91
                                  by \em Probabilistic Counting Method . . 114
                      Eli Biham   Cryptanalysis of Ladder-DES  . . . . . . 134
             Vincent Rijmen and   
                   Bart Preneel   A Family of Trapdoor Ciphers . . . . . . 139
                Joan Daemen and   
               Lars Knudsen and   
                 Vincent Rijmen   The Block Cipher SQUARE  . . . . . . . . 149
           David M'Ra\"\ihi and   
             David Naccache and   
              Jacques Stern and   
                 Serge Vaudenay   XMX: A Firmware-Oriented Block Cipher
                                  Based on Modular Multiplications . . . . 166
                Shai Halevi and   
                  Hugo Krawczyk   MMH: Software Message Authentication in
                                  the Gbit/second Rates  . . . . . . . . . 172
       Valentine Afanassiev and   
         Christian Gehrmann and   
                     Ben Smeets   Fast Message Authentication Using
                                  Efficient Polynomial Evaluation  . . . . 190
                   Gideon Yuval   Reinventing the Travois: Encryption/MAC
                                  in 30 ROM Bytes  . . . . . . . . . . . . 205
               Ronald L. Rivest   All-or-Nothing Encryption and the
                                  Package Transform  . . . . . . . . . . . 210
                   Stefan Lucks   On the Security of Remotely Keyed
                                  Encryption . . . . . . . . . . . . . . . 219
                 Adam Young and   
                      Moti Yung   Sliding Encryption: A Cryptographic Tool
                                  for Mobile Agents  . . . . . . . . . . . 230
             Bruce Schneier and   
                   Doug Whiting   Fast Software Encryption: Designing
                                  Encryption Algorithms for Optimal
                                  Software Speed on the Intel Pentium
                                  Processor  . . . . . . . . . . . . . . . 242--259
                      Eli Biham   A Fast New DES Implementation in
                                  Software . . . . . . . . . . . . . . . . 260
              Craig S. K. Clapp   Optimizing a Fast Stream Cipher for
                                  VLIW, SIMD, and Superscalar Processors   273


Lecture Notes in Computer Science
Volume 1268, 1997

                  L. Braine and   
                       C. Clack   Introducing Clover: An Object-Oriented
                                  Functional Language  . . . . . . . . . . 1
                       M. Erwig   Active Patterns  . . . . . . . . . . . . 21
                 U. Boquist and   
                    T. Johnsson   The Grin Project: A Highly Optimising
                                  Back End for Lazy Functional Languages   58
              S. Breitinger and   
                  U. Klusik and   
                      R. Loogen   An Implementation of Eden on Top of
                                  Concurrent Haskell . . . . . . . . . . . 141
                     C. Assmann   Coordinating Functional Processes Using
                                  Petri Nets . . . . . . . . . . . . . . . 162
               S. A. Jarvis and   
                   R. G. Morgan   The Results of: Profiling Large-scale
                                  Lazy Functional Programs . . . . . . . . 200
                 M. Debbabi and   
                   A. Faour and   
                       N. Tawbi   A Type-based Algorithm for the
                                  Control-Flow Analysis of Higher-Order
                                  Concurrent Programs  . . . . . . . . . . 247
                   W. Dosch and   
                     B. Moeller   Calculating a Functional Module for
                                  Binary Search Trees  . . . . . . . . . . 267


Lecture Notes in Computer Science
Volume 1270, 1997

                     A. Joesang   Prospectives for modelling trust in
                                  information security . . . . . . . . . . 2
                     Y. Bai and   
                V. Varadharajan   Analysis and implementation of a formal
                                  authorisation policy design approach . . 14
                 J. Holford and   
                       G. Mohay   ProtectOS: Operating system and hardware
                                  support for small objects  . . . . . . . 102
                    M. Fischlin   Practical memory checkers for stacks,
                                  queues and deques  . . . . . . . . . . . 114
                 S. Charney and   
                  S. Perrin and   
                S. Orlowski and   
                     N. Reaburn   Panel Session: Cryptographic Policy
                                  Guidelines . . . . . . . . . . . . . . . 126
                      X. Yi and   
                      K.-Y. Lam   A new hash function based on block
                                  cipher . . . . . . . . . . . . . . . . . 139
                X.-M. Zhang and   
                       Y. Zheng   New lower bounds on nonlinearity and a
                                  class of highly nonlinear functions  . . 147
                    L. Chen and   
                D. Gollmann and   
             C. J. Mitchell and   
                        P. Wild   Secret sharing with reusable polynomials 183
               S. Bakhtiari and   
            R. Safavi-Naini and   
                    J. Pieprzyk   A message authentication code based on
                                  Latin squares  . . . . . . . . . . . . . 194
                     F. Bao and   
                    R. Deng and   
                     Y. Han and   
                        A. Jeng   Design and analyses of two basic
                                  protocols for use in TTP-based key
                                  escrow . . . . . . . . . . . . . . . . . 261
                        C. Boyd   On keg agreement and conference keg
                                  agreement  . . . . . . . . . . . . . . . 294
                J. Dittmann and   
                   A. Steinmetz   Enabling technology for the trading of
                                  MPEG-encoded video . . . . . . . . . . . 314
                     T. Abe and   
                   H. Fujii and   
                     K. Kushima   Image distribution method with embedded
                                  identifier scheme for copyright
                                  protection . . . . . . . . . . . . . . . 325


Lecture Notes in Computer Science
Volume 1271, 1997

                  L. Kerschberg   The Role of Intelligent Software Agents
                                  in Advanced Information Systems  . . . . 1
            S. E. Bratsberg and   
            S.-O. Hvasshovd and   
                O. Torbjoernsen   Location and Replication Independent
                                  Recovery in a Highly Available Database  23
                O. Groevlen and   
            O. Torbjoernsen and   
                S.-O. Hvasshovd   Compensation-Based Query Processing in
                                  On-Line Transaction Processing Systems   38
     F. De Ferreira Rezende and   
                 T. Haerder and   
               A. Gloeckner and   
                       J. Lutze   Detection Arcs for Deadlock Management
                                  in Nested Transactions and Their
                                  Performance  . . . . . . . . . . . . . . 54
          K. Bratbergsengen and   
                    K. Noervaag   Improved and Optimized Partitioning
                                  Techniques in Database Query Processing  69
                   T. Grust and   
                 J. Kroeger and   
                  D. Gluche and   
                       A. Heuer   Query Evaluation in CROQUE --- Calculus
                                  and Algebra Coincide . . . . . . . . . . 84
                       T. Zurek   Optimisation of Partitioned Temporal
                                  Joins  . . . . . . . . . . . . . . . . . 101
                O. Balownew and   
                    T. Bode and   
              A. B. Cremers and   
                    J. Kalinski   Maintaining Library Catalogues with an
                                  RDBMS: A Performance Study . . . . . . . 116
                       L. Berti   Merging an Active Database and a
                                  Reflective System: Modelling a New
                                  Several Active Meta-Levels Architecture  119
                   H. Gupta and   
                 I. McLaren and   
                       A. Vella   A Framework for Database Mining  . . . . 121
                   O. Haase and   
                     A. Henrich   Query Processing Techniques for Partly
                                  Inaccessible Distributed Databases . . . 123
              W. Winiwarter and   
                  Y. Kambayashi   DOA --- The Deductive Object-Oriented
                                  Approach to the Development of Adaptive
                                  Natural Language Interfaces  . . . . . . 137
            L. C. Faulstich and   
            M. Spiliopoulou and   
                   V. Linnemann   WIND: A Warehouse for Internet Data  . . 169
                  S. Conrad and   
                 M. Hoeding and   
                   G. Saake and   
                     I. Schmitt   Schema Integration with Integrity
                                  Constraints  . . . . . . . . . . . . . . 200
                      L. Xu and   
               A. Poulovassilis   A Method for Integrating Deductive
                                  Databases  . . . . . . . . . . . . . . . 215


Lecture Notes in Computer Science
Volume 1272, 1997

                    B. Chazelle   Discrepancy Theory and Computational
                                  Geometry . . . . . . . . . . . . . . . . 1
             R.-P. Berretty and   
                M. Overmars and   
          A. F. Van der Stappen   Dynamic Motion Planning in Low Obstacle
                                  Density Environments . . . . . . . . . . 3
               L. J. Guibas and   
              J.-C. Latombe and   
              S. M. LaValle and   
                         D. Lin   Visibility-Based Pursuit-Evasion in a
                                  Polygonal Environment  . . . . . . . . . 17
              P. K. Agarwal and   
               L. J. Guibas and   
             J. Hershberger and   
                       E. Veach   Maintaining the Extent of a Moving Point
                                  Set  . . . . . . . . . . . . . . . . . . 31
                 S. Alstrup and   
            P. W. Lauridsen and   
              P. Sommerlund and   
                      M. Thorup   Finding Cores of Limited Length  . . . . 45
               F. Shahrokhi and   
                  O. Sykora and   
                 L. Szekely and   
                        I. Vrto   On Bipartite Crossings, Largest Biplanar
                                  Subgraphs, and the Linear Arrangement
                                  Problem  . . . . . . . . . . . . . . . . 55
            S. Rao Kosaraju and   
            A. A. Schaeffer and   
                L. G. Biesecker   Approximation Algorithms for a Genetic
                                  Diagnostics Problem  . . . . . . . . . . 69
             J. Hershberger and   
                    J. Snoeyink   Cartographic Line Simplification and
                                  Polygon CSG Formulae in $ O(n \log n) $
                                  Time . . . . . . . . . . . . . . . . . . 93
                M. Charikar and   
                 R. Motwani and   
                P. Raghavan and   
                 C. Silverstein   Constrained TSP and Low-Power Computing  104
                  P. Berman and   
                M. Charikar and   
                   M. Karpinski   On-Line Load Balancing for Related
                                  Machines . . . . . . . . . . . . . . . . 116
              N. Stojanovic and   
                  P. Berman and   
                 D. Gumucio and   
                    R. Hardison   A Linear-Time Algorithm for the
                                  1-Mismatch Problem . . . . . . . . . . . 126
                   J. Majhi and   
                R. Janardan and   
                    M. Smid and   
                       P. Gupta   On Some Geometric Optimization Problems
                                  in Layered Manufacturing . . . . . . . . 136
                   H. Okano and   
                  S. Misono and   
                       K. Iwano   New TSP Construction Heuristics and
                                  Their Relationships To The 2-Opt . . . . 150
                    A. Amir and   
              M. Lewenstein and   
                  N. Lewenstein   Pattern Matching in Hypertext  . . . . . 160
             R. Baeza-Yates and   
                     G. Navarro   Multiple Approximate String Matching . . 174
                   D. P. Dobkin   Applied Computational Geometry . . . . . 185
               O. Devillers and   
                  G. Liotta and   
            F. P. Preparata and   
                    R. Tamassia   Checking the Convexity of Polytopes and
                                  the Planarity of Subdivisions  . . . . . 186
                G. Barequet and   
            M. T. Dickerson and   
                 M. T. Goodrich   Voronoi Diagrams for Polygon-Offset
                                  Distance Functions . . . . . . . . . . . 200
                      S. Seiden   Randomized Algorithms for that Ancient
                                  Scheduling Problem . . . . . . . . . . . 210
                 T. Hayashi and   
                  K. Nakano and   
                      S. Olariu   Optimal Parallel Algorithms for
                                  Proximate Points, with Applications  . . 224
                D. Eppstein and   
                     D. W. Hart   An Efficient Algorithm for Shortest
                                  Paths in Vertical and Horizontal
                                  Segments . . . . . . . . . . . . . . . . 234
                 D. Z. Chen and   
                  O. Daescu and   
                    K. S. Klenk   On Geometric Path Query Problems . . . . 248
              S. A. Goldman and   
              J. Parwatikar and   
                        S. Suri   On-Line Schedufing with Hard Deadlines   258
                  S. K. Das and   
                  M. C. Pinotti   Load Balanced Mapping of Data Structures
                                  in Parallel Memory Modules for Fast and
                                  Conflict-Free Templates Access . . . . . 272
                    K. Mulmuley   Parallel vs. Parametric Complexity . . . 282
             A. Lopez-Ortiz and   
                   S. Schuierer   Position-Independent Near Optimal
                                  Searching and On-Line Recognition in
                                  Star Polygons  . . . . . . . . . . . . . 284
                   A. Efrat and   
                 M. J. Katz and   
                 F. Nielsen and   
                      M. Sharir   Dynamic Data Structures for Fat Objects
                                  and Their Appfications . . . . . . . . . 297
              M. Goldwasser and   
                     R. Motwani   Intractability of Assembly Sequencing:
                                  Unit Disks in the Plane  . . . . . . . . 307
                  G. Narasimhan   On Hamiltonian Triangulations in Simple
                                  Polygons . . . . . . . . . . . . . . . . 321
              P. Bertolazzi and   
             G. Di Battista and   
                      W. Didimo   Computing Orthogonal Drawings with the
                                  Minimum Number of Bends  . . . . . . . . 331
                        S. Kwek   On a simple Depth-First Search Strategy
                                  for Exploring Unknown Graphs . . . . . . 345
              A. Papakostas and   
                   I. G. Tollis   Orthogonal Drawing of High Degree Graphs
                                  with Small Area and Few Bends  . . . . . 354
                 S. Ramnath and   
                        H. Shen   A Centroid Labeling Technique and Its
                                  Application to Path Selection in Trees   368
                G. Barequet and   
               A. J. Briggs and   
            M. T. Dickerson and   
                 M. T. Goodrich   Offset-Polygon Annulus Placement
                                  Problems . . . . . . . . . . . . . . . . 378
                 M. De Berg and   
                    P. Bose and   
                 D. Bremner and   
                   S. Ramaswami   Computing Constrained Minimum-Width
                                  Annuli of Point Sets . . . . . . . . . . 392
                   M. Segal and   
                       K. Kedem   Geometric Applications of Posets . . . . 402
                   H. Gupta and   
                      R. Wenger   Constructing Pairwise Disjoint Paths
                                  with Few Links . . . . . . . . . . . . . 416
                 A. Brodnik and   
            P. B. Miltersen and   
                    J. I. Munro   Trans-dichotomous Algorithms without
                                  Multiplication --- Some Upper and Lower
                                  Bounds . . . . . . . . . . . . . . . . . 426
                 J. Rethman and   
                       E. Wanke   An Approximation Algorithm for Stacking
                                  up Bins from a Conveyer onto Pallets . . 440
               K. S. Larsen and   
       E. Soisalon-Soininen and   
                    P. Widmayer   Relaxed Balance through Standard
                                  Rotations  . . . . . . . . . . . . . . . 450
             J. Hershberger and   
                        S. Suri   Efficient Breakout Routing in Printed
                                  Circuit Boards . . . . . . . . . . . . . 462
                 Z.-Z. Chen and   
                  M. Grigni and   
               C. Papadimitriou   Planarity Revisited  . . . . . . . . . . 472


Lecture Notes in Computer Science
Volume 1273, 1997

              A. B. Arehart and   
                 W. A. Wolovich   Bumpless Switching in Hybrid Systems . . 1
             M. S. Branicky and   
               E. Dolginova and   
                       N. Lynch   A Toolbox for Proving and Maintaining
                                  Hybrid Specifications  . . . . . . . . . 18
             M. S. Branicky and   
                 S. E. Mattsson   Simulation of Hybrid Systems . . . . . . 31
                 V. Brayman and   
                     J. Vagners   Application of the Kohn-Nerode Control
                                  Law Extraction Procedure to the Inverted
                                  Pendulum Problem . . . . . . . . . . . . 57
                 M. Broucke and   
                     P. Varaiya   Decidability of Hybrid Systems with
                                  Linear and Nonlinear Differential
                                  Inclusions . . . . . . . . . . . . . . . 77
                    D. D. Cofer   Reliable implementation of Hybrid
                                  Control Systems for Advanced Avionics    93
               A. Deshpande and   
                 A. Goellue and   
                     P. Varaiya   SHIFT: A Formalism and a Programming
                                  Language for Dynamic Networks of Hybrid
                                  Automata . . . . . . . . . . . . . . . . 113
                 M. Heymann and   
                     F. Lin and   
                       G. Meyer   Synthesis of Minimally Restrictive Legal
                                  Controllers for a Class of Hybrid
                                  Systems  . . . . . . . . . . . . . . . . 134
               J. F. Knight and   
                      B. Luense   Control Theory, Modal Logic, and Games   160
                    W. Kohn and   
                  A. Nerode and   
                   J. B. Remmel   Agent Based Velocity Control of Highway
                                  Systems  . . . . . . . . . . . . . . . . 174
                J. F. Kolen and   
                        F. Zhao   A Computational Analysis of the
                                  Reachability Problem for a Class of
                                  Hybrid Dynamical Systems . . . . . . . . 215
              M. Kourjanski and   
                     P. Varaiya   A Class of Rectangular Hybrid Systems
                                  with Computable Reach Set  . . . . . . . 228
                  M. Lemmon and   
                     C. J. Bett   Safe Implementations of Supervisory
                                  Commands . . . . . . . . . . . . . . . . 235
                  A. Nerode and   
               J. B. Remmel and   
                     A. Yakhnis   Hybrid System Games: Extraction of
                                  Control Automata with Small Topologies   248
               O. Oezguener and   
               C. Hatipoglu and   
                   A. Iftar and   
                     K. Redmill   Hybrid Control Desgin for a Three
                                  Vehicle Scenario Demonstration Using
                                  Overlapping Decompositions . . . . . . . 294
               G. J. Pappas and   
                      S. Sastry   Towards Continuous Abstractions of
                                  Dynamical and Control Systems  . . . . . 329
                  J. Raisch and   
                     S. O'Young   A Totally Ordered Set of Discrete
                                  Abstractions for a Given Hybrid or
                                  Continuous System  . . . . . . . . . . . 342
               O. Stursberg and   
              S. Kowalewski and   
                I. Hoffmann and   
                    J. Preussig   Comparing Timed and Hybrid Automata as
                                  Approximations of Continuous Systems . . 361
                  C. Tomlin and   
                  G. Pappas and   
                 J. Lygeros and   
                     D. Godbole   Hybrid Control Models of Next Generation
                                  Air Traffic Management . . . . . . . . . 378


Lecture Notes in Computer Science
Volume 1274, 1997

                    K. Urquhart   Java and the Emerging Technology . . . . 1
                   T. H. Nelson   Transcopyright: A Simple Legal
                                  Arrangement for Sharing, Re-use, and
                                  Republication of Copyrighted Material on
                                  the Net  . . . . . . . . . . . . . . . . 7
                      S. Hirano   HORB: Distributed Execution of Java
                                  Programs . . . . . . . . . . . . . . . . 29
                  M. Fukuda and   
                  L. F. Bic and   
              M. B. Dillencourt   Performance of the MESSENGERS
                                  Autonomous-Objects-Based System  . . . . 43
                 K. Wallnau and   
                  E. Morris and   
                  P. Feiler and   
                        A. Earl   Engineering Component-Based Systems with
                                  Distributed Object Technology  . . . . . 58
                T. Nishioka and   
                Y. Hamazaki and   
                   M. Tsukamoto   Local Class Name Space Facility for
                                  Worldwide Object-Oriented Distributed
                                  Systems Environment  . . . . . . . . . . 74
                 L. Fuentes and   
                    J. M. Troya   A Component-Oriented Architecture to
                                  Design Multimedia Services on a
                                  Distributed Platform . . . . . . . . . . 90
                 L. Cavedon and   
                     A. Rao and   
               L. Sonenberg and   
                      G. Tidhar   Teamwork via Team Plans in Intelligent
                                  Autonomous Agent Systems . . . . . . . . 106
                  H. Mizuno and   
                     H. Fukuoka   WISH: A Web Information Sharing System
                                  Accessible via the WWW . . . . . . . . . 122
                   H. Nakashima   Organic Programming for Cooperative
                                  Computation  . . . . . . . . . . . . . . 133
                  J. Grudin and   
                       L. Palen   Emerging Groupware Successes in Major
                                  Corporations: Studies of Adoption and
                                  Adaptation . . . . . . . . . . . . . . . 142
                    T. Yamakami   An Approach toward Fits Evaluation
                                  between Organizational Culture and
                                  Groupware  . . . . . . . . . . . . . . . 154
                  K. Fujita and   
                    S. Kunifuji   A Realization of a Reflection of
                                  Personal Information on Distributed
                                  Brainstorming Environment  . . . . . . . 166
                   W.-S. Li and   
               K. S. Candan and   
                  K. Hirata and   
                        Y. Hara   A Hybrid Approach to Multimedia Database
                                  Systems through Integration of Semantics
                                  and Media-Based Search . . . . . . . . . 182
                       R. Bayer   The Universal B-tree for
                                  Multidimensional Indexing: General
                                  Concepts . . . . . . . . . . . . . . . . 198
                 M. Kamiura and   
                    H. Oiso and   
                  K. Tajima and   
                      K. Tanaka   Spatial Views and LOD-based Access
                                  Control in VRML-object Databases . . . . 210
                     P. Messina   Metacomputing and Data-Intensive
                                  Applications . . . . . . . . . . . . . . 226
                  S. Nishio and   
                   M. Tsukamoto   Architectural Issues of Database Systems
                                  in Advanced Computer Networks  . . . . . 237
                D. B. Lange and   
                  M. Oshima and   
                 G. Kargoth and   
                      K. Kosaka   Aglets: Programming Mobile Agents in
                                  Java . . . . . . . . . . . . . . . . . . 253
               S. Yamaguchi and   
               K.-I. Chinen and   
                       H. Inoue   WWW Cache Management and Its
                                  International Deployment . . . . . . . . 267
               G. Mansfield and   
               E. P. Duarte and   
               M. Kitahashi and   
                     S. Noguchi   VINES: Distributed Algorithms for a Web
                                  Based Distributed Network Management
                                  System . . . . . . . . . . . . . . . . . 281
           P. I. Radoslavov and   
                      T. Tokuda   An Algorithm for Cost-Delay Balanced
                                  Trees and Its Application to Wide Area
                                  Network Multicast  . . . . . . . . . . . 294
               R. J. Kummerfeld   Server Initiated Delivery of Multimedia
                                  Information  . . . . . . . . . . . . . . 309
                  S. Moriai and   
                      H. Tokuda   Dynamic Loadable Object Support for
                                  Real-Time Mach Kernels . . . . . . . . . 318
                 M. Iwasaki and   
                T. Takeuchi and   
                M. Nakahara and   
                    S. Nakamura   A Micro-kernel for Isochronous
                                  Video-Data Transfer  . . . . . . . . . . 334
              E. G. Manning and   
                    S. Khan and   
                     R. Lea and   
                    G. C. Shoja   Metaspaces and Mobile Computing:
                                  Promises and Challenges  . . . . . . . . 350
                   Budiarto and   
            Kaname Harumoto and   
         Masahiko Tsukamoto and   
                 Shojiro Nishio   Position Locking: Handling Location
                                  Dependent Queries in Mobile Computing
                                  Environment  . . . . . . . . . . . . . . 363--378
                A. Hokimoto and   
                    T. Nakajima   Robust Host Mobility Supports for
                                  Adaptive Mobile Applications . . . . . . 379
                  M. Terada and   
                Y. Murayama and   
                   G. Mansfield   Access Control for Inter-Organizational
                                  Computer Network Environment . . . . . . 394
                      Y. Shinjo   The World Wide Shell Based on the
                                  Object-Stacking Model  . . . . . . . . . 410
                    Y. Sato and   
                    Y. Hamazaki   DeleGate: A General Purpose Application
                                  Level Gateway  . . . . . . . . . . . . . 426


Lecture Notes in Computer Science
Volume 1275, 1997

                S. Agerholm and   
                       J. Frost   An Isabelle-Based Theorem Prover for
                                  VDM-SL . . . . . . . . . . . . . . . . . 1
                  J. H. Andrews   Executing Formal Specifications by
                                  Translation to Higher Order Logic
                                  Programming  . . . . . . . . . . . . . . 17
                  M. Archer and   
                   C. Heitmeyer   Human-Style Theorem Proving Using PVS    33
                A. J. Camilleri   A Hybrid Approach to Verifying Liveness
                                  in a Symmetric Multi-Processor . . . . . 49
                 B. Chetali and   
                        B. Heyd   Formal Verification of Concurrent
                                  Programs in LP and in CoQ: A Comparative
                                  Analysis . . . . . . . . . . . . . . . . 69
                R. L. Constable   ML Programming in Constructive Type
                                  Theory . . . . . . . . . . . . . . . . . 87
               M. Devillers and   
               D. Griffioen and   
                     O. Mueller   Possibly Infinite Sequences in Theorem
                                  Provers: A Comparative Study . . . . . . 89
                       G. Dowek   Proof Normalization for a First-Order
                                  Formulation of Higher-Order Logic  . . . 105
                B. Dutertre and   
                   S. Schneider   Using a PVS Embedding of CSP to Verify
                                  Authentication Protocols . . . . . . . . 121
                    J. Harrison   Verifying the Accuracy of Polynomial
                                  Approximations in HOL  . . . . . . . . . 137
                  D. Hirschkoff   A Full Formalisation of $ \pi $-Calculus
                                  Theory in the Calculus of Constructions  153--169
                       D. Kapur   Rewriting, Decision Procedures and Lemma
                                  Speculation for Automated Hardware
                                  Verification . . . . . . . . . . . . . . 171
              T. Laangbacka and   
                  J. Von Wright   Refining Reactive Systems in HOL Using
                                  Action Systems . . . . . . . . . . . . . 183
                       T. Mohri   On Formalization of Bicategory Theory    199
                W. Naraschewski   Towards an Object-Oriented Progification
                                  Language . . . . . . . . . . . . . . . . 215
                       D. Peled   Verification for Robust Specification    231
                      T. Santen   A Theory of Structured Model-Based
                                  Specifications in Isabelle/HOL . . . . . 243
                      M. Simons   Proof Presentation for Isabelle  . . . . 259
                       K. Slind   Derivation and Use of Induction Schemes
                                  in Higher-Order Logic  . . . . . . . . . 275
                    O. Slotosch   Higher Order Quotients and their
                                  Implementation in Isabelle HOL . . . . . 291
                      M. Wenzel   Type Classes and Overloading in
                                  Higher-Order Logic . . . . . . . . . . . 307
                      V. Zammit   A Comparative Study of Coq and HOL . . . 323


Lecture Notes in Computer Science
Volume 1276, 1997

                  S. K. Das and   
                  M. C. Pinotti   Conflict-Free Access to Templates of
                                  Trees and Hypercubes in Parallel Memory
                                  Systems  . . . . . . . . . . . . . . . . 1
                 D. Krizanc and   
                       L. Zhang   Many-to-One Packet Routing via Matchings 11
           F. S. Annexstein and   
               K. A. Berman and   
                 R. Swaminathan   A Multi-tree Generating Routing Scheme
                                  Using Acyclic Orientations . . . . . . . 18
       C. Bertram-Kretzberg and   
              T. Hofmeister and   
                     H. Lefmann   An Algorithm for Heilbronn's Problem . . 23
                 K. W. Chan and   
                  F. Y. L. Chin   Optimal Multiresolution Polygonal
                                  Approximation  . . . . . . . . . . . . . 32
                    W. Chen and   
              Xiao Wen Deng and   
                    K. Wada and   
                   K. Kawaguchi   Constructing a Strongly Convex Superhull
                                  of Points  . . . . . . . . . . . . . . . 42
                         B. Zhu   Fast Range Searching with Delaunay
                                  Triangulations . . . . . . . . . . . . . 52
                  J.-Y. Cai and   
                   D. Sivakumar   Resolution of Hartmanis' Conjecture for
                                  NL-hard Sparse Sets  . . . . . . . . . . 62
                    R. Reischuk   Can Large Fanin Circuits Perform
                                  Reliable Computations in the Presence of
                                  Noise? . . . . . . . . . . . . . . . . . 72
                    V. Grolmusz   On Set Systems with Restricted
                                  Intersections Modulo a Composite Number  82
                Y. Takenaga and   
                  M. Nouzoe and   
                      S. Yajima   Size and Variable Ordering of OBDDs
                                  Representing Threshold Functions . . . . 91
                     K. Atteson   The Performance of Neighbor-Joining
                                  Algorithms of Phylogeny Reconstruction   101
                   V. Berry and   
                     O. Gascuel   Inferring Evolutionary Trees with Strong
                                  Combinatorial Evidence . . . . . . . . . 111
                    K. Rice and   
                      T. Warnow   Parsimony is Hard to Beat  . . . . . . . 124
               L. Gasieniec and   
                 J. Jansson and   
                  A. Lingas and   
                     A. Oestlin   On the Complexity of Computing
                                  Evolutionary Trees . . . . . . . . . . . 134
                     V. Brattka   Computable Invariance  . . . . . . . . . 146
                        Q. Zhou   Subclasses of Computable Real Valued
                                  Functions  . . . . . . . . . . . . . . . 156
               K. Weihrauch and   
                       X. Zheng   Computability on Continuous, Lower
                                  Semi-continuous and Upper
                                  Semi-continuous Real Functions . . . . . 166
              T. Hofmeister and   
                  M. Krause and   
                    H. U. Simon   Contrast-Optimal $k$ out of $n$ Secret
                                  Sharing Schemes in Visual Cryptography   176
             Seng Kiat Chua and   
                        S. Ling   A Rabin-Type Scheme Based on $ y^2 x^3 +
                                  b x^2 \bmod n $  . . . . . . . . . . . . 186
                  M.-Y. Kao and   
                      J. Qi and   
                         L. Tan   Optimal Bidding Algorithms Against
                                  Cheating in Multiple-Object Auctions . . 192
                   P. Eades and   
                         X. Lin   Spring Algorithms and Symmetry . . . . . 202
             M. Abul Kashem and   
                    X. Zhou and   
                   T. Nishizeki   Generalized Vertex-Rankings of Partial
                                  $k$-trees  . . . . . . . . . . . . . . . 212
                        L. Chen   A Selected Tour of the Theory of
                                  Identification Matrices  . . . . . . . . 222
                Y. D. Liang and   
               Chin Lung Lu and   
                  Chuan Yi Tang   Efficient Domination on Permutation
                                  Graphs and Trapezoid Graphs  . . . . . . 232
                      W.-L. Hsu   On Physical Mapping Algorithms --- An
                                  Error-Tolerant Test for the Consecutive
                                  Ones Property  . . . . . . . . . . . . . 242
                 D. Sankoff and   
                  M. Blanchette   The Median Problem for Breakpoints in
                                  Comparative Genomics . . . . . . . . . . 251
                     K.-M. Chao   Fast Algorithms for Aligning Sequences
                                  with Restricted Affine Gap Penalties . . 264
                    S. Qiao and   
                   W. S.-Y Wang   A Matrix Representation of Phylogenetic
                                  Trees  . . . . . . . . . . . . . . . . . 274
                 S.-L. Peng and   
                   C.-W. Ho and   
                  T.-S. Hsu and   
                        M.-T Ko   Edge and Node Searching Problems on
                                  Trees  . . . . . . . . . . . . . . . . . 284
                      P. Becker   Construction of Nearly Optimal Multiway
                                  Trees  . . . . . . . . . . . . . . . . . 294
                 K.-H. Tsai and   
                      D.-W Wang   Optimal Algorithms for Circle
                                  Partitioning . . . . . . . . . . . . . . 304
                     X. Tan and   
                        X. Song   Hexagonal Routing of Multiterminal Nets  311
                  S.-J. Lim and   
                        Y.-K Ng   Design and Analysis of Parallel Set-Term
                                  Unification  . . . . . . . . . . . . . . 321
                  Y. Kawabe and   
                       N. Ishii   On Modularity of the Completeness in
                                  Order-Sorted Term Rewriting Systems  . . 331
                      K. Su and   
                    D. Ding and   
                        H. Chen   A Three-Valued Quantificational Logic of
                                  Context  . . . . . . . . . . . . . . . . 343
           A. S. Poulakidas and   
              A. Srinivasan and   
             O. Egecio\uglu and   
                      O. Ibarra   A Compact Storage Scheme for Fast
                                  Wavelet-Based Subregion Retrieval  . . . 353
                   Y. Zhang and   
                    J. Xiao and   
                        X. Zhou   A Declustering Algorithm for Minimizing
                                  Spatial Join Cost  . . . . . . . . . . . 363
                    L. Wang and   
                         X. Jia   Fixed Topology Steiner Trees and
                                  Spanning Forests with Applications in
                                  Network Communications . . . . . . . . . 373
                         G. Xue   A Branch-and-Bound Algorithm for
                                  Computing Node Weighted Steiner Minimum
                                  Trees  . . . . . . . . . . . . . . . . . 383
               Y. Kobayashi and   
                    F. Otto and   
                    P. Seedbold   A Complete Characterization of
                                  Repetitive Morphisms over the Two-Letter
                                  Alphabet . . . . . . . . . . . . . . . . 393
                      S. M. Kim   An Algorithm for Identifying Spliced
                                  Languages  . . . . . . . . . . . . . . . 403
                   U. Hertrampf   The Shapes of Trees  . . . . . . . . . . 412
               D. Geidmanis and   
                  J. Kaneps and   
                 K. Apsitis and   
                     D. Taimina   Tally Languages Accepted by Alternating
                                  Multitape Finite Automata  . . . . . . . 422
                 Y. Iwasaki and   
                Y. Kajiwara and   
                 K. Obokata and   
                    Y. Igarashi   Independent Spanning Trees of Chordal
                                  Rings  . . . . . . . . . . . . . . . . . 431
                      Q. Hu and   
                   Y. Zhang and   
                        X. Shen   Rearrangeable Graphs . . . . . . . . . . 441
                 T.-Y. Sung and   
                   T.-Y. Ho and   
                      L.-H. Hsu   Projective Torus Networks  . . . . . . . 451
                     P. Cai and   
                      J.-Y. Cai   On the 100% Rule of Sensitivity Analysis
                                  in Linear Programming  . . . . . . . . . 460
                F. Takeuchi and   
                        H. Imai   Enumerating Triangulations for Products
                                  of Two Simplices and for Arbitrary
                                  Configurations of Points . . . . . . . . 470
                     Z. Han and   
                          R. Lu   Tree Structure Genetic Algorithm with a
                                  Nourishment Mechanism  . . . . . . . . . 482
                          X. Wu   An Approach to Scalability of Parallel
                                  Matrix Multiplication Algorithms . . . . 492
                     H. Liu and   
                    E. Song and   
                     R. Sotudeh   Limited Acceleration Mechanism for Cell
                                  Loss Free Flow Control in ATM Networks   502
                    Y. Chen and   
                          Q. Li   They Are Just Butterflies  . . . . . . . 512
                     P. Vitanyi   Mutual Search  . . . . . . . . . . . . . 514
                      S.-H Teng   Eigenvalues, Eigenvectors, and Graph
                                  Partitioning . . . . . . . . . . . . . . 515


Lecture Notes in Computer Science
Volume 1277, 1997

                 G. P. Agibalov   Parallel Computations on Finite
                                  Partially Ordered Sets . . . . . . . . . 1
                        L. Chen   Tight Lower Bounds for Computing
                                  Shortest Paths on Proper Interval and
                                  Bipartite Permutation Graphs . . . . . . 7
                R. D. Dietz and   
             T. L. Casavant and   
              T. E. Scheetz and   
                    T. A. Braun   Using Run-Time Uncertainty to Robustly
                                  Schedule Parallel Computation  . . . . . 13
                    P. Hartmann   A Tuple-Based Data Structure for
                                  Distributed Parallel Processing of $3$D
                                  Dynamic Meshes . . . . . . . . . . . . . 25
              M. V. Khenner and   
             D. V. Lyubimov and   
                    B. Roux and   
                 S. V. Shklyaev   The Application of Parallel Computations
                                  Technique to the Solution of Certain
                                  Hydrodynamic Stability Problems  . . . . 40
             O. Kushnarenko and   
                 P. Schnoebelen   A Formal Framework for the Analysis of
                                  Recursive-Parallel Programs  . . . . . . 45
             N. A. Likhoded and   
               A. A. Tiountchik   Systematic Design of $3$-Dimensional
                                  Fixed-Size Array Processors  . . . . . . 60
                    I. Lomazova   On Proving Large Distributed Systems:
                                  Petri Net Modules Verification . . . . . 70
                       S. Pudov   Influence of Self-Connection Weights on
                                  Cellular-Neural Network Stability  . . . 76--82
                 R. Sakellariou   Estimating the Parallel Start --- Up
                                  Overhead for Parallelizing Compilers . . 83
              F. Seredynski and   
                  P. Bouvry and   
                       F. Arbab   Parallel and Distributed Evolutionary
                                  Computation with MANIFOLD  . . . . . . . 94
                  V. Severyanov   Parallel Computation of Fractal Sets
                                  with the Help of Neural Networks and
                                  Cellular Automata  . . . . . . . . . . . 109
              V. A. Sokolov and   
            E. E. Roubtsova and   
                 S. A. Roubtsov   On a Technology of Design and Analysis
                                  of Dataflow Programs . . . . . . . . . . 115
                 A. Stoutchinin   An Integer Linear Programming Model of
                                  Software Pipelining for the MIPS R8000
                                  Processor  . . . . . . . . . . . . . . . 121
              V. Valkovskii and   
                     D. Zerbino   Computations on Cellular Automata with
                                  Defects  . . . . . . . . . . . . . . . . 136
                        T. Yang   Efficient Implementation of the Improved
                                  Unsymmetric Lanczos Process on Massively
                                  Distributed Memory Computers . . . . . . 145
                A. Alpkocak and   
                   E. Ozkarahan   A Spatial Grid File for Multimedia Data
                                  Representation . . . . . . . . . . . . . 156
                O. Bessonov and   
                        B. Roux   Optimization Techniques and Performance
                                  Analysis for Different Serial and
                                  Parallel RISC-based Computers  . . . . . 168
            A. V. Borshchev and   
               Y. G. Karpov and   
             V. V. Roudakov and   
                    A. Filippov   Analysis of a Distributed Election
                                  Algorithm Using COVERS 3.0 --- A Case
                                  Study  . . . . . . . . . . . . . . . . . 175
              B. D. De Dinechin   A Unified Software Pipeline Construction
                                  Scheme for Modulo Scheduled Loops  . . . 189
                 C. Germain and   
                 J. Laminie and   
                  M. Pallud and   
                    D. Etiemble   An HPF Case Study of a
                                  Domain-Decomposition Based Irregular
                                  Application  . . . . . . . . . . . . . . 201
                  L. Hluchy and   
                M. Dobrucky and   
                     J. Astalos   Hybrid Approach to Task Allocation in
                                  Distributed Systems  . . . . . . . . . . 210
                    H. Kwak and   
                     B. Lee and   
                   A. R. Hurson   Viability of Multithreading on Networks
                                  of Workstations  . . . . . . . . . . . . 216
                       Y. Jegou   Task Migration and Fine Grain
                                  Parallelism on Distributed Memory
                                  Architectures  . . . . . . . . . . . . . 226
                   G.-W. On and   
                  B.-S. Lee and   
                 C.-E. Hong and   
                       D.-H Chi   A Scheme for Building Visual Debugging
                                  Environment with Dynamic Debugging
                                  Method for Parallel Systems  . . . . . . 241
         G. A. Papadopoulos and   
                       F. Arbab   Control-Driven Coordination Programming
                                  in Shared Dataspace  . . . . . . . . . . 247
                  S. V. Ten and   
                    K. Otsuyama   Performance Analysis of Geometric
                                  Modeling Algorithm . . . . . . . . . . . 262
                E. Trichina and   
                     J. Oinonen   $3$D Visual Tool Supporting Derivation
                                  of Parallel Programs for MIMD Systems    268
                    J. Wang and   
                      J. Li and   
                      H. Kameda   Scheduling Algorithms for Parallel
                                  Transaction Processing Systems . . . . . 283
                F. Cappello and   
                    D. Etiemble   Communications in Parallel Architectures
                                  and Networks of Workstations: From
                                  Standardisation to New Standards . . . . 298
                    B. Goossens   A Multithreaded Vector Co-processor  . . 311
                R. Hoffmann and   
                 K.-P Voelkmann   Hardware Support for $3$D Cellular
                                  Processing . . . . . . . . . . . . . . . 322
                 S. M. Achasova   Cellular Neural-Like Algorithms with
                                  Heuristics for Solving Combinatorial
                                  Optimization Problems  . . . . . . . . . 330
                M. Balandin and   
              O. Chernyshev and   
                     E. Shurina   Analysis of Methods for Solving
                                  Large-Scale Non-Symmetric Linear Systems
                                  with Sparsed Matrices  . . . . . . . . . 336
               J. C. Fabero and   
                A. Bautista and   
                     L. Casasus   Parallel Simulation of Non-linear
                                  Phenomena with Cellular Automata . . . . 344
            V. G. Khajdukov and   
              V. D. Korneev and   
               V. I. Kostin and   
               V. V. Kovalevsky   Modelling of Seismic Wave Propagation
                                  for $2$D Media (Direct and Inverse
                                  Problems)  . . . . . . . . . . . . . . . 350
                  O. V. Klimova   Decomposition on a Group and Parallel
                                  Convolution and Fast Fourier Transform
                                  Algorithms . . . . . . . . . . . . . . . 358
                    V. P. Ii'in   Parallel Implementation of Symmetric
                                  Alternating Direction Implicit Methods   364
                 V. Markova and   
                    S. Piskunov   Construction of Composed ALT-models of
                                  Cellular Architectures . . . . . . . . . 371
                 E. Onuphre and   
                   A. Chambarel   Parallel Computation of an Unsteady
                                  Compressible Flow  . . . . . . . . . . . 377
                 I. N. Sinitsyn   Parallel Simulation Technologies for
                                  Stochastic Systems . . . . . . . . . . . 383
                  E. N. Akimova   Parallel Direct Algorithms for Solution
                                  of Sparse Linear Systems . . . . . . . . 389
               O. Dikenelli and   
                 O. Ozkasap and   
                   E. Ozkarahan   Scheduling Parallel Programs Involving
                                  Parallel Database Interactions . . . . . 391
                 A. Kaliaev and   
                 I. Kaliaev and   
                       I. Levin   The Base Module of Multiprocessor System
                                  with Structural-Procedural Organization
                                  of Computing . . . . . . . . . . . . . . 394
                        W. Koch   Bitwise Processing --- a Paradigm for
                                  Deriving Parallel Algorithms . . . . . . 396
               E. D. Moreno and   
               S. T. Kofuji and   
                   M. Stumm and   
                 T. Abdelrahman   Tuning Shared Network Cache Size vs.
                                  Second-Level Cache Size in
                                  Clusters-Based Multiprocessors . . . . . 398
           P. P. B. De Oliveira   A Simple, Multi-Architecture, Parallel
                                  Procedure for Generating Combinations    400
               V. Samofalov and   
                   A. Konovalov   Processing and Debugging of Parallel
                                  Programs on the Level of Task Model  . . 402
               A. A. Tiountchik   Systolic Modular Exponentiation  . . . . 404
                    T. Yang and   
                      H.-X. Lin   The Highly Parallel Incomplete
                                  Gram--Schmidt Preconditioner . . . . . . 406
            A. V. Borshchev and   
               Y. G. Karpov and   
             V. V. Roudakov and   
                    A. Filippov   COVERS 3.0 --- A C++ Based Graphical
                                  Modeling and Simulation Tool . . . . . . 409
                 Y. Pogudin and   
                     O. Bandman   Simulating Cellular Computations with
                                  ALT. A Tutorial  . . . . . . . . . . . . 424
                A. Vazhenin and   
                     V. Morozov   SPARTH: a Family of Systems for Parallel
                                  High-Accuracy Computations . . . . . . . 436


Lecture Notes in Computer Science
Volume 1278, 1997

                  M. Conrad and   
                   K.-P. Zauner   Molecular Computing: From Conformational
                                  Pattern Recognition to Complex
                                  Processing Networks  . . . . . . . . . . 1
               P. Prusinkiewicz   A Look at the Visual Modeling of Plants
                                  Using L-Systems  . . . . . . . . . . . . 11
                         H. Lim   Bioinformatics and Cheminformatics in
                                  the Drug Discovery Cycle . . . . . . . . 30
                R. Apweiler and   
                  V. Junker and   
                  A. Gateau and   
                   C. O'Donovan   New Developments in Linking of
                                  Biological Databases and
                                  Computer-Generation of Annotation:
                                  SWISS-PROT and Its Computer-Annotated
                                  Supplement TREMBL  . . . . . . . . . . . 44
                   F. Salas and   
                    J. Haas and   
                 G. Overton and   
                   C. Stoeckert   EpoDB: An Erythropoiesis Gene Expression
                                  Database in Progress . . . . . . . . . . 52
                   T. Havel and   
                 S. Hyberts and   
                     I. Najfeld   Recent Advances in Molecular Distance
                                  Geometry . . . . . . . . . . . . . . . . 62
           J. Collado-Vides and   
                  A. Huerta and   
                       K. Klose   Three Models of Gene Regulation in E.
                                  coli . . . . . . . . . . . . . . . . . . 72
                   K. Frech and   
                  K. Quandt and   
                      T. Werner   A New Method to Develop Highly Specific
                                  Models for Regulatory DNA-Regions  . . . 79
                  G. Breuel and   
                      E. Gilles   Towards an Object-Oriented Framework for
                                  the Modeling of Integrated Metabolic
                                  Processes  . . . . . . . . . . . . . . . 88
                     A. Kel and   
                     O. Kel and   
              O. Vishnevsky and   
                 M. Ponomarenko   TRRD and COMPEL Databases on
                                  Transcription Linked to TRANSFAC as
                                  Tools for Analysis and Recognition of
                                  Regulatory Sequences . . . . . . . . . . 99
               A. Grigoriev and   
                 H. Lehrach and   
                     J. Kumlien   Integrating Heterogeneous Datasets in
                                  Genomic Mapping: Radiation Hybrids,
                                  YACS, Genes and STS Markers over the
                                  Entire Human Chromosome X  . . . . . . . 106
             B. Schwikowski and   
                     M. Vingron   A Clustering Approach to Generalized
                                  Tree Alignment with Application to ALU
                                  Repeats  . . . . . . . . . . . . . . . . 115
              E. Bornberg-Bauer   Simple Folding Model for HP Lattice
                                  Proteins . . . . . . . . . . . . . . . . 125
                  R. Zimmer and   
                      R. Thiele   Fast Protein Fold Recognition and
                                  Accurate Sequence-Structure Alignment    137
        C.-W. Von der Lieth and   
                    E. Lang and   
                       T. Kozar   Carbohydrates: Second-Class Citizens in
                                  Biomedicine and Bioinformatics ? . . . . 147
                  U. Goebel and   
                   C. Forst and   
                    P. Schuster   Structural Constraints and Neutrality in
                                  RNA  . . . . . . . . . . . . . . . . . . 156
                  C. Schwab and   
               S. Handschuh and   
              A. Teckentrup and   
                     M. Wagener   A Systematic Approach to Finding New
                                  Lead Structures Having biological
                                  Activity . . . . . . . . . . . . . . . . 166
                    A. Kaps and   
                 K. Heumann and   
                D. Frishman and   
                       M. Baehr   Visualization and Analysis of the
                                  Complete Yeast Genome  . . . . . . . . . 178
                     J. Suehnel   Virtual Reality Modeling for Structural
                                  Biology  . . . . . . . . . . . . . . . . 189
                  J. Dassow and   
                     V. Mitrana   Evolutionary Grammars: A Grammatical
                                  Model for Genome Evolution . . . . . . . 199
                    G. Paun and   
                     A. Salomaa   From DNA Recombination to DNA Computing,
                                  Via Formal Languages . . . . . . . . . . 210


Lecture Notes in Computer Science
Volume 1279, 1997

                   T. Eiter and   
                     G. Gottlob   The Complexity Class aitch theta0p2:
                                  Recent Results and Applications in AI
                                  and Modal Logic  . . . . . . . . . . . . 1
               R. Hennicker and   
                     M. Wirsing   Proof Systems for Structured Algebraic
                                  Specifications: An Overview  . . . . . . 19
                      M. Li and   
                     P. Vitanyi   Average-Case Analysis via
                                  Incompressibility  . . . . . . . . . . . 38
                A. Mazurkiewicz   Locally Computable Enumerations  . . . . 51
                 D. A. Spielman   The Complexity of Error-Correcting Codes 67
                       E. Upfal   Stochastic Analysis of Dynamic Processes 85
              A. Avermiddig and   
                   M. Kunde and   
                    A. Osterloh   $k$-$k$ Sorting on the Multi-Mesh  . . . 93
                    E. Best and   
                     T. Thielke   Refinement of Coloured Petri Nets  . . . 105
                 E. Badouel and   
                   P. Darondeau   Stratified Petri Nets  . . . . . . . . . 117
                   A. Calabrese   Distributed Acyclic Orientation of
                                  Asynchronous Anonymous Networks  . . . . 129
                C. Choffrut and   
                      L. Guerra   Generalized Rational Relations and their
                                  Logical Definability . . . . . . . . . . 138
                K. Ciebiera and   
                  A. Malinowski   A Note on Broadcasting with Linearly
                                  Bounded Transmission Faults in Constant
                                  Degree Networks  . . . . . . . . . . . . 150
                  F. Cucker and   
                        K. Meer   Logics which Capture Complexity Classes
                                  over the Reals . . . . . . . . . . . . . 157
                  F. Drewes and   
             H.-J. Kreowski and   
                     D. Lapoire   Criteria to Disprove Context-Freeness of
                                  Collage Languages  . . . . . . . . . . . 169
                     A. E. Frid   The Subword Complexity of Fixed Points
                                  of Binary Uniform Morphisms  . . . . . . 179
               L. Gasieniec and   
                       P. Indyk   Efficient Parallel Computing with Memory
                                  Faults . . . . . . . . . . . . . . . . . 188
                   D. P. Gruska   Bounded Concurrency  . . . . . . . . . . 198
                  M. Hammar and   
                  B. J. Nilsson   Concerning the Time Bounds of Existing
                                  Shortest Watchman Route Algorithms . . . 210
            E. Hemaspaandra and   
         L. A. Hemaspaandra and   
                      H. Hempel   Query Order in the Polynomial Hierarchy  222
                   U. Hertrampf   Polynomial Time Machines Equipped with
                                  Word Problems over Algebraic Structures
                                  as their Acceptance Criteria . . . . . . 233
              J. Karhumaeki and   
              W. Plandowski and   
                      W. Rytter   Pattern-Matching Problems for
                                  $2$-Dimensional Images Described by
                                  Finite Automata  . . . . . . . . . . . . 245
             U. Koppenhagen and   
                     E. W. Mayr   The Complexity of the Coverability, the
                                  Containment, and the Equivalence
                                  Problems for Commutative Semigroups  . . 257
                  M. Kudlek and   
                  S. Marcus and   
                    A. Mateescu   Contextual Grammars with Distributed
                                  Catenation and Shuffle . . . . . . . . . 269
                  A. Kuehnemann   A Two-Dimensional Hierarchy for
                                  Attributed Tree Transducers  . . . . . . 281
                S. La Torre and   
                  M. Napoli and   
                     M. Parente   Synchronization of 1-Way Connected
                                  Processors . . . . . . . . . . . . . . . 293
             C. Levcopoulos and   
                 J. Gudmundsson   A Linear-Time Heuristic for Minimum
                                  Rectangular Coverings  . . . . . . . . . 305
                 I. A. Lomazova   On Occurrence Net Semantics for Petri
                                  Nets with Contacts . . . . . . . . . . . 317
                      B. Martin   Cellular Automata Universality Revisited 329
            M. Mavronicolas and   
                   N. Papadakis   Trade-Off Results for Connection
                                  Management . . . . . . . . . . . . . . . 340
                    M. E. Nebel   On the Average Complexity of the
                                  Membership Problem for a Generalized
                                  Dyck Language  . . . . . . . . . . . . . 352
             R. Niedermeier and   
               K. Reinhardt and   
                     P. Sanders   Towards Optimal Locality in
                                  Mesh-Indexings . . . . . . . . . . . . . 364
          E. A. Okol'nishnikova   On the Hierarchy of Nondeterministic
                                  Branching $k$-programs . . . . . . . . . 376
                    F. Otto and   
               A. Sattler-Klein   FDT Is Undecidable for Finitely
                                  Presented Monoids with Solvable Word
                                  Problems . . . . . . . . . . . . . . . . 388
                    H. Petersen   The Equivalence of Pebbles and Sensing
                                  Heads for Finite Automata  . . . . . . . 400
              A. Rabinovich and   
             B. A. Trakhtenbrot   From Finite Automata toward Hybrid
                                  Systems  . . . . . . . . . . . . . . . . 411
                    Z. Sadowski   On an Optimal Quantified Propositional
                                  Proof System and a Complete Language for
                                  NP intersection co-NP  . . . . . . . . . 423
                   S. Schuierer   Lower Bounds in On-Line Geometric
                                  Searching  . . . . . . . . . . . . . . . 429
              F. C. Stephan and   
                  S. A. Terwijn   The Complexity of Universal
                                  Text-Learners  . . . . . . . . . . . . . 441
                    R. M. Verma   Unique Normal Forms for Nonlinear Term
                                  Rewriting Systems: Root Overlaps . . . . 452
            I. Virbitskaite and   
                  A. Votintseva   Behavioural Characterisations of Partial
                                  Order Logics . . . . . . . . . . . . . . 463


Lecture Notes in Computer Science
Volume 1280, 1997

                  David J. Hand   Intelligent Data Analysis: Issues and
                                  Opportunities  . . . . . . . . . . . . . 1
             Chidanand Apte and   
               Se June Hong and   
     Jonathan R. M. Hosking and   
                Jorge Lepre and   
       Edwin P. D. Pednault and   
                 Barry K. Rosen   Decomposition of Heterogeneous
                                  Classification Problems  . . . . . . . . 17--28
         Michael William Muller   Managing Dialogue in a Statistical
                                  Expert Assistant with a Cluster-Based
                                  User Model . . . . . . . . . . . . . . . 29
              C. C. McGeoch and   
                  D. Precup and   
                    P. R. Cohen   How to Find Big-Oh in Your Data Set (and
                                  How Not to)  . . . . . . . . . . . . . . 41
                  Ian Berry and   
                     Paul Gough   Data Classification Using a W.I.S.E.
                                  Toolbox  . . . . . . . . . . . . . . . . 53
         Tremaine A. O. Cornish   Mill's Methods for Complete Intelligent
                                  Data Analysis  . . . . . . . . . . . . . 65
            Dawn E. Gregory and   
                  Paul R. Cohen   Integrating Many Techniques for
                                  Discovering Structure in Data  . . . . . 77
            Robert Levinson and   
                 Jeff Wilkinson   Meta-Reasoning for Data Analysis Tool
                                  Allocation . . . . . . . . . . . . . . . 89
               Robert St. Amant   Navigation for Data Analysis Systems . . 101
         Christine L. Tsien and   
                James C. Fackle   An Annotated Data Collection System to
                                  Support Intelligent Analysis of
                                  Intensive Care Unit Data . . . . . . . . 111--121
                 Hairong Yu and   
                   Arthur Ramer   A Combined Approach to Uncertain Data
                                  Analysis . . . . . . . . . . . . . . . . 123
     Kristina Schädler and   
                 Fritz Wysotzki   A Connectionist Approach to the
                                  Distance-Based Analysis of Relational
                                  Data . . . . . . . . . . . . . . . . . . 137--148
               K. Schaedler and   
                    F. Wysotzki   A Connectionist Approach to the
                                  Distance-Based Analysis of Relational
                                  Data . . . . . . . . . . . . . . . . . . 137
               Robin Glover and   
                   Peter Sharpe   Efficient GA Based Techniques for
                                  Automating the Design of Classification
                                  Models . . . . . . . . . . . . . . . . . 149
                  C. P. Lam and   
              G. A. W. West and   
                   T. M. Caelli   Data Representations and Machine
                                  Learning Techniques  . . . . . . . . . . 161
                 Suzanne Lo and   
                      A. Famili   Development of a Knowledge-Driven
                                  Constructive Induction Mechanism . . . . 173
               João Gama   Oblique Linear Tree  . . . . . . . . . . 187
                  S. Haring and   
                  J. N. Kok and   
                M. C. Van Wezel   Feature Selection for Neural Networks
                                  through Functional Links Found by
                                  Evolutionary Computation . . . . . . . . 199
                  S. Haring and   
                  J. N. Kok and   
                M. C. van Wezel   Feature Selection for Neural Networks
                                  through Functional Links Found by
                                  Evolutionary Computation . . . . . . . . 199
               David Jensen and   
                  Tim Oates and   
                  Paul R. Cohen   Building Simple Models: A Case Study
                                  with Decision Trees  . . . . . . . . . . 211
                M. Piccardi and   
               R. Cucchiara and   
                 M. Bariani and   
                       P. Mello   Exploiting Symbolic Learning in Visual
                                  Inspection . . . . . . . . . . . . . . . 223
                P. D. Scott and   
             R. J. Williams and   
                       K. M. Ho   Forming Categories in Exploratory Data
                                  Analysis and Data Mining . . . . . . . . 235
        Maarten van Someren and   
            Cristina Torres and   
                Floor Verdenius   A Systematic Description of Greedy
                                  Optimisation Algorithms for Cost
                                  Sensitive Generalisation . . . . . . . . 247
             M. Van Someren and   
                  C. Torres and   
                   F. Verdenius   A Systematic Description of Greedy
                                  Optimisation Algorithms for Cost
                                  Sensitive Generalisation . . . . . . . . 247
             Petko Valtchev and   
    Jérôme Euzenat   Dissimilarity Measure for Collections of
                                  Objects and Values . . . . . . . . . . . 259
       H. J. L. M. Vullings and   
         M. H. G. Verhaegen and   
               H. B. Verbruggen   ECG Segmentation Using Time-Warping  . . 275
          Riccardo Bellazzi and   
          Cristiana Larizza and   
                   Alberto Riva   Interpreting Longitudinal Data through
                                  Temporal Abstractions: An Application to
                                  Diabetic Patients Monitoring . . . . . . 287
                  Vera Kamp and   
                   Frank Wietek   Intelligent Support for Multidimensional
                                  Data Analysis in Environmental
                                  Epidemiology . . . . . . . . . . . . . . 299
              Steve R. Gunn and   
               Martin Brown and   
                 Kev M. Bossley   Network Performance Assessment for
                                  Neurofuzzy Data Modelling  . . . . . . . 313
          Susana Nascimento and   
           Fernando Moura-Pires   A Genetic Approach to Fuzzy Clustering
                                  with a Validity Measure Fitness Function 325
           C. M. Roadknight and   
            D. Palmer-Brown and   
                    G. E. Mills   The Analysis of Artificial Neural
                                  Network Data Models  . . . . . . . . . . 337
          Klaus-Peter Huber and   
            Michael R. Berthold   Simulation Data Analysis Using Fuzzy
                                  Graphs . . . . . . . . . . . . . . . . . 347
              Frank Klawonn and   
            Erich-Peter Klement   Mathematical Analysis of Fuzzy
                                  Classifiers  . . . . . . . . . . . . . . 359
                    A. Lapp and   
                    H.-G. Kranz   Neuro-Fuzzy Diagnosis System with a
                                  Rated Diagnosis Reliability and Visual
                                  Data Analysis  . . . . . . . . . . . . . 371
                  Meltem Turhan   Genetic Fuzzy Clustering by Means of
                                  Discovering Membership Functions . . . . 383
                 David McSherry   A Strategy for Increasing the Efficiency
                                  of Rule Discovery in Data Mining . . . . 397
       Klemens Schnattinger and   
                       Udo Hahn   Intelligent Text Analysis for
                                  Dynamically Maintaining and Updating
                                  Domain Knowledge Bases . . . . . . . . . 409
              Michael Schlosser   Knowledge Discovery in Endgame Databases 423
            John Darlington and   
                  Yi-ke Guo and   
        Janjao Sutiwaraphun and   
                   Hing Wing To   Parallel Induction Algorithms for Data
                                  Mining . . . . . . . . . . . . . . . . . 437
                J. Robinson and   
                B. G. T. Lowden   Data Analysis for Query Processing . . . 447
    Laurent Siklóssy and   
                      Marc Ayel   Datum Discovery  . . . . . . . . . . . . 459
               Zhou Yuanhui and   
                 Lu Yuchang and   
                     Shi Chunyi   A Connectionist Approach to Extracting
                                  Knowledge from Databases . . . . . . . . 465
                    Y. Zhou and   
                      Y. Lu and   
                         C. Shi   A Connectionist Approach to Extracting
                                  Knowledge from Databases . . . . . . . . 465
       G. C. van den Eijkel and   
     J. C. A. Van der Lubbe and   
                      E. Backer   A Modulated Parzen-Windows Approach for
                                  Probability Density Estimation . . . . . 479
     M. Rueda García and   
    A. Arcos Cebrián and   
E. Artés Rodríguez   Improvement on Estimating Quantiles in
                                  Finite Population Using Indirect Methods
                                  of Estimation  . . . . . . . . . . . . . 491
                   Yurij Kharin   Robustness of Clustering under Outliers  501
             Erich Schikuta and   
                  Martin Erhart   The BANG-Clustering System: Grid-Based
                                  Data Analysis  . . . . . . . . . . . . . 513
                  W. Z. Liu and   
                A. P. White and   
             S. G. Thompson and   
                   M. A. Bramer   Techniques for Dealing with Missing
                                  Values in Classification . . . . . . . . 527
               Marco Ramoni and   
               Paola Sebastiani   The Use of Exogenous Knowledge to Learn
                                  Bayesian Networks from Incomplete
                                  Databases  . . . . . . . . . . . . . . . 537
                 John X. Wu and   
             Gongxian Cheng and   
                    Xiaohui Liu   Reasoning about Outliers by Modelling
                                  Noisy Data . . . . . . . . . . . . . . . 549
          Elizabeth Bradley and   
                 Matthew Easley   Reasoning about Sensor Data for
                                  Automated System Identification  . . . . 561
              Adele E. Howe and   
                  Gabriel Somlo   Modelling Discrete Event Sequences as
                                  State Transition Diagrams  . . . . . . . 573
                     Sarah Boyd   Detecting and Describing Patterns in
                                  Time-Varying Data Using Wavelets . . . . 585
       Björn Schieffer and   
               Günter Hotz   Diagnosis of Tank Ballast Systems  . . . 597
               Olaf Wolkenhauer   Qualitative Uncertainty Models from
                                  Random Set Theory  . . . . . . . . . . . 609


Lecture Notes in Computer Science
Volume 1281, 1997

                      R. Milner   Strong Normalisation in Higher-Order
                                  Action Calculi . . . . . . . . . . . . . 1
                J. Garrigue and   
                        D. Remy   Extending ML with Semi-explicit
                                  Higher-Order Polymorphism  . . . . . . . 20
                   A. Aiken and   
              E. L. Wimmers and   
                    J. Palsberg   Optimal Representations of Polymorphic
                                  Types with Subtyping . . . . . . . . . . 47
               Z. M. Ariola and   
                        S. Blom   Cyclic Lambda Calculi  . . . . . . . . . 77
                       A. Ohori   Type System for Specializing
                                  Polymorphism . . . . . . . . . . . . . . 107
                   M. Coppo and   
                 F. Damiani and   
                    P. Giannini   On Strictness and Totality . . . . . . . 138
               J. L. Lawall and   
                    P. Thiemann   Sound Specialization in the Presence of
                                  Computational Effects  . . . . . . . . . 165
               Y. Kinoshita and   
              P. W. O'Hearn and   
                A. J. Power and   
                    M. Takeyama   An Axiomatic Approach to Binary Logical
                                  Relations with Applications to Data
                                  Refinement . . . . . . . . . . . . . . . 191
            M. M. Bonsangue and   
                      J. N. Kok   Infinitary Domain Logic for Finitary
                                  Transition Systems . . . . . . . . . . . 213
                    J.- J. Levy   Some Results in the Join-Calculus  . . . 233
                  J. Rathke and   
                    M. Hennessy   Local Model Checking for Value-Passing
                                  Processes  . . . . . . . . . . . . . . . 250
                    K. Sere and   
                      M. Walden   Data Refinement of Remote Procedures . . 267
                S. Abramsky and   
                     S. Gay and   
                   R. Nagarajan   A Type-Theoretic Approach to
                                  Deadlock-Freedom of Asynchronous Systems 295
                  C. L. Talcott   Composable Semantic Models for Actor
                                  Theories . . . . . . . . . . . . . . . . 321
               F. Barbanera and   
                 S. Berardi and   
                M. Schivalocchi   ``Classical'' Programming-with-Proofs in
                                  lambda0s0y0mPA: An Analysis of
                                  Non-confluence . . . . . . . . . . . . . 365
                   J. Power and   
                   H. Thielecke   Environments, Continuation Semantics and
                                  Indexed Categories . . . . . . . . . . . 391
                K. B. Bruce and   
                L. Cardelli and   
                   B. C. Pierce   Comparing Object Encodings . . . . . . . 415
                        E. Poll   System F with Width-Subtyping and Record
                                  Updating . . . . . . . . . . . . . . . . 439
                L. Birkedal and   
                      R. Harper   Relational Interpretations of Recursive
                                  Types in an Operational Setting  . . . . 458
                    S. Matthews   Extending a Logical Framework with a
                                  Modal Connective for Validity  . . . . . 491
                      S. Boutin   Using Reflection to Build Efficient and
                                  Certified Decision Procedures  . . . . . 515
                      B. Werner   Sets in Types, Types in Sets . . . . . . 530
                        R. Mayr   Combining Petri Nets and PA-Processes    547
                  S. Yamane and   
                    K. Nakamura   Symbolic Model-Checking Method Based on
                                  Approximations and Binary Decision
                                  Diagrams for Real-Time Systems . . . . . 562
                 P. Gardner and   
                    M. Hasegawa   Types and Models for Higher-Order Action
                                  Calculi  . . . . . . . . . . . . . . . . 583
                    G. Huet and   
                    H. Laulhere   Finite-State Transducers as Regular
                                  Boehm Trees  . . . . . . . . . . . . . . 604
                       M. Abadi   Secrecy by Typing in Security Protocols  611


Lecture Notes in Computer Science
Volume 1282, 1997

                R. Bjornson and   
                N. Carriero and   
                   D. Gelernter   From weaving threads to untangling the
                                  Web: A view of coordination from Linda's
                                  perspective  . . . . . . . . . . . . . . 1
                  J. Kramer and   
                       J. Magee   Exposing the skeleton in the
                                  coordination closet  . . . . . . . . . . 18
                         D. Lea   Design for open systems in Java  . . . . 32
               P. Inverardi and   
                 A. L. Wolf and   
                 D. Yankelevich   Checking assumptions in component
                                  dynamics at the architectural level  . . 46
                   C. Bidan and   
                     V. Issarny   Security benefits from software
                                  architecture . . . . . . . . . . . . . . 64
               N. H. Minsky and   
                   V. Ungureanu   Regulated coordination in open
                                  distributed systems  . . . . . . . . . . 81
                  P. A. Olivier   Debugging distributed applications using
                                  a coordination architecture  . . . . . . 98
                   I. Nunes and   
             J. L. Fiadeiro and   
                   W. M. Turski   Coordinating durative actions  . . . . . 115
                 S. Jagannathan   Communication-passing style for
                                  coordination languages . . . . . . . . . 131
                     E. De Jong   Software architecture for large control
                                  systems: A case study description  . . . 150
                S. Stuurman and   
                 J. Van Katwijk   Evaluation of software architectures for
                                  a control system: A case study . . . . . 157
           A. A. Holzbacher and   
                   M. Perin and   
                    M. Suedholt   Modeling railway control systems using
                                  graph grammars: A case study . . . . . . 172
               D. Gelernter and   
                        L. Zuck   On what Linda is: Formal description of
                                  Linda as a reactive system . . . . . . . 187
                    N. Busi and   
                R. Gorrieri and   
                   G. Zavattaro   Three semantics of the output operation
                                  for generative communication . . . . . . 205
               R. De Nicola and   
              G. L. Ferrari and   
                    R. Pugliese   Coordinating mobile agents via
                                  blackboards and access rights  . . . . . 220
                   A. Brogi and   
                   J.-M Jacquet   Modeling coordination via asynchronous
                                  communication  . . . . . . . . . . . . . 238
                    E. Best and   
              F. S. De Boer and   
                 C. Palamidessi   Partial order and SOS semantics for
                                  linear constraint programs . . . . . . . 256
                   E. Denti and   
                  A. Natali and   
                     A. Omicini   Programmable coordination Media  . . . . 274
            R. Van Der Goot and   
               J. Schaeffer and   
                   G. V. Wilson   Safer tuple spaces . . . . . . . . . . . 289
               E. J. Hedman and   
                  J. N. Kok and   
                        K. Sere   Coordinating actions systems . . . . . . 302
                      J. Dingel   Approximating UNITY  . . . . . . . . . . 320
               P. J. McCann and   
                    G.-C. Roman   Mobile UNITY coordination constructs
                                  applied to packet forwarding for mobile
                                  hosts  . . . . . . . . . . . . . . . . . 338
                  K. Granoe and   
                      J. Paakki   From layer to layer: Object-oriented
                                  protocol refinement in Kannel  . . . . . 355
                   R. M. Amadio   An asynchronous model of locality,
                                  failure, and process mobility  . . . . . 374
            J.-Y. Vion-Dury and   
              L. Bellissard and   
                  V. Marangozov   A component calculus for modeling the
                                  Olan configuration language  . . . . . . 392
                   M. Buffo and   
                       D. Buchs   A coordination model for distributed
                                  object systems . . . . . . . . . . . . . 410
              B. Freisleben and   
                    T. Kielmann   Coordination patterns for parallel
                                  computing  . . . . . . . . . . . . . . . 414
                 A. Kellett and   
                      M. Fisher   Concurrent MetateM as a coordination
                                  language . . . . . . . . . . . . . . . . 418
         G. A. Papadopoulos and   
                       F. Arbab   Control-based coordination of human and
                                  other activities in cooperative
                                  information systems  . . . . . . . . . . 422
                    A. Rowstron   Using asynchronous tuple-space access
                                  primitives (BONITA primitives) for
                                  process co-ordination  . . . . . . . . . 426
                   R. Tolksdorf   Berlinda: An object-oriented platform
                                  for implementing coordination languages
                                  in Java  . . . . . . . . . . . . . . . . 430


Lecture Notes in Computer Science
Volume 1283, 1997

             M. Müller-Olm   Modular Compiler Verification. A
                                  Refinement-Algebraic Approach Advocating
                                  Stepwise Abstraction . . . . . . . . . . xii + 250


Lecture Notes in Computer Science
Volume 1284, 1997

               A. K. Amoura and   
                  E. Bampis and   
                  C. Kenyon and   
                 Y. Manoussakis   Scheduling independent multiprocessor
                                  tasks  . . . . . . . . . . . . . . . . . 1
                E. M. Arkin and   
                      R. Hassin   On local search for weighted $k$-set
                                  packing  . . . . . . . . . . . . . . . . 13
                    Y. Azar and   
                     L. Epstein   On-line machine covering . . . . . . . . 23
                T. C. Biedl and   
                    M. Kaufmann   Area-efficient static and incremental
                                  graph drawings . . . . . . . . . . . . . 37
                     J. Bloemer   Denesting by bounded degree radicals . . 53
                 U. Brandes and   
                      D. Wagner   A linear time algorithm for the arc
                                  disjoint Menger problem in planar
                                  directed graphs  . . . . . . . . . . . . 64
             A. Brandstaedt and   
                  V. Chepoi and   
                      F. Dragan   Distance approximating trees for chordal
                                  and dually chordal graphs  . . . . . . . 78
              G. Cornuejols and   
                R. Urbaniak and   
              R. Weismantel and   
                      L. Wolsey   Decomposition of integer programs and of
                                  generating sets  . . . . . . . . . . . . 92
                  A. Czumaj and   
               W. B. Strothmann   Bounded degree spanning trees  . . . . . 104
                    K. Diks and   
                        A. Pelc   Optimal adaptive broadcasting with a
                                  bounded fraction of faulty nodes . . . . 118
                  H. N. Djidjev   Weighted graph separators and their
                                  applications . . . . . . . . . . . . . . 130
               S. P. Fekete and   
                    J. Schepers   A new exact algorithm for general
                                  orthogonal $d$-dimensional knapsack
                                  problems . . . . . . . . . . . . . . . . 144
                 M. Fischer and   
     F. Meyer auf der Heide and   
               W. B. Strothmann   Dynamic data structures for realtime
                                  management of large geometric scenes . . 157
              U. Foessmeier and   
                    M. Kaufmann   Solving rectilinear Steiner tree
                                  problems exactly in theory and practice  171
                D. Frigioni and   
                 G. F. Italiano   Dynamically switching vertices in planar
                                  graphs . . . . . . . . . . . . . . . . . 186
                 T. Garefalakis   A new family of randomized algorithms
                                  for list accessing . . . . . . . . . . . 200
               R. Giancarlo and   
                     D. Guaiana   On-line construction of two-dimensional
                                  suffix trees . . . . . . . . . . . . . . 217
           K. D. Glazebrook and   
            J. Niño-Mora   Scheduling multiclass queueing networks
                                  on parallel servers: approximate and
                                  heavy-traffic optimality of Klimov's
                                  priority rule  . . . . . . . . . . . . . 232
               V. Grebinski and   
                    G. Kucherov   Optimal reconstruction of graphs under
                                  the additive model . . . . . . . . . . . 246
                    C. Helmberg   Fixing variables in semidefinite
                                  relaxations  . . . . . . . . . . . . . . 259
                    M. Henk and   
                  R. Weismantel   Test sets of the knapsack problem and
                                  simultaneous Diophantine approximation   271
                   K. Iwama and   
                      E. Miyano   Three-dimensional meshes are less
                                  powerful than two-dimensional ones in
                                  oblivious routing  . . . . . . . . . . . 284
         B. Kalyanasundaram and   
                       K. Pruhs   Fault-tolerant real-time scheduling  . . 296
                   D. Kogan and   
                    A. Schuster   Collecting garbage pages in a
                                  distributed shared memory with reduced
                                  memory and communication overhead  . . . 308
             M. R. Korupolu and   
                V. Ramachandran   Quasi-fully dynamic algorithms for
                                  two-connectivity, cycle equivalence and
                                  related problems . . . . . . . . . . . . 326
                D. Krznaric and   
             C. Levcopoulos and   
                  B. J. Nilsson   Minimum spanning trees in $d$ dimensions 341
               K. S. Larsen and   
                 T. Ottmann and   
           E. Soisalon-Soininen   Relaxed balance for search trees with
                                  local rebalancing  . . . . . . . . . . . 350
       M. Mueller-Hannemann and   
                       K. Weihe   Improved approximations for minimum
                                  cardinality quadrangulations of finite
                                  element meshes . . . . . . . . . . . . . 364
                    S. Naor and   
                    A. Orda and   
                  Y. Petruschka   Dynamic storage allocation with known
                                  durations  . . . . . . . . . . . . . . . 378
                   A. Nolte and   
                    R. Schrader   Coloring in sublinear time . . . . . . . 388
                J. Rethmann and   
                       E. Wanke   Competitive analysis of on-line stack-up
                                  algorithms . . . . . . . . . . . . . . . 402
               A. S. Schulz and   
                    M. Skutella   Scheduling-LPs bear probabilities:
                                  randomized approximations for Min-Sum
                                  Criteria . . . . . . . . . . . . . . . . 416
                       M. Segal   On piercing sets of axis-parallel
                                  rectangles and rings . . . . . . . . . . 430
                 S. Sevastianov   Seven problems: so different yet close   443
                J. Snoeyink and   
                 M. Van Kreveld   Linear-time reconstruction of Delaunay
                                  triangulations with applications . . . . 459
                    L. Trevisan   Approximating satisfiable satisfiability
                                  problems . . . . . . . . . . . . . . . . 472
                      B. Vallee   Algorithms for computing signs of 2 x 2
                                  determinants: Dynamics and average case
                                  analysis . . . . . . . . . . . . . . . . 486
                   K. Weihe and   
                    T. Willhalm   Reconstructing the topology of a CAD
                                  model --- A discrete approach  . . . . . 500


Lecture Notes in Computer Science
Volume 1285, 1997

                    J. L. Casti   Emergent Phenomena and Computer Worlds   1
                    L. J. Fogel   Top-Evolutionary Engineering . . . . . . 11
                   C. Chung and   
                 R. G. Reynolds   Function Optimization Using Evolutionary
                                  Programming with Self-Adaptive Cultural
                                  Algorithms . . . . . . . . . . . . . . . 17
                     Z. Pan and   
                        L. Kang   An Adaptive Evolutionary Algorithm for
                                  Numerical Optimization . . . . . . . . . 27
                   H. Myung and   
                      J.-H. Kim   Lagrangian-Based Evolutionary
                                  Programming for Constrained Optimization 35
              S. Matsushita and   
               T. Furuhashi and   
                 H. Tsutsui and   
                    Y. Uchikawa   Selection of Input Variables of Fuzzy
                                  Model Using Genetic Algorithm with Quick
                                  Fuzzy Inference  . . . . . . . . . . . . 45
                  C.-Y. Lee and   
                      S. K. Han   Entropic Sampling in Genetic-Entropic
                                  Algorithm  . . . . . . . . . . . . . . . 54
                     J.-C. Chen   Computational and Learning Synergies
                                  with a Coevolving Multilevel
                                  Architecture . . . . . . . . . . . . . . 63
                 S. E. Raik and   
                   D. G. Browne   Evolving State and Memory in Genetic
                                  Programming  . . . . . . . . . . . . . . 73
                   Z. Nakao and   
               M. Takashibu and   
                     Y.-W. Chen   Evolutionary CT Image Reconstruction by
                                  Image Partitioning . . . . . . . . . . . 81
                 R. Stonier and   
                    D. Sturgess   Genetic Learning of the Irrigation Cycle
                                  for Water Flow in Cropped Soils  . . . . 89
                 W.-K. Song and   
                        Z. Bien   Optimization of Parameters of Color
                                  Image Segmentation Using Evolutionary
                                  Programming  . . . . . . . . . . . . . . 97
               Y. Tsujimura and   
                         M. Gen   Genetic Algorithms for Solving
                                  Multiprocessor Scheduling Problems . . . 106
                        Q. Zhao   A Study on Co-evolutionary Learning of
                                  Neural Networks  . . . . . . . . . . . . 116
               T. Yoshikawa and   
               T. Furuhashi and   
                    Y. Uchikawa   Knowledge Acquisition of Fuzzy Control
                                  Rules for Mobile Robots Using DNA Coding
                                  Method and Pseudo-Bacterial GA . . . . . 126
                M. W. Hwang and   
                     J. Y. Choi   Evolutionary Learning Algorithm for
                                  Projection Neural Networks . . . . . . . 136
                     X. Yao and   
                         Y. Liu   EPNet for Chaotic Time-Series Prediction 146
                      S.-H Chen   Would and Should Government Lie About
                                  Economic Statistics: Simulations Based
                                  on Evolutionary Cellular Automata  . . . 157
                 K. P. Wong and   
                          A. Li   A Technique for Improving the
                                  Convergence Characteristic of Genetic
                                  Algorithms and Its Application to a
                                  Genetic-Based Load Flow Algorithm  . . . 167
                  Y. Makita and   
                    M. Hagiwara   Knowledge Extraction Using Neural
                                  Network by an Artificial Life Approach   177
                I. Takeuchi and   
                   T. Furuhashi   An Inference Method Using Multiple
                                  Patterns and Modification of Pattern
                                  Space  . . . . . . . . . . . . . . . . . 187
                  R. M. Kil and   
                        Y. Song   Random Search Based on Genetic Operators 196
                  S.-B. Cho and   
                      S.-I. Lee   Hybrid Evolutionary Learning of Fuzzy
                                  Logic and Genetic Algorithm  . . . . . . 206
                  J.-H. Lee and   
                    L. K. Hyung   Fuzzy Identification of Unknown Systems
                                  Based on GA  . . . . . . . . . . . . . . 216
                  M. Nerome and   
                  K. Yamada and   
                    S. Endo and   
                      H. Miyagi   Competitive Co-evolution Model on the
                                  Acquisition of Game Strategy . . . . . . 224


Lecture Notes in Computer Science
Volume 1286, 1997

                      N. Glaser   The CoMoMAS Methodology and Environment
                                  for Multi-Agent System Development . . . 1
              E. A. Kendall and   
                  M. T. Malkoun   Design Patterns for the Development of
                                  Multi-Agent Systems  . . . . . . . . . . 17
                      D. Lukose   Modelling Extendible Mobile Agents . . . 32
               M. D'Inverno and   
                        M. Luck   Making and Breaking Engagements: An
                                  Operational Analysis of Agent
                                  Relationships  . . . . . . . . . . . . . 48
                  K. Decker and   
                  K. Sycara and   
                  M. Williamson   Cloning for Intelligent Adaptive
                                  Information Agents . . . . . . . . . . . 63
                  W. C. Jamison   ACACIA: An Agency Based Collaboration
                                  Framework for Heterogeneous Multi-Agent
                                  Systems  . . . . . . . . . . . . . . . . 76
                      L. He and   
                    Y. Chao and   
                    S. Kato and   
                       T. Araki   A Multi-Agent Cooperative Reasoning
                                  System for Amalgamated Knowledge Bases   92
                    L. Ekenberg   Detecting Conflicts in Multi-Agent
                                  Systems  . . . . . . . . . . . . . . . . 106
                    C. Reed and   
                    D. Long and   
                     M. Fox and   
                   M. Garagnani   Persuasion as a Form of Inter-Agent
                                  Negotiation  . . . . . . . . . . . . . . 120
                   M. Zhang and   
                       C. Zhang   Methodologies of Solution Synthesis in
                                  Distributed Expert Systems . . . . . . . 137
                      L. He and   
                    Y. Chao and   
                    S. Kato and   
                       T. Araki   Implementing an Automated Reasoning
                                  System for Multi-Agent Knowledge and
                                  Time . . . . . . . . . . . . . . . . . . 152
                    H. Yang and   
                       C. Zhang   Application of MAS in Implementing
                                  Rational IP Routers on the Priced
                                  Internet . . . . . . . . . . . . . . . . 166
                       S. Haegg   A Sentinel Approach to Fault Handling in
                                  Multi-Agent Systems  . . . . . . . . . . 181


Lecture Notes in Computer Science
Volume 1287, 1997

                       T. Kropf   Formal Hardware Verification: Methods
                                  and Systems in Comparison  . . . . . . . xii + 367


Lecture Notes in Computer Science
Volume 1288, 1997

                   M. Schneider   Spatial Data Types for Database Systems.
                                  Finite Resolution Geometry for
                                  Geographic Information Systems . . . . . xiii + 275


Lecture Notes in Computer Science
Volume 1289, 1997

                    L. Bachmair   Paramodulation, Superposition, and
                                  Simplification . . . . . . . . . . . . . 1
                    W. Buchholz   Explaining Gentzen's Consistency Proof
                                  within Infinitary Proof Theory . . . . . 4
                     S. R. Buss   Alogtime Algorithms for Tree
                                  Isomorphism, Comparison, and
                                  Canonization . . . . . . . . . . . . . . 18
            W. A. Carnielli and   
                P. R. S. Veloso   Ultrafilter Logic and Generic Reasoning  34
                 J. A. Robinson   Informal Rigor and Mathematical
                                  Understanding  . . . . . . . . . . . . . 54
                      T. Tammet   Resolution, Inverse Method and the
                                  Sequent Calculus . . . . . . . . . . . . 65
                      J. Tiuryn   Subtyping over a Lattice . . . . . . . . 84
                   D. Basin and   
                S. Matthews and   
                      L. Vigano   A New Method for Bounding the Complexity
                                  of Modal Logics  . . . . . . . . . . . . 89
              L. D. Beklemishev   Parameter Free Induction and Reflection  103
                B. Borchert and   
                     F. Stephan   Looking for an Analogue of Rice's
                                  Theorem in Circuit Complexity Theory . . 114
              A. Ciabattoni and   
                       D. Luchi   Two Connections between Linear Logic and
                                  Lukasiewicz Logics . . . . . . . . . . . 128
                    U. Egly and   
                     K. Genther   Structuring of Computer-Generated Proofs
                                  by Cut Introduction  . . . . . . . . . . 140
                  P. C. Gilmore   NaDSyl and some Applications . . . . . . 153
               V. K. Khakhanian   Markov's Rule is Admissible in the Set
                                  Theory with Intuitionistic Logic . . . . 167
                 A. Lisitsa and   
                     V. Sazonov   Bounded Hyperset Theory and Web-like
                                  Data Bases . . . . . . . . . . . . . . . 172
                 J. A. Makowsky   Invariant Definability . . . . . . . . . 186
                   R. Matzinger   Comparing Computational Representations
                                  of Herbrand Models . . . . . . . . . . . 203
                    C. Pape and   
                     R. Haehnle   Restart Tableaux with Selection Function 219
                      V. Plisko   Two Semantics and Logics Based on the
                                  Goedel Interpretation  . . . . . . . . . 233
               R. Pliuskevicius   On the Completeness and Decidability of
                                  a Restricted First Order Linear Temporal
                                  Logic  . . . . . . . . . . . . . . . . . 241
                     T. Polacik   Propositional Quantification in
                                  Intuitionistic Logic . . . . . . . . . . 255
                    N. Preining   Sketch-as-Proof  . . . . . . . . . . . . 264
                      A. Setzer   Translating Set Theoretical Proofs into
                                  Type Theoretical Programs  . . . . . . . 278
            L. Tortora De Falco   Denotational Semantics for Polarized
                                  (but Non-constrained) LK by means of the
                                  Additives  . . . . . . . . . . . . . . . 290
                      M. Veanes   The Undecidability of Simultaneous Rigid
                                  E-Unification with Two Variables . . . . 305
                  D. E. Willard   The Tangibility Reflection Principle for
                                  Self-Verifying Axiom Systems . . . . . . 319
                          H. Xi   Upper Bounds for Standardizations and an
                                  Application  . . . . . . . . . . . . . . 335


Lecture Notes in Computer Science
Volume 1290, 1997

                     J. C. Baez   An Introduction to $n$-Categories  . . . 1
                     R. S. Bird   Allegories as a Basis for Algorithmics   34
                      C. B. Jay   Separating Shape from Data . . . . . . . 47
                   P.-A Mellies   A Factorisation Theorem in Rewriting
                                  Theory . . . . . . . . . . . . . . . . . 49
                   C. Lueth and   
                       N. Ghani   Monads and Modular Term Rewriting  . . . 69
               A. Corradini and   
                    F. Gadducci   A $2$-Categorical Presentation of Term
                                  Graph Rewriting  . . . . . . . . . . . . 87
              G. L. Cattani and   
                   I. Stark and   
                     G. Winskel   Presheaf Models for the $ \pi $-Calculus 106--126
                        D. Turi   Categorical Modelling of Structural
                                  Operational Rules: Case Studies  . . . . 127
                D. Pavlovic and   
                    S. Abramsky   Specifying Interaction Categories  . . . 147
                  U. Wolter and   
                     A. Martini   Shedding New Light in the World of
                                  Logical Systems  . . . . . . . . . . . . 159
             T. Mossakowski and   
                A. Tarlecki and   
                   W. Pawlowski   Combining and Representing Logical
                                  Systems  . . . . . . . . . . . . . . . . 177
                 A. Andreev and   
                    S. Soloviev   A Deciding Algorithm for Linear
                                  Isomorphism of Types with complexity $
                                  O(n \log_2 (n)) $  . . . . . . . . . . . 197
               K. Weihrauch and   
                       X. Zheng   Effectiveness of the Global Modulus of
                                  Continuity on Metric Spaces  . . . . . . 210
                  U. Hensel and   
                      B. Jacobs   Proof Principles for Datatypes with
                                  Iterated Recursion . . . . . . . . . . . 220
              P. Hoogendijk and   
                   R. Backhouse   When Do Datatypes Commute? . . . . . . . 242
                 K. Lellahi and   
                      V. Tannen   A Calculus for Collections and
                                  Aggregates . . . . . . . . . . . . . . . 261
                  A. Bucalo and   
                    G. Rosolini   Lifting  . . . . . . . . . . . . . . . . 281
                    B. Reus and   
                   T. Streicher   General Synthetic Domain Theory --- A
                                  Logical Approach . . . . . . . . . . . . 293


Lecture Notes in Computer Science
Volume 1291, 1997

            D. G. Feitelson and   
                 L. Rudolph and   
          U. Schwiegelshohn and   
                   K. C. Sevcik   Theory and Practice in Parallel Job
                                  Scheduling . . . . . . . . . . . . . . . 1
                   A. B. Downey   Using Queue Time Predictions for
                                  Processor Allocation . . . . . . . . . . 35
                     R. Gibbons   A Historical Application Profiler for
                                  Use by Parallel Schedulers . . . . . . . 58
                D. G. Feitelson   Memory Usage in the LANL CM-5 Workload   78
                    J. Jann and   
                P. Pattnaik and   
                  H. Franke and   
                        F. Wang   Modeling of Workload in MPPs . . . . . . 95
           R. N. Lagerstrom and   
                     S. K. Gipp   PScheD: Political Scheduling on the CRAY
                                  T3E  . . . . . . . . . . . . . . . . . . 117
                   T. B. Brecht   An Experimental Evaluation of Processor
                                  Pool-Based Scheduling for Shared-Memory
                                  NUMA Multiprocessors . . . . . . . . . . 139
              E. W. Parsons and   
                   K. C. Sevcik   Implementing Multiprocessor Scheduling
                                  Disciplines  . . . . . . . . . . . . . . 166
             Pham Hong Hanh and   
                   V. Simonenko   Objective-Oriented Algorithm for Job
                                  Scheduling in Parallel Heterogeneous
                                  Systems  . . . . . . . . . . . . . . . . 193
                     W. Lee and   
                   M. Frank and   
                     V. Lee and   
                   K. Mackenzie   Implications of I/O for Gang Scheduled
                                  Workloads  . . . . . . . . . . . . . . . 215
            D. G. Feitelson and   
                    M. A. Jette   Improved Utilization and Responsiveness
                                  with Gang Scheduling . . . . . . . . . . 238
                    A. Hori and   
                  H. Tezuka and   
                    Y. Ishikawa   Global State Detection Using Network
                                  Preemption . . . . . . . . . . . . . . . 262
                    F. Wang and   
           M. Papaefthymiou and   
                  M. Squillante   Performance Evaluation of Gang
                                  Scheduling for Parallel and Distributed
                                  Multiprogramming . . . . . . . . . . . . 277


Lecture Notes in Computer Science
Volume 1292, 1997

                   S. Antoy and   
                   Z. M. Ariola   Narrowing the Narrowing Space  . . . . . 1
              A. Compagnoni and   
                   M. Fernandez   An Object Calculus with Algebraic
                                  Rewriting  . . . . . . . . . . . . . . . 17
             J. E. Gallardo and   
               F. Gutierrez and   
                     B. C. Ruiz   Inheritance and Selective Method
                                  Dispatching in Concurrent Haskell  . . . 33
                  D. Ancona and   
                       E. Zucca   Overriding Operators in a Mixin-Based
                                  Framework  . . . . . . . . . . . . . . . 47
               A. F. Bowers and   
                 P. M. Hill and   
               F. Ibañez   Resolution for Logic Programming with
                                  Universal Quantifiers  . . . . . . . . . 63
                     S. Gregory   A Declarative Approach to Concurrent
                                  Programming  . . . . . . . . . . . . . . 79
             C. A. Herrmann and   
                    C. Lengauer   Transformation of Divide and Conquer to
                                  Nested Parallel Loops  . . . . . . . . . 95
                    R. Paterson   Transforming Lazy Functions Using
                                  Comportment Properties . . . . . . . . . 111
                       S. Lucas   Transformations for Efficient
                                  Evaluations in Functional Programming    127
                     M. Serrano   Inline Expansion: When and How?  . . . . 143
                      C. Mossin   Higher-Order Value Flow Graphs . . . . . 159
              R. Giacobazzi and   
                    F. Scozzari   Intuitionistic Implication in Abstract
                                  Interpretation . . . . . . . . . . . . . 175
                M. Carlsson and   
                G. Ottosson and   
                     B. Carlson   An Open-Ended Finite Domain Constraint
                                  Solver . . . . . . . . . . . . . . . . . 191
             J.-L. Giavitto and   
                 D. De Vito and   
                      O. Michel   Semantics and Compilation of Recursive
                                  Sequential Streams in 81/2 . . . . . . . 207
                   K. Ogata and   
                   K. Futatsugi   Implementation of Term Rewritings with
                                  the Evaluation Strategy  . . . . . . . . 225
                  G. Barthe and   
                J. Hatcliff and   
                M. H. Soerensen   Reflections on Reflections . . . . . . . 241
                          H. Xi   Evaluation under Lambda Abstraction  . . 259
                   Z. Huang and   
                     C. Sun and   
                      A. Sattar   Selective Recomputation for Handling
                                  Side-Effects in Parallel Logic Programs  275
                  J. Sparud and   
                    C. Runciman   Tracing Lazy Functional Computations
                                  Using Redex Trails . . . . . . . . . . . 291
                   G. Cousineau   Functional Programming and Geometry  . . 309
                    S. Thompson   Where do I begin? A Problem Solving
                                  Approach in Teaching Functional
                                  Programming  . . . . . . . . . . . . . . 323
                       M. Hanus   Teaching Functional and Logic
                                  Programming with a Single Computation
                                  Model  . . . . . . . . . . . . . . . . . 335
                N. Eisinger and   
                 T. Geisler and   
                       S. Panne   Logic Implemented Functionally . . . . . 351
              R. B. Findler and   
                C. Flanagan and   
                   M. Flatt and   
               S. Krishnamurthi   DrScheme: A Pedagogic Programming
                                  Environment for Scheme . . . . . . . . . 369
                 J. Whittle and   
                   A. Bundy and   
                        H. Lowe   An Editor for Helping Novices to Learn
                                  Standard ML  . . . . . . . . . . . . . . 389
                     D. DeRoure   Introducing the Declarative Dungeon  . . 407
               E. Johansson and   
                 C. Jonsson and   
                T. Lindgren and   
                     J. Bevemyr   A Pragmatic Approach to Compilation of
                                  Erlang . . . . . . . . . . . . . . . . . 419
                J. Janousek and   
                    B. Melichar   Formal Translations Described by
                                  Translation Grammars with LR(kappa)
                                  Input Grammars . . . . . . . . . . . . . 421
                    N. Fujinami   Automatic Run-Time Code Generation in
                                  Object-Oriented Languages  . . . . . . . 423


Lecture Notes in Computer Science
Volume 1293, 1997

                   E. V. Munson   Toward an Operational Theory of Media    1
                    K. Sandkuhl   First Steps to Cross Media Publishing
                                  and Multimodal Documents . . . . . . . . 15
                      H. Ahonen   Disambiguation of SGML Content Models    27
        P. Kilpeläinen and   
                        D. Wood   SGML and Exceptions  . . . . . . . . . . 39
                 T. Schroff and   
       A. Brüggemann-Klein   Grammar-Compatible Stylesheets . . . . . 51
              M. A. Heather and   
                 B. N. Rossiter   Object Awareness in Multimedia Documents 59
                     P. R. King   A Logic Based Formalism for Temporal
                                  Constraints in Multimedia Documents  . . 87
                    A. Myka and   
                H. Argenton and   
                    U. Guentzer   Towards Automatic Hypertextual
                                  Representation of Linear Texts . . . . . 103
                A. Kosmynin and   
                    I. Davidson   Using Background Contextual Knowledge
                                  for Documents Representation . . . . . . 123
                  C. Dharap and   
                  C. Mic Bowman   Typed Structured Documents for
                                  Information Retrieval  . . . . . . . . . 135
                      M. Murata   Transformation of Documents and Schemas
                                  by Patterns and Contextual Conditions    153
                    X. Wang and   
                        D. Wood   Tabular Formatting Problems  . . . . . . 171
                   M. Minas and   
                      L. Shklar   Visual Definition of Virtual Documents
                                  for the World-Wide-Web . . . . . . . . . 183


Lecture Notes in Computer Science
Volume 1294, 1997

            Mikael Goldmann and   
              Mats Näslund   The Complexity of Computing Hard Core
                                  Predicates . . . . . . . . . . . . . . . 1
          Eiichiro Fujisaki and   
               Tatsuaki Okamoto   Statistical Zero Knowledge Protocols to
                                  Prove Modular Polynomial Relations . . . 16
      Giovanni Di Crescenzo and   
           Tatsuaki Okamoto and   
                      Moti Yung   Keeping the SZK-Verifier Honest
                                  Unconditionally  . . . . . . . . . . . . 31
            G. Di Crescenzo and   
                 T. Okamoto and   
                        M. Yung   Keeping the SZK-Verifier Honest
                                  Unconditionally  . . . . . . . . . . . . 31
                 Oded Goldreich   On the Foundations of Modern
                                  Cryptography . . . . . . . . . . . . . . 46--74
                  Donald Beaver   Plug and Play Encryption . . . . . . . . 75
                Ran Canetti and   
              Cynthia Dwork and   
                  Moni Naor and   
               Rafail Ostrovsky   Deniable Encryption  . . . . . . . . . . 90--104
             Oded Goldreich and   
           Shafi Goldwasser and   
                    Shai Halevi   Eliminating Decryption Errors in the
                                  Ajtai--Dwork Cryptosystem  . . . . . . . 105
             Oded Goldreich and   
           Shafi Goldwasser and   
                    Shai Halevi   Public-Key Cryptosystems from Lattice
                                  Reduction Problems . . . . . . . . . . . 112
            Rosario Gennaro and   
              Hugo Krawczyk and   
                      Tal Rabin   RSA-Based Undeniable Signatures  . . . . 132
                  Ari Juels and   
               Michael Luby and   
               Rafail Ostrovsky   Security of Blind Digital Signatures . . 150
                  Yuliang Zheng   Digital Signcryption or How to Achieve
                                  Cost (Signature & Encryption) $ < < $
                                  Cost(Signature) $+$ Cost(Encryption) . . 165--179
            Rosario Gennaro and   
                 Pankaj Rohatgi   How to Sign Digital Streams  . . . . . . 180
               Phong Nguyen and   
                  Jacques Stern   Merkle--Hellman Revisited: A
                                  Cryptanalysis of the Qu-Vanstone
                                  Cryptosystem Based on Group
                                  Factorizations . . . . . . . . . . . . . 198
               Thomas A. Berson   Failure of the McEliece Public-Key
                                  Cryptosystem Under Message-Resend and
                                  Related-Message Attack . . . . . . . . . 213
  Jean-François Misarsky   A Multiplicative Attack Using LLL
                                  Algorithm on RSA Signatures with
                                  Redundancy . . . . . . . . . . . . . . . 221
          Daniel Bleichenbacher   On the Security of the KMOV Public Key
                                  Cryptosystem . . . . . . . . . . . . . . 235
              Chae Hoon Lim and   
                  Pil Joong Lee   A Key Recovery Attack on Discrete
                                  Log-Based Schemes Using a Prime Order
                                  Subgroup . . . . . . . . . . . . . . . . 249
                 Adam Young and   
                      Moti Yung   The Prevalence of Kleptographic Attacks
                                  on Discrete-Log Based Cryptosystems  . . 264
              Mihir Bellare and   
           Shafi Goldwasser and   
             Daniele Micciancio   ``Pseudo-Random'' Number Generation
                                  within Cryptographic Algorithms: The DSS
                                  Case . . . . . . . . . . . . . . . . . . 277
           Christian Cachin and   
                 Ueli M. Maurer   Unconditional Security Against
                                  Memory-Bounded Adversaries . . . . . . . 292
             Ueli M. Maurer and   
                    Stefan Wolf   Privacy Amplification Secure Against
                                  Active Adversaries . . . . . . . . . . . 307
                  Moni Naor and   
                   Benny Pinkas   Visual Authentication and Identification 322
                Gilles Brassard   Quantum Information Processing: The
                                  Good, the Bad and the Ugly . . . . . . . 337
             Jorge Guajardo and   
                  Christof Paar   Efficient Algorithms for Elliptic Curve
                                  Cryptosystems  . . . . . . . . . . . . . 342
              Jerome A. Solinas   An Improved Algorithm for Arithmetic on
                                  a Family of Elliptic Curves  . . . . . . 357
                Tsuyoshi Takagi   Fast RSA-Type Cryptosystems Using
                                  $n$-adic Expansion . . . . . . . . . . . 372
       Johannes A. Buchmann and   
                  Sachar Paulus   A One Way Function Based on Ideal
                                  Arithmetic in Number Fields  . . . . . . 385
               Shlomi Dolev and   
               Rafail Ostrovsky   Efficient Anonymous Multicast and
                                  Reception  . . . . . . . . . . . . . . . 395
           Jan L. Camenisch and   
              Markus A. Stadler   Efficient Group Signature Schemes for
                                  Large Groups . . . . . . . . . . . . . . 410
                  Dan Boneh and   
               Matthew Franklin   Efficient Generation of Shared RSA Keys  425
               Yair Frankel and   
              Peter Gemmell and   
        Philip D. MacKenzie and   
                      Moti Yung   Proactive RSA  . . . . . . . . . . . . . 440
                    Ran Canetti   Towards Realizing Random Oracles: Hash
                                  Functions that Hide All Partial
                                  Information  . . . . . . . . . . . . . . 455
              Mihir Bellare and   
                Phillip Rogaway   Collision-Resistant Hashing: Towards
                                  Making UOWHFs Practical  . . . . . . . . 470
      Lars Ramkilde Knudsen and   
                   Bart Preneel   Fast and Secure Hashing Based on Codes   485
            Jovan Dj. Golic and   
               Renato Menicocci   Edit Distance Correlation Attack on the
                                  Alternating Step Generator . . . . . . . 499
                  Eli Biham and   
                     Adi Shamir   Differential Fault Analysis of Secret
                                  Key Cryptosystems  . . . . . . . . . . . 513
               David Wagner and   
             Bruce Schneier and   
                    John Kelsey   Cryptanalysis of the Cellular Message
                                  Encryption Algorithm . . . . . . . . . . 526
                      Anonymous   Author Index . . . . . . . . . . . . . . 539


Lecture Notes in Computer Science
Volume 1295, 1997

                    S. Abramsky   Game Semantics for Programming Languages 3
                       L. Babai   Communication Complexity . . . . . . . . 5
               H. L. Bodlaender   Treewidth: Algorithmic Techniques and
                                  Results  . . . . . . . . . . . . . . . . 19
                  N. Dershowitz   When are Two Rewrite Systems More than
                                  None?  . . . . . . . . . . . . . . . . . 37
                       C. Dwork   Positive Applications of Lattices to
                                  Cryptography . . . . . . . . . . . . . . 44
              G. L. Ferrari and   
                   U. Montanari   A Tile-Based Coordination View of
                                  Asynchronous Pi-Calculus . . . . . . . . 52
               J. Hromkovic and   
                   G. Schnitger   Communication Complexity and Sequential
                                  Computation  . . . . . . . . . . . . . . 71
                    J. Krajicek   Lower Bounds for a Proof System with an
                                  Exponential Speed-Up over Constant-Depth
                                  Frege Systems and over Polynomial
                                  Calculus . . . . . . . . . . . . . . . . 85
              M. Liskiewicz and   
                    R. Reischuk   Computational Limitations of Stochastic
                                  Turing Machines and Arthur--Merlin Games
                                  with Small Space Bounds  . . . . . . . . 91
                        D. Roth   Learning to Perform Knowledge-Intensive
                                  Inferences . . . . . . . . . . . . . . . 108
                   U. Schoening   Resolution Proofs, Exponential Bounds,
                                  and Kolmogorov Complexity  . . . . . . . 110
                  F. Afrati and   
              L. Guessarian and   
                M. De Rougemont   The Expressiveness of Datalog Circuits
                                  (DAC)  . . . . . . . . . . . . . . . . . 119
                M. Mundhenk and   
               J. Goldsmith and   
                    E. Allender   The Complexity of Policy Evaluation for
                                  Finite-Horizon Partially-Observable
                                  Markov Decision Processes  . . . . . . . 129
           L. Bernardinello and   
                     L. Pomello   A Category of Transition Systems and Its
                                  Relations with Orthomodular Posets . . . 139
           B. Bérard and   
                   C. Picaronny   Accepting Zeno Words without Making Time
                                  Stand Still  . . . . . . . . . . . . . . 149
                  B. Bollig and   
                     I. Wegener   Complexity Theoretical Results on
                                  Partitioned (Nondeterministic) Binary
                                  Decision Diagrams  . . . . . . . . . . . 159
            M. M. Bonsangue and   
                      J. N. Kok   Specifying Computations Using Hyper
                                  Transition Systems . . . . . . . . . . . 169
                G. Cattaneo and   
                E. Formenti and   
                 L. Margara and   
                     J. Mazoyer   A Shift-Invariant Metric on S0Z Inducing
                                  a Non-trivial Topology . . . . . . . . . 179
                        G. Chen   Subtyping Calculus of Construction . . . 189
                C. Choffrut and   
                  G. Pighizzini   Distances between Languages and
                                  Reflexivity of Relations . . . . . . . . 199
                     I. Ryl and   
                    Y. Roos and   
                    M. Clerbout   Partial Characterization of
                                  Synchronization Languages  . . . . . . . 209
                  R. Heckel and   
                   H. Ehrig and   
                  U. Wolter and   
                   A. Corradini   Integrating the Specification Techniques
                                  of Graph Transformation and Temporal
                                  Logic  . . . . . . . . . . . . . . . . . 219
                      F. Drewes   On the Generation of Trees by Hyperedge
                                  Replacement  . . . . . . . . . . . . . . 229
                  H. Fernau and   
                      R. Stiebe   Regulation by Valences . . . . . . . . . 239
                 W. Fokkink and   
                  J. Van de Pol   Simulation as a Correct Transformation
                                  of Rewrite Systems . . . . . . . . . . . 249
                    C. Gavoilie   On the Dilation of Interval Routing  . . 259
           Z. Khasidashvili and   
                     J. Glauert   Relating Conflict-Free Stable Transition
                                  and Event Models . . . . . . . . . . . . 269
                      A. Goerdt   The Giant Component Threshold for Random
                                  Regular Graphs with Edge Faults  . . . . 279
                      M. Holzer   Multi-Head Finite Automata:
                                  Data-Independent versus Data-Dependent
                                  Computations . . . . . . . . . . . . . . 299
                       K. Iwama   Complexity of Finding Short Resolution
                                  Proofs . . . . . . . . . . . . . . . . . 309
                   S. Jukna and   
                A. Razborov and   
                 P. Savicky and   
                     I. Wegener   On P versus NP intersection co-NP for
                                  Decision Trees and Read-Once Branching
                                  Programs . . . . . . . . . . . . . . . . 319
                  G. Karner and   
                       W. Kuich   A Characterization of Abstract Families
                                  of Algebraic Power Series  . . . . . . . 327
               Y. Kobayashi and   
                        F. Otto   Repetitiveness of D0L-Languages is
                                  Decidable in Polynomial Time . . . . . . 337
                R. Kolpakov and   
                    G. Kucherov   Minimal Letter Frequency in $n$-th
                                  Power-Free Binary Words  . . . . . . . . 347
                       I. Korec   Real-Time Generation of Primes by a
                                  One-Dimensional Cellular Automaton with
                                  11 States  . . . . . . . . . . . . . . . 358
                D. Krznaric and   
                 C. Levcopoulos   Optimal Algorithms for Complete Linkage
                                  Clustering in $d$ Dimensions . . . . . . 368
                 G. Manzini and   
                     L. Margara   Invertible Linear Cellular Automata over
                                  Zm: Algorithmic and Dynamical Aspects    378
             C. Martin-Vide and   
           J. Miquel-Verges and   
                        G. Paun   Two-Level Contextual Grammars: The
                                  Internal Case  . . . . . . . . . . . . . 388
                        K. Meer   Counting Problems over the Reals . . . . 398
                  C. Meinel and   
                    T. Theobald   On the Influence of the State Encoding
                                  on OBDD-Representations of Finite State
                                  Machines . . . . . . . . . . . . . . . . 408
                   R. Meyer and   
                       A. Petit   Decomposition of TrPTL Formulas  . . . . 418
                    M. Mundhenk   NP-hard Sets Have Many Hard Instances    428
                   A. Nickelsen   Deciding Verbose Languages with Linear
                                  Advice . . . . . . . . . . . . . . . . . 438
                    H. Petersen   Homomorphic Images of Sentential Forms
                                  and Terminating Grammars . . . . . . . . 448
                       D. Plump   Simplification Orders for Term Graph
                                  Rewriting  . . . . . . . . . . . . . . . 458
                 A. Rensink and   
                    H. Wehrheim   Dependency-Based Action Refinement . . . 468
                 P. Savicky and   
                         S. Zak   A Hierarchy for (1, +kappa)-branching
                                  Programs with Respect to kappa . . . . . 478
                   J. F. Sibeyn   Routing with Finite Speeds of Memory and
                                  Network  . . . . . . . . . . . . . . . . 488
                 J. Tyszkiewicz   Queries and Algorithms Computable by
                                  Polynomial Time Existential Reflective
                                  Machines . . . . . . . . . . . . . . . . 498
                      W. Vogler   Partial Order Semantics and Read Arcs    508


Lecture Notes in Computer Science
Volume 1296, 1997

               A. Leonardis and   
                     H. Bischof   Computational Complexity Reduction in
                                  Eigenspace Approaches  . . . . . . . . . 1
                  J. Bruske and   
                      G. Sommer   An Algorithm for Intrinsic
                                  Dimensionality Estimation  . . . . . . . 9
              E. J. Pauwels and   
              P. Fiddelaers and   
                      F. Mindru   Fully Unsupervised Clustering Using
                                  Center-Surround Receptive Fields with
                                  Applications to Color-Segmentation . . . 17
             M. L. Williams and   
              E. R. Hancock and   
                   R. C. Wilson   Multi-sensor Fusion with Bayesian
                                  Inference  . . . . . . . . . . . . . . . 25
                  S. Lanser and   
                   C. Zierl and   
                 O. Munkelt and   
                       B. Radig   MORAL --- A Vision-Based Object
                                  Recognition System for Autonomous Mobile
                                  Systems  . . . . . . . . . . . . . . . . 33
                 J. Denzler and   
                     H. Niemann   Real-Time Pedestrian Tracking in Natural
                                  Scenes . . . . . . . . . . . . . . . . . 42
                K. Surendro and   
                       Y. Anzai   Non-rigid Object Recognition Using
                                  Principal Component Analysis and
                                  Geometric Hashing  . . . . . . . . . . . 50
           A. A. Y. Mustafa and   
              L. G. Shapiro and   
                   M. A. Ganter   Object Identification with Surface
                                  Signatures . . . . . . . . . . . . . . . 58
                  G. Csurka and   
                    O. Faugeras   Computing Projective and Permutation
                                  Invariants of Points and Lines . . . . . 66
                     T. Suk and   
                     J. Flusser   Point Projective and Permutation
                                  Invariants . . . . . . . . . . . . . . . 74
                 J. Lasenby and   
            E. Bayro-Corrochano   Computing $3$D Projective Invariants
                                  from Points and Lines  . . . . . . . . . 82
                     L. Muresan   $2$D $ \rightarrow $ $2$D Geometric
                                  Transformation Invariant to Arbitrary
                                  Translations, Rotations and Scales . . . 90
                   I. Aksak and   
                   C. Feist and   
                   V. Kijko and   
                     R. Knoefel   Extraction of Filled-In Data from Color
                                  Forms  . . . . . . . . . . . . . . . . . 98
                T. M. Buzug and   
                  C. Lorenz and   
                       J. Weese   Improvement of Vessel Segmentation by
                                  Elastically Compensated Patient Motion
                                  in Digital Subtraction Angiography
                                  Images . . . . . . . . . . . . . . . . . 106
                  A. Herzog and   
                   G. Krell and   
               B. Michaelis and   
                        J. Wang   Three-Dimensional Quasi-binary Image
                                  Restoration for Confocal Microscopy and
                                  Its Application to Dendritic Trees . . . 114
                 A. G. Bors and   
                   W. Puech and   
                   I. Pitas and   
                 J.-M. Chassery   Mosaicing of Flattened Images from
                                  Straight Homogeneous Generalized
                                  Cylinders  . . . . . . . . . . . . . . . 122
                  R. Kozera and   
                      R. Klette   Well-Posedness of Linear
                                  Shape-from-Shading Problem . . . . . . . 130
                 A. Tuzikov and   
           H. J. A. M. Heijmans   Comparing Convex Shapes Using Minkowski
                                  Addition . . . . . . . . . . . . . . . . 138
                Y. Kenmochi and   
                       A. Imiya   Deformation of Discrete Object Surfaces  146
              V. M. Chernov and   
                A. V. Shabashev   Non-archimedean Normalized Fields in
                                  Texture Analysis Tasks . . . . . . . . . 154
                I. G. Kazantsev   The Radon Transform-Based Analysis of
                                  Bidirectional Structural Textures  . . . 162
             D. Chetverikov and   
                        K. Gede   Textures and Structural Defects  . . . . 167
               M. Pollefeys and   
                    L. Van Cool   Self-Calibration from the Absolute Conic
                                  on the Plane at Infinity . . . . . . . . 175
                 T. Svoboda and   
                       P. Sturm   A Badly Calibrated Camera in Ego-Motion
                                  Estimation-Propagation of Uncertainty    183
                       S. Blake   $6$DOF Calibration of a Camera with
                                  Respect to the Wrist of a $5$-Axis
                                  Machine Tool . . . . . . . . . . . . . . 191
                  D. Koller and   
                 G. Klinker and   
                    E. Rose and   
                       D. Breen   Automated Camera Calibration and $3$D
                                  Egomotion Estimation for Augmented
                                  Reality Applications . . . . . . . . . . 199
                   H. Farid and   
               E. P. Simoncelli   Optimally Rotation-Equivariant
                                  Directional Derivative Kernels . . . . . 207
             T. Stammberger and   
               M. Michaelis and   
                  M. Reiser and   
                K.-H. Englmeier   A Hierarchical Filter Scheme for
                                  Efficient Corner Detection . . . . . . . 215
                  A. Branca and   
            F. P. Lovergine and   
                G. Attolico and   
                    A. Distante   Defect Detection on Leather by Oriented
                                  Singularities  . . . . . . . . . . . . . 223
                    L. Quan and   
                        R. Mohr   Uniqueness of $3$D Affine Reconstruction
                                  of Lines with Affine Cameras . . . . . . 231
                    K. Kanatani   Self-Evaluation for Active Vision by the
                                  Geometric Information Criterion  . . . . 247
              J. Mendelsohn and   
              E. Simoncelli and   
                      R. Bajcsy   Discrete-Time Rigidity-Constrained
                                  Optical Flow . . . . . . . . . . . . . . 255
                     R. Wiemker   An Iterative Spectral-Spatial Bayesian
                                  Labeling Approach for Unsupervised
                                  Robust Change Detection on Remotely
                                  Sensed Multispectral Imagery . . . . . . 263
                  B. Smolka and   
            K. W. Wojciechowski   Contrast Enhancement of Badly
                                  Illuminated Images Based on Gibbs
                                  Distribution and Random Walk Model . . . 271
                  V. Hlavac and   
                      J. Fojtik   Adaptive Non-linear Predictor for
                                  Lossless Image Compression . . . . . . . 279
                    Z. Yang and   
                          S. Ma   Beyond Standard Regularization Theory    289
                   R. D. Henkel   Fast Stereovision by Coherence Detection 297
                  C. Menard and   
                   A. Leonardis   Stereo Matching Using M-Estimators . . . 305
                  Z.-D. Lan and   
                        R. Mohr   Robust Location Based Partial
                                  Correlation  . . . . . . . . . . . . . . 313
                  M. Hansen and   
              K. Daniilidis and   
                      O. Sommer   Optimization of Stereo Disparity
                                  Estimation Using the Instantaneous
                                  Frequency  . . . . . . . . . . . . . . . 321
                     L. Wiskott   Segmentation from Motion: Combining
                                  Gabor- and Mallat-Wavelets to Overcome
                                  Aperture and Correspondence Problem  . . 329
                 L. Weitzel and   
                  K. Kopecz and   
                C. Spengler and   
                     R. Eckhorn   Contour Segmentation with Recurrent
                                  Neural Networks of Pulse-Coding Neurons  337
                   L. Czuni and   
                T. Sziranyi and   
                     J. Zerubia   Multigrid MRF Based Picture Segmentation
                                  with Cellular Neural Networks  . . . . . 345
                L. Williams and   
                    T. Wang and   
                    K. Thornber   Computing Stochastic Completion Fields
                                  in Linear-Time Using a Resolution
                                  Pyramid  . . . . . . . . . . . . . . . . 353
                   B. Krebs and   
               M. Burkhardt and   
                     F. M. Wahl   A Bayesian Network for $3$D Object
                                  Recognition in Range Data  . . . . . . . 361
                    P. Kalocsai   Improving the Shape Recognition
                                  Performance of a Model with Gabor Filter
                                  Representation . . . . . . . . . . . . . 369
                    R. Mohr and   
                  S. Picard and   
                      C. Schmid   Bayesian Decision Versus Voting for
                                  Image Retrieval  . . . . . . . . . . . . 376
                     S. Kroener   A Structured Neural Network Invariant to
                                  Cyclic Shifts and Rotations  . . . . . . 384
           H. J. A. M. Heijmans   Morphological Grain Operators for Binary
                                  Images . . . . . . . . . . . . . . . . . 392
                 K. Palagyi and   
                       A. Kubas   A Parallel $ 12 $-Subiteration $3$D
                                  Thinning Algorithm to Extract Medial
                                  Lines  . . . . . . . . . . . . . . . . . 400
                   V. Rodehorst   Architectural Image Segmentation Using
                                  Digital Watersheds . . . . . . . . . . . 408
           C. P. Vavoulidis and   
                       I. Pitas   Morphological Iterative Closest Point
                                  Algorithm  . . . . . . . . . . . . . . . 416
                  F. Pernus and   
               A. Leonardis and   
                     S. Kovacic   Planning Multiple Views for $3$-D Object
                                  Recognition and Pose Determination . . . 424
                 S. Christy and   
                      R. Horaud   Fast and Reliable Object Pose Estimation
                                  from Line Correspondences  . . . . . . . 432
                   J. Poesl and   
                     H. Niemann   Statistical a-D Object Localization
                                  Without Segmentation Using Wavelet
                                  Analysis . . . . . . . . . . . . . . . . 440
                   S. F. Li and   
                     W. Hsu and   
                     H. K. Pung   A Real-Time Monocular Vision-Based $3$D
                                  Mouse  . . . . . . . . . . . . . . . . . 448
                 L. Wiskott and   
              J.-M. Fellous and   
                 N. Krueger and   
            C. Von der Malsburg   Face Recognition by Elastic Bunch Graph
                                  Matching . . . . . . . . . . . . . . . . 456
                  R. Feraud and   
                 O. Bernier and   
              J.-E. Viallet and   
                   M. Collobert   A Conditional Mixture of Neural Networks
                                  for Face Detection, Applied to Locating
                                  and Tracking an Individual Speaker . . . 464
                      K. Yu and   
                   X. Jiang and   
                       H. Bunke   Lipreading Using Fourier Transform over
                                  Time . . . . . . . . . . . . . . . . . . 472
                     L. Wiskott   Phantom Faces for Face Analysis  . . . . 480
              A. Gasteratos and   
               I. Andreadis and   
                    P. Tsalides   A New Hardware Structure for
                                  Implementation of Soft Morphological
                                  Filters  . . . . . . . . . . . . . . . . 488
              V. A. Kovalev and   
                   Y. S. Bondar   A Method for Anisotropy Analysis of $3$D
                                  Images . . . . . . . . . . . . . . . . . 495
              D. Lagunovsky and   
                   S. Ablameyko   Fast Line and Rectangle Detection by
                                  Clustering and Grouping  . . . . . . . . 503
                 L.-X. Zhou and   
                       W.-K. Gu   1st and 2nd Order Recursive Operators
                                  for Adaptive Edge Detection  . . . . . . 511
                 A. J. Kasinski   Smoothing Noisy Images Without
                                  Destroying Predefined Feature Carriers   519
                 W. Skarbek and   
                  M. Ghuwar and   
                    K. Ignasiak   Local Subspace Method for Pattern
                                  Recognition  . . . . . . . . . . . . . . 527
                     G. Paschos   Testing the Effectiveness of Non-linear
                                  Rectification on Gabor Energy  . . . . . 535
                   L. Chudy and   
                       V. Chudy   Neural-Like Thinning Processing  . . . . 543
                   I. Aksak and   
                   C. Feist and   
                   V. Kijko and   
                     R. Knoefel   Detection of the Objects with Given
                                  Shape on the Grey-Valued Pictures  . . . 551
                  F. Aherne and   
                 P. Rockett and   
                     N. Thacker   Automatic Parameter Selection for Object
                                  Recognition Using a Parallel
                                  Multiobjective Genetic Algorithm . . . . 559
                    A. Negi and   
                P. Sreedevi and   
                    P. Debbarma   Unsupervised Texture Segmentation Using
                                  Hermite Transform Filters  . . . . . . . 567
              H. G. Sarukhanyan   Decomposition of the Hadamard Matrices
                                  and Fast Hadamard Transform  . . . . . . 575
                   J. Zunic and   
                     N. Sladoje   A Characterization of Digital Disks by
                                  Discrete Moments . . . . . . . . . . . . 582
              V. M. Chernov and   
                 M. A. Chicheva   One-Step Short-Length DCT Algorithms
                                  with Data Representation in the Direct
                                  Sum of the Associative Algebras  . . . . 590
               O. Chutatape and   
                          L. Li   Character Extraction from Scene Image
                                  Using Fuzzy Entropy and Rule-Based
                                  Technique  . . . . . . . . . . . . . . . 597
          D. Carreño and   
                     X. Ginesta   Facial Image Recognition Using Neural
                                  Networks and Genetic Algorithms  . . . . 605
                 V. Kovalev and   
                      M. Petrou   An Energy Minimisation Approach to the
                                  Registration, Matching and Recognition
                                  of Images  . . . . . . . . . . . . . . . 613
              V. M. Chernov and   
                 M. V. Pershina   ``Error-Free'' Calculation of the
                                  Convolution Using Generalized Mersenne
                                  and Fermat Transforms over Algebraic
                                  Fields . . . . . . . . . . . . . . . . . 621
                  B. Smolka and   
            K. W. Wojciechowski   A New Method of Texture Binarization . . 629
                B. Nickolay and   
               B. Schneider and   
                       S. Jacob   Parameter Optimisation of an Image
                                  Processing System Using Evolutionary
                                  Algorithms . . . . . . . . . . . . . . . 637
                       A. Hoogs   Analysis of Learning Using Segmentation
                                  Models . . . . . . . . . . . . . . . . . 645
                      R. Reulke   Stereo Processing of Image Data from the
                                  Airborne CCD Scanner WAAC  . . . . . . . 653
                  C. F. Fan and   
                   Z. M. Li and   
                   X. Q. Ye and   
                       W. K. Gu   An Adaptive Method of Color Road
                                  Segmentation . . . . . . . . . . . . . . 661
                        N. Ohta   Optical Flow Detection Using a General
                                  Noise Model for Gradient Constraint  . . 669
                M. Kolesnik and   
                        G. Paar   Algorithmic Solution and Simulation
                                  Results for Vision-Based Autonomous Mode
                                  of a Planetary Rover . . . . . . . . . . 677
              J. M. Sanchiz and   
                     F. Pla and   
                 J. A. Marchant   A Framework for Feature-Based Motion
                                  Recovery in Ground Plane Vehicle
                                  Navigation . . . . . . . . . . . . . . . 686
           G. L. Gimel'farb and   
                 R. M. Haralick   Terrain Reconstruction from Multiple
                                  Views  . . . . . . . . . . . . . . . . . 694
               J. A. Boluda and   
                 J. Domingo and   
                   F. Pardo and   
                   J. Pelechano   Detecting Motion Independent of the
                                  Camera Movement through a Log-Polar
                                  Differential Approach  . . . . . . . . . 702
                J. Arnspang and   
               K. Henriksen and   
                       N. Olsen   Coordinate-Free Camera Calibration . . . 710
              H. Klingspohr and   
                   T. Block and   
                   R.-R. Grigat   A Passive Real-Time Gaze Estimation
                                  System for Human-Machine Interfaces  . . 718
                 W. Fellenz and   
                K. Schluens and   
                 A. Koschan and   
                    M. Teschner   An Active Vision System for Obtaining
                                  High Resolution Depth Information  . . . 726


Lecture Notes in Computer Science
Volume 1297, 1997

                      U. Fayyad   Knowledge Discovery in Databases: An
                                  Overview . . . . . . . . . . . . . . . . 3
                 G. Gottlob and   
                   N. Leone and   
                   F. Scarcello   On the Complexity of Some Inductive
                                  Logic Programming Problems . . . . . . . 17
                    J.-F. Puget   Inductive Logic Programming and
                                  Constraint Logic Programming (Abstract)  33
                  Z. Alexin and   
                  J. Csirik and   
                T. Gyimothy and   
                    M. Jelasity   Learning Phonetic Rules in a Speech
                                  Recognition System . . . . . . . . . . . 37
                 S. Anthony and   
                   A. M. Frisch   Cautious Induction in Inductive Logic
                                  Programming  . . . . . . . . . . . . . . 45
                 S. Anthony and   
                   A. M. Frisch   Generating Numerical Literals During
                                  Refinement . . . . . . . . . . . . . . . 61
                H. Blockeel and   
                    L. De Raedt   Lookahead and Discretization in ILP  . . 77
                   C. H. Bryant   Data Mining via ILP: The Application of
                                  Progol to a Database of
                                  Enantioseparations . . . . . . . . . . . 85
                     J. Cussens   Part-of-Speech Tagging Using Progol  . . 93
                     L. Dehaspe   Maximum Entropy Modeling with Clausal
                                  Constraints  . . . . . . . . . . . . . . 109
                 L. Dehaspe and   
                    L. De Raedt   Mining Association Rules in Multiple
                                  Relations  . . . . . . . . . . . . . . . 125
                L. De Raedt and   
                    H. Blockeel   Using Logical Decision Trees for
                                  Clustering . . . . . . . . . . . . . . . 133
                S. Dzeroski and   
                     T. Erjavec   Induction of Slovene Nominal Paradigms   141
                    P. A. Flach   Normal Forms for Inductive Logic
                                  Programming  . . . . . . . . . . . . . . 149
                K. Furukawa and   
                T. Murakami and   
                    K. Ueno and   
                       T. Ozaki   On a Sufficient Condition for the
                                  Existence of Most Specific Hypothesis in
                                  Progol . . . . . . . . . . . . . . . . . 157
                M. Furusawa and   
                 N. Inuzuka and   
                    H. Seki and   
                        H. Itoh   Induction of Logic Programs with More
                                  Than One Recursive Clause by Analyzing
                                  Saturations  . . . . . . . . . . . . . . 165
                  P. Geibel and   
                    F. Wysotzki   A Logical Framework for Graph
                                  Theoretical Decision Tree Learning . . . 173
                A. C. Kakas and   
                     F. Riguzzi   Learning with Abduction  . . . . . . . . 181
                  L. Martin and   
                       C. Vrain   Systematic Predicate Invention in
                                  Inductive Logic Programming  . . . . . . 189
                   S. Moyle and   
                   S. Muggleton   Learning Programs in the Event Calculus  205
            S.-H Nienhuys-Cheng   Distance Between Herbrand
                                  Interpretations: A Measure for
                                  Approximations to a Target Concept . . . 213
                   T. Ozaki and   
                K. Furukawa and   
                T. Murakami and   
                        K. Ueno   Realizing Progol by Forward Reasoning    227
                   U. Pompe and   
                   I. Kononenko   Probabilistic First-Order Classification 235
                   C. Reddy and   
                   P. Tadepalli   Learning Horn Definitions with
                                  Equivalence and Membership Queries . . . 243
                K. Sadohara and   
                   M. Haraguchi   Using Abstraction Schemata in Inductive
                                  Logic Programming  . . . . . . . . . . . 256
                       M. Sebag   Distance Induction in First Order Logic  264
              A. Srinivasan and   
                 R. D. King and   
            S. H. Muggleton and   
             M. J. E. Sternberg   Carcinogenesis Predictions Using ILP . . 273
                       I. Weber   Discovery of First-Order Regularities in
                                  a Relational Database Using Offline
                                  Candidate Determination  . . . . . . . . 288
                    A. Yamamoto   Which Hypotheses Can Be Found with
                                  Inverse Entailment?  . . . . . . . . . . 296


Lecture Notes in Computer Science
Volume 1298, 1997

                M. Alpuente and   
                M. Falaschi and   
                  G. Moreno and   
                       G. Vidal   Safe Folding/unfolding with Conditional
                                  Narrowing  . . . . . . . . . . . . . . . 1
                       S. Antoy   Optimal Non-deterministic Functional
                                  Logic Computations . . . . . . . . . . . 16
                  M. Codish and   
                      C. Taboch   A Semantic Basis for Termination
                                  Analysis of Logic Programs and Its
                                  Realization Using Symbolic Norm
                                  Constraints  . . . . . . . . . . . . . . 31
                   A. Geser and   
                    S. Gorlatch   Parallelizing Functional Programs by
                                  Generalization . . . . . . . . . . . . . 46
                G. Kirchner and   
                  C. Ringeissen   Higher-Order Equational Unification via
                                  Explicit Substitutions . . . . . . . . . 61
                 L. J. Steggles   Parameterised Higher-Order Algebraic
                                  Specifications . . . . . . . . . . . . . 76
                  T. Suzuki and   
                K. Nakagawa and   
                         T. Ida   Higher-Order Lazy Narrowing Calculus: A
                                  Computation Model for a Higher-Order
                                  Functional Logic Language  . . . . . . . 99
                    T. Aoto and   
                      Y. Toyama   On Composable Properties of Term
                                  Rewriting Systems  . . . . . . . . . . . 114
                       S. Lucas   Needed Reductions with Context-Sensitive
                                  Rewriting  . . . . . . . . . . . . . . . 129
                   E. Ohlebusch   Conditional Term Graph Rewriting . . . . 144
    J. M. Almendros-Jimenez and   
                  A. Gil-Luezas   Lazy Narrowing with Parametric Order
                                  Sorted Types . . . . . . . . . . . . . . 159
                  G. Barthe and   
               F. Van Raamsdonk   Termination of Algebraic Type Systems:
                                  The Syntactic Approach . . . . . . . . . 174
                  L. Caires and   
                    L. Monteiro   Proof Net Semantics of Proof Search
                                  Computation  . . . . . . . . . . . . . . 194
                  G. Barthe and   
             F. Kamareddine and   
                        A. Rios   Explicit Substitutions for the lambdacap
                                  delta Calculus . . . . . . . . . . . . . 209
       Cesar A. Muñoz H.   A Left-Linear Variant of lambda-sigma    224
           Z. Khasidashvili and   
                       M. Ogawa   Perpetuality and Uniform Normalization   240
             S. Abdennadher and   
                     H. Schuetz   Model Generation with Existentially
                                  Quantified Variables and Constraints . . 256
                  N. Nedjah and   
               C. D. Walter and   
                 S. E. Eldridge   Optimal Left-to-Right Pattern-Matching
                                  Automata . . . . . . . . . . . . . . . . 273


Lecture Notes in Computer Science
Volume 1299, 1997

                       Y. Wilks   Information Extraction as a Core
                                  Language Technology  . . . . . . . . . . 1
                    R. Grishman   Information Extraction: Techniques and
                                  Challenges . . . . . . . . . . . . . . . 10
              R. Gaizauskas and   
               K. Humphreys and   
                   S. Azzam and   
                       Y. Wilks   Concepticons vs. Lexicons: An
                                  Architecture for Multilingual
                                  Information Extraction . . . . . . . . . 28
                  R. Basili and   
                 M. T. Pazienza   Lexical Acquisition for Information
                                  Extraction . . . . . . . . . . . . . . . 44
                B. Boguraev and   
                     C. Kennedy   Technical Terminology for Domain
                                  Specification and Content
                                  Characterisation . . . . . . . . . . . . 73
                G. Grefenstette   Short Query Linguistic Expansion
                                  Techniques: Palliating One-Word Queries
                                  by Providing Intermediate Structures to
                                  Text . . . . . . . . . . . . . . . . . . 97
                  A. F. Smeaton   Information Retrieval: Still Butting
                                  Heads with Natural Language Processing ? 115
                     N. Guarino   Semantic Matching: Formal Ontological
                                  Distinctions for Information
                                  Organization, Extraction, and
                                  Integration  . . . . . . . . . . . . . . 139
                    F. Neri and   
                      L. Saitta   Machine Learning for Information
                                  Extraction . . . . . . . . . . . . . . . 171
                       S. Cluet   Modeling and Querying Semi-structured
                                  Data . . . . . . . . . . . . . . . . . . 192