Table of contents for issues of Lecture Notes in Computer Science

Last update: Mon Dec 16 09:11:22 MST 2019                Valid HTML 3.2!

Volume 2188, 2001
Volume 2189, 2001
Volume 2190, 2001
Volume 2191, 2001
Volume 2192, 2001
Volume 2193, 2001
Volume 2194, 2001
Volume 2195, 2001
Volume 2196, 2001
Volume 2197, 2001
Volume 2198, 2001
Volume 2199, 2001
Volume 2200, 2001
Volume 2201, 2001
Volume 2202, 2001
Volume 2203, 2001
Volume 2204, 2001
Volume 2205, 2001
Volume 2206, 2001
Volume 2207, 2001
Volume 2208, 2001
Volume 2209, 2001
Volume 2210, 2001
Volume 2211, 2001
Volume 2212, 2001
Volume 2213, 2001
Volume 2214, 2001
Volume 2215, 2001
Volume 2216, 2001
Volume 2217, 2001
Volume 2218, 2001
Volume 2219, 2001
Volume 2220, 2001
Volume 2221, 2001
Volume 2223, 2001
Volume 2224, 2001
Volume 2225, 2001
Volume 2226, 2001
Volume 2227, 2001
Volume 2228, 2001
Volume 2229, 2001
Volume 2230, 2001
Volume 2231, 2001
Volume 2232, 2001
Volume 2233, 2001
Volume 2234, 2001
Volume 2235, 2001
Volume 2236, 2001
Volume 2237, 2001
Volume 2239, 2001
Volume 2240, 2001
Volume 2241, 2001
Volume 2242, 2001
Volume 2243, 2001
Volume 2244, 2001
Volume 2245, 2001
Volume 2246, 2001
Volume 2247, 2001
Volume 2248, 2001
Volume 2249, 2001
Volume 2250, 2001
Volume 2251, 2001
Volume 2252, 2001
Volume 2253, 2001
Volume 2254, 2001
Volume 2255, 2001
Volume 2256, 2001
Volume 2257, 2001
Volume 2258, 2001
Volume 2259, 2001
Volume 2260, 2001
Volume 2262, 2001
Volume 2263, 2001
Volume 2264, 2001
Volume 2267, 2001
Volume 2271, 2001
Volume 2273, 2001
Volume 2274, 2001
Volume 2275, 2001
Volume 2276, 2001
Volume 2284, 2001
Volume 2300, 2001


Lecture Notes in Computer Science
Volume 2188, 2001

                 Dieter Rombach   Guaranteed Software Quality  . . . . . . 1
                  Victor Basili   Building an Experience Base for Software
                                  Engineering: a Report on the First
                                  CeBASE eWorkshop . . . . . . . . . . . . 3
                  Werner Mellis   A Contingency Approach to Software
                                  Development  . . . . . . . . . . . . . . 4
                      Mary Shaw   Career-Long Education for Software
                                  Professionals: a US View of the
                                  Educational Challenges in a
                                  Rapidly-Changing Technology  . . . . . . 5
               Bernard Wong and   
                   Ross Jeffery   Cognitive Structures of Software
                                  Evaluation: a Means-End Chain Analysis
                                  of Quality . . . . . . . . . . . . . . . 6
            Stuart Anderson and   
                 Massimo Felici   Requirements Evolution from Process to
                                  Product Oriented Management  . . . . . . 27
              Josef Nedstam and   
           Martin Höst and   
         Björn Regnell and   
                 Jennie Nilsson   A Case Study on Scenario-Based Process
                                  Flexibility Assessment for Risk
                                  Reduction  . . . . . . . . . . . . . . . 42
           V. Seppänen and   
        S. Komi-Sirviö and   
         A. Mäntyniemi and   
               T. Rahikkala and   
                 M. Pikkarainen   Contexts of KM Based SPI: The Case of
                                  Software Design Experience Reuse . . . . 57
            Marion Lepasaar and   
                Timo Varkoi and   
                 Hannu Jaakkola   Models and Success Factors of Process
                                  Change . . . . . . . . . . . . . . . . . 68
                  Karl Lebsanft   Process Improvement in Turbulent Times
                                  --- Is CMM Still an Answer ? . . . . . . 78
               Macario Polo and   
             Mario Piattini and   
             Francisco Ruiz and   
             Mar Jiménez   Assessment of Maintenance Maturity in IT
                                  Departments of Public Entities: Two Case
                                  Studies  . . . . . . . . . . . . . . . . 86
               Netta Iivari and   
                    Timo Jokela   Evaluating a Usability Capability
                                  Assessment . . . . . . . . . . . . . . . 98
              Victor Basili and   
         Roseanne Tesoriero and   
             Patricia Costa and   
            Mikael Lindvall and   
                  Ioana Rus and   
              Forrest Shull and   
               Marvin Zelkowitz   Building an Experience Base for Software
                                  Engineering: a Report on the First
                                  CeBASE eWorkshop . . . . . . . . . . . . 110
                 Kurt Schneider   Experience Magnets: Attracting
                                  Experiences, Not Just Storing Them . . . 126
                 Timo Kucza and   
        Minna Nättinen and   
          Päivi Parviainen   Improving Knowledge Management in
                                  Software Reuse Process . . . . . . . . . 141
                 Christof Nagel   Processes and Knowledge Management: a
                                  Symbiosis  . . . . . . . . . . . . . . . 153
    Torgeir Dingsòyr and   
             Nils Brede Moe and   
    Òystein Nytrò   Augmenting Experience Reports with
                                  Lightweight Postmortem Reviews . . . . . 167
            Scott Henninger and   
                Jason Schlabach   A Tool for Managing Software Development
                                  Knowledge  . . . . . . . . . . . . . . . 182
            Marjo Kauppinen and   
                    Sari Kujala   Starting Improvement of Requirements
                                  Engineering Processes: An Experience
                                  Report . . . . . . . . . . . . . . . . . 196
              Karen Allenby and   
               Simon Burton and   
              Darren Buttle and   
              John McDermid and   
               John Murdoch and   
            Alan Stephenson and   
               Mike Bardill and   
              Stuart Hutchesson   A Family-Oriented Software Development
                                  Process for Engine Controllers . . . . . 210
        Peter Fröhlich and   
              Horst Lichter and   
                 Manfred Zeller   Enabling Local SPI in a Multi-national
                                  Company  . . . . . . . . . . . . . . . . 227
                    Ton Dekkers   Project Improvement as Start-Up  . . . . 240
           Jörg Zettel and   
               Frank Maurer and   
     Jürgen Münch and   
                       Les Wong   LIPE: a Lightweight Process for
                                  E-business Startup Companies Based on
                                  Extreme Programming  . . . . . . . . . . 255
        M. Letizia Jaccheri and   
             Tor Stålhane   Evaluation of the E3 Process Modelling
                                  Language and Tool for the Purpose of
                                  Model Creation . . . . . . . . . . . . . 271
            Harald Störrle   Describing Fractal Processes with UML    282
              Renata Araujo and   
                  Marcos Borges   Extending the Software Process Culture
                                  --- An Approach Based on Groupware and
                                  Workflow . . . . . . . . . . . . . . . . 297
       Ulrike Becker-Kornstaedt   Towards Systematic Knowledge Elicitation
                                  for Descriptive Software Process
                                  Modeling . . . . . . . . . . . . . . . . 312
              Michael Gnatz and   
            Frank Marschall and   
               Gerhard Popp and   
             Andreas Rausch and   
              Wolfgang Schwerin   Modular Process Patterns Supporting an
                                  Evolutionary Software Development
                                  Process  . . . . . . . . . . . . . . . . 326
                Per Runeson and   
          Magnus C. Ohlsson and   
                   Claes Wohlin   A Classification Scheme for Studies on
                                  Fault-Prone Components . . . . . . . . . 341
             Lars Bratthall and   
              Erik Arisholm and   
         Magne Jòrgensen   Program Understanding Behavior during
                                  Estimation of Enhancement Effort on
                                  Small Java Programs  . . . . . . . . . . 356
            Hikaru Fujiwara and   
            Shinji Kusumoto and   
              Katsuro Inoue and   
          Toshifusa Ootsubo and   
                Katsuhiko Yuura   Evaluation of a Business Application
                                  Framework Using Complexity and
                                  Functionality Metrics  . . . . . . . . . 371
                      Anonymous   Author Index . . . . . . . . . . . . . . 381


Lecture Notes in Computer Science
Volume 2189, 2001

          Elizabeth Bradley and   
              Nancy Collins and   
           W. Philip Kegelmeyer   Feature Characterization in Scientific
                                  Datasets . . . . . . . . . . . . . . . . 1
          Luis M. de Campos and   
Juan M. Fernández-Luna and   
                  Juan F. Huete   Relevance Feedback in the Bayesian
                                  Network Retrieval Model: An Approach
                                  Based on Term Instantiation  . . . . . . 13
                   Anne Laurent   Generating Fuzzy Summaries from Fuzzy
                                  Multidimensional Databases . . . . . . . 24
          Andrew Estabrooks and   
             Nathalie Japkowicz   A Mixture-of-Experts Framework for
                                  Learning from Imbalanced Data Sets . . . 34
          Achim Lewandowski and   
                  Peter Protzel   Predicting Time-Varying Functions with
                                  Local Models . . . . . . . . . . . . . . 44
                     Cen Li and   
              Gautam Biswas and   
                  Mike Dale and   
                       Pat Dale   Building Models of Ecological Dynamics
                                  Using HMM Based Temporal Data Clustering
                                  --- A Preliminary Study  . . . . . . . . 53
            Nuno C. Marques and   
          Gabriel Pereira Lopes   Tagging with Small Training Corpora  . . 63
                   Udo Hahn and   
              Martin Honeck and   
                  Stefan Schulz   A Search Engine for Morphologically
                                  Complex Languages  . . . . . . . . . . . 73
               Renato Bruni and   
                Antonio Sassano   Errors Detection and Correction in Large
                                  Scale Data Collecting  . . . . . . . . . 84
            Fernando Berzal and   
             Ignacio Blanco and   
      Daniel Sánchez and   
       María-Amparo Vila   A New Framework to Assess Association
                                  Rules  . . . . . . . . . . . . . . . . . 95
             Corinna Cortes and   
             Daryl Pregibon and   
                 Chris Volinsky   Communities of Interest  . . . . . . . . 105
       Alexander K. Seewald and   
        Johannes Fürnkranz   An Evaluation of Grading Classifiers . . 115
         Frank Höppner and   
                  Frank Klawonn   Finding Informative Rules in Interval
                                  Sequences  . . . . . . . . . . . . . . . 125
             Seppo Puuronen and   
             Alexey Tsymbal and   
                 Iryna Skrypnyk   Correlation-Based and Contextual
                                  Merit-Based Ensemble Feature Selection   135
       Michiel C. van Wezel and   
          Walter A. Kosters and   
       Peter van der Putten and   
                   Joost N. Kok   Nonmetric Multidimensional Scaling with
                                  Neural Networks  . . . . . . . . . . . . 145
               João Gama   Functional Trees for Regression  . . . . 156
José Tomé A. S. Ferreira and   
        David G. T. Denison and   
                  David J. Hand   Data Mining with Products of Trees . . . 167
            Masahiro Terabe and   
             Takashi Washio and   
                 Hiroshi Motoda   $ S^3 $ Bagging: Fast Classifier
                                  Induction Method with Subsampling and
                                  Bagging  . . . . . . . . . . . . . . . . 177--186
                  Rolf Backofen   RNA-Sequence-Structure Properties and
                                  Selenocysteine Insertion . . . . . . . . 187
                 Paul Cohen and   
                    Niall Adams   An Algorithm for Segmenting Categorical
                                  Time Series into Meaningful Episodes . . 198
             Terry Windeatt and   
            Gholamreza Ardeshir   An Empirical Comparison of Pruning
                                  Methods for Ensemble Classifiers . . . . 208
                Paul Kellam and   
                Xiaohui Liu and   
               Nigel Martin and   
           Christine Orengo and   
              Stephen Swift and   
                   Allan Tucker   A Framework for Modelling Short,
                                  High-Dimensional Multivariate Time
                                  Series: Preliminary Results in Virus
                                  Gene Expression Data Analysis  . . . . . 218
José L. Triviño-Rodriguez and   
           Rafael Morales-Bueno   Using Multiattribute Prediction Suffix
                                  Graphs for Spanish Part-of-Speech
                                  Tagging  . . . . . . . . . . . . . . . . 228
                Fuchun Peng and   
                Dale Schuurmans   Self-Supervised Chinese Word
                                  Segmentation . . . . . . . . . . . . . . 238
      Syed Sibte Raza Abidi and   
               Kok Meng Hoe and   
                      Alwyn Goh   Analyzing Data Clusters: a Rough Sets
                                  Approach to Extract Cluster-Defining
                                  Symbolic Rules . . . . . . . . . . . . . 248
              Ryohei Nakano and   
                   Kazumi Saito   Finding Polynomials to Fit Multivariate
                                  Data Having Numeric and Nominal
                                  Variables  . . . . . . . . . . . . . . . 258
                  Paul R. Cohen   Fluent Learning: Elucidating the
                                  Structure of Episodes  . . . . . . . . . 268
   Sérgio Viademonte and   
                 Frada Burstein   An Intelligent Decision Support Model
                                  for Aviation Weather Forecasting . . . . 278
             Robert Castelo and   
                Ad Feelders and   
                    Arno Siebes   MAMBO: Discovering Association Rules
                                  Based on Conditional Independencies  . . 289
              R. H. Glendinning   Model Building for Random Fields . . . . 299
            Tobias Scheffer and   
         Christian Decomain and   
                  Stefan Wrobel   Active Hidden Markov Models for
                                  Information Extraction . . . . . . . . . 309
           Gabriel L. Somlo and   
                  Adele E. Howe   Adaptive Lightweight Text Filtering  . . 319
              Zhang Hongwei and   
              Tian Fengzhan and   
                     Lu Yuchang   A General Algorithm for Approximate
                                  Inference in Multiply Sectioned Bayesian
                                  Networks . . . . . . . . . . . . . . . . 330
              Dave Yearling and   
                  David J. Hand   Investigating Temporal Patterns of Fault
                                  Behaviour within Large Telephony
                                  Networks . . . . . . . . . . . . . . . . 340
           Marzena Kryszkiewicz   Closed Set Based Discovery of
                                  Representative Association Rules . . . . 350
             Matthew Easley and   
              Elizabeth Bradley   Intelligent Sensor Analysis and Actuator
                                  Control  . . . . . . . . . . . . . . . . 360
          Grace W. Rumantir and   
               Chris S. Wallace   Sampling of Highly Correlated Data for
                                  Polynomial Regression and Model
                                  Discovery  . . . . . . . . . . . . . . . 370
                 Paul Cohen and   
                Niall Adams and   
                  David J. Hand   The IDA'01 Robot Data Challenge  . . . . 378
                      Anonymous   Author Index . . . . . . . . . . . . . . 383


Lecture Notes in Computer Science
Volume 2190, 2001

                Daniel Thalmann   The Foundations to Build a Virtual Human
                                  Society  . . . . . . . . . . . . . . . . 1
                    Jeff Rickel   Intelligent Virtual Agents for Education
                                  and Training: Opportunities and
                                  Challenges . . . . . . . . . . . . . . . 15
                 Michael Li and   
                     Ted Selker   Eye Pattern Analysis in Intelligent
                                  Virtual Agents . . . . . . . . . . . . . 23
        Carlos Delgado-Mata and   
                    Ruth Aylett   Communicating Emotion in Virtual
                                  Environments through Artificial Scents   36
                 Eric Aaron and   
           Dimitris Metaxas and   
         Franjo Ivan\vci\'c and   
                  Oleg Sokolsky   A Framework for Reasoning about
                                  Animation Systems  . . . . . . . . . . . 47
           Matthias Scheutz and   
           Brigitte Römmer   Autonomous Avatars? From Users to Agents
                                  and Back . . . . . . . . . . . . . . . . 61
                    L. Chen and   
                K. Bechkoum and   
                  G. Clapworthy   Equipping a Lifelike Animated Agent with
                                  a Mind . . . . . . . . . . . . . . . . . 72
        Jeremy N. Bailenson and   
            Andrew C. Beall and   
             Jim Blascovich and   
              Mike Raimundo and   
                   Max Weisbuch   Intelligent Agents Who Wear Your Face:
                                  Users' Reactions to the Virtual Self . . 86
              F. Alonso Amo and   
F. Fernández Velasco and   
G. López Gómez and   
 J. P. Rojas Jiménez and   
           F. J. Soriano Camino   Intelligent Virtual Agent Societies on
                                  the Internet . . . . . . . . . . . . . . 100
        George Anastassakis and   
     Themis Panayiotopoulos and   
                  Tim Ritchings   Virtual Agent Societies with the mVITAL
                                  Intelligent Agent System . . . . . . . . 112
      Gonzalo Méndez and   
         Pedro Pérez and   
     Angélica de Antonio   An Overview of the Use of Mobile Agents
                                  in Virtual Environments  . . . . . . . . 126
                 M. Gerhard and   
                D. J. Moore and   
                    D. J. Hobbs   Continuous Presence in Collaborative
                                  Virtual Environments: Towards a Hybrid
                                  Avatar-Agent Model for User
                                  Representation . . . . . . . . . . . . . 137
               Marc Cavazza and   
               Fred Charles and   
                 Steven J. Mead   Agents' Interaction in Virtual
                                  Storytelling . . . . . . . . . . . . . . 156
         André Silva and   
                 Marco Vala and   
                      Ana Paiva   Papous: The Virtual Storyteller  . . . . 171
              Martin Klesen and   
           Janek Szatkowski and   
                  Niels Lehmann   A Dramatised Actant Model for
                                  Interactive Improvisational Plays  . . . 181
             Nadine Richard and   
          Philippe Codognet and   
                 Alain Grumbach   The InViWo Toolkit: Describing
                                  Autonomous Virtual Agents and Avatars    195
           Spyros Vosinakis and   
         Themis Panayiotopoulos   SimHuman: a Platform for Real-Time
                                  Virtual Agents with Planning
                                  Capabilities . . . . . . . . . . . . . . 210
             Pietro Casella and   
                      Ana Paiva   MAgentA: An Architecture for Real Time
                                  Automatic Composition of Background
                                  Music  . . . . . . . . . . . . . . . . . 224
               Juan de Lara and   
               Manuel Alfonseca   Agent Oriented Simulation with OOCSMP.
                                  An Example in Evolutionary Ant Colonies  233
                 Isabella Poggi   The Lexicon and the Alphabet of Gesture,
                                  Gaze, and Touch  . . . . . . . . . . . . 235
                Junichi Hoshino   Extraction and Reconstruction of
                                  Personal Characters from Human Movement  237
                     Ray Walshe   The Origin of the Speeches: Language
                                  Evolution through Collaborative
                                  Reinforcement Learning . . . . . . . . . 239
              Aldo Paradiso and   
             Fabio Zambetta and   
               Fabio Abbattista   Fanky: a Tool for Animating Faces of
                                  $3$D Agents  . . . . . . . . . . . . . . 242
                      Anonymous   Author Index . . . . . . . . . . . . . . 245


Lecture Notes in Computer Science
Volume 2191, 2001

                   Robert Hanek   Model-Based Image Segmentation Using
                                  Local Self-Adapting Separation Criteria  1
             Sven Siggelkow and   
                Marc Schael and   
                 Hans Burkhardt   SIMBA --- Search IMages By Appearance    9
                    Marc Schael   Texture Defect Detection Using Invariant
                                  Textural Features  . . . . . . . . . . . 17
                Amin Massad and   
         Bärbel Mertsching   Segmentation of Spontaneously Splitting
                                  Figures into Overlapping Layers  . . . . 25
            Anja Brakensiek and   
            Andreas Kosmala and   
                 Gerhard Rigoll   Writer Adaptation for Online Handwriting
                                  Recognition  . . . . . . . . . . . . . . 32
               Xiaoyi Jiang and   
                   Daniel Mojon   Blood Vessel Detection in Retinal Images
                                  by Shape-Based Multi-threshold Probing   38
                Stefan Hinz and   
             Albert Baumgartner   Vehicle Detection in Aerial Images Using
                                  Generic Features, Grouping, and Context  45
         Martin Gröger and   
              Wolfgang Sepp and   
            Tobias Ortmaier and   
                 Gerd Hirzinger   Reconstruction of Image Structure in
                                  Presence of Specular Reflections . . . . 53
                Jan Neumann and   
              Yiannis Aloimonos   Spatio-Temporal Analysis of Human Faces
                                  Using Multi-resolution Subdivision
                                  Surfaces . . . . . . . . . . . . . . . . 61
               Hanno Scharr and   
            Dietmar Uttenweiler   $3$D Anisotropic Diffusion Filtering for
                                  Enhancing Noisy Actin Filament
                                  Fluorescence Images  . . . . . . . . . . 69
                  J. Fieres and   
                  J. Mattes and   
                        R. Eils   A Point Set Registration Algorithm Using
                                  a Motion Model Based on Thin-Plate
                                  Splines and Point Clustering . . . . . . 76
                 Marc Luxen and   
         Wolfgang Förstner   Optimal Camera Orientation from Points
                                  and Straight Lines . . . . . . . . . . . 84
                  Stephan Heuel   Points, Lines, and Planes and Their
                                  Optimal Estimation . . . . . . . . . . . 92
              Georg von Wichert   A Probabilistic Approach to Simultaneous
                                  Segmentation, Object Recognition, $3$D
                                  Localization, and Tracking Using Stereo  100
              Manfred Alker and   
          Sönke Frantz and   
                  Karl Rohr and   
            H. Siegfried Stiehl   Improving the Robustness in Extracting
                                  $3$D Point Landmarks Based on Deformable
                                  Models . . . . . . . . . . . . . . . . . 108
        Dimitrios Katsoulas and   
                  Lothar Bergen   Efficient $3$D Vertex Detection in Range
                                  Images Acquired with a Laser Sensor  . . 116
           Michael Felsberg and   
                  Gerald Sommer   Scale Adaptive Filtering Derived from
                                  the Laplace Equation . . . . . . . . . . 124
              Sung Woo Choi and   
              Hans-Peter Seidel   One-Sided Stability of Medial Axis
                                  Transform  . . . . . . . . . . . . . . . 132
                M. Feldbach and   
             K. D. Tönnies   Robust Line Detection in Historical
                                  Church Registers . . . . . . . . . . . . 140
                 Carsten Steger   Similarity Measures for Occlusion,
                                  Clutter, and Illumination Invariant
                                  Object Recognition . . . . . . . . . . . 148
                    K. Voss and   
                      H. Suesse   Affine Point Pattern Matching  . . . . . 155
                Hagen Spies and   
           Bernd Jähne and   
                 John L. Barron   Surface Expansion from Range Data
                                  Sequences  . . . . . . . . . . . . . . . 163
              Rudolf Mester and   
                   Til Aach and   
              Lutz Dümbgen   Illumination-Invariant Change Detection
                                  Using a Statistical Colinearity
                                  Criterion  . . . . . . . . . . . . . . . 170
        Christian Bauckhage and   
             Jannik Fritsch and   
                Gerhard Sagerer   Memorizing Visual Knowledge for Assembly
                                  Process Monitoring . . . . . . . . . . . 178
         Volker Krüger and   
               Rogerio S. Feris   Wavelet Subspace Method for Real-Time
                                  Face Tracking  . . . . . . . . . . . . . 186
         Christoph S. Garbe and   
               Bernd Jähne   Reliable Estimates of the Sea Surface
                                  Heat Flux from Image Sequences . . . . . 194
                   Axel Techmer   Real-Time Motion Based Vehicle
                                  Segmentation in Traffic Lanes  . . . . . 202
         Birgit Möller and   
                   Stefan Posch   Detection and Tracking of Moving Objects
                                  for Mosaic Image Generation  . . . . . . 208
        Christian Wallraven and   
         Heinrich Bülthoff   Acquiring Robust Representations for
                                  Recognition from Image Sequences . . . . 216
                   M. Wenig and   
                    C. Leue and   
                   S. Kraus and   
                  T. Wagner and   
                   U. Platt and   
                  B. Jähne   Image Sequence Analysis of Satellite
                                  NO$_2$ Concentration Maps  . . . . . . . 223
  Norbert Kirchgeßner and   
                Hagen Spies and   
               Hanno Scharr and   
                     Uli Schurr   Root Growth Measurements in Object
                                  Coordinates  . . . . . . . . . . . . . . 231
              Frank Deinzer and   
            Joachim Denzler and   
               Heinrich Niemann   On Fusion of Multiple Views for Active
                                  Object Recognition . . . . . . . . . . . 239
                    Volker Roth   Probabilistic Discriminative Kernel
                                  Classifiers for Multi-class Problems . . 246
           Michael Reinhold and   
            Dietrich Paulus and   
               Heinrich Niemann   Appearance-Based Statistical Object
                                  Recognition by Heterogeneous Background
                                  and Occlusions . . . . . . . . . . . . . 254
          Tanja Kämpfe and   
          Tim W. Nattkemper and   
                   Helge Ritter   Combining Independent Component Analysis
                                  and Self-Organizing Maps for Cell Image
                                  Classification . . . . . . . . . . . . . 262
             Daniel Cremers and   
            Timo Kohlberger and   
         Christoph Schnörr   Nonlinear Shape Statistics via Kernel
                                  Spaces . . . . . . . . . . . . . . . . . 269
          Arnulf B. A. Graf and   
                   Silvio Borer   Normalization in Support Vector Machines 277
            Friedhelm Schwenker   Solving Multi-class Pattern Recognition
                                  Problems with Tree-Structured Support
                                  Vector Machines  . . . . . . . . . . . . 283
         Frank Hülsken and   
             Frank Wallhoff and   
                 Gerhard Rigoll   Facial Expression Recognition with
                                  Pseudo-$3$D Hidden Markov Models . . . . 291
              Jan Böhm and   
         Jürgen Hefele and   
                 Dieter Fritsch   Towards Online Pose Measurement for
                                  Robots . . . . . . . . . . . . . . . . . 298
                 J. Denzler and   
                C. M. Brown and   
                     H. Niemann   Optimal Camera Parameter Selection for
                                  State Estimation with Applications in
                                  Object Recognition . . . . . . . . . . . 305
               Konrad Klein and   
          Vítor Sequeira   View Planning for Unknown Indoor Scenes
                                  Based on a Cost Benefit Analysis . . . . 313
           Thorsten Schmitt and   
               Robert Hanek and   
             Sebastian Buck and   
                  Michael Beetz   Cooperative Probabilistic State
                                  Estimation for Vision-Based Autonomous
                                  Soccer Robots  . . . . . . . . . . . . . 321
               Markus Suing and   
              Lothar Hermes and   
             Joachim M. Buhmann   A New Contour-Based Approach to Object
                                  Recognition for Assembly Line Robots . . 329
              E. Michaelsen and   
                U. Ahlrichs and   
                  U. Stilla and   
                  D. Paulus and   
                     H. Niemann   Where Is the Hole Punch? Object
                                  Localization Capabilities on a Specific
                                  Bureau Task  . . . . . . . . . . . . . . 337
                Uwe Soergel and   
             Karsten Schulz and   
             Ulrich Thoennessen   Phenomenology-Based Segmentation of
                                  InSAR Data for Building Detection  . . . 345
               Jens Keuchel and   
      Christian Schellewald and   
             Daniel Cremers and   
         Christoph Schnörr   Convex Relaxations for Binary Image
                                  Partitioning and Perceptual Grouping . . 353
      Christian Schellewald and   
                Stefan Roth and   
         Christoph Schnörr   Evaluation of Convex Optimization
                                  Techniques for the Weighted
                                  Graph-Matching Problem in Computer
                                  Vision . . . . . . . . . . . . . . . . . 361
              D. M. Gavrila and   
                  J. Giebel and   
                     H. Neumann   Learning Shape Models from Examples  . . 369
              S. Winkelbach and   
                     F. M. Wahl   Shape from $2$D Edge Gradients . . . . . 377
           Alexander Suppes and   
              Frank Suhling and   
            Michael Hötter   Robust Obstacle Detection from
                                  Stereoscopic Image Sequences Using
                                  Kalman Filtering . . . . . . . . . . . . 385
              Dietmar Saupe and   
              Dejan V. Vrani\'c   $3$D Model Retrieval with Spherical
                                  Harmonics and Moments  . . . . . . . . . 392
              Sung Joon Ahn and   
              Wolfgang Rauh and   
             Matthias Recknagel   Least Squares Orthogonal Distance
                                  Fitting of Implicit Curves and Surfaces  398
           Thorsten Behrens and   
                  Karl Rohr and   
            H. Siegfried Stiehl   Segmentation of Tubular Structures in
                                  $3$D Images Using a Combination of the
                                  Hough Transform and a Kalman Filter  . . 406
                   P. Faber and   
                   R. B. Fisher   Pros and Cons of Euclidean Fitting . . . 414
             Jochen Schmidt and   
                Ingo Scholz and   
               Heinrich Niemann   Placing Arbitrary Objects in a Real
                                  Scene Using a Color Cube for Pose
                                  Estimation . . . . . . . . . . . . . . . 421
            Marina Kolesnik and   
            Thomas Kuleßa   Detecting, Tracking, and Interpretation
                                  of a Pointing Gesture by an Overhead
                                  View Camera  . . . . . . . . . . . . . . 429
             Islam Shdaifat and   
         Rolf-Rainer Grigat and   
            Stefan Lütgert   Recognition of the German Visemes Using
                                  Multiple Feature Matching  . . . . . . . 437
                   Nassir Navab   Keynote Speech: Medical & Industrial
                                  Augmented Reality: Challenges for
                                  Real-Time Vision, Computer Graphics and
                                  Mobile Computing . . . . . . . . . . . . 443
                      Anonymous   Author Index . . . . . . . . . . . . . . 453


Lecture Notes in Computer Science
Volume 2192, 2001

              Renaud Pawlak and   
          Lionel Seinturier and   
           Laurence Duchien and   
           Gérard Florin   JAC: a Flexible Solution for
                                  Aspect-Oriented Programming in Java  . . 1
         Éric Tanter and   
Noury M. N. Bouraqadi-Saâdani and   
            Jacques Noyé   Reflex --- Towards an Open Reflective
                                  Extension of Java  . . . . . . . . . . . 25
                    John Whaley   System Checkpointing Using Reflection
                                  and Program Analysis . . . . . . . . . . 44
              Eric Bruneton and   
                 Michel Riveill   Experiments with JavaPod, a Platform
                                  Designed for the Adaptation of
                                  Non-functional Properties  . . . . . . . 52
               Doug Orleans and   
                Karl Lieberherr   DJ: Dynamic Adaptive Programming in Java 73
                Jim Dowling and   
                   Vinny Cahill   The $K$-Component Architecture
                                  Meta-model for Self-Adaptive Software    81
           Naoyasu Ubayashi and   
                   Tetsuo Tamai   Separation of Concerns in Mobile Agent
                                  Applications . . . . . . . . . . . . . . 89
          Jacques Malenfant and   
       Maria-Teresa Segarra and   
  Françoise André   Dynamic Adaptability: The Mol\`eNE
                                  Experiment . . . . . . . . . . . . . . . 110
              Denis Caromel and   
               Fabrice Huet and   
             Julien Vayssi\`ere   A Simple Security-Aware MOP for Java . . 118
                Licia Capra and   
          Wolfgang Emmerich and   
                Cecilia Mascolo   Reflective Middleware Solutions for
                                  Context-Aware Applications . . . . . . . 126
           Juan Carlos Ruiz and   
         Jean-Charles Fabre and   
  Pascale Thévenod-Fosse   Testing MetaObject Protocols Generated
                                  by Open Compilers for Safety-Critical
                                  Systems  . . . . . . . . . . . . . . . . 134
             Torsten Nelson and   
               Donald Cowan and   
                  Paulo Alencar   Supporting Formal Verification of
                                  Crosscutting Concerns  . . . . . . . . . 153
        Rémi Douence and   
            Olivier Motelet and   
             Mario Südholt   A Formal Definition of Crosscuts . . . . 170
               James H. Andrews   Process-Algebraic Foundations of
                                  Aspect-Oriented Programming  . . . . . . 187
François Pennaneac'h and   
Jean-Marc Jézéquel and   
          Jacques Malenfant and   
            Gerson Sunyé   UML Reflections  . . . . . . . . . . . . 210
                   Awais Rashid   A Hybrid Approach to Separation of
                                  Concerns: The Story of SADES . . . . . . 231
            William G. Griswold   Coping with Crosscutting Software
                                  Changes Using Information Transparency   250
           Giuseppe Attardi and   
             Antonio Cisternino   Template Metaprogramming an Object
                                  Interface to Relational Tables . . . . . 266
            Gordon S. Blair and   
              Geoff Coulson and   
             Michael Clarke and   
             Nikos Parlavantzas   Performance and Integrity in the OpenORB
                                  Reflective Middleware  . . . . . . . . . 268
         Stephan Gudmundson and   
                Gregor Kiczales   Data Abstraction in AspectJ  . . . . . . 270
              Joon-Sang Lee and   
               Doo-Hwan Bae and   
                       Ikju Han   Towards Coping with Role-Binding Anomaly 272
              Jung Gyu Park and   
                  Arthur H. Lee   Removing Reflection from Java Programs
                                  Using Partial Evaluation . . . . . . . . 274
           Pascal Rapicault and   
              Jean-Paul Rigault   Open Implementation of UML Meta-model(s) 276
               Karen Renaud and   
                      Huw Evans   JavaCloak: Reflecting on Java Typing for
                                  Class Reuse Using Proxies  . . . . . . . 278
                  Ian Welch and   
           Robert J. Stroud and   
           Alexander Romanovsky   Aspects of Exceptions at the Meta-level  280
                      Anonymous   Author Index . . . . . . . . . . . . . . 283


Lecture Notes in Computer Science
Volume 2193, 2001

             Thomi Pilioura and   
          Aphrodite Tsalgatidou   E-Services: Current Technology and Open
                                  Issues . . . . . . . . . . . . . . . . . 1
              Christoph Bussler   The Role of B2B Protocols in
                                  Inter-Enterprise Process Execution . . . 16
                Harumi Kuno and   
                 Mike Lemon and   
                  Alan Karp and   
              Dorothea Beringer   Conversations + Interfaces = Business
                                  Logic  . . . . . . . . . . . . . . . . . 30
            Massimo Mecella and   
            Barbara Pernici and   
                    Paolo Craca   Compatibility of e-Services in a
                                  Cooperative Multi-platform Environment   44
     Vassilis Christophides and   
               Richard Hull and   
      Gregory Karvounarakis and   
                Akhil Kumar and   
               Geliang Tong and   
                     Ming Xiong   Beyond Discrete E-Services: Composing
                                  Session-Oriented Services in
                                  Telecommunications . . . . . . . . . . . 58
             Eleanna Kafeza and   
         Dickson K. W. Chiu and   
                   Irene Kafeza   View-Based Contracts in an E-Service
                                  Cross-Organizational Workflow
                                  Environment  . . . . . . . . . . . . . . 74
           Raja Krithivasan and   
        Abdelsalam (Sumi) Helal   BizBuilder --- An E-Services Framework
                                  Targeted for Internet Workflow . . . . . 89
     Marie-Christine Fauvet and   
               Marlon Dumas and   
         Boualem Benatallah and   
                 Hye-Young Paik   Peer-to-Peer Traced Execution of
                                  Composite Services . . . . . . . . . . . 103
          Christoph Schuler and   
              Heiko Schuldt and   
           Hans-Jörg Schek   Supporting Reliable Transactional
                                  Business Processes by Publish/Subscribe
                                  Techniques . . . . . . . . . . . . . . . 118
              Kaushik Dutta and   
           Debra VanderMeer and   
              Anindya Datta and   
             Krithi Ramamritham   User Action Recovery in Internet SAGAs
                                  (iSAGAs) . . . . . . . . . . . . . . . . 132
            Stefan Seltzsam and   
Stephan Börzsöpnyi and   
                  Alfons Kemper   Security for Distributed E-Service
                                  Composition  . . . . . . . . . . . . . . 147
  Guillermo Fernandez Ortiz and   
    Ana Sofia Caires Branco and   
            Paz Ruiz Sancho and   
      José Luis Castillo   ESTIA --- Efficient Electronic Services
                                  for Tourists in Action . . . . . . . . . 163--174
              Marcus Herzog and   
                  Georg Gottlob   InfoPipes: a Flexible Framework for
                                  $M$-Commerce Applications  . . . . . . . 175
            Dejan Milojicic and   
                Alan Messer and   
          Philippe Bernadat and   
              Ira Greenberg and   
              Olaf Spinczyk and   
              Danilo Beuche and   
Wolfgang Schröder-Preikschat   $ \Psi $-Pervasive Services
                                  Infrastructure . . . . . . . . . . . . . 187
               DongChun Lee and   
                    JeomGoo Kim   Adaptive Migration Strategy for Mobile
                                  Agents on Internet . . . . . . . . . . . 201
                      Anonymous   Author Index . . . . . . . . . . . . . . 213


Lecture Notes in Computer Science
Volume 2194, 2001

                  Sukumar Ghosh   Cooperating Mobile Agents and
                                  Stabilization  . . . . . . . . . . . . . 1
          Joffroy Beauquier and   
           Maria Gradinariu and   
                 Colette Johnen   Cross-Over Composition --- Enforcement
                                  of Fairness under Unfair Adversary . . . 19
          Joffroy Beauquier and   
      Thomas Hérault and   
                  Elad Schiller   Easy Stabilization with an Agent . . . . 35
              Jorge A. Cobb and   
               Mohamed G. Gouda   Stabilization of Routing in Directed
                                  Networks . . . . . . . . . . . . . . . . 51
               Shlomi Dolev and   
                     Ted Herman   Dijkstra's Self-Stabilizing Algorithm in
                                  Unsupportive Environments  . . . . . . . 67
               Shlomi Dolev and   
                  Elad Schiller   Communication Adaptive Self-Stabilizing
                                  Group Membership Service (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 82
      Felix C. Gärtner and   
                 Stefan Pleisch   (Im)Possibilities of Predicate Detection
                                  in Crash-Affected Systems  . . . . . . . 98
               Mohamed G. Gouda   The Theory of Weak Stabilization . . . . 114
           Mohamed G. Gouda and   
            Chin-Tser Huang and   
                    Anish Arora   On the Security and Vulnerability of
                                  PING . . . . . . . . . . . . . . . . . . 124
               Rachid Hadid and   
                Vincent Villain   A New Efficient Tool for the Design of
                                  Self-Stabilizing $ \ell $-Exclusion
                                  Algorithms: The Controller . . . . . . . 136--151
                 Ted Herman and   
            Toshimitsu Masuzawa   Self-Stabilizing Agent Traversal . . . . 152
                 Ted Herman and   
                  Imran Pirwani   A Composite Stabilizing Data Structure   167
        Sandeep S. Kulkarni and   
                       Ravikant   Stabilizing Causal Deterministic Merge   183--199
                   Franck Petit   Fast Self-Stabilizing Depth-First Token
                                  Circulation  . . . . . . . . . . . . . . 200
       Sébastien Tixeuil   On a Space-Optimal Distributed Traversal
                                  Algorithm  . . . . . . . . . . . . . . . 216
                      Anonymous   Author Index . . . . . . . . . . . . . . 229


Lecture Notes in Computer Science
Volume 2195, 2001

             Noboru Kamijoh and   
             Tadanobu Inoue and   
       Kohichiroh Kishimoto and   
                   Ken Tamagawa   Linux Watch: Hardware Platform for
                                  Wearable Computing Research  . . . . . . 1
                Ryoko Ueoka and   
           Michitaka Hirose and   
                 Kengo Kuma and   
                Michie Sone and   
             Kenji Kohiyama and   
          Tomohiro Kawamura and   
               Kenichiro Hiroto   Wearable Computer Application for Open
                                  Air Exhibition in EXPO 2005  . . . . . . 8
            Kiyoharu Aizawa and   
         Kenichiro Ishijima and   
                  Makoto Shiina   Automatic Summarization of Wearable
                                  Video --- Indexing Subjective Interest   16
         Tatsuyuki Kawamura and   
              Yasuyuki Kono and   
               Masatsugu Kidode   A Novel Video Retrieval Method to
                                  Support a User's Recollection of Past
                                  Events Aiming for Wearable Information
                                  Playing  . . . . . . . . . . . . . . . . 24
                Tetsuro Ogi and   
              Koji Yamamoto and   
              Toshio Yamada and   
               Michitaka Hirose   Experience of Immersive Virtual World
                                  Using Cellular Phone Interface . . . . . 32
             Takeshi Kurata and   
              Takashi Okuma and   
          Masakatsu Kourogi and   
              Takekazu Kato and   
               Katsuhiko Sakaue   VizWear: Toward Human-Centered
                                  Interaction through Wearable Vision and
                                  Visualization  . . . . . . . . . . . . . 40
                 Haizhou Ai and   
               Luhong Liang and   
                 Xipan Xiao and   
                    Guangyou Xu   Face Indexing and Retrieval in Personal
                                  Digital Album  . . . . . . . . . . . . . 48
                 K. Idrissi and   
                  J. Ricard and   
                A. Anwander and   
                     A. Baskurt   An Image Retrieval System Based on Local
                                  and Global Color Descriptions  . . . . . 55
                 Dong Zhang and   
                     Wei Qi and   
               Hong Jiang Zhang   A New Shot Boundary Detection Algorithm  63
                      P. Wu and   
            B. S. Manjunath and   
              S. Chandrasekaran   An Adaptive Index Structure for
                                  High-Dimensional Similarity Search . . . 71
              Wensheng Zhou and   
                     Son K. Dao   Combining Hierarchical Classifiers with
                                  Video Semantic Indexing Systems  . . . . 78
              Wang Xing Guo and   
                 Liu Ji Lin and   
              Wei Guo Zheng and   
                         Ishfaq   Mismatch MB Retrieval for MPEG-2 to
                                  MPEG-4 Transcoding . . . . . . . . . . . 86--93
              Dongyang Long and   
                     Weijia Jia   On the Optimal Coding  . . . . . . . . . 94
                    Yang Yu and   
                    Xuelong Zhu   Dynamic Multi-reference Prediction in
                                  Video Coding for Improved Error
                                  Resilience over Internet . . . . . . . . 102
               Duan-Yu Chen and   
                    Suh-Yin Lee   Motion-Based Semantic Event Detection
                                  for Video Content Description in MPEG-7  110
                     Yan Lu and   
                    Wen Gao and   
                        Feng Wu   Fast and Robust Sprite Generation for
                                  MPEG-4 Video Coding  . . . . . . . . . . 118
              Shin-Wei Yang and   
            Chung-Neng Wang and   
                Chi-Min Liu and   
                   Tihao Chiang   Fast Motion Estimation Using $N$-Queen
                                  Pixel Decimation . . . . . . . . . . . . 126
            Chung-Neng Wang and   
                Chi-Min Liu and   
                   Tihao Chiang   Improved MPEG-4 Visual Texture Coding
                                  Using Perceptual Dithering for
                                  Transparent Image Coding . . . . . . . . 134
          Anthony G. Nguyen and   
                Jenq-Neng Hwang   SPEM Rate Control  . . . . . . . . . . . 142
                Chunli Wang and   
                    Wen Gao and   
                   Zhaoguo Xuan   A Real-Time Large Vocabulary Continuous
                                  Recognition System for Chinese Sign
                                  Language . . . . . . . . . . . . . . . . 150
               Dongmei Wang and   
           Russell M. Mersereau   Object Modeling, Coding, and
                                  Transmission for Multimedia
                                  Communications . . . . . . . . . . . . . 158
           Hideki Tanahashi and   
                Caihua Wang and   
             Yoshinori Niwa and   
              Kazuhiko Yamamoto   Live Events Accessing for Multi-users
                                  with Free Viewpoints Using Stereo
                                  Omni-directional System  . . . . . . . . 166
              Tian-Shu Wang and   
           Heung-Yeung Shum and   
               Ying-Qing Xu and   
                 Nan-Ning Zheng   Unsupervised Analysis of Human Gestures  174
                    Fan Lin and   
                 Liu Wenyin and   
                 Zheng Chen and   
            Hongjiang Zhang and   
                      Tang Long   User Modeling for Efficient Use of
                                  Multimedia Files . . . . . . . . . . . . 182
             Young-Kee Jung and   
                     Yo-Sung Ho   A Feature-Based Vehicle Tracking System
                                  in Congested Traffic Video Sequences . . 190
                    Ying Li and   
                  C.-C. Jay Kuo   Movie Event Detection by Using Audio
                                  Visual Information . . . . . . . . . . . 198
                Peizhong Lu and   
                        Lide Wu   Double Hierarchical Algorithm for Video
                                  Mosaics  . . . . . . . . . . . . . . . . 206
              Ming-Gang Liu and   
                  Chao-Huan Hou   Automatic Segmentation and Tracking of
                                  Moving Objects . . . . . . . . . . . . . 214
             Xiangrong Chen and   
                Hongjiang Zhang   Text Area Detection from Video Frames    222
                  Yong Wang and   
                   Jiang Li and   
                   Kun Zhou and   
               Heung-Yeung Shum   Interacting with $3$D Graphic Objects in
                                  an Image-Based Environment . . . . . . . 229
            Yea-Shuan Huang and   
              Yao-Hong Tsai and   
                  Jun-Wei Shieh   Robust Face Recognition with Light
                                  Compensation . . . . . . . . . . . . . . 237
              Yao-Jen Chang and   
                Yung-Chang Chen   Robust Head Pose Estimation Using
                                  Textured Polygonal Model with Local
                                  Correlation Measure  . . . . . . . . . . 245
                   Feng Xie and   
                Guangyou Xu and   
                   Eckart Hundt   A Face Verification Algorithm
                                  Integrating Geometrical and Template
                                  Features . . . . . . . . . . . . . . . . 253
                   Bo Zhang and   
                 Changbo Hu and   
              Qingsheng Cai and   
                Baining Guo and   
                     Harry Shum   E-Partner: a Photo-Realistic
                                  Conversation Agent . . . . . . . . . . . 261
                Zicheng Liu and   
             Zhengyou Zhang and   
               Dennis Adler and   
                Erik Hanson and   
                  Michael Cohen   A Robust and Fast Face Modeling System   269
                Kwan-Ho Lin and   
                Baofeng Guo and   
                Kin-Man Lam and   
                    Wan-Chi Siu   Automatic Human Face Recognition System
                                  Using Fractal Dimension and Modified
                                  Hausdorff Distance . . . . . . . . . . . 277
            Jiann-Jone Chen and   
               Cheng-Yi Liu and   
            Yea-Shuan Huang and   
                  Jun-Wei Hsieh   Similarity Retrieval in Image Databases
                                  by Boosted Common Shape Features Among
                                  Query Images . . . . . . . . . . . . . . 285
                 Huizhen Yu and   
             W. Eric L. Grimson   Combining Configurational and
                                  Statistical Approaches in Image
                                  Retrieval  . . . . . . . . . . . . . . . 293
             Pei-Yuan Huang and   
                 Long-Wen Chang   Digital Image Coding with Hybrid Wavelet
                                  Packet Transform . . . . . . . . . . . . 301
               Chih-Yi Chiu and   
              Hsin-Chih Lin and   
                  Shi-Nine Yang   Texture Retrieval with Linguistic
                                  Descriptions . . . . . . . . . . . . . . 308
                   Chi-Syan Lin   Implementation of the Virtual School:
                                  Best Cyber Academy . . . . . . . . . . . 316
        Jihn-Chang J. Jehng and   
                  Jia-Sheng Heh   Applying Process Improvement Approach to
                                  the Design and Development of a
                                  Multimedia-Based Training Management
                                  System . . . . . . . . . . . . . . . . . 324
                   Dong Wei and   
                  Nirwan Ansari   IP Traffic Monitoring: An Overview and
                                  Future Considerations  . . . . . . . . . 335
              G. R. Joubert and   
                         O. Kao   Efficient Dynamic Image Retrieval Using
                                  the Á Trous Wavelet Transformation  . . . 343
               Sagarmay Deb and   
                  Yanchun Zhang   Image Retrieval in Multimedia with
                                  Emergence Index  . . . . . . . . . . . . 351
               Chi-wai Fung and   
                        Qing Li   Efficient Multimedia Database Indexing
                                  Using Structural Join Index Hierarchy    359
            Jiung-Yao Huang and   
               Lawrence Y. Deng   Modeling of the HLA-Based Simulation
                                  System . . . . . . . . . . . . . . . . . 367
               Jen-Wen Ding and   
             Yueh-Min Huang and   
                Cheng-Chung Chu   An End-to-End Delivery Scheme for Robust
                                  Video Streaming  . . . . . . . . . . . . 375
              Jana Dittmann and   
               Enrico Hauer and   
            Claus Vielhauer and   
          Jörg Schwenk and   
                       Eva Saar   Customer Identification for MPEG Video
                                  Based on Digital Fingerprinting  . . . . 383
                Shuichi Shimizu   Performance Analysis of Data Hiding  . . 391
                Chaur-Chin Chen   Data Encryption Using MRF with an RSA
                                  Key  . . . . . . . . . . . . . . . . . . 399
                 Y. J. Song and   
                  R. Z. Liu and   
                      T. N. Tan   Digital Watermarking for Forgery
                                  Detection in Printed Materials . . . . . 403
            I. Wiseto Agung and   
                  Peter Sweeney   Improvement and Comments on Image
                                  Watermarking Using Complementary
                                  Modulation . . . . . . . . . . . . . . . 411
           Peter Bergström   An Eye-Movement Controlled Wavelet Based
                                  Image Coder  . . . . . . . . . . . . . . 418
                   Yuwen He and   
                Xuejun Zhao and   
              Shiqiang Yang and   
                   Yuzhuo Zhong   Variable Frame-Rate Video Coding Based
                                  on Global Motion Analysis  . . . . . . . 426
           Daniel P. K. Lun and   
           Tommy C. L. Chan and   
                T. C. Hsung and   
                  David D. Feng   Efficient Blind Image Restoration Based
                                  on $1$-D Generalized Cross Validation    434
                   Ta-Te Lu and   
                Kuo-Wei Wen and   
                  Pao-Chi Chang   Block Reordering Wavelet Packet SPIHT
                                  Image Coding . . . . . . . . . . . . . . 442
                Xinding Sun and   
             Ajay Divakaran and   
                B. S. Manjunath   A Motion Activity Descriptor and Its
                                  Extraction in Compressed Domain  . . . . 450
                  Jian Wang and   
                 Chang Wen Chen   A Fast and Effective Block-Matching
                                  Error Concealment Scheme . . . . . . . . 458
                   Shan Liu and   
                JongWon Kim and   
                  C.-C. Jay Kuo   Bit Allocation for Video Coding with
                                  Temporal-Spatial Tradeoff  . . . . . . . 466
               Shyhwei Teng and   
                      Guojun Lu   An Evaluation of the Robustness of Image
                                  Retrieval Based on Vector Quantization   474
                   Jun Yang and   
             Yueting Zhuang and   
                        Qing Li   Search for Multi-modality Data in
                                  Digital Libraries  . . . . . . . . . . . 482
                 C. M. Chew and   
              M. S. Kankanhalli   Compressed Domain Summarization of
                                  Digital Video  . . . . . . . . . . . . . 490
              Weiqiang Wang and   
                        Wen Gao   Automatic Segmentation of News Items
                                  Based on Video and Audio Features  . . . 498
                     Yin Xu and   
                    Yujin Zhang   Association Feedback: a Novel Tool for
                                  Feature Elements Based Image Retrieval   506
           Colin C. Venters and   
         Richard J. Hartley and   
          Matthew D. Cooper and   
              William T. Hewitt   Query by Visual Example: Assessing the
                                  Usability of Content-Based Image
                                  Retrieval System User Interfaces . . . . 514
                    Lei Zhu and   
                 Chung Tang and   
                   Aidong Zhang   Using Keyblock Statistics to Model Image
                                  Retrieval  . . . . . . . . . . . . . . . 522
                Yongwei Zhu and   
       Mohan S. Kankanhalli and   
                  Changsheng Xu   Pitch Tracking and Melody Slope Matching
                                  for Song Retrieval . . . . . . . . . . . 530
            Simon Moncrieff and   
               Chitra Dorai and   
               Svetha Venkatesh   Analysis of Environmental Sounds as
                                  Indexical Signs in Film  . . . . . . . . 538
                  H. S. Lam and   
                    Tan Lee and   
                    P. C. Ching   A Low Missing Rate Audio Search
                                  Technique for Cantonese Radio Broadcast
                                  Recording  . . . . . . . . . . . . . . . 546
                    Feng Yu and   
                 Eric Chang and   
                Yingqing Xu and   
               Heung-Yeung Shum   Emotion Detection from Speech to Enrich
                                  Multimedia Content . . . . . . . . . . . 550
             Yong Woon Park and   
              Keon Hyo Baek and   
                  Ki Dong Chung   Proxy Caching Based on Patching Scheme
                                  and Prefetching  . . . . . . . . . . . . 558
                     Hu Yan and   
                Zhang Guangzhao   A Stateless Active Queue Management
                                  Scheme for Approximating Fair Bandwidth
                                  Allocation and Stabilized Buffer
                                  Occupation . . . . . . . . . . . . . . . 566
               Shinji Osada and   
                 Hiroaki Higaki   QoS-Based Checkpoint Protocol for
                                  Multimedia Network Systems . . . . . . . 574
           Chung-Ming Huang and   
              Pei-Chuan Liu and   
                   Pi-Fung Shih   An Interactive Audio and Video Station
                                  over Internet  . . . . . . . . . . . . . 582
       Jyh-Shing Roger Jang and   
                Hong-Ru Lee and   
                   Chia-Hui Yeh   Query by Tapping: a New Paradigm for
                                  Content-Based Music Retrieval from
                                  Acoustic Input . . . . . . . . . . . . . 590
             Chung-Hsien Wu and   
              Yu-Hsien Chiu and   
                 Kung-Wei Cheng   Multi-modal Sign Icon Retrieval for
                                  Augmentative Communication . . . . . . . 598
              Hsin-min Wang and   
                    Berlin Chen   Comparison of Word and Subword Indexing
                                  Techniques for Mandarin Chinese Spoken
                                  Document Retrieval . . . . . . . . . . . 606
           Chien-Kang Huang and   
             Lee-Feng Chien and   
                  Yen-Jen Oyang   Interactive Web Multimedia Search Using
                                  Query-Session-Based Query Expansion  . . 614
             Han-Chieh Chao and   
                  Y. M. Chu and   
                    T. G. Tsuei   Codec Schemes Selection for Wireless
                                  Voice over IP (VoIP) . . . . . . . . . . 622
          T. Brandão and   
               M. P. Queluz and   
                   A. Rodrigues   On the Use of Error Correction Codes in
                                  Spread Spectrum Based Image Watermarking 630
                 Jin S. Seo and   
                   Chang D. Yoo   Correlation Detection of Asymmetric
                                  Watermark  . . . . . . . . . . . . . . . 638
              M. Monsignori and   
                    P. Nesi and   
                    M. B. Spinu   Watermarking Music Sheets  . . . . . . . 646
           Shaou-Gang Miaou and   
            Tzung-Shian Lee and   
                 Chih-Ming Chen   BCH Coded Watermarks for Error-Prone
                                  Transmission of MPEG Video . . . . . . . 654
                 Weikai Xie and   
               Yuanchun Shi and   
                 Guanyou Xu and   
                       Dong Xie   Smart Classroom --- An Intelligent
                                  Environment for Tele-education . . . . . 662
                Wenli Zhang and   
         Yoshitomo Yaginuma and   
                 Masao Sakauchi   Movie Video Hypermedia Authoring System  669
                 Frank Wang and   
                 Grace Lian and   
                     Jeff Zheng   Design Considerations for the Video
                                  Analyzer SDK . . . . . . . . . . . . . . 677
                    Fang Yu and   
                 Qian Zhang and   
                  Wenwu Zhu and   
                   Ya-Qin Zhang   Network-Adaptive Cache Management
                                  Schemes for Mixed Media  . . . . . . . . 685
                GuiJin Wang and   
                   Xinggang Lin   Robust Scalable Image Transmission over
                                  Wireless Fading Channel  . . . . . . . . 693
            Hsiang-Ren Shih and   
             Chun-Liang Hou and   
                I-Chieh Lin and   
                   Shie-Jue Lee   A Dynamic Regulation with Scheduler
                                  Feedback Information for Multimedia
                                  Networks . . . . . . . . . . . . . . . . 700
                 Huadong Ma and   
                   Kang G. Shin   A New Scheduling Scheme for Multicast
                                  True VoD Service . . . . . . . . . . . . 708
                  Yunnan Wu and   
              Anthony Vetro and   
                Huifang Sun and   
                     S.-Y. Kung   Intelligent Multi-hop Video
                                  Communications . . . . . . . . . . . . . 716
                   Pin Liao and   
                    Wen Gao and   
                    Li Shen and   
                 Xilin Chen and   
              Shiguang Shan and   
                   Wenbing Zeng   Classification of Facial Images Using
                                  Gaussian Mixture Models  . . . . . . . . 724
                 B. C. Song and   
                  M. J. Kim and   
                       J. B. Ra   A Fast Descriptor Matching Algorithm for
                                  Exhaustive Search in Large Databases . . 732
                  Fang Qian and   
                  Lei Zhang and   
                 Fuzong Lin and   
                       Bo Zhang   FBCC: An Image Similarity Algorithm
                                  Based on Regions . . . . . . . . . . . . 740
               Ji Hwan Park and   
              Sook Ee Jeong and   
                      Young Huh   A New Digital Watermarking for Text
                                  Document Images Using Diagonal Profile   748
                Hyun-Ju Lee and   
               Yong-Jae Lee and   
                   Chil-Woo Lee   Gesture Classification and Recognition
                                  Using Principal Component Analysis and
                                  HMM  . . . . . . . . . . . . . . . . . . 756
               Wai-Pak Choi and   
                Kin-Man Lam and   
                    Wan-Chi Siu   A Robust Line-Feature-Based Hausdorff
                                  Distance for Shape Matching  . . . . . . 764
              Changsheng Xu and   
           David Dagan Feng and   
                    Yongwei Zhu   Copyright Protection for WAV-Table
                                  Synthesis Audio Using Digital
                                  Watermarking . . . . . . . . . . . . . . 772
                Xiaochen Bo and   
              Lincheng Shen and   
                   Wensen Chang   Sign Correlation Detector for Blind
                                  Image Watermarking in the DCT Domain . . 780
                K. H. Leung and   
                      Bing Zeng   Wavelet-Domain Image Watermarking Based
                                  on Statistical Metrics . . . . . . . . . 788
                   Yuichi Nakai   Semi Fragile Watermarking Based on
                                  Wavelet Transform  . . . . . . . . . . . 796
            Chin-Chen Chang and   
             Jyh-Chiang Yeh and   
                  Ju-Yuan Hsiao   A Novel Scheme for Securing Image
                                  Steganography  . . . . . . . . . . . . . 804
               Minghua Chen and   
                         Yun He   A Synchronous Fragile Watermarking
                                  Scheme for Erroneous Q--DCT Coefficients
                                  Detection  . . . . . . . . . . . . . . . 812
                 C. C. Shih and   
                 H. R. Tyan and   
                H. Y. Mark Liao   Shot Change Detection Based on the
                                  Reynolds Transport Theorem . . . . . . . 819
           Shui-Lung Chuang and   
             Lee-Feng Chien and   
                  Hsiao-Tieh Pu   Automatic Subject Categorization of
                                  Query Terms for Filtering Sensitive
                                  Queries in Multimedia Search . . . . . . 825
            Chin-Chen Chang and   
            Chi-Shiang Chan and   
                  Ju-Yuan Hsiao   A Color Image Retrieval Method Based on
                                  Local Histogram  . . . . . . . . . . . . 831
               Jianping Fan and   
               Xingquan Zhu and   
                        Lide Wu   Seeded Semantic Object Generation toward
                                  Content-Based Video Indexing . . . . . . 837
               Xingquan Zhu and   
                    Lide Wu and   
              Xiangyang Xue and   
                  Xiaoye Lu and   
                   Jianping Fan   Automatic Scene Detection in News
                                  Program by Integrating Visual Feature
                                  and Rules  . . . . . . . . . . . . . . . 843
              Hans Shui-Hua and   
                  Lu Zheng-Ding   Shape Retrieval by Hierarchical
                                  Evolution  . . . . . . . . . . . . . . . 849
            Dengsheng Zhang and   
                      Guojun Lu   A Comparison of Shape Retrieval Using
                                  Fourier Descriptors and Short-Time
                                  Fourier Descriptors  . . . . . . . . . . 855
               Kathy Cheung and   
                 Cindy Hung and   
                  C. W. Kok and   
                    Mansun Chan   A SMIL Browser with an Enhanced Image,
                                  Audio and Video Effect Library for
                                  Multimedia Rich Presentations  . . . . . 861
                 Jiayi Chen and   
                   Tele Tan and   
                Philippe Mulhem   A Method for Photograph Indexing Using
                                  Speech Annotation  . . . . . . . . . . . 867
              WeiQiang Wang and   
                        Wen Gao   A Fast Anchor Shot Detection Algorithm
                                  on Compressed Video  . . . . . . . . . . 873
              Young-tae Kim and   
                Jae-Gon Kim and   
            Hyun Sung Chang and   
              Kyeongok Kang and   
                   Jinwoong Kim   Content-Based News Video Retrieval with
                                  Closed Captions and Time Alignment . . . 879
               Feng Yahzong and   
             Zhuang Yueting and   
                      Pan Yunhe   Query Similar Music by Correlation
                                  Degree . . . . . . . . . . . . . . . . . 885
                 Berna Erol and   
              Faouzi Kossentini   Color Content Matching of MPEG-4 Video
                                  Objects  . . . . . . . . . . . . . . . . 891
              Jun-Wei Hsieh and   
                L. W. Huang and   
                Yea-Shuan Huang   Multiple-Person Tracking System for
                                  Content Analysis . . . . . . . . . . . . 897
               Kunio Yamada and   
            Kenji Mochizuki and   
            Kiyoharu Aizawa and   
                 Takahiro Saito   Motion Segmentation with Census
                                  Transform  . . . . . . . . . . . . . . . 903
           Jong Myeon Jeong and   
                Young Shik Moon   Efficient Algorithms for Motion Based
                                  Video Retireval  . . . . . . . . . . . . 909
                         G. Qiu   Content-Based Retrieval on the
                                  Compressed Domain of $ 2^{\rm nd} $
                                  Generation Image Coding  . . . . . . . . 915
                     G. Qiu and   
                    S. Sudirman   Retrieving Landscape Images Using Scene
                                  Structural Matrix  . . . . . . . . . . . 921
              Chun-Shien Lu and   
            Hong-Yuan Mark Liao   Digital Watermarking: a Communications
                                  with Side Information Perspective  . . . 927
              Xiangwei Kong and   
                     Yu Liu and   
                    Huajian Liu   Adaptive Video Watermarking Scheme . . . 933
                   Li Qiang and   
                Cui Huijuan and   
                       Tang Kun   An Error Resilience Algorithm for
                                  H.263++ Based Video Coding . . . . . . . 939
                    Bin Qiu and   
                 Xiaoxiang Guan   A Predictive Connection Admission
                                  Control Scheme for QoS Improvement . . . 945
           Keun-hyeong Park and   
               Chul Soo Lee and   
                  HyunWook Park   A Multiresolutional Coding Method Based
                                  on SPIHT . . . . . . . . . . . . . . . . 951
                 Debin Zhao and   
                    Wen Gao and   
              Shiguang Shan and   
                     Y. K. Chan   LLEC: An Image Coder with Low-Complexity
                                  and Low-Memory Requirement . . . . . . . 957
          Chwei-Shyong Tsai and   
                Chin-Chen Chang   A Generalized Secret Image Sharing and
                                  Recovery Scheme  . . . . . . . . . . . . 963
               Jiaoying Shi and   
                    Kaixiang Yi   New Semi-fragile Authentication
                                  Watermarking . . . . . . . . . . . . . . 969
                    Yong Hu and   
                Chang-sheng Xie   Performance Analysis of Video Storage
                                  Based on Clustered NAS Architecture  . . 975
                 Weimin Liu and   
                     Huadong Ma   Modeling Video-on-Demand System in
                                  Temporal Logic . . . . . . . . . . . . . 983
               Zhiyong Wang and   
                  Zheru Chi and   
                 Dagan Feng and   
                      S. Y. Cho   Adaptive Processing of Tree-Structure
                                  Image Representation . . . . . . . . . . 989
               Yongwon Jang and   
                 Intaek Kim and   
               Hwan Il Kang and   
                 Kab Il Kim and   
                  Seung-Soo Han   Blind Watermarking Algorithm Using
                                  Complex Block Selection Method . . . . . 996
           P. L. Montessoro and   
              D. Pierattoni and   
                 D. Cortolezzis   MTEACH: a Language-Based Framework for
                                  Didactic Multimedia Production . . . . . 1002
              Siu-Ping Chan and   
                    Chi-Wah Kok   Protocol and Buffer Design for
                                  Multimedia-on-Demand System  . . . . . . 1010
                 Zhibo Chen and   
                         Yun He   Quality Weighted Bit Allocation for
                                  Smoother Streaming of Stored FGS Video   1016
                  Guohui Li and   
                  Jun Zhang and   
                      Defeng Wu   A Content-Based Multimedia Database
                                  Engine: MIR  . . . . . . . . . . . . . . 1024
              Sofia Tzelepi and   
                George Pangalos   A Flexible Access Control Model for
                                  Multimedia Medical Image Security  . . . 1030
                Zhaohui Cai and   
                T. H. Cheng and   
                        Chao Lu   Joint Source/Channel Coding Using Turbo
                                  Trellis Codes  . . . . . . . . . . . . . 1036
              Mei-Ling Shyu and   
             Shu-Ching Chen and   
                     Hongli Luo   An Adaptive Optimal Multimedia Network
                                  Transmission Control Scheme  . . . . . . 1042
     Alireza Nasiri Avanaki and   
           Babak Hamidzadeh and   
              Faouzi Kossentini   Effects of Sampling Rate and Pose Error
                                  on Volume Reconstruction by Space
                                  Carving  . . . . . . . . . . . . . . . . 1048
                Weijun Chen and   
                 Fuzong Lin and   
                 Jianmin Li and   
                       Bo Zhang   A Tree-Based Model of Prosodic Phrasing
                                  for Chinese Text-to-Speech Systems . . . 1054
               Peng Zhenyun and   
                   Hong Wei and   
               Liang Luhong and   
                Xu Guangyou and   
                 Zhang Hongjian   Detecting Facial Features on Image
                                  Sequences Using Cross--Verification
                                  Mechanism  . . . . . . . . . . . . . . . 1060
               Hanfeng Chen and   
               Yiqiang Zhan and   
                       Feihu Qi   Rapid Object Tracking on Compressed
                                  Video  . . . . . . . . . . . . . . . . . 1066
               Si-Yong Park and   
              Seung-Ho Park and   
                  Ki-Dong Chung   Design and Implementation of the
                                  Multimedia Cluster System Based on VIA   1072
            Chin-Chen Chang and   
               Shu-Kai Yang and   
               JunWei Hsieh and   
             Ding-Zhou Duan and   
                   Ming-Fen Lin   A Fuzzy Inference System for Simplifying
                                  Surfaces with Color  . . . . . . . . . . 1078
                Suk-Han Lam and   
                    Chi-Wah Kok   Demosaic: Color Filter Array
                                  Interpolation for Digital Cameras  . . . 1084
                    Hua Cai and   
                      Bing Zeng   Object-Based Classification of
                                  Mixed-Mode Images  . . . . . . . . . . . 1090
              Shiguang Shan and   
                    Wen Gao and   
                 Xilin Chen and   
                     Bo Cao and   
                    Wenbin Zeng   A Face-Unlock Screen Saver by Using Face
                                  Verification Based on Identity-Specific
                                  Subspaces  . . . . . . . . . . . . . . . 1096
              Won-Young Yoo and   
                  Joonwhoan Lee   Analysis of Camera Operations in MPEG
                                  Compressed Domain Based on Generalized
                                  Hough Transform  . . . . . . . . . . . . 1102
               Yiqiang Chen and   
                    Wen Gao and   
                Zhaoqi Wang and   
                         Li Zuo   Speech Driven MPEG-4 Based Face
                                  Animation via Neural Network . . . . . . 1108
               Kam-Fai Chan and   
                    Chi-Wah Kok   Mesh Simplification by Vertex Cluster
                                  Contraction  . . . . . . . . . . . . . . 1114
                Xiujuan Gao and   
                Hongxun Yao and   
                    Wen Gao and   
                       Wei Zeng   Fusion of Biometrics Based on D--S
                                  Theory . . . . . . . . . . . . . . . . . 1120
                  Chenyu Wu and   
                     Ce Liu and   
                       Jie Zhou   Eyeglasses Verification by Support
                                  Vector Machine . . . . . . . . . . . . . 1126
                  K. K. Yiu and   
                  M. W. Mak and   
                     S. Y. Kung   A GMM-Based Handset Selector for Channel
                                  Mismatch Compensation with Applications
                                  to Speaker Identification  . . . . . . . 1132
          Yan Li Liu Wenyin and   
               Heung-Yeung Shum   Performance Evaluation of $2$D Feature
                                  Tracking Based on Bayesian Estimation    1138
                      Anonymous   Author Index . . . . . . . . . . . . . . 1145


Lecture Notes in Computer Science
Volume 2196, 2001

            Krzysztof Czarnecki   Generative Programming and Software
                                  System Families  . . . . . . . . . . . . 1
                     Tim Sheard   Accomplishments and Research Challenges
                                  in Meta-programming  . . . . . . . . . . 2
                  Mitchell Wand   A Semantics for Advice and Dynamic Join
                                  Points in Aspect-Oriented Programming    45
                Patricia Johann   Short Cut Fusion: Proved and Improved    47
                Isao Sasano and   
               Zhenjiang Hu and   
                Masato Takeichi   Generation of Efficient Programs for
                                  Solving Maximum Multi-marking Problems   72
              Daniel Damian and   
                  Olivier Danvy   Static Transition Compression  . . . . . 92
              Olivier Danvy and   
             Bernd Grobauer and   
                  Morten Rhiger   A Unifying Approach to Goal-Directed
                                  Evaluation . . . . . . . . . . . . . . . 108
                   Kenichi Asai   Integrating Partial Evaluators into
                                  Interpreters . . . . . . . . . . . . . . 126
                 David Wakeling   A Design Methodology for Functional
                                  Programs . . . . . . . . . . . . . . . . 146
              Bill Harrison and   
                     Tim Sheard   Dynamically Adaptable Software with
                                  Metacomputations in a Staged Language    163
          Gianluigi Ferrari and   
              Eugenio Moggi and   
               Rosario Pugliese   MetaKlaim: Meta-programming for Global
                                  Computing  . . . . . . . . . . . . . . . 183
      Christoph A. Herrmann and   
             Christian Lengauer   A Transformational Approach which
                                  Combines Size Inference and Program
                                  Optimization . . . . . . . . . . . . . . 199
                      Anonymous   Author Index . . . . . . . . . . . . . . 219


Lecture Notes in Computer Science
Volume 2197, 2001

            Eric Badiqué   Under Construction in Europe: Virtual
                                  and Mixed Reality for a Rich Media
                                  Experience . . . . . . . . . . . . . . . 3
          Jean-Christophe Nebel   Generation of True $3$D Films  . . . . . 10
               David Murphy and   
                       Ian Pitt   Spatial Sound Enhancing Virtual Story
                                  Telling  . . . . . . . . . . . . . . . . 20
              Olivier Balet and   
                 Paul Kafno and   
                Fred Jordan and   
            Tony Polichroniadis   The VISIONS Project  . . . . . . . . . . 30
    Pierre-Alexandre Favier and   
             Pierre De Loor and   
                Jacques Tisseau   Programming Agent with Purposes:
                                  Application to Autonomous Shooting in
                                  Virtual Environment  . . . . . . . . . . 40
                 Alok Nandi and   
                Xavier Marichal   Interactive Immersive Transfiction . . . 44
                Andrew Glassner   Interactive Storytelling: People,
                                  Stories, and Games . . . . . . . . . . . 51
          Massimo Zancanaro and   
     Alessandro Cappelletti and   
          Claudio Signorini and   
              Carlo Strapparava   An Authoring Tool for Intelligent
                                  Educational Games  . . . . . . . . . . . 61
         Nikitas M. Sgouros and   
                Sophia Kousidou   Generation and Implementation of
                                  Mixed-Reality, Narrative Performances
                                  Involving Robotic Actors . . . . . . . . 69
                Andy Clarke and   
                Grethe Mitchell   Film and the Development of Interactive
                                  Narrative  . . . . . . . . . . . . . . . 81
                  Clive Fencott   Virtual Storytelling as Narrative
                                  Potential: Towards an Ecology of
                                  Narrative  . . . . . . . . . . . . . . . 90
                Jay Douglas and   
                Jonathan Gratch   Adaptive Narrative: How Autonomous
                                  Agents, Hollywood, and Multiprocessing
                                  Operating Systems Can Live Happily Ever
                                  After  . . . . . . . . . . . . . . . . . 100
              Bruce M. Blumberg   Learning in Character: Building
                                  Autonomous Animated Characters That
                                  Learn What They Ought to Learn . . . . . 113
             Isabel Machado and   
                  Ana Paiva and   
                      Paul Brna   Real Characters in Virtual Stories . . . 127
                     Eric Menou   Real-Time Character Animation Using
                                  Multi-layered Scripts and Spacetime
                                  Optimization . . . . . . . . . . . . . . 135
               Marc Cavazza and   
               Fred Charles and   
                 Steven J. Mead   Characters in Search of an Author:
                                  AI-Based Virtual Storytelling  . . . . . 145
                Eric Maffre and   
            Jacques Tisseau and   
           Marc Parenthoën   Virtual Agents' Self-Perception in Story
                                  Telling  . . . . . . . . . . . . . . . . 155
                     Paul Kafno   Reflections from a Hobby Horse . . . . . 161
           Beno\^\it Labaye and   
        Nadia Guérin and   
       Sébastien Dohogne   DocToon\copyright --- A Mediator in the
                                  Hospital of the XXIst Century  . . . . . 171
                  Maria Roussou   The Interplay between Form, Story, and
                                  History: The Use of Narrative in
                                  Cultural and Educational Virtual Reality 181
        Leonie Schäfer and   
             Wolfgang Prinz and   
             Amanda Oldroyd and   
                   Lesley Gavin   Virtual Storytelling of Cooperative
                                  Activities in a Theatre of Work  . . . . 191
              Ronan Querrec and   
             Pierre Chevaillier   Virtual Storytelling for Training: An
                                  Application to Fire Fighting in
                                  Industrial Environment . . . . . . . . . 201
         Jean-Pierre Jessel and   
      Céline Jaspart and   
            Jean-Jacques Flores   Computer Animation and Virtual Reality
                                  for Live Art Performance . . . . . . . . 205
            Jaroslav Adamec and   
                 Jiri Cizek and   
                Michal Masa and   
             Pascal Silondi and   
              Pavel Smetana and   
                      Jiri Zara   Virtual House of European Culture:
                                  e-AGORA (Electronic Arts for
                                  Geographically Open Real Audience) . . . 208--211
                      Anonymous   Author Index . . . . . . . . . . . . . . 213


Lecture Notes in Computer Science
Volume 2198, 2001

                  Y. Y. Yao and   
                 Ning Zhong and   
                 Jiming Liu and   
                  Setsuo Ohsuga   Web Intelligence (WI)  . . . . . . . . . 1
              James Hendler and   
           Edward A. Feigenbaum   Knowledge Is Power: The Semantic Web
                                  Vision . . . . . . . . . . . . . . . . . 18
                   Nick Cercone   From Computational Intelligence to Web
                                  Intelligence: An Ensemble from Potpourri 30
               W. Lewis Johnson   Pedagogical Agents for Web-Based
                                  Learning . . . . . . . . . . . . . . . . 43
             Riichiro Mizoguchi   Ontological Engineering: Foundation of
                                  the Next Generation Knowledge Processing 44
             Prabhakar Raghavan   Social Networks on the Web and in the
                                  Enterprise . . . . . . . . . . . . . . . 58
             Patrick S. P. Wang   $3$D Object Recognition and
                                  Visualization on the Web . . . . . . . . 61
               Jose Aguilar and   
                    Ernst Leiss   A Web Proxy Cache Coherency and
                                  Replacement Approach . . . . . . . . . . 75
             Chi-Huang Chiu and   
             Kai-Chih Liang and   
                Shyan-Ming Yuan   Content Request Markup Language (CRML):
                                  a Distributed Framework for XML-Based
                                  Content Publishing . . . . . . . . . . . 85
             Richard Jensen and   
                     Qiang Shen   A Rough Set-Aided System for Sorting WWW
                                  Bookmarks  . . . . . . . . . . . . . . . 95
              Yutaka Matsuo and   
               Yukio Ohsawa and   
               Mitsuru Ishizuka   Average-Clicks: a New Measure of
                                  Distance on the World Wide Web . . . . . 106
            Kwok Ching Tsui and   
                 Jiming Liu and   
                     Hiu Lo Liu   Autonomy Oriented Load Balancing in
                                  Proxy Cache Servers  . . . . . . . . . . 115
             Khoo Khyou Bun and   
               Mitsuru Ishizuka   Emerging Topic Tracking System . . . . . 125
                     C. J. Butz   On Axiomatizing Probabilistic
                                  Conditional Independencies in Bayesian
                                  Networks . . . . . . . . . . . . . . . . 131
                 DaeEun Kim and   
                    Sea Woo Kim   Dynamic Expert Group Models for
                                  Recommender Systems  . . . . . . . . . . 136
            Robert McArthur and   
                    Peter Bruza   The ABC's of Online Community  . . . . . 141
                Hongjing Wu and   
                    Paul De Bra   Sufficient Conditions for Well-Behaved
                                  Adaptive Hypermedia Systems  . . . . . . 148
               Vadim Doubrovski   Towards Formal Specification of
                                  Client-Server Interactions for a Wide
                                  Range of Internet Applications . . . . . 153
              Yasuyuki Sumi and   
                     Kenji Mase   Collecting, Visualizing, and Exchanging
                                  Personal Interests and Experiences in
                                  Communities  . . . . . . . . . . . . . . 163
    Alicja A. Wieczorkowska and   
                Zbigniew W. Ras   Audio Content Description in Sound
                                  Databases  . . . . . . . . . . . . . . . 175
               L. Ardissono and   
               A. Felfernig and   
               G. Friedrich and   
                 D. Jannach and   
            R. Schäfer and   
                      M. Zanker   Intelligent Interfaces for Distributed
                                  Web-Based Product and Service
                                  Configuration  . . . . . . . . . . . . . 184
            Sunny S. J. Lin and   
             Eric Z.-F. Liu and   
                M. C. Cheng and   
                     S. M. Yuan   Using Networked Workshop System to
                                  Enhance Creative Design  . . . . . . . . 189
          Naohiro Matsumura and   
               Yukio Ohsawa and   
               Mitsuru Ishizuka   Discovering Seeds of New Interest Spread
                                  from Premature Pages Cited by Multiple
                                  Communities  . . . . . . . . . . . . . . 195
              Koichi Takeda and   
               Hiroshi Nomiyama   Personalized Web Knowledge Management    200
                 Minsoo Lee and   
           Stanley Y. W. Su and   
                     Herman Lam   Event and Rule Services for Achieving a
                                  Web-Based Knowledge Network  . . . . . . 205
      Heiner Stuckenschmidt and   
             Frank van Harmelen   Knowledge-Based Validation, Aggregation,
                                  and Visualization of Meta-data:
                                  Analyzing a Web-Based Information System 217
         W. Sardha Wijesoma and   
                  K. W. Yue and   
                K. L. Chien and   
                     T. K. Chow   Online Handwritten Signature
                                  Verification for Electronic Commerce
                                  over the Internet  . . . . . . . . . . . 227
             Vilas Wuwongse and   
              Kiyoshi Akama and   
        Chutiporn Anutariya and   
         Ekawit Nantajeewarawat   A Data Model for XML Databases . . . . . 237
             Tsunenori Mine and   
             Makoto Amamiya and   
                Teruko Mitamura   Conference Information Management
                                  System: Towards a Personal Assistant
                                  System . . . . . . . . . . . . . . . . . 247
       José Perdigao and   
                Anjula Garg and   
              Thomas Barbas and   
              Stefan Scheer and   
       Giuseppe Mastrangelo and   
                Giovanna Rubino   Automatic Intelligence Gathering from
                                  the Web: a Case Study in Container
                                  Traffic  . . . . . . . . . . . . . . . . 254
                Won Bo Shim and   
                      Seog Park   The Work Concept RBAC Model for the
                                  Access Control of the Distributed Web
                                  Server Environment . . . . . . . . . . . 262
               Kam Fai Wong and   
                 Yat Fan Su and   
              Dongqing Yang and   
                    Shiwei Tang   A New Conceptual Graph Generated
                                  Algorithm for Semi-structured Databases  267
           Chien-Kang Huang and   
              Yen-Jen Oyang and   
                 Lee-Feng Chien   A Contextual Term Suggestion Mechanism
                                  for Interactive Web Search . . . . . . . 272
              Jong Ha Hwang and   
              Keung Hae Lee and   
                  Soochan Hwang   $3$DGML: a $3$-Dimensional Graphic
                                  Information Retrieval System . . . . . . 282
              Vincenzo Loia and   
                   Paolo Luongo   An Evolutionary Approach to Automatic
                                  Web Page Categorization and Updating . . 292
             Makoto Tsukada and   
             Takashi Washio and   
                 Hiroshi Motoda   Automatic Web-Page Classification by
                                  Using Machine Learning Methods . . . . . 303
                 Z. W. Wang and   
                  R. B. Maguire   A Theory and Approach to Improving
                                  Relevance Ranking in Web Retrieval . . . 314
                Keiji Yanai and   
              Masaya Shindo and   
                  Kohei Noshita   A Fast Image-Gathering System on the
                                  World-Wide Web Using a PC Cluster  . . . 324
               Hal D. Brian and   
                  Max H. Garzon   MELISSA: Mobile Electronic LSA Internet
                                  Server Search Agent  . . . . . . . . . . 335
                Rowena Chau and   
                Chung-Hsing Yeh   Construction of a Fuzzy Multilingual
                                  Thesaurus and Its Application to
                                  Cross-Lingual Text Retrieval . . . . . . 340
               Yoojin Chung and   
             Hyuk-Chul Kwon and   
             Sang-Hwa Chung and   
                 Kwang Ryel Ryu   Declustering Web Content Indices for
                                  Parallel Information Retrieval . . . . . 346
              E. Desmontils and   
                     C. Jacquin   Indexing a Web Site to Highlight Its
                                  Content  . . . . . . . . . . . . . . . . 351
                Maria Fasli and   
                 Udo Kruschwitz   Using Implicit Relevance Feedback in a
                                  Web Search Assistant . . . . . . . . . . 356
              Toru Fukumoto and   
                  Kanji Akahori   The Development and Evaluation of an
                                  Integrated Imagery Access Engine . . . . 361
            Kyung-Joong Kim and   
                   Sung-Bae Cho   Conceptual Information Extraction with
                                  Link-Based Search  . . . . . . . . . . . 367
                    Fang Li and   
               Huanye Sheng and   
              Wilhelm Weisweber   World Wide Web --- A Multilingual
                                  Language Resource  . . . . . . . . . . . 373
            Takashi Sakairi and   
               Hiroshi Nomiyama   Query by History Tree Manipulation . . . 379
             Kwang Mong Sim and   
                   Pui Tak Wong   Web-Based Information Retrieval Using
                                  Agent and Ontology . . . . . . . . . . . 384
                 Chunru Wan and   
               Mingchun Liu and   
                      Lipo Wang   Content-Based Sound Retrieval for Web
                                  Application  . . . . . . . . . . . . . . 389
            Katsuhiro Honda and   
           Nobukazu Sugiura and   
         Hidetomo Ichihashi and   
                  Shoichi Araki   Collaborative Filtering Using Principal
                                  Component Analysis and Fuzzy Clustering  394
              Raymond S. T. Lee   i JADE IWShopper: a New Age of
                                  Intelligent Mobile Web Shopping System
                                  Based on Fuzzy-Neuro Agent Technology    403
               J. F. Peters and   
                 S. Ramanna and   
                 A. Skowron and   
                   M. Borkowski   Wireless Agent Guidance of Remote Mobile
                                  Robots: Rough Integral Approach to
                                  Sensor Signal Analysis . . . . . . . . . 413
                Yi-Jia Chen and   
                    Von-Wun Soo   Ontology-Based Information Gathering
                                  Agents . . . . . . . . . . . . . . . . . 423
               Seung-Ik Lee and   
                  Chul Sung and   
                   Sung-Bae Cho   An Effective Conversational Agent with
                                  User Modeling Based on Bayesian Network  428
                     Yuefeng Li   Information Fusion for Intelligent
                                  Agent-Based Information Gathering  . . . 433
               Myungeun Lim and   
                     Juntae Kim   An Adaptive Recommendation System with a
                                  Coordinator Agent  . . . . . . . . . . . 438
             Masayuki Okabe and   
                   Seiji Yamada   Interactive Web Page Filtering with
                                  Relational Learning  . . . . . . . . . . 443
                 S. Vrettos and   
                A. Stafylopatis   A Fuzzy Rule-Based Agent for Web
                                  Retrieval-Filtering  . . . . . . . . . . 448
               Jianchao Han and   
                   Nick Cercone   Implementation Issues and Paradigms of
                                  Visual KDD Systems . . . . . . . . . . . 454
                Ahmad Kayed and   
               Robert M. Colomb   Re-engineering Approach to Build Domain
                                  Ontologies . . . . . . . . . . . . . . . 464
          Naohiro Matsumura and   
               Yukio Ohsawa and   
               Mitsuru Ishizuka   Discovery of Emerging Topics between
                                  Communities on WWW . . . . . . . . . . . 473
                 Qiang Yang and   
        Henry Haining Zhang and   
               Ian T. Y. Li and   
                          Ye Lu   Mining Web Logs to Improve Web Caching
                                  and Prefetching  . . . . . . . . . . . . 483
                  V. Dubois and   
                M. Quafafou and   
                    B. Habegger   Mining Crawled Data and Visualizing
                                  Discovered Knowledge . . . . . . . . . . 493
   Vladimir Estivill-Castro and   
                   Jianhua Yang   Categorizing Visitors Dynamically by
                                  Fast and Robust Clustering of Access
                                  Logs . . . . . . . . . . . . . . . . . . 498
                Rayid Ghani and   
                Rosie Jones and   
                 Dunja Mladenic   Online Learning for Web Query
                                  Generation: Finding Documents Matching a
                                  Minority Concept on the Web  . . . . . . 508
                 Norihiro Ogata   A Formal Ontology Discovery from Web
                                  Documents  . . . . . . . . . . . . . . . 514
           V. Uma Maheswari and   
             Arul Siromoney and   
                   K. M. Mehata   The Variable Precision Rough Set Model
                                  for Web Usage Mining . . . . . . . . . . 520
                 Kaoru Sumi and   
             Riichiro Mizoguchi   Supporting Cooperative Consensus
                                  Formation via Ontologies . . . . . . . . 525
              Kyungsook Han and   
                    Dongkyu Lee   Web-Based Intelligent Call Center for an
                                  Intensive Care Unit  . . . . . . . . . . 530
               Chunnian Liu and   
                  Lei Zheng and   
                Junzhong Ji and   
            Chengzhong Yang and   
                 Jingyue Li and   
                  Wensheng Yang   Electronic Homework on the WWW . . . . . 540
              Markus Stolze and   
           Michael Ströbel   The Shopping Gate --- Enabling Role- and
                                  Preference-Specific E-commerce Shopping
                                  Experiences  . . . . . . . . . . . . . . 549
             Paola Forcheri and   
       Maria Teresa Molfino and   
            Stefano Moretti and   
                Alfonso Quarati   Building Reusable and Adaptable
                                  Web-Based Courses  . . . . . . . . . . . 562
             Atsuo Hazeyama and   
               Akiko Nakako and   
           Sachiko Nakajima and   
                    Keiji Osada   Group Learning Support System for
                                  Software Engineering Education ---
                                  Web-based Collaboration Support between
                                  the Teacher Side and the Student Groups  568
                Junzhong Ji and   
                  Lei Zheng and   
                   Chunnian Liu   The Intelligent Electronic Shopping
                                  System Based on Bayesian Customer
                                  Modeling . . . . . . . . . . . . . . . . 574
                   Sheng-Tun Li   Leveraging a Web-Aware Self-Organization
                                  Map Tool for Clustering and
                                  Visualization  . . . . . . . . . . . . . 579
          Eric Zhi-Feng Liu and   
            Sunny S. J. Lin and   
                Shyan-Ming Yuan   Experiencing NetPeas: Another Way of
                                  Learning . . . . . . . . . . . . . . . . 584
         Hiroyuki Mitsuhara and   
                 Youji Ochi and   
                     Yoneo Yano   ITMS: Individualized Teaching Material
                                  System --- Web-Based Exploratory
                                  Learning Support System by Adaptive
                                  Knowledge Integration  . . . . . . . . . 589
                  Martin Molina   An Intelligent Sales Assistant for
                                  Configurable Products  . . . . . . . . . 596
              Ngoc Thanh Nguyen   Reconciling of Disagreeing Data in
                                  Web-Based Distributed Systems Using
                                  Consensus Methods  . . . . . . . . . . . 601
                 Youji Ochi and   
                 Yoneo Yano and   
                    Riko Wakita   Web Based Digital Resource Library
                                  Tracing Author's Quotation . . . . . . . 606
                      Anonymous   Author Index . . . . . . . . . . . . . . 613


Lecture Notes in Computer Science
Volume 2199, 2001

                   R. W. Brause   Medical Analysis and Diagnosis by Neural
                                  Networks . . . . . . . . . . . . . . . . 1
                  B. Sierra and   
                    I. Inza and   
            P. Larrañaga   On Applying Supervised Classification
                                  Techniques in Medicine . . . . . . . . . 14
                  J. Crespo and   
               H. Billhardt and   
J. Rodríguez-Pedrosa and   
         J. A. Sanandrés   Methods and Criteria for Detecting
                                  Significant Regions in Medical Image
                                  Analysis . . . . . . . . . . . . . . . . 20
                    S. Acid and   
            L. M. de Campos and   
        S. Rodríguez and   
     J. M. Rodríguez and   
                  J. L. Salcedo   Using Bayesian Networks to Model
                                  Emergency Medical Services . . . . . . . 28
                  F. Alonso and   
Á. López-Illescas and   
         L. Martínez and   
                  C. Montes and   
                  J. P. Valente   Analysis of Strength Data Based on
                                  Expert Knowledge . . . . . . . . . . . . 35
                   V. Alves and   
                   J. Neves and   
                    M. Maia and   
                       L. Nelas   A Computational Environment for Medical
                                  Diagnosis Support Systems  . . . . . . . 42
             J. M. Barreiro and   
               A. Carrascal and   
                D. Manrique and   
             J. Ríos and   
                   A. Vilarrasa   Automatic Detection of Regions of
                                  Interest in Digitized Mammograms for
                                  Computer-Aided Diagnosis . . . . . . . . 48
               H. Billhardt and   
                  J. Crespo and   
                   V. Maojo and   
                  F. Martin and   
              J. L. Maté   A New Method for Unifying Heterogeneous
                                  Databases  . . . . . . . . . . . . . . . 54
                 R. Bittner and   
                  P. Smrcka and   
                 M. Pavelka and   
           P. Vysoký and   
                      L. Pousek   Fatigue Indicators of Drowsy Drivers
                                  Based on Analysis of Physiological
                                  Signals  . . . . . . . . . . . . . . . . 62
                  B. Blobel and   
          G. Stassinopoulos and   
                     P. Hoepner   Secure and Interoperable Document
                                  Management over the Internet --- The
                                  Generic HARP Cross-Security Platform for
                                  Clinical Studies . . . . . . . . . . . . 69
                     A. Bolotin   A Generalized U. Function and Fuzzy
                                  Modeling . . . . . . . . . . . . . . . . 75
                     M. Fazekas   Special Time Series Models for Analysis
                                  of Mortality Data  . . . . . . . . . . . 81
          J. A. F. del Pozo and   
                  C. Bielza and   
                M. Gómez   Knowledge Organisation in a Neonatal
                                  Jaundice Decision Support System . . . . 88
                  M. Friger and   
                  Y. Novack and   
                       U. Ranft   Quasi-Fourier Modeling for Individual
                                  and Count Outcomes . . . . . . . . . . . 95
A. J. García de Linares and   
L. de la Peña Fernández   An Anatomical and Functional Model for
                                  the Study of Cortical Functions  . . . . 101
                 M. Grabert and   
                 R. W. Holl and   
                  U. Krause and   
                  I. Melzer and   
                 F. Schweiggert   Predicting the Level of Metabolic
                                  Control Using Collaborative Filtering    108
                   P. Juvan and   
                   B. Zupan and   
                  J. Demsar and   
                  I. Bratko and   
             John A. Halter and   
                   A. Kuspa and   
                    G. Shaulsky   Web-Enabled Knowledge-Based Analysis of
                                  Genetic Data . . . . . . . . . . . . . . 113
               E. Kaczmarek and   
                 A. Wozniak and   
              W. Salwa-Zurawska   Fuzzy Sets Applied to Image Processing
                                  and Quantification of Interstitial
                                  Fibrosis and Glomerular Size in Computer
                                  Assisted Microscopy  . . . . . . . . . . 120
                 E. Kordysh and   
                 A. Bolotin and   
                M. Barchana and   
                        R. Chen   Cancer Epidemiology of Small
                                  Communities: Using a Novel Approach to
                                  Detecting Clusters . . . . . . . . . . . 126
               M. Kurzynski and   
                 E. Puchala and   
                         J. Sas   Hybrid Pattern Recognition Algorithms
                                  with the Statistical Model Applied to
                                  the Computer-Aided Medical Diagnosis . . 133
                 M. J. Lado and   
        A. J. Méndez and   
              P. G. Tahoces and   
                   M. Souto and   
                    J. J. Vidal   Computer-Aided Diagnosis: Application of
                                  Wavelet Transform to the Detection of
                                  Clustered Microcalcifications in Digital
                                  Mammograms . . . . . . . . . . . . . . . 140
                L. M. Laita and   
G. González-Páez and   
           E. Roanes-Lozano and   
                   V. Maojo and   
              L. de Ledesma and   
                       L. Laita   A Methodology for Constructing Expert
                                  Systems for Medical Diagnosis  . . . . . 146
                   E. Lamma and   
                   P. Mello and   
                 A. Nanetti and   
                    G. Poli and   
                 F. Riguzzi and   
                     S. Storari   An Expert System for Microbiological
                                  Data Validation and Surveillance . . . . 153
              J. Laurikkala and   
                      M. Juhola   Hierarchical Clustering of Female
                                  Urinary Incontinence Data Having Noise
                                  and Outliers . . . . . . . . . . . . . . 161
                  R. Linder and   
               S. J. Pöppl   ACMD: a Practical Tool for Automatic
                                  Neural Net Based Learning  . . . . . . . 168
            J. Martí and   
                 P. Planiol and   
               J. Freixenet and   
          J. Español and   
                  E. Golobardes   Development of a Mammographic Analysis
                                  System Using Computer Vision Techniques  174
        A. J. Méndez and   
              P. G. Tahoces and   
                  C. Varela and   
                 M. J. Lado and   
                   M. Souto and   
                    J. J. Vidal   Improvement of a Mammographic CAD System
                                  for Mass Detection . . . . . . . . . . . 181
               H. Midelfart and   
           A. Lægreid and   
                  J. Komorowski   Classification of Gene Expression Data
                                  in an Ontology . . . . . . . . . . . . . 186
            M. Navío and   
             J. J. Aguilera and   
            M. J. del Jesus and   
         R. González and   
                 F. Herrera and   
               C. Iríbar   Feature Selection Algorithms Applied to
                                  Parkinson's Disease  . . . . . . . . . . 195
                    J. Orbe and   
                E. Ferreira and   
V. Núñez-Antón   A New Model for AIDS Survival Analysis   201
                   J. Paetz and   
                      R. Brause   A Frequent Patterns Tree Approach for
                                  Rule Generation with Categorical Septic
                                  Shock Patient Data . . . . . . . . . . . 207
                 J. Pereira and   
                  A. Lamelo and   
  J. M. Vázquez-Naya and   
        M. Fernández and   
                  J. Dorado and   
                  A. Santos and   
                J. Teijeiro and   
                       A. Pazos   Analysis of Medical Diagnostic Images
                                  via the Implementation and Access to a
                                  Safe DICOM PACS with a Web Interface:
                                  Analysis of Contrast-Enhanced CT Imaging
                                  of Oral and Oropharyngeal Carcinomas . . 213
                      P. Perner   Classification of HEp-2 Cells Using
                                  Fluorescent Image Analysis and Data
                                  Mining . . . . . . . . . . . . . . . . . 219
                 E. Puchala and   
                   M. Kurzynski   Multitask Pattern Recognition Algorithm
                                  for the Medical Decision Support System  225
            D. Riaño and   
                       S. Prado   The Analysis of Hospital Episodes  . . . 231
                   J. Rodas and   
                  K. Gibert and   
                     J. E. Rojo   Electroshock Effects Identification
                                  Using Classification Based on Rules  . . 238
                  D. Rotger and   
           C. Cañero and   
                  P. Radeva and   
                   J. Mauri and   
               E. Fernandez and   
                   A. Tovar and   
                       V. Valle   Advanced Visualization of $3$D Data of
                                  Intravascular Ultrasound Images  . . . . 245
                   W. Sauerbrei   Investigations on Stability and
                                  Overoptimism of Classification Trees by
                                  Using Cross-Validation . . . . . . . . . 251
               A. Schlaefer and   
           K. Schröter and   
                    L. Fritsche   A Case-Based Approach for the
                                  Classification of Medical Time Series    258
                M. Siermala and   
                  M. Juhola and   
                     M. Vihinen   Binary Vector or Real Value Coding for
                                  Secondary Structure Prediction? A Case
                                  Study of Polyproline Type II Prediction  264
                 M. Sprogar and   
                   P. Kokol and   
                  M. Zorman and   
              V. Podgorelec and   
                 L. Lhotska and   
                       J. Klema   Notes on Medical Decision Model Creation 270
                  K. Viikki and   
                      M. Juhola   Refining the Knowledge Base of an
                                  Otoneurological Expert System  . . . . . 276
                  T. Walter and   
                    J.-C. Klein   Segmentation of Color Fundus Images of
                                  the Human Retina: Detection of the Optic
                                  Disc and the Vascular Tree Using
                                  Morphological Techniques . . . . . . . . 282
                    F. Wang and   
                 R. Quiniou and   
                G. Carrault and   
                  M.-O. Cordier   Learning Structural Knowledge from the
                                  ECG  . . . . . . . . . . . . . . . . . . 288
                  N. Wessel and   
                  N. Marwan and   
              U. Meyerfeldt and   
              A. Schirdewan and   
                      J. Kurths   Recurrence Quantification Analysis to
                                  Characterise the Heart Rate Variability
                                  before the Onset of Ventricular
                                  Tachycardia  . . . . . . . . . . . . . . 295
                      X. Wu and   
                   P. Lucas and   
                    S. Kerr and   
                  R. Dijkhuizen   Learning Bayesian-Network Topologies in
                                  Realistic Medical Domains  . . . . . . . 302
                      Anonymous   Author Index . . . . . . . . . . . . . . 309


Lecture Notes in Computer Science
Volume 2200, 2001

               Carlo Blundo and   
               Paolo D'Arco and   
                Vanesa Daza and   
            Carles Padró   Bounds and Constructions for
                                  Unconditionally Secure Distributed Key
                                  Distribution Schemes for General Access
                                  Structures . . . . . . . . . . . . . . . 1
              Valeri Korjik and   
     Guillermo Morales-Luna and   
         Vladimir B. Balakirsky   Privacy Amplification Theorem for Noisy
                                  Main Channel . . . . . . . . . . . . . . 18
      Giovanni Di Crescenzo and   
              Olga Kornievskaia   Efficient Kerberized Multicast in a
                                  Practical Distributed Setting  . . . . . 27
        Sigrid Gürgens and   
                   Javier Lopez   Suitability of a Classical Analysis
                                  Method for E-commerce Protocols  . . . . 46
               Carlo Blundo and   
               Paolo D'Arco and   
          Alfredo De Santis and   
                 Clemente Galdi   Hyppocrates  . . . . . . . . . . . . . . 63--80
           Fumitaka Hoshino and   
               Masayuki Abe and   
            Tetsutaro Kobayashi   Lenient/Strict Batch Verification in
                                  Several Groups . . . . . . . . . . . . . 81
              Dmitri Asonov and   
              Markus Schaal and   
       Johann-Christoph Freytag   Absolute Privacy in Voting . . . . . . . 95
             Tsan-sheng Hsu and   
            Churn-Jung Liau and   
                    Da-Wei Wang   A Logical Model for Privacy Protection   110
          Enriquillo Valdez and   
                      Moti Yung   DISSECT: DIStribution for SECurity Tool  125
               Stanley Chow and   
                    Yuan Gu and   
             Harold Johnson and   
           Vladimir A. Zakharov   An Approach to the Obfuscation of
                                  Control-Flow of Sequential Computer
                                  Programs . . . . . . . . . . . . . . . . 144
               Mark Chapman and   
           George I. Davida and   
                  Marc Rennhard   A Practical and Effective Approach to
                                  Large-Scale Automated Linguistic
                                  Steganography  . . . . . . . . . . . . . 156
       David Sánchez and   
      Agustín Orfila and   
Julio César Hernández and   
José María Sierra   Robust New Method in Frequency Domain
                                  Watermarking . . . . . . . . . . . . . . 166
            Diana Berbecaru and   
               Antonio Lioy and   
                  Marius Marian   On the Complexity of Public-Key
                                  Certificate Validation . . . . . . . . . 183
Apol\textperiodcenteredl\`onia Martínez-Nadal and   
         Josep L. Ferrer-Gomila   Liability of Certification Authorities:
                                  a Juridical Point of View  . . . . . . . 204
            Pawel Chodowiec and   
                   Kris Gaj and   
              Peter Bellows and   
                   Brian Schott   Experimental Testing of the Gigabit
                                  IPSec-Compliant Implementations of
                                  Rijndael and Triple DES Using SLAAC-1V
                                  FPGA Accelerator Board . . . . . . . . . 220
              Kazumaro Aoki and   
           Fumitaka Hoshino and   
        Tetsutaro Kobayashi and   
                  Hiroaki Oguro   Elliptic Curve Arithmetic Using SIMD . . 235
             Kostas Marinis and   
       Nikos K. Moshopoulos and   
           Fotis Karoubalis and   
            Kiamal Z. Pekmestzi   On the Hardware Implementation of the
                                  3GPP Confidentiality and Integrity
                                  Algorithms . . . . . . . . . . . . . . . 248
                Sheng-Bo Xu and   
                   Lejla Batina   Efficient Implementation of Elliptic
                                  Curve Cryptosystems on an ARM7 with
                                  Hardware Accelerator . . . . . . . . . . 266
          Rainer Steinwandt and   
           Willi Geiselmann and   
                    Thomas Beth   A Theoretical DPA-Based Cryptanalysis of
                                  the NESSIE Candidates FLASH and SFLASH   280
               Routo Terada and   
              Paulo G. Pinheiro   Quadratic Relations for S-Boxes: Their
                                  Minimum Representations and Bounds . . . 294
Ismael Jiménez Calvo and   
      German Sáez Moreno   Approximate Power Roots in $ \mathbb
                                  {Z}_m $  . . . . . . . . . . . . . . . . 310
               Bodo Möller   Securing Elliptic Curve Point
                                  Multiplication against Side-Channel
                                  Attacks  . . . . . . . . . . . . . . . . 324
              Sofia Tzelepi and   
                George Pangalos   A Flexible Role-Based Access Control
                                  Model for Multimedia Medical Image
                                  Database Systems . . . . . . . . . . . . 335
              Elisa Bertino and   
          Barbara Carminati and   
                  Elena Ferrari   A Secure Publishing Service for Digital
                                  Libraries of XML Documents . . . . . . . 347
         Olivier Markowitch and   
                   Steve Kremer   An Optimistic Non-repudiation Protocol
                                  with Transparent Trusted Third Party . . 363
       Aris Anagnostopoulos and   
        Michael T. Goodrich and   
               Roberto Tamassia   Persistent Authenticated Dictionaries
                                  and Their Applications . . . . . . . . . 379
     Josep L. Ferrer-Gomila and   
Magadalena Payeras-Capell\`a and   
   Llorenç Huguet-Rotger   Efficient Optimistic $N$-Party Contract
                                  Signing Protocol . . . . . . . . . . . . 394
                 Koji Chida and   
            Kunio Kobayashi and   
                  Hikaru Morita   Efficient Sealed-Bid Auctions for
                                  Massive Numbers of Bidders with Lump
                                  Comparison . . . . . . . . . . . . . . . 408
       Francesc Sebé and   
           Josep Domingo-Ferrer   Oblivious Image Watermarking Robust
                                  against Scaling and Geometric
                                  Distortions  . . . . . . . . . . . . . . 420
            Christian D. Jensen   Fingerprinting Text in Logical Markup
                                  Languages  . . . . . . . . . . . . . . . 433
               Antonio Ruiz and   
   Gregorio Martínez and   
       Oscar Cánovas and   
        Antonio F. Gómez   SPEED Protocol: Smartcard-Based Payment
                                  with Encrypted Electronic Delivery . . . 446
               Ik Rae Jeong and   
              Dong Hoon Lee and   
                    Jong In Lim   Efficient Transferable Cash with Group
                                  Signatures . . . . . . . . . . . . . . . 462
                 Liqun Chen and   
                      Wenbo Mao   An Auditable Metering Scheme for Web
                                  Advertisement Applications . . . . . . . 475
              Jaime Delgado and   
             Isabel Gallego and   
                Xavier Perramon   Broker-Based Secure Negotiation of
                                  Intellectual Property Rights . . . . . . 486
              Jae Seung Lee and   
                 Sang Choon Kim   Design of the Decision Support System
                                  for Network Security Management to
                                  Secure Enterprise Network  . . . . . . . 497
                   Jia Wang and   
                      Insup Lee   Measuring False-Positive by Automated
                                  Real-Time Correlated Hacking Behavior
                                  Analysis . . . . . . . . . . . . . . . . 512
                Kenji Masui and   
          Masahiko Tomoishi and   
                 Naoki Yonezaki   Design of UNIX System for the Prevention
                                  of Damage Propagation by Intrusion and
                                  Its Implementation Based on 4.4BSD . . . 536
                      Anonymous   Author Index . . . . . . . . . . . . . . 553


Lecture Notes in Computer Science
Volume 2201, 2001

                    Larry Smarr   Assembling the Planetary Computer  . . . 1
           Fredrik Espinoza and   
                Per Persson and   
                Anna Sandin and   
         Hanna Nyström and   
          Elenor Cacciatore and   
                  Markus Bylund   GeoNotes: Social and Navigational
                                  Aspects of Location-Based Information
                                  Systems  . . . . . . . . . . . . . . . . 2
                Paul Castro and   
               Patrick Chiu and   
               Ted Kremenek and   
                  Richard Muntz   A Probabilistic Room Location Service
                                  for Wireless Networked Environments  . . 18
                Hani Naguib and   
               George Coulouris   Location Information Managment . . . . . 35
              Cliff Randell and   
                    Henk Muller   Low Cost Indoor Positioning System . . . 42
           W. Steven Conner and   
     Lakshman Krishnamurthy and   
                       Roy Want   Making Everyday Life Easier Using Dense
                                  Sensor Networks  . . . . . . . . . . . . 49
      Shankar R. Ponnekanti and   
                  Brian Lee and   
                Armando Fox and   
               Pat Hanrahan and   
                 Terry Winograd   ICrafter: a Service Framework for
                                  Ubiquitous Computing Environments  . . . 56
            Radu Teodorescu and   
                    Raju Pandey   Using JIT Compilation and Configurable
                                  Runtime Systems for Efficient Deployment
                                  of Java Programs on Ubiquitous Devices   76
                  Peter Tandler   Software Infrastructure for Ubiquitous
                                  Computing Environments: Supporting
                                  Synchronous Collaboration with
                                  Heterogeneous Devices  . . . . . . . . . 96
        Lars Erik Holmquist and   
         Friedemann Mattern and   
              Bernt Schiele and   
           Petteri Alahuhta and   
              Michael Beigl and   
              Hans-W. Gellersen   Smart-Its Friends: a Technique for Users
                                  to Easily Establish Connections between
                                  Smart Artefacts  . . . . . . . . . . . . 116
            Heather Richter and   
           Gregory D. Abowd and   
               Werner Geyer and   
               Ludwin Fuchs and   
          Shahrokh Daijavad and   
                Steven Poltrock   Integrating Meeting Capture within a
                                  Collaborative Team Environment . . . . . 123
               Patrik Werle and   
           Fredrik Kilander and   
             Martin Jonsson and   
       Peter Lönnqvist and   
            Carl Gustaf Jansson   A Ubiquitous Service Environment with
                                  Active Documents for Teamwork Support    139
              Yasuyuki Sumi and   
                     Kenji Mase   Digital Assistant for Supporting
                                  Conference Participants: An Attempt to
                                  Combine Mobile, Ubiquitous and Web
                                  Computing  . . . . . . . . . . . . . . . 156
                 Kris Nagel and   
               Cory D. Kidd and   
           Thomas O'Connell and   
                  Anind Dey and   
               Gregory D. Abowd   The Family Intercom: Developing a
                                  Context-Aware Audio Communication System 176
                Norbert Streitz   Ubiquitous Computing and The
                                  Disappearing Computer --- Research
                                  Agendas, Issues, and Strategies  . . . . 184
           Allison Woodruff and   
      Margaret H. Szymanski and   
               Paul M. Aoki and   
                      Amy Hurst   The Conversational Role of Electronic
                                  Guidebooks . . . . . . . . . . . . . . . 187
             Khai N. Truong and   
           Gregory D. Abowd and   
            Jason A. Brotherton   Who, What, When, Where, How: Design
                                  Issues of Capture & Access Applications   209
              Steve Benford and   
                John Bowers and   
              Paul Chandler and   
             Luigina Ciolfi and   
            Martin Flintham and   
                Mike Fraser and   
           Chris Greenhalgh and   
                  Tony Hall and   
   Sten Olof Hellström and   
              Shahram Izadi and   
                 Tom Rodden and   
   Holger Schnädelbach and   
                     Ian Taylor   Unearthing Virtual History: Using
                                  Diverse Interfaces to Reveal Hidden
                                  Virtual Worlds . . . . . . . . . . . . . 225
            Thorstein Lunde and   
                    Arve Larsen   KISS the Tram: Exploring the PDA as
                                  Support for Everyday Activities  . . . . 232
            Rebecca Hansson and   
          Peter Ljungstrand and   
            Johan Redström   Subtle and Public Notification Cues for
                                  Mobile Devices . . . . . . . . . . . . . 240
              Ismail Haritaoglu   InfoScope: Link from Real World to
                                  Digital Information Space  . . . . . . . 247
           W. Keith Edwards and   
             Rebecca E. Grinter   At Home with Ubiquitous Computing: Seven
                                  Challenges . . . . . . . . . . . . . . . 256
              Marc Langheinrich   Privacy by Design --- Principles of
                                  Privacy-Aware Ubiquitous Systems . . . . 273
             Anders Kirkeby and   
               Rasmus Zacho and   
             Jock Mackinlay and   
                Polle Zellweger   TrekTrack: a Round Wristwatch Interface
                                  for SMS Authoring  . . . . . . . . . . . 292
         Joseph A. Paradiso and   
                 Mark Feldmeier   A Compact, Wireless, Self-Powered
                                  Pushbutton Controller  . . . . . . . . . 299
              Brad A. Myers and   
            Choon Hong Peck and   
            Jeffrey Nichols and   
                  Dave Kong and   
                  Robert Miller   Interacting at a Distance Using Semantic
                                  Snarfing . . . . . . . . . . . . . . . . 305
               Claudio Pinhanez   The Everywhere Displays Projector: a
                                  Device to Create Ubiquitous Graphical
                                  Interfaces . . . . . . . . . . . . . . . 315
         Joseph F. McCarthy and   
              Tony J. Costa and   
              Edy S. Liongosari   UniCast, OutCast & GroupCast: Three Steps
                                  Toward Ubiquitous, Peripheral Displays   332
              Brad Johanson and   
         Shankar Ponnekanti and   
            Caesar Sengupta and   
                    Armando Fox   Multibrowsing: Moving Web Content across
                                  Multiple Displays  . . . . . . . . . . . 346
          Daniel M. Russell and   
                Rich Gossweiler   On the Design of Personal & Communal
                                  Large Information Scale Appliances . . . 354
            Oscar de Bruijn and   
                  Robert Spence   Serendipity within a Ubiquitous
                                  Computing Environment: a Case for
                                  Opportunistic Browsing . . . . . . . . . 362
                      Anonymous   Author Index . . . . . . . . . . . . . . 371


Lecture Notes in Computer Science
Volume 2202, 2001

          GianLuigi Ferrari and   
              Ugo Montanari and   
                  Emilio Tuosto   A LTS Semantics of Ambients via Graph
                                  Synchronization with Mobility  . . . . . 1
               Fabio Alessi and   
Mariangiola Dezani-Ciancaglini and   
                  Furio Honsell   Filter Models and Easy Terms . . . . . . 17
            Silvia Ghilezan and   
                  Viktor Kuncak   Confluence of Untyped Lambda Calculus
                                  via Simple Types . . . . . . . . . . . . 38
                Mario Coppo and   
              Daniel Hirschkoff   Incremental Inference of Partial Types   50
                   Luca Paolini   Call-by-Value Separability and
                                  Computability  . . . . . . . . . . . . . 74
            Juraj Hromkovic and   
   Kathleen Steinhöfel and   
                 Peter Widmayer   Job Shop Scheduling with Unit Length
                                  Tasks: Bounds and Algorithms . . . . . . 90
               Klaus Jansen and   
        Monaldo Mastrolilli and   
              Roberto Solis-Oba   Job Shop Scheduling Problems with
                                  Controllable Processing Times  . . . . . 107
           Carlo Mereghetti and   
                Beatrice Palano   Upper Bounds on the Size of One-Way
                                  Quantum Finite Automata  . . . . . . . . 123
            Daniela Besozzi and   
            Claudio Zandron and   
            Giancarlo Mauri and   
             Nicoletta Sabadini   $P$ Systems with Gemmation of Mobile
                                  Membranes  . . . . . . . . . . . . . . . 136
              Giuseppe Prencipe   Instantaneous Actions vs. Full
                                  Asynchronicity: Controlling and
                                  Coordinating a Set of Autonomous Mobile
                                  Robots . . . . . . . . . . . . . . . . . 154
       Alessandra Cherubini and   
    Stefano Crespi Reghizzi and   
           Pierluigi San Pietro   Some Structural Properties of
                                  Associative Language Descriptions  . . . 172
           Dora Giammarresi and   
            Rosa Montalbano and   
                    Derick Wood   Block-Deterministic Regular Languages    184
               Marcella Anselmo   Constructing Finite Maximal Codes from
                                  Schützenberger Conjecture . . . . . . . . 197
              Davide Ancona and   
       Christopher Anderson and   
          Ferruccio Damiani and   
        Sophia Drossopoulou and   
             Paola Giannini and   
                    Elena Zucca   An Effective Translation of Fickle into
                                  Java . . . . . . . . . . . . . . . . . . 215
           Michele Bugliesi and   
          Giuseppe Castagna and   
                   Silvia Crafa   Subtyping and Matching for Mobile
                                  Objects  . . . . . . . . . . . . . . . . 235
        Diletta Cacciagrano and   
               Flavio Corradini   On Synchronous and Asynchronous
                                  Communication Paradigms  . . . . . . . . 256
              Lars Jacobsen and   
                  Kim S. Larsen   Complexity of Layered Binary Search
                                  Trees with Relaxed Balance . . . . . . . 269
          Jirí Fiala and   
      Jan Kratochvíl and   
           Andrzej Proskurowski   Distance Constrained Labeling of
                                  Precolored Trees . . . . . . . . . . . . 285
              Lars Jacobsen and   
                  Kim S. Larsen   Exponentially Decreasing Number of
                                  Operations in Balanced Trees . . . . . . 293
           Giorgio Ausiello and   
         Paolo G. Franciosa and   
               Daniele Frigioni   Directed Hypergraphs: Problems,
                                  Algorithmic Results, and a Novel
                                  Decremental Approach . . . . . . . . . . 312
          Alexis C. Kaporis and   
       Lefteris M. Kirousis and   
        Yannis C. Stamatiou and   
          Malvina Vamvakari and   
                   Michele Zito   Coupon Collectors, $q$-Binomial
                                  Coefficients and the Unsatisfiability
                                  Threshold  . . . . . . . . . . . . . . . 328
   André Große and   
            Jörg Rothe and   
                  Gerd Wechsung   Relating Partial and Complete Solutions
                                  and the Complexity of Computing Smallest
                                  Solutions  . . . . . . . . . . . . . . . 339
                   Paolo D'Arco   On the Distribution of a Key
                                  Distribution Center  . . . . . . . . . . 357
             Stelvio Cimato and   
              Annalisa De Bonis   Online Advertising: Secure E-coupons . . 370
            Nicola Olivetti and   
             Camilla B. Schwind   A Calculus and Complexity Bound for
                                  Minimal Conditional Logic  . . . . . . . 384
             Matteo Baldoni and   
             Laura Giordano and   
           Alberto Martelli and   
                  Viviana Patti   Reasoning about Complex Actions with
                                  Incomplete Knowledge: a Modal Approach   405
                 Emanuele Viola   E-unifiability via Narrowing . . . . . . 426
                      Anonymous   Author Index . . . . . . . . . . . . . . 439


Lecture Notes in Computer Science
Volume 2203, 2001

                 Paul Davidsson   Categories of Artificial Societies . . . 1
         Martin Fredriksson and   
                Rune Gustavsson   A Methodological Perspective on
                                  Engineering of Agent Societies . . . . . 10
              Laurent Vercouter   A Distributed Approach to Design Open
                                  Multi-agent Systems  . . . . . . . . . . 25
              Giacomo Cabri and   
           Letizia Leonardi and   
                Marco Mamei and   
              Franco Zambonelli   Engineering Infrastructures for Mobile
                                  Organizations  . . . . . . . . . . . . . 39
      Pierangelo Dell'Acqua and   
      Luís Moniz Pereira   Preferring and Updating in Abductive
                                  Multi-agent Systems  . . . . . . . . . . 57
László Aszalós and   
                 Andreas Herzig   Reasoning about Failure  . . . . . . . . 74
          Vincenzo Pallotta and   
                   Afzal Ballim   Agent-Oriented Language Engineering for
                                  Robust NLP . . . . . . . . . . . . . . . 86
              Paolo Torroni and   
                 Francesca Toni   Extending a Logic Based One-to-One
                                  Negotiation Framework to One-to-Many
                                  Negotiation  . . . . . . . . . . . . . . 105
                 Bengt Carlsson   The Tragedy of the Commons --- Arms Race
                                  within Peer-to-Peer Tools  . . . . . . . 119
   Stanislaw Ambroszkiewicz and   
                   Tomasz Nowak   Agentspace as a Middleware for Service
                                  Integration  . . . . . . . . . . . . . . 134
              Flavien Balbo and   
                 Suzanne Pinson   Toward a Multi-agent Modelling Approach
                                  for Urban Public Transportation Systems  160
               Filip Perich and   
               Lalana Kagal and   
                 Harry Chen and   
               Sovrin Tolia and   
                Youyong Zou and   
                  Tim Finin and   
               Anupam Joshi and   
                   Yun Peng and   
              R. Scott Cost and   
               Charles Nicholas   ITTALKS: An Application of Agents in the
                                  Semantic Web . . . . . . . . . . . . . . 175
                      Anonymous   Author Index . . . . . . . . . . . . . . 195


Lecture Notes in Computer Science
Volume 2204, 2001

                Hans-J. Bandelt   Invited Presentation: Median Hulls as
                                  Steiner Hulls in Rectilinear and
                                  Molecular Sequence Spaces  . . . . . . . 1
  Friedhelm Meyer auf der Heide   Invited Presentation: Data Management in
                                  Networks . . . . . . . . . . . . . . . . 8
         Sergei L. Bezrukov and   
           Robert Elsässer   Edge-Isoperimetric Problems for
                                  Cartesian Powers of Regular Graphs . . . 9
        Ioannis Caragiannis and   
            Afonso Ferreira and   
        Christos Kaklamanis and   
Stéphane Pérennes and   
              Pino Persiano and   
            Hervé Rivano   Approximate Constrained Bipartite Edge
                                  Coloring . . . . . . . . . . . . . . . . 21
            Maw-Shang Chang and   
                  Ton Kloks and   
                  Chuan-Min Lee   Maximum Clique Transversals  . . . . . . 32
            Maw-Shang Chang and   
              Haiko Müller   On the Tree-Degree of Graphs . . . . . . 44
                Jianer Chen and   
                   Iyad A. Kanj   On Constrained Minimum Vertex Covers of
                                  Bipartite Graphs: Improved Algorithms    55
          Serafino Cicerone and   
        Gianluca D'Ermiliis and   
            Gabriele Di Stefano   ($ k, + $ )-Distance-Hereditary Graphs   66
           Derek G. Corneil and   
                     Udi Rotics   On the Relationship between Clique-Width
                                  and Treewidth  . . . . . . . . . . . . . 78
           Sabine Cornelsen and   
               Yefim Dinitz and   
                Dorothea Wagner   Planarity of the $2$-Level Cactus Model  91
               Feodor F. Dragan   Estimating All Pairs Shortest Paths in
                                  Restricted Graph Families: a Unified
                                  Approach . . . . . . . . . . . . . . . . 103
          Wolfgang Espelage and   
               Frank Gurski and   
                     Egon Wanke   How to Solve NP-hard Graph Problems on
                                  Clique-Width Bounded Graphs in
                                  Polynomial Time  . . . . . . . . . . . . 117
                     Haodi Feng   $ (g, f) $-Factorizations Orthogonal to
                                  $k$ Subgraphs  . . . . . . . . . . . . . 129
           Guillaume Fertin and   
       André Raspaud and   
                     Bruce Reed   On Star Coloring of Graphs . . . . . . . 140
          Jirí Fiala and   
               Klaus Jansen and   
                Van Bang Le and   
                    Eike Seidel   Graph Subcolorings: Complexity and
                                  Algorithms . . . . . . . . . . . . . . . 154
             Fedor V. Fomin and   
             Hans L. Bodlaender   Approximation of Pathwidth of
                                  Outerplanar Graphs . . . . . . . . . . . 166
             Fedor V. Fomin and   
          Dimitrios M. Thilikos   On the Monotonicity of Games Generated
                                  by Symmetric Submodular Functions  . . . 177
              Sven Fuhrmann and   
         Sven Oliver Krumke and   
           Hans-Christoph Wirth   Multiple Hotlink Assignment  . . . . . . 189
             Cyril Gavoille and   
                David Peleg and   
       André Raspaud and   
                    Eric Sopena   Small $k$-Dominating Sets in Planar
                                  Graphs with Applications . . . . . . . . 201
         Clemens Gröpl and   
            Stefan Hougardy and   
              Till Nierhoff and   
   Hans Jürgen Prömel   Lower Bounds for Approximation
                                  Algorithms for the Steiner Tree Problem  217
          Öjvind Johansson   $ \log n $-Approximative
                                  NLC$_k$-Decomposition in $ O(n^{2k + 1})
                                  $ Time . . . . . . . . . . . . . . . . . 229--240
       Ekkehard Köhler and   
           Derek G. Corneil and   
             Stephan Olariu and   
                  Lorna Stewart   On Subfamilies of AT-Free Graphs . . . . 241
        Daniel Král' and   
      Jan Kratochvíl and   
                 Zsolt Tuza and   
           Gerhard J. Woeginger   Complexity of Coloring Graphs without
                                  Forbidden Induced Subgraphs  . . . . . . 254
                Van Bang Le and   
                 Bert Randerath   On Stable Cutsets in Line Graphs . . . . 263
                 Eunseuk Oh and   
                    Jianer Chen   On Strong Menger-Connectivity of Star
                                  Graphs . . . . . . . . . . . . . . . . . 272
        Maurizio Patrignani and   
              Maurizio Pizzonia   The Complexity of the Matching-Cut
                                  Problem  . . . . . . . . . . . . . . . . 284
            Rudi Pendavingh and   
            Petra Schuurman and   
           Gerhard J. Woeginger   De Bruijn Graphs and DNA Graphs  . . . . 296
          Antonio Puricella and   
                Iain A. Stewart   A Generic Greedy Algorithm,
                                  Partially-Ordered Graphs and
                                  NP-Completeness  . . . . . . . . . . . . 306
                Annegret Wagler   Critical and Anticritical Edges in
                                  Perfect Graphs . . . . . . . . . . . . . 317
                      Anonymous   Author Index . . . . . . . . . . . . . . 329


Lecture Notes in Computer Science
Volume 2205, 2001

           Michael F. Goodchild   A Geographer Looks at Spatial
                                  Information Theory . . . . . . . . . . . 1
                    Barry Smith   True Grid  . . . . . . . . . . . . . . . 14
             Thomas Bittner and   
                    Barry Smith   A Taxonomy of Granular Partitions  . . . 28
                     Lars Kulik   A Geometric Theory of Vague Boundaries
                                  Based on Supervaluation  . . . . . . . . 44
          Gérard Ligozat   When Tables Tell It All: Qualitative
                                  Spatial and Temporal Reasoning Based on
                                  Linear Orderings . . . . . . . . . . . . 60
               Matt Duckham and   
                Michael Worboys   Computational Structure in Three-Valued
                                  Nearness Relations . . . . . . . . . . . 76
      Shyamanta M. Hazarika and   
                Anthony G. Cohn   Qualitative Spatio-Temporal Continuity   92
                Brandon Bennett   Application of Supervaluation Semantics
                                  to Vaguely Defined Spatial Concepts  . . 108
            Andrew U. Frank and   
            Steffen Bittner and   
                  Martin Raubal   Spatial and Cognitive Simulation with
                                  Multi-agent Systems  . . . . . . . . . . 124
               Geoffrey Edwards   A Virtual Test Bed in Support of
                                  Cognitively-Aware Geomatics Technologies 140
           Sara Irina Fabrikant   Evaluating the Usability of the Scale
                                  Metaphor for Querying Semantic Spaces    156
           Hartwig Hochmair and   
                Andrew U. Frank   A Semantic Map as Basis for the Decision
                                  Process in the www Navigation  . . . . . 173--188
           Susan L. Epstein and   
             Bernard Moulin and   
               Walid Chaker and   
             Janice Glasgow and   
                  Jeremi Gancet   Pragmatism and Spatial Layout Design . . 189
          Christy R. Miller and   
                  Gary L. Allen   Spatial Frames of Reference Used in
                                  Identifying Direction of Movement: An
                                  Unexpected Turn  . . . . . . . . . . . . 206
                M. Jeanne Sholl   The Role of a Self-Reference System in
                                  Spatial Navigation . . . . . . . . . . . 217
            M. E. Jefferies and   
                     W. K. Yeap   The Utility of Global Representations in
                                  a Cognitive Map  . . . . . . . . . . . . 233
                  Leonard Talmy   How Spoken Language and Signed Language
                                  Structure Space Differently  . . . . . . 247
             Christian Kray and   
             Jörg Baus and   
              Hubert Zimmer and   
              Harry Speiser and   
            Antonio Krüger   Two Path Prepositions: Along and Past    263
            Holly A. Taylor and   
             David H. Uttal and   
                Joan Fisher and   
                Marshall Mazepa   Ambiguity in Acquiring Spatial
                                  Representation from Descriptions
                                  Compared to Depictions: The Role of
                                  Spatial Orientation  . . . . . . . . . . 278
     Pierre-Emmanuel Michon and   
                   Michel Denis   When and Why Are Visual Landmarks Used
                                  in Giving Directions?  . . . . . . . . . 292
       Joe Heike Steinhauer and   
                  Tom Wiese and   
           Christian Freksa and   
               Thomas Barkowsky   Recognition of Abstract Regions in
                                  Cartographic Maps  . . . . . . . . . . . 306
       Christopher B. Jones and   
               Harith Alani and   
                Douglas Tudhope   Geographical Information Retrieval with
                                  Ontologies of Place  . . . . . . . . . . 322
               C. Schlieder and   
             T. Vögele and   
                      U. Visser   Qualitative Spatial Representation for
                                  Information Retrieval by Gazetteers  . . 336
           Marlene Behrmann and   
                  John Philbeck   Spatial Representation and Updating:
                                  Evidence from Neuropsychological
                                  Investigations . . . . . . . . . . . . . 352
               Thomas Barkowsky   Mental Processing of Geographic
                                  Knowledge  . . . . . . . . . . . . . . . 371
                Sylvie Fontaine   Spatial Cognition and the Processing of
                                  Verticality in Underground Environments  387
               Clare Davies and   
                  Eric Pederson   Grid Patterns and Cultural Expectations
                                  in Urban Wayfinding  . . . . . . . . . . 400
             Hedda R. Schmidtke   The House Is North of the River:
                                  Relative Localization of Extended
                                  Objects  . . . . . . . . . . . . . . . . 415
           Alexander Scivos and   
                 Bernhard Nebel   Double-Crossing: Decidability and
                                  Computational Complexity of a
                                  Qualitative Calculus for Navigation  . . 431
              Markus Knauff and   
               Corinne Jola and   
                 Gerhard Strube   Spatial Reasoning: No Need for Visual
                                  Information  . . . . . . . . . . . . . . 447
                  Antony Galton   A Formal Theory of Objects and Fields    458
      Gilberto Câmara and   
           Max J. Egenhofer and   
          Frederico Fonseca and   
Antônio Miguel Vieira Monteiro   What's in an Image?  . . . . . . . . . . 474
              David M. Mark and   
        André Skupin and   
                    Barry Smith   Features, Objects, and Other Things:
                                  Ontological Distinctions in the
                                  Geographic Domain  . . . . . . . . . . . 489
                      Anonymous   Author Index . . . . . . . . . . . . . . 503


Lecture Notes in Computer Science
Volume 2206, 2001

                Hideyuki Takagi   Interactive Evolutionary Computation as
                                  Humanized Computational Intelligence
                                  Technology . . . . . . . . . . . . . . . 1
           Steffen Patzwahl and   
               Thomas Nacke and   
              Dieter Frense and   
            Dieter Beckmann and   
      Klaus-Dietrich Kramer and   
               Tobias Tautz and   
            Gerd-Rainer Vollmer   Microcontroller-Based Fuzzy System to
                                  Optimize the Anaerobic Digestion in
                                  Biogas Reactors  . . . . . . . . . . . . 2
         Tatiana A. Dziouba and   
              Igor N. Rozenberg   The Decision of Service Centres Location
                                  Problem in Fuzzy Conditions  . . . . . . 11
  Minija Tamo\vsi\=unait\.e and   
      Erinija Prackevi\vcien\.e   Application of the Biologically Inspired
                                  Network for Electroencephalogram
                                  Analysis . . . . . . . . . . . . . . . . 18
             Jose L. Martin and   
            Luciano Boquete and   
                Carmen Diaz and   
      Manuel Garcia de Leon and   
                    Manuel Mazo   Discrimination between Two Mental States
                                  (Rest and Motor Image) Using Wavelet
                                  Transform and Neural Networks  . . . . . 28
          Tatiana Kiseliova and   
                    Hajo Peters   Decision Making in Diagnosis of Oral
                                  Mucosa Lesions . . . . . . . . . . . . . 33
                Janusz Kacprzyk   Fuzzy Logic and the Internet: Linguistic
                                  Summarization of Distributed Sets of
                                  Data . . . . . . . . . . . . . . . . . . 40
              Christian Leubner   Adaptive Color- and Edge-Based Image
                                  Segmentation Using Fuzzy Techniques  . . 43
                Yutaka Hata and   
              Syoji Kobashi and   
          Yasuhiro Tokimoto and   
            Makoto Ishikawa and   
               Hitoshi Ishikawa   Computer Aided Diagnosis System of
                                  Meniscal Tears with T1 and T2 Weighted
                                  MR Images Based on Fuzzy Inference . . . 55
            Aureli Soria-Frisch   A New Paradigm for Fuzzy Aggregation in
                                  Multisensorial Image Processing  . . . . 59
        Yevgeniy Bodyanskiy and   
       Vitaliy Kolodyazhniy and   
                Andreas Stephan   An Adaptive Learning Algorithm for a
                                  Neuro-fuzzy Network  . . . . . . . . . . 68
           Farshid Delgosha and   
             Mohammad B. Menhaj   Fuzzy Probabilistic Neural Networks: a
                                  Practical Approach to the Implementation
                                  of Baysian [sic] Classifier  . . . . . . 76--85
                Miroslaw Bedzak   Fuzzy-$ \eta $ for Back Propagation
                                  Networks . . . . . . . . . . . . . . . . 86
            Andreas Rummler and   
                  Gerd Scarbata   eaLib --- A Java Framework for
                                  Implementation of Evolutionary
                                  Algorithms . . . . . . . . . . . . . . . 92
             W. S. Wijesoma and   
              K. R. S. Kodagoda   Experimental Evaluation of Fuzzy
                                  Controllers for an Outdoor AGV . . . . . 103
           Bernard Hugueney and   
     Bernadette Bouchon-Meunier   Time-Series Segmentation and Symbolic
                                  Representation, from Process-Monitoring
                                  to Data-Mining . . . . . . . . . . . . . 118
              Syoji Kobashi and   
                Yutaka Hata and   
           Yuri T. Kitamura and   
          Toshiaki Hayakata and   
                Toshio Yanagida   Brain State Recognition Using Fuzzy
                                  C-Means (FCM) Clustering with Near
                                  Infrared Spectroscopy (NIRS) . . . . . . 124
                A. Yardimci and   
               A. Ferikoglu and   
                  N. Hadimioglu   Microcontroller Based Fuzzy Logic
                                  Sevofluorane Anesthesia Control System   137
             Eulalia Szmidt and   
                Janusz Kacprzyk   Intuitionistic Fuzzy Sets in some
                                  Medical Applications . . . . . . . . . . 148
              Vasile Palade and   
       Daniel-Ciprian Neagu and   
                  Ron J. Patton   Interpretation of Trained Neural
                                  Networks by Rule Extraction  . . . . . . 152
      Héctor Allende and   
             Claudio Moraga and   
                  Rodrigo Salas   Neural Model Identification Using Local
                                  Robustness Analysis  . . . . . . . . . . 162
                Matthias Reuter   Computing with Activity Patterns . . . . 174
            Navid Seifipour and   
             Mohammad B. Menhaj   A GA-Based Algorithm with a Very Fast
                                  Rate of Convergence  . . . . . . . . . . 185
         Gabriele Kern-Isberner   Representing and Learning Conditional
                                  Information in Possibility Theory  . . . 194
                J. Botzheim and   
           B. Hámori and   
             L. T. Kóczy   Extracting Trapezoidal Membership
                                  Functions of a Fuzzy Rule System by
                                  Bacterial Algorithm  . . . . . . . . . . 218
                  Didier Dubois   Possibility Theory, Probability Theory
                                  and Multiple-Valued Logics: a
                                  Clarification  . . . . . . . . . . . . . 228
          Zoran M. Gacovski and   
           Georgi M. Dimirovski   Parameterized Petri Net Reformulation of
                                  the Fuzzy Production System  . . . . . . 229
            Martine De Cock and   
                    E. E. Kerre   Fuzzy Topologies Induced by Fuzzy
                                  Relation Based Modifiers . . . . . . . . 239
                  H. Kiendl and   
                      P. Krause   Advanced Inference Filter
                                  Defuzzification  . . . . . . . . . . . . 249
       Krzysztof Dyczkowski and   
                Maciej Wygralak   On Cardinality and Singular Fuzzy Sets   261
                 Hazem El-Bakry   Fast Iris Detection for Personal
                                  Verification Using Modular Neural Nets   269
                 Hazem El-Bakry   A Rotation Invariant Algorithm for
                                  Recognition  . . . . . . . . . . . . . . 284
             Igor Aizenberg and   
       Ekaterina Myasnikova and   
            Maria Samsonova and   
                   John Reinitz   Application of the Neural Networks Based
                                  on Multi-valued Neurons to
                                  Classification of the Images of Gene
                                  Expression Patterns  . . . . . . . . . . 291
              Gunther Heidemann   A Multi-purpose Visual Classification
                                  System . . . . . . . . . . . . . . . . . 305
                Karsten Weicker   Problem Difficulty in Real-Valued
                                  Dynamic Problems . . . . . . . . . . . . 313
         Gabriella Kókai   GeLog --- A System Combining Genetic
                                  Algorithm with Inductive Logic
                                  Programming  . . . . . . . . . . . . . . 326
            Arita Takahashi and   
                 Arkady Borisov   Decision Strategies in Evolutionary
                                  Optimization . . . . . . . . . . . . . . 345
         István Borgulya   A Cluster-Based Evolutionary Algorithm
                                  for Multi-objective Optimization . . . . 357
             Kouki Nagamune and   
                Yutaka Hata and   
             Kazuhiko Taniguchi   Inherent Wave Estimation on Ultrasonic
                                  Non-destructive Testing Using Fuzzy
                                  Inference  . . . . . . . . . . . . . . . 369
          Eyke Hüllermeier   Fuzzy Association Rules: Semantic Issues
                                  and Quality Measures . . . . . . . . . . 380
              Chongfu Huang and   
             Claudio Moraga and   
                 Xingguang Yuan   Calculation vs. Subjective Assessment
                                  with Respect to Fuzzy Probability  . . . 392
               Ingo Renners and   
               Adolf Grauel and   
               Ernesto Saavedra   Methodology for Optimizing Fuzzy
                                  Classifiers Based on Computational
                                  Intelligence . . . . . . . . . . . . . . 412
                Matthias Reuter   Analysing the Structure of
                                  Poly-crystalline Materials by
                                  $2$-Dimensional DLS-Spectra and Neural
                                  Nets . . . . . . . . . . . . . . . . . . 420
          Victor Varshavsky and   
         Vyacheslav Marakhovsky   A Neuron-MOS Threshold Element with
                                  Switching Capacitors . . . . . . . . . . 430
                  Victor Neagoe   A Neural Approach to Compression of
                                  Hyperspectral Remote Sensing Imagery . . 436
                 Igor Aizenberg   Multi-valued and Universal Binary
                                  Neurons: New Applications in Intelligent
                                  Image Processing . . . . . . . . . . . . 450
              Julian Dorado and   
            Antonino Santos and   
     Juan R. Rabuñal and   
            Nieves Pedreira and   
                Alejandro Pazos   Hybrid Two-Population Genetic Algorithm  464
          Patrick Monsieurs and   
                Eddy Flerackers   Reducing Bloat in Genetic Programming    471
            Frank Schmiedle and   
         Daniel Große and   
             Rolf Drechsler and   
                   Bernd Becker   Too Much Knowledge Hurts: Acceleration
                                  of Genetic Programs for Learning
                                  Heuristics . . . . . . . . . . . . . . . 479
           Ernesto Saavedra and   
               Ingo Renners and   
               Adolf Grauel and   
               H. J. Convey and   
                       A. Razak   Gaussians-Based Hybrid System for
                                  Prediction and Classification  . . . . . 492
           Leonid Bershtein and   
             Alexander Bozhenuk   A Color Problem for Fuzzy Graph  . . . . 500
                  Helmut Thiele   On the Uniqueness of Interpretations for
                                  Fuzzy IF--THEN Rule Bases  . . . . . . . 506
           Jaros\law Pykacz and   
              Bart D'Hooghe and   
              Roman R. Zapatrin   Quantum Computers as Fuzzy Computers . . 526
                 K. W. Wong and   
         L. T. Kóczy and   
               T. D. Gedeon and   
                   A. Chong and   
                        D. Tikk   Improvement of the Cluster Searching
                                  Algorithm in Sugeno and Yasukawa's
                                  Qualitative Modeling Approach  . . . . . 536
            B.-J. Falkowski and   
                J. Nietzschmann   Can Perceptrons Identify Users of Body
                                  Lotion?  . . . . . . . . . . . . . . . . 550
                  Jerzy Martyna   Reinforcement Learning for Control of
                                  Traffic and Access Points in Intelligent
                                  Wireless ATM Networks  . . . . . . . . . 554
              Sabine Bostelmann   Categorization of Time Delay by Means of
                                  Neural Networks  . . . . . . . . . . . . 565
                  Kai Dadhe and   
       Volker Roßmann and   
               Kazim Durmus and   
               Sebastian Engell   Neural Networks as a Tool for Gray Box
                                  Modelling in Reactive Distillation . . . 576
                 Lars Nolle and   
              Alec Goodyear and   
          Adrian A. Hopgood and   
             Phil D. Picton and   
      Nicholas StJ. Braithwaite   On Step Width Adaptation in Simulated
                                  Annealing for Continuous Parameter
                                  Optimisation . . . . . . . . . . . . . . 589--598
           Marcus Gemeinder and   
                  Michael Gerke   GA-Based Search for Paths with Minimum
                                  Energy Consumption for Mobile Robot
                                  Systems  . . . . . . . . . . . . . . . . 599
       Mahrokh G. Shayesteh and   
         Mohammad B. Menhaj and   
                Babak G. Nobary   A New Modified Genetic Algorithm for
                                  Multiuser Detection in DS/CDMA Systems   608
            Thomas Villmann and   
                   Conny Albani   Clustering of Categoric Data in Medicine
                                  --- Application of Evolutionary
                                  Algorithms . . . . . . . . . . . . . . . 619
                 Lotfi A. Zadeh   A New Direction in AI --- Toward a
                                  Computational Theory of Perceptions  . . 628
                   Gero Presser   Personalization of Newsletters Using
                                  Multistage Fuzzy Inference . . . . . . . 629
            Ernesto Damiani and   
            Barbara Oliboni and   
                  Letizia Tanca   Fuzzy Techniques for XML Data Smushing   637
             Thomas Bernard and   
           Markoto Sajidman and   
        Helge-Björn Kuntze   A New Fuzzy-Based Multi-objective
                                  Optimization Concept for Process Control
                                  Systems  . . . . . . . . . . . . . . . . 653
    Felipe Fernández and   
         Julio Gutiérrez   An Improved Shape-Preserving Affine
                                  Takagi-Sugeno Controller Using Splines   671
       Juan A. Botía and   
Antonio F. Gómez-Skarmeta and   
     Mercedes Valdés and   
                Antonio Padilla   METALA: A Meta-learning Architecture . . 688
         W. Sardha Wijesoma and   
                Mingming Ma and   
                      K. W. Yue   On-Line Signature Verification Using a
                                  Computational Intelligence Approach  . . 699
        Michael Krödel and   
           Klaus-Dieter Kuhnert   Autonomous Driving through Intelligent
                                  Image Processing and Machine Learning    712
      Szilveszter Kovács   SVD Reduction in Continuos Environment
                                  Reinforcement Learning . . . . . . . . . 719
               Carlos Cotta and   
           José M. Troya   Analyzing Directed Acyclic Graph
                                  Recombination  . . . . . . . . . . . . . 739
              Hayato Uchida and   
                Yutaka Hata and   
            Shinro Matsuura and   
        Tadahiro Tsuchikawa and   
            Yoshio Morotomi and   
                Hideyasu Aoyama   Rough Set Based Knowledge Discovery of
                                  Interface for the Internet Usage among
                                  Japanese Elderly Women . . . . . . . . . 749
                  Martin Kalina   Fuzzy Limits and Fuzzy Nearness Relation 755
       Berend-Jan van der Zwaag   Handwritten Digit Recognition: a Neural
                                  Network Demo . . . . . . . . . . . . . . 762
                  Thomas Kromer   New Neural Nets  . . . . . . . . . . . . 772
           Bohdan S. Butkiewicz   Inference in Fuzzy Models of Physical
                                  Processes  . . . . . . . . . . . . . . . 782
                Hartmut Surmann   About the Combination of Functional
                                  Approaches and Fuzzy Reasoning . . . . . 791
          Anna Slobodová   Expected Utility Networks in
                                  Transferable Belief Model  . . . . . . . 800
          Jonathan Corcoran and   
              Ian D. Wilson and   
              Owen M. Lewis and   
                 J. Andrew Ware   Data Clustering and Rule Abduction to
                                  Facilitate Crime Hot Spot Prediction . . 807
               Marcus Gemeinder   Computing with Words: Multi-objective
                                  GAS for Approximate Reasoning  . . . . . 822
           Djavvat Khadjiev and   
           Funda Karaçal   The Description of All $ \vee
                                  $-Distributive Triangular Norms of
                                  Lengths $2$ and $3$  . . . . . . . . . . 829
                  Preslav Nakov   Latent Semantic Analysis for German
                                  Literature Investigation . . . . . . . . 834
               Eriks Tipans and   
                 Arkady Borisov   Some Possibilities of Improving the CORA
                                  Classification Algorithm . . . . . . . . 842
    O\uguzhan Yìlmaz and   
Günseli Görür and   
             Türkay Dereli   Computer Aided Selection of Cutting
                                  Parameters by Using Fuzzy Logic  . . . . 854
            Joachim Neumann and   
        Görge Deerberg and   
       Stefan Schlüter and   
                Hans Fahlenkamp   Process Monitoring in Chemical Plants
                                  Using Neural Networks  . . . . . . . . . 871
         Mariana Dumitrescu and   
                Toader Munteanu   Fuzzy Probability and Power System
                                  Safety . . . . . . . . . . . . . . . . . 885
         Mariana Dumitrescu and   
                Toader Munteanu   A Fuzzy Logic System Used in Safety
                                  Analysis . . . . . . . . . . . . . . . . 890
             Zenon A. Sosnowski   Chaining of Fuzzy Rules in RETE Network  895
        Marius Cãlin and   
                Dan Gâlea   A Fuzzy Relation for Comparing Intervals 904
                  Thomas Kromer   Tomography in Fractal Neural Nets  . . . 917


Lecture Notes in Computer Science
Volume 2207, 2001

                   Eric Y. Chen   AEGIS: An Active-Network-Powered Defense
                                  Mechanism against DDoS Attacks . . . . . 1
          Laurent Lef\`evre and   
              Cong-duc Pham and   
             Pascale Primet and   
        Bernard Tourancheau and   
           Benjamin Gaidioz and   
         Jean-Patrick Gelas and   
                Moufida Maimour   Active Networking Support for the Grid   16
              Takashi Egawa and   
                  Koji Hino and   
                 Yohei Hasegawa   Fast and Secure Packet Processing
                                  Environment for Per-Packet QoS
                                  Customization  . . . . . . . . . . . . . 34
              Toru Hasegawa and   
              Shigehiro Ano and   
                 Koji Nakao and   
                  Fumito Kubota   Programmable Remote Traffic Monitoring
                                  Method Using Active Network Approach . . 49
                Georg Carle and   
            Henning Sanneck and   
           Sebastian Zander and   
                        Long Le   Deploying an Active Voice Application on
                                  a Three-Level Active Network Node
                                  Architecture . . . . . . . . . . . . . . 65
             Steven Simpson and   
              Mark Banfield and   
                 Paul Smith and   
                David Hutchison   Component Selection for Heterogeneous
                                  Active Networking  . . . . . . . . . . . 84
     Kostas G. Anagnostakis and   
          Sotiris Ioannidis and   
            Stefan Miltchev and   
              Jonathan M. Smith   Practical Network Applications on a
                                  Lightweight Active Management
                                  Environment  . . . . . . . . . . . . . . 101
             Seiichiro Tani and   
          Toshiaki Miyazaki and   
             Noriyuki Takahashi   Adaptive Stream Multicast Based on IP
                                  Unicast and Dynamic Commercial
                                  Attachment Mechanism: An Active Network
                                  Implementation . . . . . . . . . . . . . 116
              Michael Hicks and   
          Jonathan T. Moore and   
                  Scott Nettles   Compiling PLAN to SNAP . . . . . . . . . 134
           Carlos Macián   The Octopus Network Model: Opening Up
                                  the Internet to Active and Programmable
                                  Network Implementations  . . . . . . . . 152
                      Anonymous   Author Index . . . . . . . . . . . . . . 165


Lecture Notes in Computer Science
Volume 2208, 2001

               Kensaku Mori and   
            Daisuke Deguchi and   
          Jun-ichi Hasegawa and   
           Yasuhito Suenaga and   
        Jun-ichiro Toriwaki and   
       Hirotsugu Takabatake and   
                 Hiroshi Natori   A Method for Tracking the Camera Motion
                                  of Real Endoscope by Epipolar Geometry
                                  Analysis and Virtual Endoscopy System    1
          Atsushi Nishikawa and   
            Toshinori Hosoi and   
                Kengo Koara and   
               Daiji Negoro and   
                Ayae Hikita and   
              Shuichi Asano and   
             Fumio Miyazaki and   
           Mitsugu Sekimoto and   
            Yasuhiro Miyake and   
            Masayoshi Yasui and   
                  Morito Monden   Real-Time Visual Tracking of the
                                  Surgeon's Face for Laparoscopic Surgery  9
                   Ofer Ron and   
              Leo Joskowicz and   
               Ariel Simkin and   
                Charles Milgrom   Computer-Based Periaxial Rotation
                                  Measurement for Aligning Fractured Femur
                                  Fragments: Method and Preliminary
                                  Results  . . . . . . . . . . . . . . . . 17
                Guido Gerig and   
              Martin Styner and   
          Martha E. Shenton and   
           Jeffrey A. Lieberman   Shape versus Size: Improved
                                  Understanding of the Morphology of Brain
                                  Structures . . . . . . . . . . . . . . . 24
              Sylvain Bouix and   
          Jens C. Pruessner and   
          Donald L. Collins and   
                 Kaleem Siddiqi   Hippocampal Shape Analysis Using Medial
                                  Surfaces . . . . . . . . . . . . . . . . 33
               C. Studholme and   
                V. Cardenas and   
                  N. Schuff and   
                   H. Rosen and   
                  B. Miller and   
                      M. Weiner   Detecting Spatially Consistent
                                  Structural Differences in Alzheimer's
                                  and Fronto Temporal Dementia Using
                                  Deformation Morphometry  . . . . . . . . 41
                Mark Holden and   
          Julia A. Schnabel and   
               Derek L. G. Hill   Quantifying Small Changes in Brain
                                  Ventricular Volume Using Non-rigid
                                  Registration . . . . . . . . . . . . . . 49
           Rhodri H. Davies and   
              Tim F. Cootes and   
           John C. Waterton and   
                Chris J. Taylor   An Efficient Method for Constructing
                                  Optimal Statistical Shape Models . . . . 57
           Ghassan Hamarneh and   
              Tim McInerney and   
            Demetri Terzopoulos   Deformable Organisms for Automatic
                                  Medical Image Analysis . . . . . . . . . 66
                D. Rueckert and   
               A. F. Frangi and   
                 J. A. Schnabel   Automatic Construction of $3$D
                                  Statistical Deformation Models Using
                                  Non-rigid Registration . . . . . . . . . 77
    S. B. Göktürk and   
                  C. Tomasi and   
                    B. Acar and   
                    D. Paik and   
                C. Beaulieu and   
                       S. Napel   A Learning Method for Automated Polyp
                                  Detection  . . . . . . . . . . . . . . . 85
                Yasuyo Kita and   
                Eriko Tohno and   
           Ralph P. Highnam and   
                  Michael Brady   A CAD System for $3$D Locating of
                                  Lesions in Mammogram . . . . . . . . . . 94
                  Y. Kawata and   
                    N. Niki and   
                 H. Ohmatsu and   
                M. Kusumoto and   
                R. Kakinuma and   
                    K. Mori and   
               H. Nishiyama and   
                  K. Eguchi and   
                  M. Kaneko and   
                    N. Moriyama   Analysis of Pulmonary Nodule Evolutions
                                  Using a Sequence of Three-Dimensional
                                  Thoracic CT Images . . . . . . . . . . . 103
           Torsten Rohlfing and   
          Calvin R. Maurer, Jr.   Intensity-Based Non-rigid Registration
                                  Using Adaptive Multilevel Free-Form
                                  Deformation with an Incompressibility
                                  Constraint . . . . . . . . . . . . . . . 111
               Steven Haker and   
           Allen Tannenbaum and   
                    Ron Kikinis   Mass Preserving Mappings and Image
                                  Registration . . . . . . . . . . . . . . 120
                   M. Kauer and   
                V. Vuskovic and   
                    J. Dual and   
                 G. Szekely and   
                       M. Bajka   Inverse Finite Element Characterization
                                  of Soft Tissues  . . . . . . . . . . . . 128
                 Joel Brown and   
           Kevin Montgomery and   
        Jean-Claude Latombe and   
            Michael Stephanides   A Microsurgery Simulation System . . . . 137
           Han-Wen Nienhuys and   
       A. Frank van der Stappen   A Surgery Simulation Supporting Cuts and
                                  Finite Element Deformation . . . . . . . 145
             Juan R. Cebral and   
        Rainald Löhner and   
               Orlando Soto and   
            Peter L. Choyke and   
                   Peter J. Yim   Patient-Specific Simulation of Carotid
                                  Artery Stenting Using Computational
                                  Fluid Dynamics . . . . . . . . . . . . . 153
          Elizabeth Bullitt and   
                Stephen Aylward   Volume Rendering of Segmented Tubular
                                  Objects  . . . . . . . . . . . . . . . . 161
                Roel Truyen and   
           Thomas Deschamps and   
               Laurent D. Cohen   Clinical Evaluation of an Automatic Path
                                  Tracker for Virtual Colonoscopy  . . . . 169
             Erik Meijering and   
               Wiro Niessen and   
           Joachim Weickert and   
                  Max Viergever   Evaluation of Diffusion Techniques for
                                  Improved Vessel Visualization and
                                  Quantification in Three-Dimensional
                                  Rotational Angiography . . . . . . . . . 177
               J.-F. Mangin and   
                  C. Poupon and   
                   C. Clark and   
                D. Le Bihan and   
                       I. Bloch   Eddy-Current Distortion Correction and
                                  Robust Tensor Estimation for MR
                                  Diffusion Imaging  . . . . . . . . . . . 186
                 Klaus Hahn and   
            Sergei Prigarin and   
                Benno Pütz   Edge Preserving Regularization and
                                  Tracking for Diffusion Tensor Imaging    195
           Koen Van Leemput and   
              Frederik Maes and   
          Dirk Vandermeulen and   
                   Paul Suetens   A Statistical Framework for Partial
                                  Volume Segmentation  . . . . . . . . . . 204
            Vidya Elangovan and   
               Ross T. Whitaker   From Sinograms to Surfaces: a Direct
                                  Approach to the Segmentation of
                                  Tomographic Data . . . . . . . . . . . . 213
               M. Sermesant and   
              Y. Coudi\`ere and   
              H. Delingette and   
                  N. Ayache and   
   J. A. Désidéri   An Electro-mechanical Model of the Heart
                                  for Cardiac Image Analysis . . . . . . . 224
       Kathleen J. M. Surry and   
             Wendy L. Smith and   
           Gregory R. Mills and   
            Donal B. Downey and   
                  Aaron Fenster   A Mechanical, Three-Dimensional,
                                  Ultrasound-Guided Breast Biopsy
                                  Apparatus  . . . . . . . . . . . . . . . 232
          Michael Rosenthal and   
               Andrei State and   
                  Joohi Lee and   
             Gentaro Hirota and   
            Jeremy Ackerman and   
              Kurtis Keller and   
             Etta D. Pisano and   
           Michael Jiroutek and   
               Keith Muller and   
                    Henry Fuchs   Augmented Reality Guidance for Needle
                                  Biopsies: a Randomized, Controlled Trial
                                  in Phantoms  . . . . . . . . . . . . . . 240
         Alexandru Patriciu and   
            Stephen Solomon and   
             Louis Kavoussi and   
                Dan Stoianovici   Robotic Kidney and Spine Percutaneous
                                  Procedures Using a New Laser-Based CT
                                  Registration Method  . . . . . . . . . . 249
                 P. Hellier and   
                C. Barillot and   
                 I. Corouge and   
                  B. Gibaud and   
             G. Le Goualher and   
                 L. Collins and   
                   A. Evans and   
               G. Malandain and   
                      N. Ayache   Retrospective Evaluation of
                                  Inter-subject Brain Registration . . . . 258
          Simon K. Warfield and   
               Jan Rexilius and   
             Petra S. Huppi and   
            Terrie E. Inder and   
             Erik G. Miller and   
       William M. Wells III and   
           Gary P. Zientara and   
           Ferenc A. Jolesz and   
                    Ron Kikinis   A Binary Entropy Measure to Assess
                                  Nonrigid Registration Algorithms . . . . 266
           Christophe Grova and   
             Arnaud Biraben and   
        Jean-Marie Scarabin and   
              Pierre Jannin and   
              Ir\`ene Buvat and   
               Habib Benali and   
                 Bernard Gibaud   A Methodology to Validate MRI/SPECT
                                  Registration Methods Using Realistic
                                  Simulated SPECT Data . . . . . . . . . . 275
              Graham Treece and   
             Richard Prager and   
                 Andrew Gee and   
                Laurence Berman   Correction of Probe Pressure Artifacts
                                  in Freehand $3$D Ultrasound  . . . . . . 283
                Kawal Rhode and   
               Gareth Ennew and   
            Tryphon Lambrou and   
        Alexander Seifalian and   
                   David Hawkes   In-Vitro Validation of a Novel
                                  Model-Based Approach to the Measurement
                                  of Arterial Blood Flow Waveforms from
                                  Dynamic Digital X-ray Images . . . . . . 291
                 G. Behiels and   
                    F. Maes and   
            D. Vandermeulen and   
                     P. Suetens   Retrospective Correction of the Heel
                                  Effect in Hand Radiographs . . . . . . . 301
            Gilles Duchemin and   
             Etienne Dombre and   
    François Pierrot and   
           Philippe Poignet and   
         Eric Dégoulange   SCALPP: a Safe Methodology to Robotize
                                  Skin Harvesting  . . . . . . . . . . . . 309
             Anshul Thakral and   
            Jeffrey Wallace and   
              Damian Tomlin and   
                Nikesh Seth and   
               Nitish V. Thakor   Surgical Motion Adaptive Robotic
                                  Technology (S.M.A.R.T): Taking the
                                  Motion out of Physiological Motion . . . 317
   Adriana Vilchis Gonzales and   
           Philippe Cinquin and   
           Jocelyne Troccaz and   
            Agn\`es Guerraz and   
            Bernard Hennion and   
          Franck Pellissier and   
              Pierre Thorel and   
           Fabien Courreges and   
              Alain Gourdon and   
      Gérard Poisson and   
             Pierre Vieyres and   
               Pierre Caron and   
   Olivier Mérigeaux and   
             Lo\"\ic Urbain and   
        Cédric Daimo and   
Stéphane Lavallée and   
          Philippe Arbeille and   
              Marc Althuser and   
           Jean-Marc Ayoubi and   
             Bertrand Tondu and   
                 Serge Ippolito   TER: a System for Robotic
                                  Tele-echography  . . . . . . . . . . . . 326
                     Xin Ma and   
                  Zhong Fan and   
             Chee-Kong Chui and   
                   Yiyu Cai and   
          James H. Anderson and   
            Wieslaw L. Nowinski   Digital Angioplasty Balloon Inflation
                                  Device for Interventional Cardiovascular
                                  Procedures . . . . . . . . . . . . . . . 335
            Giuseppe Megali and   
               Oliver Tonet and   
           Cesare Stefanini and   
            Mauro Boccadoro and   
  Vassilios Papaspyropoulos and   
           Licinio Angelini and   
                    Paolo Dario   A Computer-Assisted Robotic
                                  Ultrasound-Guided Biopsy System for
                                  Video-Assisted Surgery . . . . . . . . . 343
                 Gang Cheng and   
                Haisong Liu and   
                 Lydia Liao and   
                         Yan Yu   Dynamic Brachytherapy of the Prostate
                                  Under Active Image Guidance  . . . . . . 351
          M. P. S. F. Gomes and   
           A. R. W. Barrett and   
                   B. L. Davies   Computer-Assisted Soft-Tissue Surgery
                                  Training and Monitoring  . . . . . . . . 360
                 G. Lehmann and   
                    A. Chiu and   
                   D. Gobbi and   
              Y. Starreveld and   
                    D. Boyd and   
                M. Drangova and   
                      T. Peters   Towards Dynamic Planning and Guidance of
                                  Minimally Invasive Robotic Cardiac
                                  Bypass Surgical Procedures . . . . . . . 368
              Damian Tomlin and   
            Jeffrey Wallace and   
     Ralph Etienne-Cummings and   
                  Nitish Thakor   Novel Real-Time Tremor Transduction
                                  Technique for Microsurgery . . . . . . . 376
            Julien Dutreuil and   
   François Goulette and   
            Claude Laurgeau and   
       Jaime Clavero Zoreda and   
                Stefan Lundgren   Computer Assisted Dental Implantology: a
                                  New Method and a Clinical Validation . . 384
                Hongen Liao and   
            Susumu Nakajima and   
             Makoto Iwahara and   
           Etsuko Kobayashi and   
              Ichiro Sakuma and   
               Naoki Yahagi and   
                 Takeyoshi Dohi   Intra-operative Real-Time $3$-D
                                  Information Display System Based on
                                  Integral Videography . . . . . . . . . . 392
                M. W. Vogel and   
                 Suprijanto and   
                  F. M. Vos and   
              H. A. Vrooman and   
            A. M. Vossepoel and   
             P. M. T. Pattynama   Towards Motion-Robust Magnetic Resonance
                                  Thermometry  . . . . . . . . . . . . . . 401--408
               Manuela Kunz and   
           Matthias Strauss and   
             Frank Langlotz and   
        Georg Deuretzbacher and   
       Wolfgang Rüther and   
               Lutz-Peter Nolte   A Non-CT Based Total Knee Arthroplasty
                                  System Featuring Complete Soft-Tissue
                                  Balancing  . . . . . . . . . . . . . . . 409
              Dinggang Shen and   
               Zhiqiang Lao and   
              Jianchao Zeng and   
       Edward H. Herskovits and   
           Gabor Fichtinger and   
            Christos Davatzikos   A Statistical Atlas of Prostate Cancer
                                  for Optimal Biopsy . . . . . . . . . . . 416
                   D. Serby and   
                 M. Harders and   
              G. Székely   A New Approach to Cutting into Finite
                                  Element Models . . . . . . . . . . . . . 425
                  James Xia and   
               Jaime Gateno and   
          John Teichgraeber and   
                   Andrew Rosen   Methodology of Precise Skull Model
                                  Creation . . . . . . . . . . . . . . . . 434
                 David Dean and   
             Pengpeng Zhang and   
          Andrew K. Metzger and   
             Claudio Sibata and   
             Robert J. Maciunas   Medial Axis Seeding of a Guided
                                  Evolutionary Simulated Annealing (GESA)
                                  Algorithm for Automated Gamma Knife
                                  Radiosurgery Treatment Planning  . . . . 441
              Nathan Wilson and   
               Kenneth Wang and   
           Robert W. Dutton and   
                 Charles Taylor   A Software Framework for Creating
                                  Patient Specific Geometric Models from
                                  Medical Imaging Data for Simulation
                                  Based Medical Planning of Vascular
                                  Surgery  . . . . . . . . . . . . . . . . 449
                   Zirui Li and   
             Chee-Kong Chui and   
                   Yiyu Cai and   
          James H. Anderson and   
            Wieslaw L. Nowinski   Interactive Catheter Shape Modeling in
                                  Interventional Radiology Simulation  . . 457
                   Yiyu Cai and   
             Chee-Kong Chui and   
               Yaoping Wang and   
               Zhenlan Wang and   
              James H. Anderson   Parametric Eyeball Model for Interactive
                                  Simulation of Ophthalmologic Surgery . . 465
              Stefan Zachow and   
            Evgeny Gladilin and   
     Hans-Florian Zeilhofer and   
                   Robert Sader   Improved $3$D Osteotomy Planning in
                                  Cranio-maxillofacial Surgery . . . . . . 473
             Marie-Pierre Jolly   Combining Edge, Region, and Shape
                                  Information to Segment the Left
                                  Ventricle in Cardiac MR Images . . . . . 482
                   S. Young and   
                   V. Pekar and   
                       J. Weese   Vessel Segmentation for Visualization of
                                  MRA with Blood Pool Contrast Agent . . . 491
                Rok Bernard and   
              Bostjan Likar and   
                  Franjo Pernus   Segmenting Articulated Structures by
                                  Hierarchical Statistical Modeling of
                                  Shape, Appearance, and Topology  . . . . 499
       Siddharth Srivastava and   
           Koen Van Leemput and   
              Frederik Maes and   
          Dirk Vandermeulen and   
                   Paul Suetens   Validation of Nonlinear Spatial
                                  Filtering to Improve Tissue Segmentation
                                  of MR Brain Images . . . . . . . . . . . 507
                Guido Gerig and   
            Matthieu Jomier and   
                 Miranda Chakos   Valmet: a New Validation Tool for
                                  Assessing and Improving $3$D Object
                                  Segmentation . . . . . . . . . . . . . . 516
               Guo-Qing Wei and   
             JianZhong Qian and   
                Helmuth Schramm   A Dual Dynamic Programming Approach to
                                  the Detection of Spine Boundaries  . . . 524
               David Sarrut and   
        Sébastien Clippe   Geometrical Transformation Approximation
                                  for $2$D/$3$D Intensity-Based
                                  Registration of Portal Images and CT
                                  Scan . . . . . . . . . . . . . . . . . . 532
      J. Lötjönen and   
            T. Mäkelä   Elastic Matching Using a Deformation
                                  Sphere . . . . . . . . . . . . . . . . . 541
               Torsten Butz and   
           Jean-Philippe Thiran   Affine Registration with Feature Space
                                  Mutual Information . . . . . . . . . . . 549
      Timo Mäkelä and   
           Patrick Clarysse and   
   Jyrki Lötjönen and   
           Outi Sipilä and   
              Kirsi Lauerma and   
       Helena Hänninen and   
  Esa-Pekka Pyökkimies and   
              Jukka Nenonen and   
              Juhani Knuuti and   
               Toivo Katila and   
             Isabelle E. Magnin   A New Method for the Registration of
                                  Cardiac PET and MR Images Using
                                  Deformable Model Based Segmentation of
                                  the Main Thorax Structures . . . . . . . 557
                  P. Jannin and   
               M. Raimbault and   
                 X. Morandi and   
                      B. Gibaud   Modeling Surgical Procedures for
                                  Multimodal Image-Guided Neurosurgery . . 565
          Julia A. Schnabel and   
            Daniel Rueckert and   
               Marcel Quist and   
           Jane M. Blackall and   
   Andy D. Castellano-Smith and   
            Thomas Hartkens and   
           Graeme P. Penney and   
             Walter A. Hall and   
                Haiying Liu and   
          Charles L. Truwit and   
         Frans A. Gerritsen and   
           Derek L. G. Hill and   
                David J. Hawkes   A Generic Framework for Non-rigid
                                  Registration Based on Non-uniform
                                  Multi-level Free-Form Deformations . . . 573
              Manfred Alker and   
          Sönke Frantz and   
                  Karl Rohr and   
            H. Siegfried Stiehl   Improving the Robustness in Extracting
                                  $3$D Point Landmarks from $3$D Medical
                                  Images Using Parametric Deformable
                                  Models . . . . . . . . . . . . . . . . . 582
               Andreas Hein and   
               Martin Klein and   
               Tim C. Lueth and   
               Jochen Queck and   
                Malte Stien and   
            Olaf Schermeier and   
                   Juergen Bier   Integration and Clinical Evaluation of
                                  an Interactive Controllable Robotic
                                  System for Anaplastology . . . . . . . . 591
         Albert W. Brzeczko and   
         Randal P. Goldberg and   
          Russell H. Taylor and   
                    Peter Evans   Smart Alignment Tool for Knee
                                  MosaicPlasty Surgery . . . . . . . . . . 599
           Ryoichi Nakamura and   
               Takeshi Oura and   
           Etsuko Kobayashi and   
              Ichiro Sakuma and   
             Takeyoshi Dohi and   
               Naoki Yahagi and   
             Takayuki Tsuji and   
             Mitsuo Shimada and   
               Makoto Hashizume   Multi-DOF Forceps Manipulator System for
                                  Laparoscopic Surgery --- Mechanism
                                  Miniaturized & Evaluation of New
                                  Interface  . . . . . . . . . . . . . . . 606
       Aleksandar Zivanovic and   
                   Brian Davies   The Development of a Haptic Robot to
                                  Take Blood Samples from the Forearm  . . 614
               Gabriel Kiss and   
   Johan Van Cleynenbreugel and   
            Maarten Thomeer and   
               Paul Suetens and   
                    Guy Marchal   Computer Aided Diagnosis for Virtual
                                  Colonography . . . . . . . . . . . . . . 621
    Marius George Linguraru and   
              Michael Brady and   
                   Margaret Yam   Filtering h int Images for the Detection
                                  of Microcalcifications . . . . . . . . . 629
                 Burak Acar and   
                Sandy Napel and   
                 David Paik and   
    Burak Göktürk and   
               Carlo Tomasi and   
        Christopher F. Beaulieu   Using Optical Flow Fields for Polyp
                                  Detection in Virtual Colonoscopy . . . . 637
                  F. M. Vos and   
            I. W. O. Serlie and   
           R. E. van Gelder and   
                 F. H. Post and   
                  R. Truyen and   
            F. A. Gerritsen and   
                  J. Stoker and   
                A. M. Vossepoel   A New Visualization Method for Virtual
                                  Colonoscopy  . . . . . . . . . . . . . . 645
                     Y. Liu and   
                F. Dellaert and   
              W. E. Rothfus and   
                   A. Moore and   
               J. Schneider and   
                      T. Kanade   Classification-Driven Pathological
                                  Neuroimage Retrieval Using Statistical
                                  Asymmetry Measures . . . . . . . . . . . 655
          Jonathan Stoeckel and   
  Grégoire Malandain and   
             Octave Migneco and   
    Pierre Malick Koulibaly and   
            Philippe Robert and   
            Nicholas Ayache and   
               Jacques Darcourt   Classification of SPECT Images of Normal
                                  Subjects versus Images of Alzheimer's
                                  Disease Patients . . . . . . . . . . . . 666
               Yann Argotti and   
            Valerie Outters and   
                Larry Davis and   
                    Ami Sun and   
             Jannick P. Rolland   Technologies for Augmented Reality:
                                  Calibration for Real-Time
                                  Superimposition on Rigid and
                                  Simple-Deformable Real Objects . . . . . 675
             George Stetten and   
                    Vikram Chib   Magnified Real-Time Tomographic
                                  Reflection . . . . . . . . . . . . . . . 683
              Stijn De Buck and   
   Johan Van Cleynenbreugel and   
                 Indra Geys and   
            Thomas Koninckx and   
        Philippe R. Koninck and   
                   Paul Suetens   A System to Support Laparoscopic Surgery
                                  by Augmented Reality Visualization . . . 691
           C. M. van Bemmel and   
              W. J. Niessen and   
                    O. Wink and   
                B. Verdonck and   
                M. A. Viergever   Blood Pool Agent CE-MRA: Improved
                                  Arterial Visualization of the Aortoiliac
                                  Vasculature in the Steady-State Using
                                  First-Pass Data  . . . . . . . . . . . . 699
                   F. Sauer and   
                 A. Khamene and   
                  B. Bascle and   
                   G. J. Rubino   A Head-Mounted Display System for
                                  Augmented Reality Image Guidance:
                                  Towards Clinical Evaluation for
                                  iMRI-guided Neurosurgery . . . . . . . . 707
               Sangyoon Lee and   
           Gabor Fichtinger and   
          Gregory S. Chirikjian   Novel Algorithms for Robust Registration
                                  of Fiducials in CT and MRI . . . . . . . 717
              Margrit Betke and   
              Harrison Hong and   
                     Jane P. Ko   Automatic $3$D Registration of Lung
                                  Surfaces in Computed Tomography Scans    725
             Pascal Cachier and   
Jean-François Mangin and   
              Xavier Pennec and   
            Denis Rivi\`ere and   
Dimitri Papadopoulos-Orfanos and   
          Jean Régis and   
                Nicholas Ayache   Multisubject Non-rigid Registration of
                                  Brain MRI Using Intensity and Geometric
                                  Features . . . . . . . . . . . . . . . . 734
                S. Ourselin and   
                E. Bardinet and   
                 D. Dormont and   
               G. Malandain and   
                   A. Roche and   
                  N. Ayache and   
            D. Tandé and   
                  K. Parain and   
                      J. Yelnik   Fusion of Histological Sections and MR
                                  Images: Towards the Construction of an
                                  Atlas of the Human Basal Ganglia . . . . 743
   Sébastien Granger and   
              Xavier Pennec and   
                   Alexis Roche   Rigid Point-Surface Registration Using
                                  an EM Variant of ICP for Computer Guided
                                  Oral Implantology  . . . . . . . . . . . 752
               G. P. Penney and   
              P. J. Edwards and   
                 A. P. King and   
             J. M. Blackall and   
            P. G. Batchelor and   
                   D. J. Hawkes   A Stochastic Iterative Closest Point
                                  Algorithm (stochastICP)  . . . . . . . . 762
    Michael H. F. Wilkinson and   
           Michel A. Westenberg   Shape Preserving Filament Enhancement
                                  Filtering  . . . . . . . . . . . . . . . 770
                 Xujiong Ye and   
            J. Alison Noble and   
                Jerome Declerck   $3$D Freehand Echocardiography for
                                  Automatic Left Ventricle Reconstruction
                                  and Analysis Based on Multiple Acoustic
                                  Windows  . . . . . . . . . . . . . . . . 778
             William Kerwin and   
                   Chao Han and   
               Baocheng Chu and   
               Dongxiang Xu and   
                   Ying Luo and   
            Jenq-Neng Hwang and   
           Thomas Hatsukami and   
                      Chun Yuan   A Quantitative Vascular Analysis System
                                  for Evaluation of Atherosclerotic
                                  Lesions by MRI . . . . . . . . . . . . . 786
              David Hattery and   
        Victor Chernomordik and   
          Amir Gandjbakhche and   
                    Murray Loew   Imaging Metabolism with Light:
                                  Quantifying Local Fluorescence Lifetime
                                  Perturbation in Tissue-like Turbid Media 795
             Yoshinobu Sato and   
        Katsuyuki Nakanishi and   
             Hisashi Tanaka and   
             Takashi Nishii and   
            Nobuhiko Sugano and   
          Hironobu Nakamura and   
              Takahiro Ochi and   
                Shinichi Tamura   Limits to the Accuracy of $3$D Thickness
                                  Measurement in Magnetic Resonance Images 803
              Sylvain Prima and   
            Nicholas Ayache and   
                Tom Barrick and   
                   Neil Roberts   Maximum Likelihood Estimation of the
                                  Bias Field in MR Brain Images:
                                  Investigating Different Modelings of the
                                  Imaging Process  . . . . . . . . . . . . 811
             Abhir Bhalerao and   
          Elke Thönnes and   
            Wilfrid Kendall and   
                  Roland Wilson   Inferring Vascular Structure from $2$D
                                  and $3$D Imagery . . . . . . . . . . . . 820
             Benjamin Stein and   
              Dimitri Lisin and   
            Joseph Horowitz and   
             Edward Riseman and   
                   Gary Whitten   Statistical and Deformable Model
                                  Approaches to the Segmentation of MR
                                  Imagery and Volume Estimation of Stroke
                                  Lesions  . . . . . . . . . . . . . . . . 829
              Rasmus Larsen and   
        Hrafnkell Eiriksson and   
             Mikkel B. Stegmann   Q--MAF Shape Decomposition . . . . . . . 837
                    O. Wink and   
              W. J. Niessen and   
                B. Verdonck and   
                M. A. Viergever   Vessel Axis Determination Using Wave
                                  Front Propagation Analysis . . . . . . . 845
 Catherine Desbleds-Mansard and   
            Alfred Anwander and   
             Linda Chaabane and   
              Maciej Orkisz and   
               Bruno Neyran and   
          Philippe C. Douek and   
             Isabelle E. Magnin   Size Independent Active Contour Model
                                  for Blood Vessel Lumen Quantification in
                                  High-Resolution Magnetic Resonance
                                  Images . . . . . . . . . . . . . . . . . 854
           Stephen M. Pizer and   
               Sarang Joshi and   
         P. Thomas Fletcher and   
              Martin Styner and   
              Gregg Tracton and   
                  James Z. Chen   Segmentation of Single-Figure Objects by
                                  Deformable $M$-reps  . . . . . . . . . . 862
          Andreas Degenhard and   
           Christine Tanner and   
               Carmel Hayes and   
            David J. Hawkes and   
                Martin O. Leach   Half Fourier Acquisition Applied to Time
                                  Series Analysis of Contrast Agent Uptake 872
           Laurent Thoraval and   
         Jean-Paul Armspach and   
                    Izzie Namer   Analysis of Brain Functional MRI Time
                                  Series Based on Continuous Wavelet
                                  Transform and Stimulation-Response
                                  Coupling Distance  . . . . . . . . . . . 881
María J. Ledesma-Carbayo and   
                  Jan Kybic and   
               Manuel Desco and   
       Andrés Santos and   
                  Michael Unser   Cardiac Motion Analysis from Ultrasound
                                  Sequences Using Non-rigid Registration   889
                  A. Cachia and   
               J.-F. Mangin and   
               D. Rivi\`ere and   
                N. Boddaert and   
                 A. Andrade and   
                  F. Kherif and   
                  P. Sonigo and   
    D. Papadopoulos-Orfanos and   
             M. Zilbovicius and   
               J.-B. Poline and   
                   I. Bloch and   
                F. Brunelle and   
                J. Régis   A Mean Curvature Based Primal Sketch to
                                  Study the Cortical Folding Process from
                                  Antenatal to Adult Brain . . . . . . . . 897
         John W. Fisher III and   
        Eric R. Cosman, Jr. and   
                Cindy Wible and   
           William M. Wells III   Adaptive Entropy Rates for fMRI
                                  Time-Series Analysis . . . . . . . . . . 905
                  Tal Arbel and   
             Xavier Morandi and   
             Roch M. Comeau and   
               D. Louis Collins   Automatic Non-linear MRI-Ultrasound
                                  Registration for the Correction of
                                  Intra-operative Brain Deformations . . . 913
                J. Rexilius and   
             S. K. Warfield and   
          C. R. G. Guttmann and   
                     X. Wei and   
                  R. Benson and   
                 L. Wolfson and   
                 M. Shenton and   
                 H. Handels and   
                     R. Kikinis   A Novel Nonrigid Registration Algorithm
                                  and Applications . . . . . . . . . . . . 923
         Stephen R. Aylward and   
                  Sue Weeks and   
              Elizabeth Bullitt   Analysis of the Parameter Space of a
                                  Metric for Registering $3$D Vascular
                                  Images . . . . . . . . . . . . . . . . . 932
              Devin V. Amin and   
               Takeo Kanade and   
          Branislav Jaramaz and   
     Anthony M. DiGioia III and   
         Constantinos Nikou and   
         Richard S. LaBarca and   
            James E. Moody, Jr.   Calibration Method for Determining the
                                  Physical Location of the Ultrasound
                                  Image Plane  . . . . . . . . . . . . . . 940
           Isabelle Corouge and   
         Christian Barillot and   
             Pierre Hellier and   
            Pierre Toulouse and   
                 Bernard Gibaud   Non-linear Local Registration of
                                  Functional Data  . . . . . . . . . . . . 948
                E. Bardinet and   
        A. C. F. Colchester and   
                   A. Roche and   
                     Y. Zhu and   
                      Y. He and   
                S. Ourselin and   
                  B. Nailon and   
               S. A. Hojjat and   
                J. Ironside and   
               S. Al-Sarraj and   
                  N. Ayache and   
                     J. Wardlaw   Registration of Reconstructed Post
                                  Mortem Optical Data with MR Scans of the
                                  Same Patient . . . . . . . . . . . . . . 957
           Hiroyuki Kataoka and   
          Toshikatsu Washio and   
             Michel Audette and   
              Kazuyuki Mizuhara   A Model for Relations between Needle
                                  Deflection, Force, and Thickness on
                                  Needle Penetration . . . . . . . . . . . 966
        Mark P. Ottensmeyer and   
      J. Kenneth Salisbury, Jr.   In Vivo Data Acquisition Instrument for
                                  Solid Organ Mechanical Property
                                  Measurement  . . . . . . . . . . . . . . 975
              Daniel Mocanu and   
         Joachim Kettenbach and   
         Michael O. Sweeney and   
         Bruce H. KenKnight and   
                Ron Kikinis and   
           Solomon R. Eisenberg   Patient-Specific Simulation of Internal
                                  Defibrillation . . . . . . . . . . . . . 983--990
           Pieter De Groeve and   
            Filip Schutyser and   
   Johan Van Cleynenbreugel and   
                   Paul Suetens   Registration of $3$D Photographs with
                                  Spiral CT Images for Soft Tissue
                                  Simulation in Maxillofacial Surgery  . . 991
                   M. Kukuk and   
                  B. Geiger and   
                 H. Müller   TBNA-protocols . . . . . . . . . . . . . 997
            Moumen T. Ahmed and   
               Ahmed H. Eid and   
                   Aly A. Farag   $3$D Reconstruction of the Human Jaw: a
                                  New Approach and Improvements  . . . . . 1007
               Naoki Suzuki and   
              Asaki Hattori and   
           Shigeyuki Suzuki and   
                Max P. Baur and   
             Andreas Hirner and   
           Susumu Kobayashi and   
              Yoji Yamazaki and   
               Yoshitaka Adachi   Real-Time Surgical Simulation with
                                  Haptic Sensation as Collaborated Works
                                  between Japan and Germany  . . . . . . . 1015
           Lauren O'Donnell and   
        Carl-Fredrik Westin and   
         W. Eric L. Grimson and   
           Juan Ruiz-Alzola and   
          Martha E. Shenton and   
                    Ron Kikinis   Phase-Based User-Steered Image
                                  Segmentation . . . . . . . . . . . . . . 1022
Miguel A. Rodriguez-Florido and   
              Karl Krissian and   
           Juan Ruiz-Alzola and   
            Carl-Fredrik Westin   Comparison of Two Restoration Techniques
                                  in the Context of $3$D Medical Imaging   1031
           Benoit M. Dawant and   
                 Shiyan Pan and   
                         Rui Li   Robust Segmentation of Medical Images
                                  Using Geometric Deformable Models and a
                                  Dynamic Speed Function . . . . . . . . . 1040
          Celina Imielinska and   
           Dimitris Metaxas and   
              Jayaram Udupa and   
                Yinpeng Jin and   
                      Ting Chen   Hybrid Segmentation of Anatomical Data   1048
                Yuri Boykov and   
              Vivian S. Lee and   
              Henry Rusinek and   
                    Ravi Bansal   Segmentation of Dynamic N--D Data Sets
                                  via Graph Cuts Using Markov Models . . . 1058
              Chahin Pachai and   
                Yue Min Zhu and   
     Charles R. G. Guttmann and   
                Ron Kikinis and   
           Ferenc A. Jolesz and   
Gérard Gimenez Jean-Claude Froment and   
       Christian Confavreux and   
              Simon K. Warfield   Unsupervised and Adaptive Segmentation
                                  of Multispectral $3$D Magnetic Resonance
                                  Images of Human Brain: a Generic
                                  Approach . . . . . . . . . . . . . . . . 1067
              David Jaffray and   
            Marcel van Herk and   
              Joos Lebesque and   
                Alvaro Martinez   Image Guided Radiotherapy of the
                                  Prostate . . . . . . . . . . . . . . . . 1075
              Karen E. Lunn and   
                Alex Hartov and   
             Eric W. Hansen and   
                    Hai Sun and   
           David W. Roberts and   
               Keith D. Paulsen   A Quantitative Comparison of Edges in
                                  $3$D Intraoperative Ultrasound and
                                  Preoperative MR Images of the Brain  . . 1081
     A. D. Castellano-Smith and   
                T. Hartkens and   
                J. Schnabel and   
                 D. R. Hose and   
                     H. Liu and   
                 W. A. Hall and   
               C. L. Truwit and   
               D. J. Hawkes and   
                  D. L. G. Hill   Constructing Patient Specific Models for
                                  Correcting Intraoperative Brain
                                  Deformation  . . . . . . . . . . . . . . 1091
         Cristiano Paggetti and   
            Sandra Martelli and   
              Laura Nofrini and   
              Paolo Vendruscolo   Interface Design and Evaluation for CAS
                                  Systems  . . . . . . . . . . . . . . . . 1099
             T. Hüfner and   
                   M. Citak and   
                   S. Tarte and   
                J. Geerling and   
               T. Pohlemann and   
               H. Rosenthal and   
                L. P. Nolte and   
                     C. Krettek   Independent Registration and Virtual
                                  Controlled Reduction of Pelvic Ring
                                  Fractures  . . . . . . . . . . . . . . . 1107
               Ariela Sofer and   
              Jianchao Zeng and   
                   Seong K. Mun   Optimization in Prostate Cancer
                                  Detection  . . . . . . . . . . . . . . . 1114
             S. Taivalkoski and   
                L. Jyrkinen and   
               O. Silvén   Automated Identification and B-spline
                                  Approximation of a Profiling Coil
                                  Centerline from Magnetic Resonance
                                  Images . . . . . . . . . . . . . . . . . 1122
              Peter M. Tate and   
           Vladimir Lachine and   
                   Liqun Fu and   
            Haniel Croitoru and   
                    Marwan Sati   Performance and Robustness of Automatic
                                  Fluoroscopic Image Calibration in a New
                                  Computer Assisted Surgery System . . . . 1130
                   Alan Liu and   
         Christoph Kaufmann and   
                   Daigo Tanaka   An Architecture for Simulating
                                  Needle-Based Surgical Procedures . . . . 1137
               David Voirin and   
                Yohan Payan and   
            Miriam Amavizca and   
              Antoine Leroy and   
 Christian Létoublon and   
               Jocelyne Troccaz   Computer-Aided Hepatic Tumour Ablation   1145
   Johan Van Cleynenbreugel and   
            Filip Schutyser and   
            Chantal Malevez and   
               Ellen Dhoore and   
          Charbel BouSerhal and   
           Reinhilde Jacobs and   
               Paul Suetens and   
         Daniel van Steenberghe   Intra-operative Transfer of Planned
                                  Zygomatic Fixtures by Personalized
                                  Templates: a Cadaver Validation Study    1147
       Kathleen J. M. Surry and   
                Terry M. Peters   A PVA--C Brain Phantom Derived from a
                                  High Quality $3$D MR Data Set  . . . . . 1149
             Yoshinobu Sato and   
            Masaki Miyamoto and   
          Masahiko Nakamoto and   
         Yoshikazu Nakajima and   
             Mitsuo Shimada and   
           Makoto Hashizume and   
                Shinichi Tamura   $3$D Ultrasound Image Acquisition Using
                                  a Magneto-optic Hybrid Sensor for
                                  Laparoscopic Surgery . . . . . . . . . . 1151
                R. E. Ellis and   
                    D. Kerr and   
                J. F. Rudan and   
                    L. Davidson   Minimally Invasive Excision of Deep Bone
                                  Tumors . . . . . . . . . . . . . . . . . 1154
                   K. Kansy and   
               A. Schmitgen and   
                  M. Bublat and   
                  G. Grunst and   
                M. Jungmann and   
             P. Wisskirchen and   
                   M. Moche and   
                 G. Strauss and   
               C. Trantakis and   
                        T. Kahn   A Multimodal Navigation System for
                                  Interventional MRI . . . . . . . . . . . 1157
                  J. Bestel and   
          F. Clément and   
                      M. Sorine   A Biomechanical Model of Muscle
                                  Contraction  . . . . . . . . . . . . . . 1159
                 Wei-te Lin and   
                Richard A. Robb   A Framework for Patient-Specific
                                  Physics-Based Simulation and Interactive
                                  Visualization of Cardiac Dynamics  . . . 1162
     Seemantini K. Nadkarni and   
                 Greg Mills and   
          Derek R. Boughner and   
                  Aaron Fenster   A Pulsating Coronary Vessel Phantom for
                                  Two- and Three-Dimensional Intravascular
                                  Ultrasound Studies . . . . . . . . . . . 1164
           Cameron A. Shute and   
              Antony J. Hodgson   Repeatability and Accuracy of Ankle
                                  Centre Location Estimates Using a
                                  Biaxial Joint Model  . . . . . . . . . . 1166
         Sharif M. Qatarneh and   
        Simo Hyödynmaa and   
             Marilyn E. Noz and   
      Gerald Q. Maguire Jr. and   
           Elissa L. Kramer and   
                Joakim Crafoord   A Whole Body Atlas Based Segmentation
                                  for Delineation of Organs in Radiation
                                  Therapy Planning . . . . . . . . . . . . 1168
               Xuesong Chen and   
             Chee-Kong Chui and   
              Swee-Hin Teoh and   
               Sim-Heng Ong and   
            Wieslaw L. Nowinski   Automatic Modeling of Anatomical
                                  Structures for Biomechanical Analysis
                                  and Visualization in a Virtual Spine
                                  Workstation  . . . . . . . . . . . . . . 1170
        Saskia van Engeland and   
              Nico Karssemeijer   Matching Breast Lesions in Multiple
                                  Mammographic Views . . . . . . . . . . . 1172
C. E. Rodríguez-Carranza and   
                     M. H. Loew   Automatic Detection of Large
                                  Misregistrations of Multimodality
                                  Medical Images . . . . . . . . . . . . . 1174
          Jason W. Trobaugh and   
               R. Martin Arthur   Registration of the Spine Using a
                                  Physically-Based Image Model for
                                  Ultrasound . . . . . . . . . . . . . . . 1176
               Brian Avants and   
           Marcelo Siqueira and   
                      James Gee   Computing Match Functions for Curves in
                                  $ {\mathrm I} \! {\mathrm R}^2 $ and $
                                  {\mathrm I} \! {\mathrm R}^3 $ by
                                  Refining Polyline Approximations . . . . 1178
           Matthias Harders and   
    Gábor Székely   A Multi-modal Approach to Segmentation
                                  of Tubular Structures  . . . . . . . . . 1180
              Vincent Barra and   
       Jean-Jacques Lemaire and   
               Franck Durif and   
                Jean-Yves Boire   Segmentation of the Subthalamic Nucleus
                                  in MR Images Using Information Fusion
                                  --- A Preliminary Study for a
                                  Computed-Aided Surgery of Parkinson's
                                  Disease  . . . . . . . . . . . . . . . . 1183
         E. G. P. Bovenkamp and   
                J. Dijkstra and   
                J. G. Bosch and   
                J. H. C. Reiber   Collaborative Multi-agent IVUS Image
                                  Segmentation . . . . . . . . . . . . . . 1185
            A. W. Simonetti and   
                 R. Wehrens and   
               L. M. C. Buydens   Segmentation of Chemical Shift Images
                                  with Mixture Modeling  . . . . . . . . . 1187
             Simon Duchesne and   
               D. Louis Collins   Analysis of $3$D Deformation Fields for
                                  Appearance-Based Segmentation  . . . . . 1189
         Marc Liévin and   
               Nils Hanssen and   
              Peter Zerfass and   
                    Erwin Keeve   $3$D Markov Random Fields and Region
                                  Growing for Interactive Segmentation of
                                  MR Data  . . . . . . . . . . . . . . . . 1191
                   Z. Yaniv and   
                   L. Joskowicz   Long Bone Panoramas from Fluoroscopic
                                  X-ray Images . . . . . . . . . . . . . . 1193
            Heinz Wörn and   
                   Harald Hoppe   Augmented Reality in the Operating
                                  Theatre of the Future  . . . . . . . . . 1195
             Shinobu Mizuta and   
             Ken-ichi Kanda and   
                Tetsuya Matsuda   Volume Visualization Using
                                  Gradient-Based Distance among Voxels . . 1197
               Daigo Tanaka and   
                   Alan Liu and   
             Christoph Kaufmann   The Evaluation of the Color Blending
                                  Function for the Texture Generation from
                                  Photographs  . . . . . . . . . . . . . . 1199
              Tae-Young Kim and   
           Byeong-Seok Shin and   
                 Yeong Gil Shin   Anisotropic Volume Rendering Using
                                  Intensity Interpolation  . . . . . . . . 1201
            Hayit Greenspan and   
               Sharon Peled and   
                     Gal Oz and   
                  Nahum Kiryati   MRI Inter-slice Reconstruction Using
                                  Super-Resolution . . . . . . . . . . . . 1204
     Marjolein van der Glas and   
                  Frans Vos and   
               Albert Vossepoel   Assessment of Center of Rotation of the
                                  Glenohumeral Joint . . . . . . . . . . . 1207
                  M. Nobler and   
                      S. Yu and   
                   B. Mensh and   
                 S. Lisanby and   
                 L. Alkalay and   
             R. Van Heertum and   
                   E. Heyer and   
                     H. Sackeim   PET Studies of the Effects of ECT on
                                  Cerebral Physiology  . . . . . . . . . . 1210
            Jeffrey Wallace and   
      Homayoun Mozaffari N. and   
                     Li Pan and   
               Nitish V. Thakor   Fuzzy C-means Clustering Analysis to
                                  Monitor Tissue Perfusion with Near
                                  Infrared Imaging . . . . . . . . . . . . 1213
   Johan Van Cleynenbreugel and   
              Lars Bergmans and   
             Martine Wevers and   
                Paul Lambrechts   A Method for $ \mu $CT Based Assessment
                                  of Root Canal Instrumentation in
                                  Endodontics Research . . . . . . . . . . 1215
                   H. Kober and   
               O. Ganslandt and   
                 Ch. Nimsky and   
              M. Buchfelder and   
                   R. Fahlbusch   Reconstruction of Subcortical Brain
                                  Activity by Spatially Filtered MEG
                                  During Epileptic Seizures  . . . . . . . 1218
             Eduard Solanas and   
           Jean-Philippe Thiran   Exploiting Voxel Correlation for
                                  Automated MRI Bias Field Correction by
                                  Conditional Entropy Minimization . . . . 1220
                    M. Lyra and   
            K. Skouroliakou and   
          C. Georgosopoulos and   
              C. Stefanides and   
                    J. Jordanou   Single Photon Emission Computed
                                  Tomography and $3$ Dimensional
                                  Quantitative Evaluation in Renal
                                  Scintigraphy . . . . . . . . . . . . . . 1222
                  O. Gerard and   
                 M. Fradkin and   
           A. Collet Billon and   
                   M. Jacob and   
                J.-M. Rouet and   
                S. Makram-Ebeid   Automatic Analysis of the Left Ventricle
                                  in the Time Sequences of $3$D
                                  Echo-Cardiographic Images  . . . . . . . 1224
                  Sabine Dippel   Displacement Field Estimation from
                                  CSPAMM Images without Segmentation of
                                  the Myocardium . . . . . . . . . . . . . 1226
            Luuk Spreeuwers and   
                Marcel Breeuwer   Automatic Detection of Myocardial
                                  Boundaries in MR Cardio Perfusion Images 1228
                  David Rey and   
          Jonathan Stoeckel and   
  Grégoire Malandain and   
                Nicholas Ayache   Using SPM to Detect Evolving MS Lesions  1232
         Edward Brian Welch and   
            Armando Manduca and   
             Roger C. Grimm and   
              Heidi A. Ward and   
           Clifford R. Jack Jr.   Spherical Navigator Echoes for Full
                                  $3$-D Rigid Body Motion Measurement in
                                  MRI  . . . . . . . . . . . . . . . . . . 1235
                 Suprijanto and   
                  F. M. Vos and   
                M. W. Vogel and   
            A. M. Vossepoel and   
                  H. M. Vrooman   Phase Unwrapping for Magnetic Resonance
                                  Thermometry  . . . . . . . . . . . . . . 1237
                  A. Hartov and   
                     H. Sun and   
              D. W. Roberts and   
                  K. D. Paulsen   A Simplified Field-of-View Calibration
                                  Technique for an Operating Microscope    1240
        David R. Holmes III and   
             Brian J. Davis and   
                Richard A. Robb   Trans-urethral Ultrasound: a New Tool
                                  for Diagnostic and Therapeutic Imaging
                                  in Prostate Cancer . . . . . . . . . . . 1243
                J. Geerling and   
             T. Hüfner and   
                    R. Raab and   
                   M. Citak and   
               T. Pohlemann and   
               H. Rosenthal and   
                     C. Krettek   Resection of Recurrent Carcinomas in the
                                  Pelvis --- A New Field of Computer Aided
                                  Surgery  . . . . . . . . . . . . . . . . 1245
              P. Hastreiter and   
                   K. Engel and   
                    G. Soza and   
                   M. Bauer and   
                    M. Wolf and   
               O. Ganslandt and   
               R. Fahlbusch and   
                 G. Greiner and   
                    T. Ertl and   
                     Ch. Nimsky   Remote Analysis for Brain Shift
                                  Compensation . . . . . . . . . . . . . . 1248
              Jianchao Zeng and   
               Ariela Sofer and   
                   Seong K. Mun   Development of a New Image-Guided
                                  Prostate Biopsy System . . . . . . . . . 1250
          Michael Rosenthal and   
                Susan Weeks and   
            Stephen Aylward and   
          Elizabeth Bullitt and   
                    Henry Fuchs   Intraoperative Tracking of Anatomical
                                  Structures Using Fluoroscopy and a
                                  Vascular Balloon Catheter  . . . . . . . 1253
               Marc Kessler and   
             Janelle Solock and   
                Paul Archer and   
                  Charles Meyer   Clinical Use of a Mutual
                                  Information-Based Automated Image
                                  Registration System for Conformal
                                  Radiotherapy Treatment Planning  . . . . 1255
            Filip Schutyser and   
   Johan Van Cleynenbreugel and   
                   Paul Suetens   Validation Methods for Soft Tissue
                                  Prediction in Maxillofacial Planning
                                  Environments . . . . . . . . . . . . . . 1258
             Steven Lobregt and   
               Ted Vuurberg and   
            Joost J. Schillings   Dental Implant Planning in EasyVision    1261
              Ullrich Meier and   
           Carlos Monserrat and   
        Nils-Christian Parr and   
Francisco Javier García and   
        José Antonio Gil   Real-Time Simulation of
                                  Minimally-Invasive Surgery with Cutting
                                  Based on Boundary Element Methods  . . . 1263
         Reza Arbab Chirani and   
      Jean-José Jacq and   
             Christian Roux and   
                Philippe Meriot   $3$-D Reconstruction and Functional
                                  Analysis of the Temporomandibular Joint  1265
               Fred S. Azar and   
        Dimitris N. Metaxas and   
            Mitchell D. Schnall   Methods for Modeling and Predicting
                                  Mechanical Deformations of the Breast
                                  Under External Perturbations . . . . . . 1267
         Jean-Marc Schwartz and   
            \`Eve Langelier and   
           Christian Moisan and   
               Denis Laurendeau   Non-linear Soft Tissue Deformations for
                                  the Simulation of Percutaneous Surgeries 1271
          Mark P. Wachowiak and   
             Adel S. Elmaghraby   The Continuous Tabu Search as an
                                  Optimizer for $2$D-to-$3$D Biomedical
                                  Image Registration . . . . . . . . . . . 1273
         Yoshitaka Masutani and   
                Fumihiko Kimura   Modally Controlled Free Form Deformation
                                  for Non-rigid Registration in
                                  Image-Guided Liver Surgery . . . . . . . 1275
                  P. Anbeek and   
              K. L. Vincken and   
          M. J. P. van Osch and   
             J. P. W. Pluim and   
           J. van der Grond and   
                M. A. Viergever   Two-Step Registration of Subacute to
                                  Hyperacute Stroke MRIs . . . . . . . . . 1279
                M. van Herk and   
             J. C. de Munck and   
    M. T. J. G. Groenewegen and   
               A. R. Peters and   
                        A. Touw   The Effect of Organ Motion and Image
                                  Artifacts on Monomodal Volume
                                  Registration . . . . . . . . . . . . . . 1281
                Jay B. West and   
              Rasool Khadem and   
                  Shao Chin and   
                  Ramin Shahidi   A Maximum Likelihood Approach for $2$-D
                                  to $3$-D Registration  . . . . . . . . . 1283
                 Pascal Cachier   How to Trade Off between Regularization
                                  and Image Similarity in Non-rigid
                                  Registration ? . . . . . . . . . . . . . 1285
                 F. Behloul and   
        B. P. F. Lelieveldt and   
        R. J. van der Geest and   
                J. H. C. Reiber   A Virtual Exploring Robot for Adaptive
                                  Left Ventricle Contour Detection in
                                  Cardiac MR Images  . . . . . . . . . . . 1287
      Jean-José Jacq and   
                 Christian Roux   A Mesh-Based Shape Analysis Framework    1289
              Horst K. Hahn and   
        Markus G. Lentschig and   
           Burckhard Terwey and   
             Heinz-Otto Peitgen   Clinical MRI Based Volumetry: The
                                  Cerebral Ventricles  . . . . . . . . . . 1291
                Maja Pokric and   
               Neil Thacker and   
       Marietta L. J. Scott and   
                   Alan Jackson   The Importance of Partial Voluming in
                                  Multi-dimensional Medical Image
                                  Segmentation . . . . . . . . . . . . . . 1293
        Grigoris Karangelis and   
            Stelios Zimeras and   
               Evelyn Firle and   
                   Min Wang and   
                 Georgios Sakas   Volume Definition Tools for Medical
                                  Imaging Applications . . . . . . . . . . 1295
         Rachael I. Scahill and   
            William R. Crum and   
                    Nick C. Fox   Automated Hippocampal Segmentation by
                                  Regional Fluid Registration of Serial
                                  MRI: Validation and Application in
                                  Alzheimer's Disease  . . . . . . . . . . 1298
                    Hui Luo and   
               Thomas O'Donnell   A $3$D Statistical Shape Model for the
                                  Left Ventricle of the Heart  . . . . . . 1300
                R. Boesecke and   
                   J. Brief and   
              J. Raczkowsky and   
                  O. Schorr and   
                 S. Daueber and   
                R. Krempien and   
                 M. Treiber and   
                  T. Wetter and   
                    S. Hassfeld   Robot Assistant for Dental Implantology  1302
               J. P. Ruurda and   
       I. A. M. J. Broeders and   
      R. K. J. Simmermacher and   
      I. H. M. Borel Rinkes and   
    Th. J. M. V. van Vroonhoven   Feasibility of Laparoscopic Surgery
                                  Assisted by a Robotic Telemanipulation
                                  System . . . . . . . . . . . . . . . . . 1304
            Alexandre Krupa and   
         Michel de Mathelin and   
         Christophe Doignon and   
           Jacques Gangloff and   
            Guillaume Morel and   
                  Luc Soler and   
              Jacques Marescaux   Development of Semi-autonomous Control
                                  Modes in Laparoscopic Surgery Using
                                  Automatic Visual Servoing  . . . . . . . 1306
                 Dirk Engel and   
           Joerg Raczkowsky and   
                    Heinz Woern   A Supervising System for Robot
                                  Application in Surgery . . . . . . . . . 1308
                 Xuemin Shi and   
                     Yi Guo and   
            Shogo Fukushima and   
              Kenshi Suzuki and   
           Hisashi Uchiyama and   
                Ichiro Fukumoto   A New Diagnostic Method for Alzheimer's
                                  Disease Using Pupillary Light Reflex . . 1310
          Kiyoshi Yoshinaka and   
               Ryo Sakamoto and   
                    Ken Ikeuchi   Reduction of Insertion Resistance by
                                  Means of Vibration for Catheters and
                                  Endoscopes . . . . . . . . . . . . . . . 1312
                Charlie Sim and   
             Ming-Yeong Teo and   
                Wan-Sing Ng and   
                   Carl Yap and   
             Yong-Chong Loh and   
             Tseng-Tsai Yeo and   
              Shao-Ping Bai and   
                     Charles Lo   Hexapod Intervention Planning for a
                                  Robotic Skull-Base Surgery System  . . . 1314
         Stephen J. Starkie and   
                Brian L. Davies   Advances in Active Constraints and Their
                                  Application to Minimally Invasive
                                  Surgery  . . . . . . . . . . . . . . . . 1316
         Edward Brian Welch and   
                Armando Manduca   Motion Correction of MRI from Orthogonal
                                  $k$-Space Phase Difference . . . . . . . 1318
            Fabien Mourgues and   
Frédéric Devernay and   
  Grégoire Malandain and   
          \`Eve Coste-Mani\`ere   $3$D+t Modeling of Coronary Artery Tree
                                  from Standard Non Simultaneous
                                  Angiograms . . . . . . . . . . . . . . . 1320
                  J. Mattes and   
                  J. Fieres and   
               J. Beaudouin and   
                 D. Gerlich and   
               J. Ellenberg and   
                        R. Eils   New Tools for Visualization and
                                  Quantification in Dynamic Processes:
                                  Application to the Nuclear Envelope
                                  Dynamics During Mitosis  . . . . . . . . 1323
                      Yi Su and   
            Armando Manduca and   
           Clifford R. Jack and   
             E. Brian Welch and   
               Richard L. Ehman   Full $3$D Rigid Body Automatic Motion
                                  Correction of MRI Images . . . . . . . . 1326
           I. A. Kakadiaris and   
                A. Pednekar and   
              G. Zouridakis and   
                 K. Grigoriadis   Estimating the Motion of the LAD: a
                                  Simulation-Based Study . . . . . . . . . 1328
                Idith Haber and   
                Ron Kikinis and   
            Carl-Fredrik Westin   Phase-Driven Finite Element Model for
                                  Spatio-temporal Tracking in Cardiac
                                  Tagged MRI . . . . . . . . . . . . . . . 1332
                Erwin Keeve and   
              Thomas Jansen and   
              Zdzislaw Krol and   
                Lutz Ritter and   
 Bartosz von Rymon-Lipinski and   
               Robert Sader and   
     Hans-Florian Zeilhofer and   
                  Peter Zerfass   JULIUS --- An Extendable Software
                                  Framework for Surgical Planning and
                                  Image-Guided Navigation  . . . . . . . . 1336
             J. M. Blackall and   
                 A. P. King and   
               G. P. Penney and   
                    A. Adam and   
                   D. J. Hawkes   A Statistical Model of Respiratory
                                  Motion and Deformation of the Liver  . . 1338
          Matthias Teschner and   
               Sabine Girod and   
               Kevin Montgomery   Evaluation of Soft-Tissue Model
                                  Parameters . . . . . . . . . . . . . . . 1341
        David J. Stahl, Jr. and   
              Norberto Ezquerra   Bag-of-Particles Model for Simulating
                                  Tissue, Organs, and Flow . . . . . . . . 1343
             Cynthia Bruyns and   
           Simon Wildermuth and   
               Kevin Montgomery   Simulated Animal Dissection  . . . . . . 1345
           Simon Wildermuth and   
             Cynthia Bruyns and   
           Kevin Montgomery and   
                 Borut Marincek   Virtual Polypectomy  . . . . . . . . . . 1347
             Cynthia Bruyns and   
              Steven Senger and   
           Simon Wildermuth and   
           Kevin Montgomery and   
                  Richard Boyle   Real-Time Interactions Using Virtual
                                  Tools  . . . . . . . . . . . . . . . . . 1349
           Matthieu Ferrant and   
         Olivier Cuisenaire and   
             Beno\^\it Macq and   
       Jean-Philippe Thiran and   
          Martha E. Shenton and   
                Ron Kikinis and   
              Simon K. Warfield   Surface Based Atlas Matching of the
                                  Brain Using Deformable Surfaces and
                                  Volumetric Finite Elements . . . . . . . 1352
               Niels Dekker and   
         Lennert S. Ploeger and   
                Marcel van Herk   Evaluation of Cost Functions for Gray
                                  Value Matching of $2$D Images in
                                  Radiotherapy . . . . . . . . . . . . . . 1354
          C. P. Behrenbruch and   
                   T. Kadir and   
                       M. Brady   Mutual Scale . . . . . . . . . . . . . . 1356
          Samson J. Timoner and   
         W. Eric L. Grimson and   
                Ron Kikinis and   
           William M. Wells III   Fast Linear Elastic Matching Without
                                  Landmarks  . . . . . . . . . . . . . . . 1358
              Rasool Khadem and   
             Michael R. Bax and   
          Jeremy A. Johnson and   
          Eric P. Wilkinson and   
                  Ramin Shahidi   Endoscope Calibration and Accuracy
                                  Testing for $3$D/$2$D Image Registration 1361
               B. C. Vemuri and   
                         J. Liu   Fast Non-rigid Multimodal Image
                                  Registration Using Local Frequency Maps  1363
         Yoshikazu Nakajima and   
           Toshihiko Sasama and   
             Yoshinobu Sato and   
             Takashi Nishii and   
            Nobuhiko Sugano and   
           Takashi Ishikawa and   
             Kazuo Yonenobu and   
              Takahiro Ochi and   
                Shinichi Tamura   Accuracy Validation of Cone-Beam CT
                                  Based Registration . . . . . . . . . . . 1366
  Luis Ibáñez and   
   Chafiaâ Hamitouche and   
             Martial Boniou and   
                 Christian Roux   Morphogenesis-Based Deformable Models
                                  Application to $3$D Medical Image
                                  Segmentation and Analysis  . . . . . . . 1369
                 Roger Hult and   
                Ewert Bengtsson   Grey-Level Morphology Based Segmentation
                                  of T1--MRI of the Human Cortex . . . . . 1371
           Matthias Gebhard and   
              Julian Mattes and   
                    Roland Eils   An Active Contour Model for Segmentation
                                  Based on Cubic B-splines and Gradient
                                  Vector Flow  . . . . . . . . . . . . . . 1373
           Gabor Fichtinger and   
                   Sheng Xu and   
              Attila Tanacs and   
              Kieran Murphy and   
                  Lee Myers and   
               Jeffery Williams   Approximate Volumetric Reconstruction
                                  from Projected Images  . . . . . . . . . 1376
                  T. S. Yoo and   
              K. R. Subramanian   Implicit Snakes: Active Constrained
                                  Implicit Models  . . . . . . . . . . . . 1379
          Casper F. Nielsen and   
              Peter J. Passmore   Towards a Robust Path Growing Algorithm
                                  for Semi-automatic MRI Segmentation  . . 1382
            J. M. Reinhardt and   
                     J. Guo and   
                   L. Zhang and   
                  D. Bilgen and   
                      S. Hu and   
                R. Uppaluri and   
                 R. M. Long and   
                 O. I. Saba and   
                G. McLennan and   
                   M. Sonka and   
                  E. A. Hoffman   Integrated System for Objective
                                  Assessment of Global and Regional Lung
                                  Structure  . . . . . . . . . . . . . . . 1384
                Ichiro Fukumoto   Computer Aided Diagnosis for the
                                  Alzheimer Type Dementia  . . . . . . . . 1386
                    M. Kubo and   
                T. Yamamoto and   
                  Y. Kawata and   
                    N. Niki and   
                  K. Eguchi and   
                 H. Ohmatsu and   
                R. Kakinuma and   
                  M. Kaneko and   
                M. Kusumoto and   
                N. Moriyama and   
                    K. Mori and   
                   H. Nishiyama   CAD System for the Assistance of
                                  Comparative Reading for Lung Cancer
                                  Using Serial Helical CT Images . . . . . 1388
               Celia Varela and   
          Nico Karssemeijer and   
               Pablo G. Tahoces   Classification of Breast Tumors on
                                  Digital Mammograms Using Laws' Texture
                                  Features . . . . . . . . . . . . . . . . 1391
                  Y. Kawata and   
                    N. Niki and   
                 H. Ohmatsu and   
                M. Kusumoto and   
                R. Kakinuma and   
                    K. Mori and   
               H. Nishiyama and   
                  K. Eguchi and   
                  M. Kaneko and   
                    N. Moriyama   Computer-Aided Diagnosis of Pulmonary
                                  Nodules Using Three-Dimensional Thoracic
                                  CT Images  . . . . . . . . . . . . . . . 1393
                Luca Bogoni and   
             Jane C. Asmuth and   
             David Hirvonen and   
        Bojidar D. Madjarov and   
              Jeffrey W. Berger   Ophthalmic Slitlamp-Based Computer-Aided
                                  Diagnosis: Image Processing Foundations  1395
              Sylvain Jaume and   
           Matthieu Ferrant and   
           Andreas Schreyer and   
               Lennox Hoyte and   
             Beno\^\it Macq and   
             Julia Fielding and   
                Ron Kikinis and   
              Simon K. Warfield   Multiresolution Signal Processing on
                                  Meshes for Automatic Pathological Shape
                                  Characterization . . . . . . . . . . . . 1398
             Abhir Bhalerao and   
                   Paul Summers   Interactive Visualisation of MRI Vector
                                  and Tensor Fields  . . . . . . . . . . . 1401
            Abhilash Pandya and   
             Mohamad Siadat and   
             Lucia Zamorano and   
              Jainxing Gong and   
                Qinghang Li and   
                James Maida and   
             Ioannis Kakadiaris   Tracking Methods for Medical Augmented
                                  Reality  . . . . . . . . . . . . . . . . 1404
                   S. Zhang and   
         Ç. Demiralp and   
                 M. DaSilva and   
                   D. Keefe and   
                 D. Laidlaw and   
            B. D. Greenberg and   
               P. J. Basser and   
               C. Pierpaoli and   
              E. A. Chiocca and   
                T. S. Deisboeck   Toward Application of Virtual Reality to
                                  Visualization of DT--MRI Volumes . . . . 1406
              O. Cuisenaire and   
                 M. Ferrant and   
            Y. Vandermeeren and   
                 E. Olivier and   
                        B. Macq   Registration and Visualization of
                                  Transcranial Magnetic Stimulation on MR
                                  Images . . . . . . . . . . . . . . . . . 1409
                 Dan Koppel and   
             Yuan-Fang Wang and   
                        Hua Lee   Automated Image Rectification in
                                  Video-Endoscopy  . . . . . . . . . . . . 1412
           Chris A. Cocosco and   
                  Alan C. Evans   Java Internet Viewer: a WWW Tool for
                                  Remote $3$D Medical Image Data
                                  Visualization and Comparison . . . . . . 1415
               Rajesh Kumar and   
            Aaron C. Barnes and   
           Gregory D. Hager and   
          Patrick S. Jensen and   
              Russell H. Taylor   Applications of Task-Level Augmentation
                                  for Cooperative Fine Manipulation Tasks
                                  in Surgery . . . . . . . . . . . . . . . 1417
               Shinsuk Park and   
             Robert D. Howe and   
             David F. Torchiana   Virtual Fixtures for Robotic Cardiac
                                  Surgery  . . . . . . . . . . . . . . . . 1419
         Alim-Louis Benabid and   
          Dominque Hoffmann and   
                  Luc Court and   
             Vincent Robert and   
    Sébastien Burtin and   
             Patrick Pittet and   
              Jörg Fischer   The Clinical Use of Multi-modal
                                  Resources ($2$D/$3$D/Statistics) for
                                  Robot Assisted Functional Neurosurgery   1421
               Kim Daeyoung and   
           Ryoichi Nakamura and   
           Etsuko Kobayashi and   
              Ichiro Sakuma and   
                 Takeyoshi Dohi   Application of Compact Pneumatic
                                  Actuators to Laparoscopic Manipulator    1424
         Peter J. Berkelman and   
         Daniel L. Rothbaum and   
                Jaydeep Roy and   
                   Sam Lang and   
          Louis L. Whitcomb and   
                 Greg Hager and   
          Patrick S. Jensen and   
             Eugene de Juan and   
          Russell H. Taylor and   
                John K. Niparko   Performance Evaluation of a Cooperative
                                  Manipulation Microsurgical Assistant
                                  Robot Applied to Stapedotomy . . . . . . 1426
         Randal P. Goldberg and   
             Mazilu Dumitru and   
          Russell H. Taylor and   
                Dan Stoianovici   A Modular Robotic System for Ultrasound
                                  Image Acquisition  . . . . . . . . . . . 1430
        Fridun Kerschbaumer and   
           Juergen Wahrburg and   
               Stephan Kuenzler   A Mechatronic System for the
                                  Implantation of the Acetabular Component
                                  in Total Hip Alloarthroplasty  . . . . . 1433
                Shaun Selha and   
              Pierre Dupont and   
                Robert Howe and   
                David Torchiana   Optimal Port Placement in Robot-Assisted
                                  Coronary Artery Bypass Grafting  . . . . 1435
                      Anonymous   Author Index . . . . . . . . . . . . . . 1437


Lecture Notes in Computer Science
Volume 2209, 2001

                Jan A. Audestad   Telecommunications, Databases, and
                                  Evolution  . . . . . . . . . . . . . . . 1
              Jovanka Adzic and   
               Valter Fiore and   
                 Stefano Spelta   Data Warehouse Population Platform . . . 9
          J. E. P. Wijnands and   
             S. J. Dijkstra and   
             W. L. A. Derks and   
                      W. Jonker   Experimenting NT Cluster Technology for
                                  Massive CDR Processing . . . . . . . . . 19
                Pei-Hsin Wu and   
              Wen-Chih Peng and   
                 Ming-Syan Chen   Mining Sequential Alarm Patterns in a
                                  Telecommunication Database . . . . . . . 37
          Michael O. Akinde and   
         Michael H. Böhlen   Generalized MD-Joins: Evaluation and
                                  Reduction to SQL . . . . . . . . . . . . 52
                David Toman and   
                  Grant Weddell   Query Processing in Embedded Control
                                  Programs . . . . . . . . . . . . . . . . 68
         Jan Lindström and   
                Tiina Niklander   Benchmark for Real-Time Database Systems
                                  for Telecommunications . . . . . . . . . 88
   Anders Björnerstedt and   
              Helena Ketoja and   
              Johan Sintorn and   
              Martin Sköld   Replication between Geographically
                                  Separated Clusters --- An Asynchronous
                                  Scalable Replication Mechanism for Very
                                  High Availability  . . . . . . . . . . . 102
           Roger Zimmermann and   
                     Kun Fu and   
              Cyrus Shahabi and   
          Didi Shu-Yuen Yao and   
                       Hong Zhu   Yima: Design and Evaluation of a
                                  Streaming Media System for Residential
                                  Broadband Services . . . . . . . . . . . 116
            Nektarios Georgalas   QuDAS: a QoS-Based Brokering
                                  Architecture for Data Services . . . . . 126
              Thierry Delot and   
   Pascal Déchamboux and   
    Béatrice Finance and   
               Yann Lepetit and   
                  Gilles LeBrun   LDAP, Databases and Distributed Objects:
                                  Towards a Better Integration . . . . . . 140
           Munir Cochinwala and   
              Harald Hauser and   
                    Naveen Suri   Network Convergence Using Universal
                                  Numbers: The UPT Project . . . . . . . . 155
    Jean-Philippe Martin-Flatin   Toward Universal Information Models in
                                  Enterprise Management  . . . . . . . . . 167
                      Anonymous   Author Index . . . . . . . . . . . . . . 179


Lecture Notes in Computer Science
Volume 2210, 2001

                    J. Torresen   Two-Step Incremental Evolution of a
                                  Prosthetic Hand Controller Based on
                                  Digital Logic Gates  . . . . . . . . . . 1
               J. F. Miller and   
                    M. Hartmann   Untidy Evolution: Evolving Messy Gates
                                  for Fault Tolerance  . . . . . . . . . . 14
                 T. Schnier and   
                         X. Yao   Evolutionary Design Calibration  . . . . 26
                   M. Iwata and   
                I. Kajitani and   
                     Y. Liu and   
                N. Kajihara and   
                     T. Higuchi   Implementation of a Gate-Level Evolvable
                                  Hardware Chip  . . . . . . . . . . . . . 38
                J. Schemmel and   
                   K. Meier and   
              F. Schürmann   A VLSI Implementation of an Analog
                                  Neural Network Suited for Genetic
                                  Algorithms . . . . . . . . . . . . . . . 50
              J. Langeheine and   
                  J. Becker and   
            S. Fölling and   
                   K. Meier and   
                    J. Schemmel   Initial Studies of a New VLSI Field
                                  Programmable Transistor Array  . . . . . 62
             H. F. Restrepo and   
                       D. Mange   An Embryonics Implementation of a
                                  Self-Replicating Universal Turing
                                  Machine  . . . . . . . . . . . . . . . . 74
              A. H. Jackson and   
                  A. M. Tyrrell   Asynchronous Embryonics with
                                  Reconfiguration  . . . . . . . . . . . . 88
                  L. Prodan and   
                G. Tempesti and   
                   D. Mange and   
                    A. Stauffer   Embryonics: Artificial Cells Driven by
                                  Artificial DNA . . . . . . . . . . . . . 100
                A. Stauffer and   
                   D. Mange and   
                G. Tempesti and   
                    C. Teuscher   A Self-Repairing and Self-Healing
                                  Electronic Watch: The BioWatch . . . . . 112
               P. C. Haddow and   
                   G. Tufte and   
                P. van Remortel   Shrinking the Genotype: $L$-systems for
                                  EHW? . . . . . . . . . . . . . . . . . . 128
              D. W. Bradley and   
                  A. M. Tyrrell   Multi-layered Defence Mechanisms:
                                  Architecture, Implementation and
                                  Demonstration of a Hardware Immune
                                  System . . . . . . . . . . . . . . . . . 140
              M. R. Tamplin and   
                    A. Hamilton   Ant Circuit World: An Ant Algorithm
                                  MATLAB\TM Toolbox for the Design,
                                  Visualisation and Analysis of Analogue
                                  Circuits . . . . . . . . . . . . . . . . 151
                  J. G. Kim and   
                   K-g. Noh and   
                        K. Park   Human-Like Dynamic Walking for a Biped
                                  Robot Using Genetic Algorithm  . . . . . 159
          Md. Monirul Islam and   
                   S. Terao and   
                      K. Murase   Effect of Fitness for the Evolution of
                                  Autonomous Robots in an Open-Environment 171--181
          Md. Monirul Islam and   
                   S. Terao and   
                      K. Murase   Incremental Evolution of Autonomous
                                  Robots for a Complex Task  . . . . . . . 182
                   K. Yanai and   
                         H. Iba   Multi-agent Robot Learning by Means of
                                  Genetic Programming: Solving an Escape
                                  Problem  . . . . . . . . . . . . . . . . 192
        F. Fernández and   
       J. M. Sánchez and   
                   M. Tomassini   Placing and Routing Circuits on FPGAs by
                                  Means of Parallel and Distributed
                                  Genetic Programming  . . . . . . . . . . 204
                   S. E. Eklund   A Massively Parallel Architecture for
                                  Linear Machine Code Genetic Programming  216
                      M. Korkin   Self-Organized Evolutionary Process in
                                  Sets of Interdependent Variables near
                                  the Midpoint of Phase Transition in
                                  $K$-Satisfiability . . . . . . . . . . . 225
                 J. D. Lohn and   
                W. F. Kraus and   
               D. S. Linden and   
                S. P. Colombano   Evolutionary Optimization of Yagi-Uda
                                  Antennas . . . . . . . . . . . . . . . . 236
      E. Islas Pérez and   
        C. A. Coello Coello and   
    A. Hernández Aguirre   Extraction of Design Patterns from
                                  Evolutionary Algorithms Using Case-Based
                                  Reasoning  . . . . . . . . . . . . . . . 244
                K. S. Leung and   
                  K. H. Lee and   
                   S. M. Cheang   Balancing Samples' Contributions on GA
                                  Learning . . . . . . . . . . . . . . . . 256
            Eduardo Sanchez and   
Andrés Pérez-Uribe and   
                 Bertrand Mesot   Solving Partially Observable Problems by
                                  Evolution and Learning of Finite State
                                  Machines . . . . . . . . . . . . . . . . 267
A. Hernández Aguirre and   
              B. P. Buckles and   
               C. Coello Coello   GA-Based Learning of $ k D N F_n^s $
                                  Boolean Formulas . . . . . . . . . . . . 279--290
                  A. Stoica and   
                 R. Zebulum and   
                   D. Keymeulen   Polymorphic Electronics  . . . . . . . . 291
               D. Keymeulen and   
                 R. Zebulum and   
                  A. Stoica and   
                     M. Buehler   Initial Experiments of Reconfigurable
                                  Sensor Adapted by Evolution  . . . . . . 303
               H. Sakanashi and   
                   M. Iwata and   
                     T. Higuchi   A Lossless Compression Method for
                                  Halftone Images Using Evolvable Hardware 314
                  H. Nosato and   
                   Y. Kasai and   
                 T. Itatani and   
                M. Murakawa and   
                  T. Furuya and   
                     T. Higuchi   Evolvable Optical Systems and Their
                                  Applications . . . . . . . . . . . . . . 327
                      Anonymous   Author Index . . . . . . . . . . . . . . 341


Lecture Notes in Computer Science
Volume 2211, 2001

            Perry Alexander and   
                     Cindy Kong   Heterogeneous Modeling Support for
                                  Embedded Systems Design  . . . . . . . . 1
                    R. Alur and   
                    T. Dang and   
                J. Esposito and   
                  R. Fierro and   
                     Y. Hur and   
             F. Ivan\vci\'c and   
                   V. Kumar and   
                     I. Lee and   
                  P. Mishra and   
                  G. Pappas and   
                    O. Sokolsky   Hierarchical Hybrid Modeling of Embedded
                                  Systems  . . . . . . . . . . . . . . . . 14
              Albert Benveniste   Some Synchronization Issues When
                                  Designing Embedded Systems from
                                  Components . . . . . . . . . . . . . . . 32
            Gérard Berry   Synchronous Programming Techniques for
                                  Embedded Systems: Present and Future . . 50
               Manfred Broy and   
                 Oscar Slotosch   From Requirements to Validated Embedded
                                  Systems  . . . . . . . . . . . . . . . . 51
                  Ken Butts and   
                Dave Bostic and   
         Alongkrit Chutinan and   
               Jeffrey Cook and   
                 Bill Milam and   
                    Yanxin Wang   Usage Scenarios for an Automated Model
                                  Compiler . . . . . . . . . . . . . . . . 66
                     Paul Caspi   Embedded Control: From Asynchrony to
                                  Synchrony and Back . . . . . . . . . . . 80
             Patrick Cousot and   
                  Radhia Cousot   Verification of Embedded Software:
                                  Problems and Perspectives  . . . . . . . 97
            David E. Culler and   
                 Jason Hill and   
          Philip Buonadonna and   
            Robert Szewczyk and   
                       Alec Woo   A Network-Centric Approach to Embedded
                                  Software for Tiny Devices  . . . . . . . 114
          Steven M. Donahue and   
         Matthew P. Hampton and   
              Morgan Deters and   
            Jonathan M. Nye and   
              Ron K. Cytron and   
                Krishna M. Kavi   Storage Allocation for Real-Time,
                                  Embedded Systems . . . . . . . . . . . . 131
             Luca de Alfaro and   
            Thomas A. Henzinger   Interface Theories for Component-Based
                                  Design . . . . . . . . . . . . . . . . . 148
        Thomas A. Henzinger and   
          Benjamin Horowitz and   
         Christoph Meyer Kirsch   Giotto: a Time-Triggered Language for
                                  Embedded Programming . . . . . . . . . . 166
                 Walid Taha and   
                 Paul Hudak and   
                   Zhanyong Wan   Directions in Functional Programming for
                                  Real(-Time) Applications . . . . . . . . 185
               Kevin Jeffay and   
                  Steve Goddard   Rate-Based Resource Allocation Models
                                  for Embedded Systems . . . . . . . . . . 204
                      H. Kopetz   The Temporal Specification of Interfaces
                                  in Distributed Real-Time Systems . . . . 223
              Edward A. Lee and   
                   Yuhong Xiong   System-Level Types for Component-Based
                                  Design . . . . . . . . . . . . . . . . . 237
                   Sharad Malik   Embedded Software Implementation Tools
                                  for Fully Programmable Application
                                  Specific Systems . . . . . . . . . . . . 254
           Krishna V. Palem and   
         Surendranath Talla and   
                  Weng-Fai Wong   Compiler Optimizations for Adaptive EPIC
                                  Processors . . . . . . . . . . . . . . . 257
              Wolfgang Pree and   
             Alessandro Pasetti   Embedded Software Market Transformation
                                  through Reusable Frameworks  . . . . . . 274
      Ragunathan (Raj) Rajkumar   An End-To-End Methodology for Building
                                  Embedded Systems . . . . . . . . . . . . 287
     William S. Beebee, Jr. and   
                  Martin Rinard   An Implementation of Scoped Memory for
                                  Real-Time Java . . . . . . . . . . . . . 289
                    John Rushby   Bus Architectures for Safety-Critical
                                  Embedded Systems . . . . . . . . . . . . 306
             Jerry R. Burch and   
          Roberto Passerone and   
Alberto L. Sangiovanni-Vincentelli   Using Multiple Levels of Abstractions in
                                  Embedded Software Design . . . . . . . . 324
                T. John Koo and   
               Judy Liebman and   
                  Cedric Ma and   
              S. Shankar Sastry   Hierarchical Approach for Design of
                                  Multi-vehicle Multi-modal Embedded
                                  Software . . . . . . . . . . . . . . . . 344
             Douglas C. Schmidt   Adaptive and Reflective Middleware for
                                  Distributed Real-Time and Embedded
                                  Systems  . . . . . . . . . . . . . . . . 361
                 Joseph Sifakis   Modeling Real-Time Systems-Challenges
                                  and Work Directions  . . . . . . . . . . 373
              John A. Stankovic   VEST --- A Toolset for Constructing and
                                  Analyzing Component Based Embedded
                                  Systems  . . . . . . . . . . . . . . . . 390
         Janos Sztipanovits and   
                   Gabor Karsai   Embedded Software: Challenges and
                                  Opportunities  . . . . . . . . . . . . . 403
              Lothar Thiele and   
       Samarjit Chakraborty and   
             Matthias Gries and   
       Alexander Maxiaguine and   
                 Jonas Greutert   Embedded Software in Network Processors
                                  --- Models and Algorithms  . . . . . . . 416
                Tunc Simsek and   
                 Pravin Varaiya   Design of Autonomous, Distributed
                                  Systems  . . . . . . . . . . . . . . . . 435
                  Pam Binns and   
                   Steve Vestal   Formalizing Software Architectures for
                                  Embedded Systems . . . . . . . . . . . . 451
        Christian Ferdinand and   
          Reinhold Heckmann and   
            Marc Langenbach and   
             Florian Martin and   
            Michael Schmidt and   
            Henrik Theiling and   
            Stephan Thesing and   
               Reinhard Wilhelm   Reliable and Precise WCET Determination
                                  for a Real-Life Processor  . . . . . . . 469
                  Niklaus Wirth   Embedded Systems and Real-Time
                                  Programming  . . . . . . . . . . . . . . 486
                     Wayne Wolf   Embedded Software for Video  . . . . . . 493
                      Anonymous   Author Index . . . . . . . . . . . . . . 503


Lecture Notes in Computer Science
Volume 2212, 2001

       Jean-Philippe Pouzol and   
        Mireille Ducassé   From Declarative Signatures to Misuse
                                  IDS  . . . . . . . . . . . . . . . . . . 1
             Magnus Almgren and   
                  Ulf Lindqvist   Application-Integrated Data Collection
                                  for Security Monitoring  . . . . . . . . 22
                  Marc Welz and   
               Andrew Hutchison   Interfacing Trusted Applications with
                                  Intrusion Detection Systems  . . . . . . 37
             Alfonso Valdes and   
                  Keith Skinner   Probabilistic Alert Correlation  . . . . 54
             Giovanni Vigna and   
        Richard A. Kemmerer and   
                       Per Blix   Designing a Web of Highly-Configurable
                                  Intrusion Detection Sensors  . . . . . . 69
         Hervé Debar and   
                  Andreas Wespi   Aggregation and Correlation of
                                  Intrusion-Detection Alerts . . . . . . . 85
       Robert K. Cunningham and   
             Craig S. Stevenson   Accurately Detecting Source Code of
                                  Attacks That Increase Privilege  . . . . 104
           Paul D. Williams and   
            Kevin P. Anchor and   
               John L. Bebo and   
            Gregg H. Gunsch and   
                 Gary D. Lamont   CDIS: Towards a Computer Immune System
                                  for Detecting Network Intrusions . . . . 117
                 Dan Sterne and   
           Kelly Djahandari and   
               Brett Wilson and   
                Bill Babson and   
          Dan Schnackenberg and   
            Harley Holliday and   
                    Travis Reid   Autonomic Response to Distributed Denial
                                  of Service Attacks . . . . . . . . . . . 134
             Steven R. Johnston   The Impact of Privacy and Data
                                  Protection Legislation on the Sharing of
                                  Intrusion Detection Information  . . . . 150
              Prem Uppuluri and   
                       R. Sekar   Experiences with Specification-Based
                                  Intrusion Detection  . . . . . . . . . . 172
                  Calvin Ko and   
                Paul Brutch and   
                  Jeff Rowe and   
                Guy Tsafnat and   
                    Karl Levitt   System Health and Intrusion Monitoring
                                  Using a Hierarchy of Constraints . . . . 190
                      Anonymous   Author Index . . . . . . . . . . . . . . 205


Lecture Notes in Computer Science
Volume 2213, 2001

           Guillaume Pierre and   
              Maarten van Steen   Globule: a Platform for Self-Replicating
                                  Web Documents  . . . . . . . . . . . . . 1
             Franco Tommasi and   
           Simone Molendini and   
              Antonio Vilei and   
              Andrea Sponziello   Architecture of QOSMIC --- A QoS Manager
                                  for Internet Connections . . . . . . . . 12
            Marcelo Bagnulo and   
    Alberto Garcia-Martinez and   
           David Larrabeiti and   
                 Arturo Azcorra   A QoS-Driven ISP Selection Mechanism for
                                  IPv6 Multi-homed Sites . . . . . . . . . 23
         Cristian Hesselman and   
                   Henk Eertink   Broadcasting Multimedia Channels in
                                  Future Mobile Systems  . . . . . . . . . 35
                Jin B. Kwon and   
                   Heon Y. Yeom   Providing VCR Functionality in Staggered
                                  Video Broadcasting . . . . . . . . . . . 44
             Fernando Cores and   
                 Ana Ripoll and   
                   Emilio Luque   A Fully Scalable and Distributed
                                  Architecture for Video-on-Demand . . . . 59
            Christos Bouras and   
                      A. Gkamas   A Mechanism for Multicast Multimedia
                                  Data with Adaptive QoS Characteristics   74
               Rui J. Lopes and   
              Laurent Mathy and   
                David Hutchison   Bandwidth Measurements of ALM Trees for
                                  Content Distribution . . . . . . . . . . 89
                Michel Diaz and   
           Roberto Canonico and   
                 Luis Costa and   
                Serge Fdida and   
            David Hutchison and   
              Laurent Mathy and   
           Andreas Meissner and   
         Stephane Owezarski and   
               Rolland Vida and   
                      Lars Wolf   GCAP: a New Multimedia Multicast
                                  Architecture for QoS . . . . . . . . . . 103
                 Jerzy Konorski   Protection of Fairness for Multimedia
                                  Traffic Streams in a Non-cooperative
                                  Wireless LAN Setting . . . . . . . . . . 116
         Jeroen P. F. Willekens   Ad Hoc Routing in Bluetooth  . . . . . . 130
          George Kormentzas and   
                D. Vergados and   
                J. Soldatos and   
              G. Stassinopoulos   An Open Signaling Protocol for Wireless
                                  Host Mobility  . . . . . . . . . . . . . 145
                    M. Benz and   
                   K. Feske and   
                  U. Hatnik and   
                     P. Schwarz   TCP/IP Protocol Engine System Simulation 155
           Albert K. T. Hui and   
              Samuel T. Chanson   Design and Implementation of a
                                  Transparent Forward Error Correction
                                  Coding Daemon for Unreliable Transports  165
                     Wei Wu and   
                   Yong Ren and   
                   Xiuming Shan   An Analytical Study on TCP-friendly
                                  Congestion Control for Multimedia
                                  Streams  . . . . . . . . . . . . . . . . 180
            Wouter B. Teeuw and   
             Dick A. C. Quartel   Model-Based Service Creation in the
                                  Friends Project  . . . . . . . . . . . . 192
             Maarten Wegdam and   
             Dirk-Jaap Plas and   
                  Musa Unmehopa   Validation of the Open Service Access
                                  API for UMTS Application Provisioning    210
                   I. Widya and   
                 R. E. Stap and   
            L. J. Teunissen and   
                   B. F. Hopman   On the End-User QoS-Awareness of a
                                  Distributed Service Environment  . . . . 222
                      Anonymous   Author Index . . . . . . . . . . . . . . 239


Lecture Notes in Computer Science
Volume 2214, 2001

Jérôme Amilhastre and   
           Philippe Janssen and   
        Marie-Catherine Vilarem   FA Minimisation Heuristics for a Class
                                  of Finite Languages  . . . . . . . . . . 1
            Philippe Andary and   
               Pascal Caron and   
      Jean-Marc Champarnaud and   
      Gérard Duchamp and   
           Marianne Flouret and   
         Éric Laugerotte   SEA: a Symbolic Environment for Automata
                                  Theory . . . . . . . . . . . . . . . . . 13
              Anne Bergeron and   
              Riccardo Catalano   Analysis of Reactive Systems with $n$
                                  Timers . . . . . . . . . . . . . . . . . 27
             Beatrix Braune and   
              Stephan Diehl and   
             Andreas Kerren and   
               Reinhard Wilhelm   Animation of the Generation and
                                  Computation of Finite Automata for
                                  Learning Software  . . . . . . . . . . . 39
         Cristian S. Calude and   
                Kai Salomaa and   
                       Sheng Yu   Metric Lexical Analysis  . . . . . . . . 48
          C. Câmpeanu and   
                   K. Culik and   
                Kai Salomaa and   
                       Sheng Yu   State Complexity of Basic Operations on
                                  Finite Languages . . . . . . . . . . . . 60
                     Jan Daciuk   Treatment of Unknown Words . . . . . . . 71
                Mark G. Eramian   Computing Entropy Maps of
                                  Finite-Automaton-Encoded Binary Images   81
           Dora Giammarresi and   
             Jean-Luc Ponty and   
                    Derick Wood   Thompson Digraphs: a Characterization    91
      Helmut Jürgensen and   
                 Ludwig Staiger   Finite Automata Encoding Geometric
                                  Figures  . . . . . . . . . . . . . . . . 101
             George Anton Kiraz   Compressed Storage of Sparse
                                  Finite-State Transducers . . . . . . . . 109
          Gertjan van Noord and   
                 Dale Gerdemann   An Extendible Regular Expression
                                  Compiler for Finite-State Approaches in
                                  Natural Language Processing  . . . . . . 122
            Gheorghe P\uaun and   
               Gabriel Thierrin   Multiset Processing by Means of Systems
                                  of Finite State Transducers  . . . . . . 140
                 M. Seuring and   
                 M. Gössel   A Structural Method for Output
                                  Compaction of Sequential Automata
                                  Implemented as Circuits  . . . . . . . . 158
                 A. N. Trahtman   An Algorithm to Verify Local Threshold
                                  Testability of Deterministic Finite
                                  Automata . . . . . . . . . . . . . . . . 164
                Bruce W. Watson   A Taxonomy of Algorithms for
                                  Constructing Minimal Acyclic
                                  Deterministic Finite Automata  . . . . . 174
                      Anonymous   Author Index . . . . . . . . . . . . . . 183


Lecture Notes in Computer Science
Volume 2215, 2001

         Luís Caires and   
                  Luca Cardelli   A Spatial Logic for Concurrency  . . . . 1
           Michele Bugliesi and   
          Giuseppe Castagna and   
                   Silvia Crafa   Boxed Ambients . . . . . . . . . . . . . 38
            Daisuke Hoshina and   
               Eijiro Sumii and   
               Akinori Yonezawa   A Typed Process Calculus for
                                  Fine-Grained Resource Access Control in
                                  Distributed Computation  . . . . . . . . 64
        Martín Abadi and   
               Jan Jürjens   Formal Eavesdropping and Its
                                  Computational Interpretation . . . . . . 82
                  Kazunori Ueda   Resource-Passing Concurrent Programming  95
              Cosimo Laneve and   
             Joachim Parrow and   
              Björn Victor   Solo Diagrams  . . . . . . . . . . . . . 127
         Barbara König and   
                  Ugo Montanari   Observational Equivalence for
                                  Synchronized Graph Rewriting with
                                  Mobility . . . . . . . . . . . . . . . . 145
                 Hiroshi Nakano   Fixed-Point Logic with the Approximation
                                  Modality and Its Kripke Completeness . . 165
                 Daniel Leivant   Termination Proofs and Complexity
                                  Certification  . . . . . . . . . . . . . 183
                    Keye Martin   A Renee Equation for Algorithmic
                                  Complexity . . . . . . . . . . . . . . . 201
                Andrew M. Pitts   Nominal Logic: a First Order Theory of
                                  Names and Binding  . . . . . . . . . . . 219
                  Makoto Hamana   A Logic Programming Language Based on
                                  Binding Algebras . . . . . . . . . . . . 243
            Didier Galmiche and   
             Daniel Méry   Proof-Search and Countermodel Generation
                                  in Propositional BI Logic  . . . . . . . 263
                 Mizuhito Ogawa   Generation of a Linear Time Query
                                  Processing Algorithm Based on
                                  Well-Quasi-Orders  . . . . . . . . . . . 283
       Christine Paulin-Mohring   Modelisation of Timed Automata in Coq    298
             Javier Esparza and   
    Antonín Ku\vcera and   
                 Stefan Schwoon   Model-Checking LTL with Regular
                                  Valuations for Pushdown Systems  . . . . 316--339
            Martin Fränzle   What Will Be Eventually True of
                                  Polynomial Hybrid Automata?  . . . . . . 340
            Joachim Niehren and   
                  Tim Priesnitz   Non-structural Subtype Entailment in
                                  Automata Theory  . . . . . . . . . . . . 360
                Ph. Schnoebelen   Bisimulation and Other Undecidable
                                  Equivalences for Lossy Channel Systems   385
                  Antti Puhakka   Weakest Congruence Results Concerning
                                  ``Any-Lock'' . . . . . . . . . . . . . . 400
           Anindya Banerjee and   
              Nevin Heintze and   
                  Jon G. Riecke   Design and Correctness of Program
                                  Transformations Based on Control-Flow
                                  Analysis . . . . . . . . . . . . . . . . 420
      Marcello M. Bonsangue and   
                   Joost N. Kok   Infinite Intersection and Union Types
                                  for the Lazy Lambda Calculus . . . . . . 448
              Yoriyuki Yamagata   Strong Normalization of Second Order
                                  Symmetric Lambda-mu Calculus . . . . . . 459
                  Philip Wadler   The Girard-Reynolds Isomorphism  . . . . 468
             Daniel Jackson and   
                    Alan Fekete   Lightweight Analysis of Object
                                  Interactions . . . . . . . . . . . . . . 492
               Lennart Beringer   Typing Assembly Programs with Explicit
                                  Forwarding . . . . . . . . . . . . . . . 514
           Andrei Serjantov and   
               Peter Sewell and   
               Keith Wansbrough   The UDP Calculus: Rigorous Semantics for
                                  Real Networking  . . . . . . . . . . . . 535
         Benjamin C. Pierce and   
   Jérôme Vouillon   Unison: a File Synchronizer and Its
                                  Specification  . . . . . . . . . . . . . 560
                      Anonymous   Author Index . . . . . . . . . . . . . . 561


Lecture Notes in Computer Science
Volume 2216, 2001

          Nagasuresh Seelam and   
               Pankaj Sethi and   
                    Wu-chi Feng   A Hysteresis Based Approach for Quality,
                                  Frame Rate, and Buffer Management for
                                  Video Streaming Using TCP  . . . . . . . 1
                   Sunghoon Son   A Transmission Scheme for Streaming
                                  Variable Bit Rate Video over Internet    16
             Naoki Wakamiya and   
         Masaki Miyabayashi and   
            Masayuki Murata and   
                 Hideo Miyahara   MPEG-4 Video Transfer with TCP-Friendly
                                  Rate Control . . . . . . . . . . . . . . 29
               John Vicente and   
             Andrew T. Campbell   IP Radio Resource Control System . . . . 43
              Youssef Iraqi and   
                  Raouf Boutaba   Is It Worth Involving Several
                                  Cooperating Agents for Multimedia User's
                                  Admission in Cellular Networks?  . . . . 57
                 Jianbo Gao and   
                    Izhak Rubin   Analysis of Random Access Protocol under
                                  Bursty Traffic . . . . . . . . . . . . . 71
            Tamás Borsos   A Practical Model for VBR Video Traffic
                                  with Applications  . . . . . . . . . . . 85
            Vincent Lecuire and   
             Francis Lepage and   
                 Khalil Kammoun   Enhancing Quality of MPEG Video through
                                  Partially Reliable Transport Service in
                                  Interactive Application  . . . . . . . . 96
               Toufik Ahmed and   
         Guillaume Buridant and   
                  Ahmed Mehaoua   Delivering of MPEG-4 Multimedia Content
                                  over Next Generation Internet  . . . . . 110
                Dan Lelescu and   
                  Dan Schonfeld   Video Skimming and Summarization Based
                                  on Principal Component Analysis  . . . . 128
             Gary Molenkamp and   
          Michael Katchabaw and   
             Hanan Lutfiyya and   
                  Michael Bauer   Distributed Resource Management to
                                  Support Distributed Application-Specific
                                  Quality of Service . . . . . . . . . . . 142
             Ibrahim Khalil and   
                  Torsten Braun   Implementation of a Bandwidth Broker for
                                  Dynamic End-to-End Capacity Reservation
                                  over Multiple Diffserv Domains . . . . . 160
        Johnathan M. Reason and   
         David G. Messerschmitt   The Impact of Confidentiality on Quality
                                  of Service in Heterogeneous Voice over
                                  IP Networks  . . . . . . . . . . . . . . 175
                Mingyu Zhai and   
                 Guanqun Gu and   
                      Yuan Yuan   Queue Length Based Fair Queueing in
                                  Core-Stateless Networks  . . . . . . . . 193
             Sung-Hyuck Lee and   
            Seung-Joon Seok and   
              Seung-Jin Lee and   
                  Chul-Hee Kang   Study of TCP and UDP Flows in a
                                  Differentiated Services Network Using
                                  Two Markers System . . . . . . . . . . . 198
             Halima Elbiaze and   
              Tijani Chahed and   
Gérard Hébuterne and   
                   Tulin Atmaca   Equation-Based Dynamic Shaping Algorithm 204
                    Li Zhao and   
                    Qi Wang and   
                   Yuwen He and   
              Shiqiang Yang and   
                   Yuzhuo Zhong   A Novel Content-Based Video Streaming
                                  Algorithm for Fine Granular Scalable
                                  Coding . . . . . . . . . . . . . . . . . 210
                Izhak Rubin and   
                Patrick Vincent   Topological Synthesis of Mobile Backbone
                                  Networks for Managing Ad Hoc Wireless
                                  Networks . . . . . . . . . . . . . . . . 215
     Marcelo Borges Ribeiro and   
Lisandro Zambenedetti Granville and   
Maria Janilce Bosquiroli Almeida and   
Liane Margarida Rockenbach Tarouco   QoS Monitoring System on IP Networks . . 222
                 Hongjun Li and   
                  John S. Baras   A Framework for Supporting Intelligent
                                  Fault and Performance Management for
                                  Communication Networks . . . . . . . . . 227
                Zheng Zhang and   
   Constantine Manikopoulos and   
                  Jay Jorgenson   Architecture of Generalized Network
                                  Service Anomaly and Fault Thresholds . . 241
         Kamil Saraç and   
              Kevin C. Almeroth   Providing Scalable Many-to-One Feedback
                                  in Multicast Reachability Monitoring
                                  Systems  . . . . . . . . . . . . . . . . 256
         Mouayad Albaghdadi and   
               Bruce Briley and   
               Martha Evens and   
               Rafid Sukkar and   
          Mohammed Petiwala and   
                    Mark Hamlen   A Framework for Event Correlation in
                                  Communication Systems  . . . . . . . . . 271
              Hamid Harroud and   
         Mouhsine Lakhdissi and   
             Ahmed Karmouch and   
                 Cliff Grossner   Policy-Based Management for Multimedia
                                  Collaborative Services . . . . . . . . . 285
               David Chieng and   
              Alan Marshall and   
                    Ivan Ho and   
                    Gerard Parr   Agent-Enhanced Dynamic Service Level
                                  Agreement in Future Network Environments 299
           Joseph V. Elarde and   
            Gregory B. Brewster   WEBARM: Mobile Code Based Agent for Web
                                  Application Response Measurement ---
                                  Software Implementations and Analysis    313
     Srinivasan Jagannathan and   
              Kevin C. Almeroth   The Dynamics of Price, Revenue, and
                                  System Utilization . . . . . . . . . . . 329
              Koon-Seng Lim and   
                   Rolf Stadler   Developing Pattern-Based Management
                                  Programs . . . . . . . . . . . . . . . . 345
                Imad Elhajj and   
                    Ning Xi and   
             Wai Keung Fung and   
                Yun hui Liu and   
                  Wen J. Li and   
              Tomoyuki Kaga and   
                  Toshio Fukuda   Supermedia in Internet-Based Telerobotic
                                  Operations . . . . . . . . . . . . . . . 359
                      Anonymous   Author Index . . . . . . . . . . . . . . 373


Lecture Notes in Computer Science
Volume 2217, 2001

                   Owen Holland   From the Imitation of Life to Machine
                                  Consciousness  . . . . . . . . . . . . . 1
             Dario Floreano and   
              Claudio Mattiussi   Evolution of Spiking Neural Controllers
                                  for Autonomous Vision-Based Robots . . . 38
          Jordan B. Pollack and   
                 Hod Lipson and   
                Pablo Funes and   
                 Gregory Hornby   First Three Generations of Evolved
                                  Robots . . . . . . . . . . . . . . . . . 62
               Rodney A. Brooks   Steps Towards Living Machines  . . . . . 72
                   Inman Harvey   Artificial Evolution: a Continuing SAGA  94
                 Robert J. Full   Using Biological Inspiration to Build
                                  Artificial Life That Locomotes . . . . . 110
          Francesco Mondada and   
                     Skye Legon   Interactions between Art and Mobile
                                  Robotic System Engineering . . . . . . . 121
                      Anonymous   Author Index . . . . . . . . . . . . . . 139


Lecture Notes in Computer Science
Volume 2218, 2001

                   Dean Kuo and   
                    Doug Palmer   Automated Analysis of Java Message
                                  Service Providers  . . . . . . . . . . . 1
              John Eberhard and   
                 Anand Tripathi   Efficient Object Caching for Distributed
                                  Java RMI Applications  . . . . . . . . . 15
               Paul Brebner and   
                    Shuping Ran   Entity Bean A, B, C's: Enterprise Java
                                  Beans Commit Options and Caching . . . . 36
             Timm Reinstorf and   
            Rainer Ruggaber and   
               Jochen Seitz and   
             Martina Zitterbart   A WAP-Based Session Layer Supporting
                                  Distributed Applications in Nomadic
                                  Environments . . . . . . . . . . . . . . 56
        Andry Rakotonirainy and   
              Jaga Indulska and   
              Seng Wai Loke and   
               Arkady Zaslavsky   Middleware for Reactive Components: An
                                  Integrated Use of Context, Roles, and
                                  Event Based Coordination . . . . . . . . 77
         Philip K. McKinley and   
      Udiyan I. Padmanabhan and   
               Nandagopal Ancha   Experiments in Composing Proxy Audio
                                  Services for Mobile Users  . . . . . . . 99
              Rainer Koster and   
            Andrew P. Black and   
                  Jie Huang and   
           Jonathan Walpole and   
                      Calton Pu   Thread Transparency in Information Flow
                                  Middleware . . . . . . . . . . . . . . . 121
                Salah Sadou and   
          Gautier Koscielny and   
                    Hafedh Mili   Abstracting Services in a Heterogeneous
                                  Environment  . . . . . . . . . . . . . . 141
             Michael Clarke and   
            Gordon S. Blair and   
              Geoff Coulson and   
             Nikos Parlavantzas   An Efficient Component Model for the
                                  Construction of Adaptive Middleware  . . 160
      Damián Arregui and   
     François Pacull and   
              Jutta Willamowski   Rule-Based Transactional Object
                                  Migration over a Reflective Middleware   179
               Iain Houston and   
             Mark C. Little and   
               Ian Robinson and   
     Santosh K. Shrivastava and   
              Stuart M. Wheater   The CORBA Activity Service Framework for
                                  Supporting Extended Transactions . . . . 197
               Eric Marsden and   
             Jean-Charles Fabre   Failure Mode Analysis of CORBA Service
                                  Implementations  . . . . . . . . . . . . 216
               Soon Ju Kang and   
                Jun Ho Park and   
                   Sung Ho Park   ROOM-BRIDGE: Vertically Configurable
                                  Network Architecture and Real-Time
                                  Middleware for Interoperability between
                                  Ubiquitous Consumer Devices in the Home  232
                Jason Flinn and   
               Eyal de Lara and   
     Mahadev Satyanarayanan and   
             Dan S. Wallach and   
               Willy Zwaenepoel   Reducing the Energy Usage of Office
                                  Applications . . . . . . . . . . . . . . 252
                Tatsuo Nakajima   System Software for Audio and Visual
                                  Networked Home Appliances on Commodity
                                  Operating Systems  . . . . . . . . . . . 273
                 Jean Bacon and   
                  Ken Moody and   
                       Walt Yao   Access Control and Trust in the Use of
                                  Widely Distributed Services  . . . . . . 295
            Philippe Laumay and   
              Eric Bruneton and   
         Noël De Palma and   
                Sacha Krakowiak   Preserving Causality in a Scalable
                                  Message-Oriented Middleware  . . . . . . 311
            Antony Rowstron and   
                 Peter Druschel   Pastry: Scalable, Decentralized Object
                                  Location, and Routing for Large-Scale
                                  Peer-to-Peer Systems . . . . . . . . . . 329
                     Jun He and   
          Matti A. Hiltunen and   
          Mohan Rajagopalan and   
         Richard D. Schlichting   Providing QoS Customization in
                                  Distributed Object Systems . . . . . . . 351
        Duangdao Wichadakul and   
            Klara Nahrstedt and   
                 Xiaohui Gu and   
                     Dongyan Xu   $ 2 K^{Q+} $: An Integrated Approach of
                                  QoS Compilation and Reconfigurable,
                                  Component-Based Run-Time Middleware for
                                  the Unified QoS Management Framework . . 373--394
                      Anonymous   Author Index . . . . . . . . . . . . . . 395


Lecture Notes in Computer Science
Volume 2219, 2001

             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 1: General . . . . . . . . . . . 1
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 2: Lexical Elements  . . . . . . 9
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 3: Declarations and Types  . . . 19
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 4: Names and Expressions . . . . 77
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 5: Statements  . . . . . . . . . 111
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 6: Subprograms . . . . . . . . . 121
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 7: Packages  . . . . . . . . . . 133
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 8: Visibility Rules  . . . . . . 147
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 9: Tasks and Synchronization . . 159
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 10: Program Structure and
                                  Compilation Issues . . . . . . . . . . . 187
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 11: Exceptions . . . . . . . . . 199
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 12: Generic Units  . . . . . . . 209
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Section 13: Representation Issues  . . . 225
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex A (normative) Predefined Language
                                  Environment  . . . . . . . . . . . . . . 259
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex B (normative) Interface to Other
                                  Languages  . . . . . . . . . . . . . . . 347
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex C (normative) Systems Programming  371
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex D (normative) Real-Time Systems    387
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex E (normative) Distributed Systems  407
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex F (normative) Information Systems  421
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex G (normative) Numerics . . . . . . 437
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex H (normative) Safety and Security  459
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex J (normative) Obsolescent Features 465
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex K (informative) Language-Defined
                                  Attributes . . . . . . . . . . . . . . . 471
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex L (informative) Language-Defined
                                  Pragmas  . . . . . . . . . . . . . . . . 485
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex M (informative)
                                  Implementation-Defined Characteristics   487
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex N (informative) Glossary . . . . . 493
             S. Tucker Taft and   
             Robert A. Duff and   
        Randall L. Brukardt and   
             Erhard Ploedereder   Annex P (informative) Syntax Summary . . 497
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 523


Lecture Notes in Computer Science
Volume 2220, 2001

                Kris Luyten and   
                   Karin Coninx   An XML-Based Runtime User Interface
                                  Description Language for Mobile
                                  Computing Devices  . . . . . . . . . . . 1
            Andreas Mueller and   
              Peter Forbrig and   
                    Clemens Cap   Model-Based User Interface Design Using
                                  Markup Concepts  . . . . . . . . . . . . 16
         Kevin A. Schneider and   
                 James R. Cordy   Abstract User Interfaces: a Model and
                                  Notation to Support Plasticity in
                                  Interactive Systems  . . . . . . . . . . 28
            Costin Pribeanu and   
           Quentin Limbourg and   
              Jean Vanderdonckt   Task Modelling for Context-Sensitive
                                  User Interfaces  . . . . . . . . . . . . 49
  Maria de F. Q. V. Turnell and   
           Alexandre Scaico and   
    Marckson R. F. de Sousa and   
               Angelo Perkusich   Industrial User Interface Evaluation
                                  Based on Coloured Petri Nets Modelling
                                  and Analysis . . . . . . . . . . . . . . 69
              David Navarre and   
          Philippe Palanque and   
            Fabio Patern\`o and   
             Carmen Santoro and   
            Rémi Bastide   A Tool Suite for Integrating Task and
                                  System Models through Scenarios  . . . . 88
                     Min Du and   
                  David England   Temporal Patterns for Complex
                                  Interaction Design . . . . . . . . . . . 114
   José Luis Garrido and   
                     Miguel Gea   Modelling Dynamic Group Behaviours . . . 128
                 G. Doherty and   
                 M. Massink and   
                     G. Faconti   Reasoning about Interactive Systems with
                                  Stochastic Models  . . . . . . . . . . . 144
           Quentin Limbourg and   
            Costin Pribeanu and   
              Jean Vanderdonckt   Towards Uniformed Task Models in a
                                  Model-Based Approach . . . . . . . . . . 164
             Alistair Sutcliffe   Heuristic Evaluation of Website
                                  Attractiveness and Usability . . . . . . 183
               Harold Thimbleby   Affordance and Symmetry  . . . . . . . . 199
                      Anonymous   Author Index . . . . . . . . . . . . . . 219


Lecture Notes in Computer Science
Volume 2221, 2001

               Mark E. Crovella   Performance Evaluation with Heavy Tailed
                                  Distributions  . . . . . . . . . . . . . 1
         Mor Harchol-Balter and   
              Nikhil Bansal and   
           Bianca Schroeder and   
                 Mukesh Agrawal   SRPT Scheduling for Web Servers  . . . . 11
                Andy B. Yoo and   
                Morris A. Jette   An Efficient and Scalable Coscheduling
                                  Technique for Large Symmetric
                                  Multiprocessor Clusters  . . . . . . . . 21
       Francesc Giné and   
           Francesc Solsona and   
  Porfidio Hernández and   
                   Emilio Luque   Coscheduling under Memory Constraints in
                                  a NOW Environment  . . . . . . . . . . . 41
             A. I. D. Bucur and   
                 D. H. J. Epema   The Influence of Communication on the
                                  Performance of Co-allocation . . . . . . 66
              David Jackson and   
                Quinn Snell and   
                   Mark Clement   Core Algorithms of the Maui Scheduler    87
                 B. B. Zhou and   
                    R. P. Brent   On the Development of an Efficient
                                  Coscheduling System  . . . . . . . . . . 103
              G. Edward Suh and   
              Larry Rudolph and   
               Srinivas Devadas   Effects of Memory Performance on
                                  Parallel Job Scheduling  . . . . . . . . 116
                   Y. Zhang and   
                  H. Franke and   
              J. E. Moreira and   
             A. Sivasubramaniam   An Integrated Approach to Parallel
                                  Scheduling Using Gang-Scheduling,
                                  Backfilling, and Migration . . . . . . . 133
              Su-Hui Chiang and   
                 Mary K. Vernon   Characteristics of a Large Shared Memory
                                  Production Workload  . . . . . . . . . . 159
              Dror G. Feitelson   Metrics for Parallel Job Scheduling and
                                  Their Convergence  . . . . . . . . . . . 188
                      Anonymous   Author Index . . . . . . . . . . . . . . 207


Lecture Notes in Computer Science
Volume 2223, 2001

                 Sue Whitesides   Chain Reconfiguration. The INs and Outs,
                                  Ups and Downs of Moving Polygons and
                                  Polygonal Linkages . . . . . . . . . . . 1
               Kazuo Murota and   
                 Akihisa Tamura   Application of $M$-Convex Submodular
                                  Flow Problem to Mathematical Economics   14
               Xiaotie Deng and   
                 Haodi Feng and   
               Pixing Zhang and   
                       Hong Zhu   A Polynomial Time Approximation Scheme
                                  for Minimizing Total Completion Time of
                                  Unbounded Batch Scheduling . . . . . . . 26
           Yoshiyuki Karuno and   
              Hiroshi Nagamochi   A Polynomial Time Approximation Scheme
                                  for the Multi-vehicle Scheduling Problem
                                  on a Path with Release and Handling
                                  Times  . . . . . . . . . . . . . . . . . 36
                Jianer Chen and   
                   Jingui Huang   Semi-normal Schedulings: Improvement on
                                  Goemans' Algorithm . . . . . . . . . . . 48
                   Hisashi Koga   Balanced Scheduling toward Loss-Free
                                  Packet Queuing and Delay Fairness  . . . 61
               Jae-Hoon Kim and   
                Kyung-Yong Chwa   Broadcasting with Universal Lists
                                  Revisited: Using Competitive Analysis    74
              Kumiko Nomura and   
           Toshinori Yamada and   
                   Shuichi Ueno   On Adaptive Fault Diagnosis for
                                  Multiprocessor Systems . . . . . . . . . 86
            Kenta Hashimoto and   
           Toshinori Yamada and   
                   Shuichi Ueno   On-Line Multicasting in All-Optical
                                  Networks . . . . . . . . . . . . . . . . 99
               Shin-ichi Nakano   Enumerating Floorplans with $n$ Rooms    107
                Giulia Galbiati   On Min-Max Cycle Bases . . . . . . . . . 116
          Hiroshi Nagamochi and   
                Toshimasa Ishii   On the Minimum Local-Vertex-Connectivity
                                  Augmentation in Graphs . . . . . . . . . 124
                Takayuki Nagoya   Counting Graph Isomorphisms among
                                  Chordal Graphs with Restricted Clique
                                  Number . . . . . . . . . . . . . . . . . 136
          Kunihiko Sadakane and   
            Norito Sugawara and   
               Takeshi Tokuyama   Quantum Algorithms for Intersection and
                                  Proximity Problems . . . . . . . . . . . 148
                  Zheng Sun and   
                      John Reif   BUSHWHACK: An Approximation Algorithm
                                  for Minimal Paths through
                                  Pseudo-Euclidean Spaces  . . . . . . . . 160
         Francis Y. L. Chin and   
             Stanley P. Y. Fung   Approximation of Minimum Triangulation
                                  for Polyhedron with Bounded Degrees  . . 172
    Christian Schindelhauer and   
                 Birgitta Weber   Tree-Approximations for the Weighted
                                  Cost-Distance Problem (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 185
             Takaaki Mizuki and   
                Takao Nishizeki   Necessary and Sufficient Numbers of
                                  Cards for Sharing Secret Keys on
                                  Hierarchical Groups  . . . . . . . . . . 196
           Akihiro Yamamura and   
                 Kaoru Kurosawa   Generic Algorithms and Key Agreement
                                  Protocols Based on Group Actions . . . . 208
        Josef M. Breutzmann and   
            David W. Juedes and   
                   Jack H. Lutz   Baire Category and Nowhere
                                  Differentiability for Feasible Real
                                  Functions  . . . . . . . . . . . . . . . 219
           Takashi Horiyama and   
              Toshihide Ibaraki   Translation among CNFs, Characteristic
                                  Models and Ordered Binary Decision
                                  Diagrams . . . . . . . . . . . . . . . . 231
            Oscar H. Ibarra and   
                       Zhe Dang   On Removing the Pushdown Stack in
                                  Reachability Constructions . . . . . . . 244
               Hiroaki Yamamoto   A New Recognition Algorithm for Extended
                                  Regular Expressions  . . . . . . . . . . 257
                Takeshi Koshiba   Polynomial-Time Algorithms for the
                                  Equivalence for One-Way Quantum Finite
                                  Automata . . . . . . . . . . . . . . . . 268
               Hirotaka Ono and   
          Mutsunori Yagiura and   
              Toshihide Ibaraki   An Index for the Data Size to Extract
                                  Decomposable Structures in LAD . . . . . 279
             Michael R. Fellows   Parameterized Complexity: The Main Ideas
                                  and Some Research Frontiers  . . . . . . 291
              Therese Biedl and   
            Erik D. Demaine and   
        Christian A. Duncan and   
           Rudolf Fleischer and   
            Stephen G. Kobourov   Tight Bounds on Maximal and Maximum
                                  Matchings  . . . . . . . . . . . . . . . 308
    Stavros D. Nikolopoulos and   
                Leonidas Palios   Recognition and Orientation Algorithms
                                  for P$ \! {}_{\mathbf 4} $-Comparability
                                  Graphs . . . . . . . . . . . . . . . . . 320--331
              Danny Z. Chen and   
                    Xiaodong Wu   Efficient Algorithms for $k$-Terminal
                                  Cuts on Planar Graphs  . . . . . . . . . 332
             Anna Galluccio and   
                 Guido Proietti   Polynomial Time Algorithms for
                                  Edge-Connectivity Augmentation of
                                  Hamiltonian Paths  . . . . . . . . . . . 345
          Michael H. Albert and   
        Robert E. L. Aldred and   
           Mike D. Atkinson and   
                Derek A. Holton   Algorithms for Pattern Involvement in
                                  Permutations . . . . . . . . . . . . . . 355
                    Takeaki Uno   A Fast Algorithm for Enumerating
                                  Bipartite Perfect Matchings  . . . . . . 367
                    Bo Chen and   
               Xiaotie Deng and   
                     Wenan Zang   On-Line Scheduling a Batch Processing
                                  System to Minimize Total Weighted Job
                                  Completion Time  . . . . . . . . . . . . 380
            Thomas Erlebach and   
          Martin Gantenbein and   
      Daniel Hürlimann and   
             Gabriele Neyer and   
            Aris Pagourtzis and   
                Paolo Penna and   
             Konrad Schlude and   
   Kathleen Steinhöfel and   
          David Scot Taylor and   
                 Peter Widmayer   On the Complexity of Train Assignment
                                  Problems . . . . . . . . . . . . . . . . 390
               James Aspnes and   
             Julia Hartling and   
              Ming-Yang Kao and   
               Junhyong Kim and   
                     Gauri Shah   A Combinatorial Toolbox for Protein
                                  Sequence Design and Landscape Analysis
                                  in the Grand Canonical Model . . . . . . 403
      Rune B. Lyngsò and   
       Christian N. S. Pedersen   Complexity of Comparing Hidden Markov
                                  Models . . . . . . . . . . . . . . . . . 416
              Ming-Yang Kao and   
             Vijay Ramachandran   DNA Self-Assembly For Constructing $3$D
                                  Boxes  . . . . . . . . . . . . . . . . . 429
                 Jens Gramm and   
           Rolf Niedermeier and   
               Peter Rossmanith   Exact Solutions for CLOSEST STRING and
                                  Related Problems . . . . . . . . . . . . 441
              Danny Z. Chen and   
                Shuang Luan and   
                      Jinhui Xu   Topological Peeling and Implementation   454
              Danny Z. Chen and   
                   Jie Wang and   
                    Xiaodong Wu   Image Segmentation with Monotonicity and
                                  Smoothness Constraints . . . . . . . . . 467
                 Jae-Ha Lee and   
              Sang-Min Park and   
                Kyung-Yong Chwa   Optimization Algorithms for Sweeping a
                                  Polygonal Region with Mobile Guards  . . 480
             Sofia Kovaleva and   
           Frits C. R. Spieksma   Approximation of a Geometric Set
                                  Covering Problem . . . . . . . . . . . . 493
             Andrew V. Goldberg   Shortest Path Algorithms: Engineering
                                  Aspects  . . . . . . . . . . . . . . . . 502
                  Xiao Zhou and   
                Takao Nishizeki   Efficient Algorithms for Weighted
                                  Colorings of Series-Parallel Graphs  . . 514
                 Marcus Peinado   Go with the Winners Algorithms for
                                  Cliques in Random Graphs . . . . . . . . 525
          Jirí Fiala and   
          Jan Kratochvíl   Complexity of Partial Covers of Graphs   537
         Hans L. Bodlaender and   
         Michael J. Dinneen and   
           Bakhadyr Khoussainov   On Game-Theoretic Models of Networks . . 550
             Andreas Jakoby and   
              Maciej Liskiewicz   The Complexity of Some Basic Problems
                                  for Dynamic Process Graphs . . . . . . . 562
                     Xuemin Lin   Delay Optimizations in Quorum Consensus  575
              Hyunyoung Lee and   
              Jennifer L. Welch   Randomized Shared Queues Applied to
                                  Distributed Optimization Algorithms  . . 587
             Andrej Brodnik and   
                 Johan Karlsson   Multiprocess Time Queue  . . . . . . . . 599
           Sheung-Hung Poon and   
               Chan-Su Shin and   
               Tycho Strijk and   
                Alexander Wolff   Labeling Points with Weights . . . . . . 610
              David Bremner and   
             Ferran Hurtado and   
          Suneeta Ramaswami and   
          Vera Sacristán   Small Convex Quadrangulations of Point
                                  Sets . . . . . . . . . . . . . . . . . . 623
               Tetsuo Asano and   
               Takeshi Tokuyama   How to Color a Checkerboard with a Given
                                  Distribution --- Matrix Rounding
                                  Achieving Low $ 2 \times 2 $-Discrepancy 636
Mari Ángeles Garrido and   
          Claudia Iturriaga and   
     Alberto Márquez and   
José Ramón Portillo and   
                Pedro Reyes and   
                Alexander Wolff   Labeling Subway Lines  . . . . . . . . . 649
               Louxin Zhang and   
                       Song Zhu   Complexity Study on Two Clustering
                                  Problems (Extended Abstract) . . . . . . 660
           Toshihiro Fujito and   
               Tsuyoshi Okumura   A Modified Greedy Algorithm for the Set
                                  Cover Problem with Weights $1$ and $2$   670
                 Liang Zhao and   
          Hiroshi Nagamochi and   
              Toshihide Ibaraki   A Unified Framework for Approximating
                                  Multiway Partition Problems (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 682
             Luitpold Babel and   
                    Bo Chen and   
              Hans Kellerer and   
                 Vladimir Kotov   On-Line Algorithms for Cardinality
                                  Constrained Bin Packing Problems . . . . 695
 Krisztián Monostori and   
           Arkady Zaslavsky and   
             István Vajk   Suffix Vector: a Space-Efficient Suffix
                                  Tree Representation  . . . . . . . . . . 707
               Hideaki Hori and   
         Shinichi Shimozono and   
            Masayuki Takeda and   
                Ayumi Shinohara   Fragmentary Pattern Matching:
                                  Complexity, Algorithms and Applications
                                  for Analyzing Classic Literary Works . . 719
Gerth Stòlting Brodal and   
             Rolf Fagerberg and   
       Christian N. S. Pedersen   Computing the Quartet Distance between
                                  Evolutionary Trees in Time $ O(n \log^2
                                  n) $ . . . . . . . . . . . . . . . . . . 731
           Ronald I. Becker and   
               Yen-I Chiang and   
              Isabella Lari and   
                Andrea Scozzari   The \em Cent-dian Path Problem on Tree
                                  Networks . . . . . . . . . . . . . . . . 743--755
         Evangelos Kranakis and   
              Danny Krizanc and   
                   Sunil Shende   Approximate Hotlink Assignment . . . . . 756
              Shan-Chyun Ku and   
                 Chi-Jen Lu and   
            Biing-Feng Wang and   
                   Tzu-Chin Lin   Efficient Algorithms for Two Generalized
                                  $2$-Median Problems on Trees . . . . . . 768
                      Anonymous   Author Index . . . . . . . . . . . . . . 779


Lecture Notes in Computer Science
Volume 2224, 2001

                Qiming Chen and   
             Umeshwar Dayal and   
                    Meichun Hsu   Conceptual Modeling for Collaborative
                                  E-business Processes . . . . . . . . . . 1
                 Kei-ichi Enoki   ``$i$-mode'', Now & Future  . . . . . . . 17
             Dennis Tsichritzis   The Role of Research in the New Economy  19
              Christoph Bussler   Semantic B2B Integration: Is Modeling
                                  the Superior Approach over Programming?  26
              Rosanne Price and   
           Nectaria Tryfona and   
            Christian S. Jensen   Modeling Topological Constraints in
                                  Spatial Part-Whole Relationships . . . . 27
         Yoshiharu Ishikawa and   
              Hiroyuki Kitagawa   Source Description-Based Approach for
                                  the Modeling of Spatial Information
                                  Integration  . . . . . . . . . . . . . . 41
                Thomas Behr and   
               Markus Schneider   Topological Relationships of Complex
                                  Points and Complex Regions . . . . . . . 56
                  Sudha Ram and   
       Richard T. Snodgrass and   
               Vijay Khatri and   
                   Yousub Hwang   DISTIL: a Design Support Environment for
                                  Conceptual Modeling of Spatio-temporal
                                  Requirements . . . . . . . . . . . . . . 70
             Tony Griffiths and   
     Alvaro A. A. Fernandes and   
            Norman W. Paton and   
             Keith T. Mason and   
                   Bo Huang and   
                Michael Worboys   Tripod: a Comprehensive Model for
                                  Spatial and Aspatial Historical Objects  84
               Markus Schneider   A Design of Topological Predicates for
                                  Complex Crisp and Fuzzy Regions  . . . . 103
Patricia Rodríguez-Gianolli and   
                John Mylopoulos   A Semantic Approach to XML-based Data
                                  Integration  . . . . . . . . . . . . . . 117
   Ronaldo dos Santos Mello and   
          Carlos Alberto Heuser   A Rule-Based Conversion of a DTD to a
                                  Conceptual Schema  . . . . . . . . . . . 133
                Murali Mani and   
                Dongwon Lee and   
               Richard R. Muntz   Semantic Data Modeling Using XML Schemas 149
                    Eric Yu and   
                    Lin Liu and   
                        Ying Li   Modelling Strategic Actor Relationships
                                  to Support Intellectual Property
                                  Management . . . . . . . . . . . . . . . 164
          Bernhard Thalheim and   
     Antje Düsterhöft   SiteLang: Conceptual Modeling of
                                  Internet Sites . . . . . . . . . . . . . 179
       Kamalakar Karlapalem and   
               Ajay R. Dani and   
               P. Radha Krishna   A Frame Work for Modeling Electronic
                                  Contracts  . . . . . . . . . . . . . . . 193
          Virginie Detienne and   
               Jean-Luc Hainaut   CASE Tool Support for Temporal Database
                                  Design . . . . . . . . . . . . . . . . . 208
      Abdel-Rahman H. Tawil and   
        Nicholas J. Fiddian and   
                William A. Gray   Domain-Specific Metadata a Key for
                                  Building Semantically-Rich Schema Models 225
                  Sven Hartmann   Coping with Inconsistent Constraint
                                  Specifications . . . . . . . . . . . . . 241
            Laure Berti-Equille   Integration of Biological Data and
                                  Quality-Driven Source Negotiation  . . . 256
             Andrea Cal\`\i and   
            Diego Calvanese and   
        Giuseppe De Giacomo and   
             Maurizio Lenzerini   Accessing Data Integration Systems
                                  through Conceptual Schemas . . . . . . . 270
               Zhiyong Peng and   
              Yahiko Kambayashi   Resolving Conflicts and Handling
                                  Replication during Integration of
                                  Multiple Databases by Object Deputy
                                  Model  . . . . . . . . . . . . . . . . . 285
               Seokjin Hong and   
              Byoungho Song and   
                      Sukho Lee   Efficient Execution of Range-Aggregate
                                  Queries in Data Warehouse Environments   299
             Torsten Priebe and   
            Günther Pernul   A Pragmatic Approach to Conceptual
                                  Modeling of OLAP Security  . . . . . . . 311
        Dimitri Theodoratos and   
         Theodore Dalamagas and   
             Alkis Simitsis and   
             Manos Stavropoulos   A Randomized Approach for the
                                  Incremental Design of an Evolving Data
                                  Warehouse  . . . . . . . . . . . . . . . 325
      François Pinet and   
                    Ahmed Lbath   Semantics of Stereotypes for Type
                                  Specification in UML: Theory and
                                  Practice . . . . . . . . . . . . . . . . 339
             Joerg Evermann and   
                      Yair Wand   Towards Ontologically Based Semantics
                                  for UML Constructs . . . . . . . . . . . 354
                   Il-Yeol Song   Developing Sequence Diagrams in UML  . . 368
                Peter Kraft and   
      Jens Otto Sòrensen   Translation of a High-Level Temporal
                                  Model into Lower Level Models: Impact of
                                  Modelling at Different Description
                                  Levels . . . . . . . . . . . . . . . . . 383
              Dolors Costal and   
        Antoni Olivé and   
                Ernest Teniente   Relationship Type Refinement in
                                  Conceptual Models with Multiple
                                  Classification . . . . . . . . . . . . . 397
               Martin Doerr and   
       Dimitris Plexousakis and   
             Chryssoyla Bekiari   A Metamodel for Part --- Whole
                                  Relationships for Reasoning on Missing
                                  Parts and Reconstruction . . . . . . . . 412
            David W. Embley and   
                     Wai Y. Mok   Developing XML Documents with Guaranteed
                                  ``Good'' Properties  . . . . . . . . . . 426
                Jacky Akoka and   
     Isabelle Comyn-Wattiau and   
                   Nicolas Prat   Dimension Hierarchies Design from UML
                                  Generalizations and Aggregations . . . . 442
              Markus Lepper and   
Baltasar Trancón y Widemann and   
                  Jacob Wieland   Minimize Mark-Up! Natural Writing Should
                                  Guide the Design of Textual Modeling
                                  Frontends  . . . . . . . . . . . . . . . 456
       Jolita Ralyté and   
                Colette Rolland   An Approach for Method Reengineering . . 471
        Yoshihiro Nakanishi and   
              Tatsuo Hirose and   
                 Katsumi Tanaka   Modeling and Structuring Multiple
                                  Perspective Video for Browsing . . . . . 485
           Biswajit Acharya and   
           Arun K. Majumdar and   
              Jayanta Mukherjee   Modeling Dynamic Objects in Video
                                  Databases: a Logic Based Approach  . . . 499
               Shazia Sadiq and   
                Wasim Sadiq and   
                 Maria Orlowska   Pockets of Flexibility in Workflow
                                  Specification  . . . . . . . . . . . . . 513
             Kuldar Taveter and   
                    Gerd Wagner   Agent-Oriented Enterprise Modeling Based
                                  on Business Rules  . . . . . . . . . . . 527
             Dickson K. W. Chiu   A Three-Layer Model for Workflow
                                  Semantic Recovery in an Object-Oriented
                                  Environment  . . . . . . . . . . . . . . 541
            David W. Embley and   
                 Yiu-Kai Ng and   
                          Li Xu   Recognizing Ontology-Applicable
                                  Multiple-Record Web Documents  . . . . . 555
            Klaus-Dieter Schewe   Querying Web Information Systems . . . . 571
                 Luis Anido and   
       Martín Llamas and   
 Manuel J. Fernández and   
    Judith Rodríguez and   
                Juan Santos and   
                  Manuel Caeiro   A Conceptual Modelling Framework for
                                  Standards-Driven Web-Based Distance
                                  Learning . . . . . . . . . . . . . . . . 585
           Takayuki Kunieda and   
                    Yuki Wakita   XML-schema Dynamic Mapped Multimedia
                                  Content Description Tool . . . . . . . . 599
                Eunsook Jin and   
                Jungmin Seo and   
              Kwangjoon Lee and   
                    Ju-won Song   Constructing a Data Map of Korea Telecom 602
                     Tatsuo Oba   Competency of Set Analysis in CRM Closed
                                  Loop Marketing . . . . . . . . . . . . . 604
                   Ray Paul and   
               Wei-Tek Tsai and   
                    Bing Li and   
                   Xiaoying Bai   XML-based E2E Test Report Management . . 607
            Hajime Horiuchi and   
          Masaharu Obayashi and   
               Yoshihide Nagase   A Framework for Reusing Business Objects
                                  by Multilevel Object Patterns  . . . . . 609
            Takashi Honishi and   
               Gengo Suzuki and   
         Nobuyuki Kobayashi and   
                 Kazuya Konishi   A Mediation System Based on Universal
                                  Relation Modeling  . . . . . . . . . . . 611
                      Anonymous   Author Index . . . . . . . . . . . . . . 613


Lecture Notes in Computer Science
Volume 2225, 2001

                  Naoki Abe and   
               Roni Khardon and   
                Thomas Zeugmann   Editors' Introduction  . . . . . . . . . 1
                 Setsuo Arikawa   The Discovery Science Project in Japan   9
                   Dana Angluin   Queries Revisited  . . . . . . . . . . . 12
              Paul R. Cohen and   
                  Tim Oates and   
                Niall Adams and   
                 Carole R. Beal   Robot Baby 2001  . . . . . . . . . . . . 32
                 Lindley Darden   Discovering Mechanisms: a Computational
                                  Philosophy of Science Perspective  . . . 57
                Ben Shneiderman   Inventing Discovery Tools: Combining
                                  Information Visualization with Data
                                  Mining . . . . . . . . . . . . . . . . . 58
                        Ke Yang   On Learning Correlated Boolean Functions
                                  Using Statistical Queries (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 59
                   Kohei Hatano   A Simpler Analysis of the Multi-way
                                  Branching Decision Tree Boosting
                                  Algorithm  . . . . . . . . . . . . . . . 77
    Ji\vrí \vSíma   Minimizing the Quadratic Training Error
                                  of a Sigmoid Neuron Is Hard  . . . . . . 92
                   Ken Sadohara   Learning of Boolean Functions Using
                                  Support Vector Machines  . . . . . . . . 106
       Jose Balcázar and   
                   Yang Dai and   
                 Osamu Watanabe   A Random Sampling Technique for Training
                                  Support Vector Machines  . . . . . . . . 119
              Ashutosh Garg and   
                       Dan Roth   Learning Coherent Concepts . . . . . . . 135
                Stephen S. Kwek   Learning Intermediate Concepts . . . . . 151
            Daniel R. Dooly and   
           Sally A. Goldman and   
                Stephen S. Kwek   Real-Valued Multiple-Instance Learning
                                  with Queries . . . . . . . . . . . . . . 167
            Yuri Kalnishkan and   
          Michael V. Vyugin and   
                   Volodya Vovk   Loss Functions, Complexities, and the
                                  Legendre Transformation  . . . . . . . . 181
          Michael V. Vyugin and   
            Vladimir V. V'yugin   Non-linear Inequalities between
                                  Predictive and Kolmogorov Complexities   190
                Sanjay Jain and   
                  Frank Stephan   Learning by Switching Type of
                                  Information  . . . . . . . . . . . . . . 205
                Sanjay Jain and   
                  Frank Stephan   Learning How to Separate . . . . . . . . 219
                Sanjay Jain and   
                Yen Kaow Ng and   
                 Tiong Seng Tay   Learning Languages in a Union  . . . . . 235
                  Sandra Zilles   On the Comparison of Inductive Inference
                                  Criteria for Uniform Learning of Finite
                                  Classes  . . . . . . . . . . . . . . . . 251
          Yasuhito Mukouchi and   
                    Masako Sato   Refutable Language Learning with a
                                  Neighbor System  . . . . . . . . . . . . 267
                Sanjay Jain and   
                Efim Kinber and   
              Rolf Wiehagen and   
                Thomas Zeugmann   Learning Recursive Functions Refutably   283
            Wolfgang Merkle and   
                  Frank Stephan   Refuting Learning Revisited  . . . . . . 299
             Hiroki Arimura and   
           Hiroshi Sakamoto and   
                 Setsuo Arikawa   Efficient Learning of Semi-structured
                                  Data from Queries  . . . . . . . . . . . 315
              Steffen Lange and   
             Gunter Grieser and   
                Klaus P. Jantke   Extending Elementary Formal Systems  . . 332
      François Denis and   
      Aurélien Lemay and   
                 Alain Terlutte   Learning Regular Languages Using RFSA    348
        Colin de la Higuera and   
        Jean-Christophe Janodet   Inference of $ \omega $-Languages from
                                  Prefixes . . . . . . . . . . . . . . . . 364
                      Anonymous   Author Index . . . . . . . . . . . . . . 379


Lecture Notes in Computer Science
Volume 2226, 2001

                 Setsuo Arikawa   The Discovery Science Project in Japan   1
                 Lindley Darden   Discovering Mechanisms: a Computational
                                  Philosophy of Science Perspective  . . . 3
                   Dana Angluin   Queries Revisited  . . . . . . . . . . . 16
                Ben Shneiderman   Inventing Discovery Tools: Combining
                                  Information Visualization with Data
                                  Mining . . . . . . . . . . . . . . . . . 17
              Paul R. Cohen and   
                  Tim Oates and   
                Niall Adams and   
                 Carole R. Beal   Robot Baby 2001  . . . . . . . . . . . . 29
               Hideo Bannai and   
           Yoshinori Tamada and   
             Osamu Maruyama and   
                  Satoru Miyano   VML: a View Modeling Language for
                                  Computational Knowledge Discovery  . . . 30
          Sa\vso D\vzeroski and   
                    Pat Langley   Computational Discovery of Communicable
                                  Knowledge: Symposium Report  . . . . . . 45
                  I. Fortes and   
      J. L. Balcázar and   
                     R. Morales   Bounding Negative Information in
                                  Frequent Sets Algorithms . . . . . . . . 50
               João Gama   Functional Trees . . . . . . . . . . . . 59
          Michael E. Gorman and   
        Alexandra Kincannon and   
             Matthew M. Mehalik   Spherical Horses and Shared
                                  Toothbrushes: Lessons Learned from a
                                  Workshop on Scientific and Technological
                                  Thinking . . . . . . . . . . . . . . . . 74
          Hans Gründel and   
              Tino Naphtali and   
            Christian Wiech and   
           Jan-Marian Gluba and   
          Maiken Rohdenburg and   
                Tobias Scheffer   Clipping and Analyzing News Using
                                  Machine Learning Techniques  . . . . . . 87
Tamás Horváth and   
                  Stefan Wrobel   Towards Discovery of Deep and Wide
                                  First-Order Structures: a Case Study in
                                  the Domain of Mutagenicity . . . . . . . 100
              Daisuke Ikeda and   
            Yasuhiro Yamada and   
                Sachio Hirokawa   Eliminating Useless Parts in
                                  Semi-structured Documents Using
                                  Alternation Counts . . . . . . . . . . . 113
             Naresh S. Iyer and   
              John R. Josephson   Multicriterially Best Explanations . . . 128
                Kouta Kanda and   
           Makoto Haraguchi and   
                 Yoshiaki Okubo   Constructing Approximate Informative
                                  Basis of Association Rules . . . . . . . 141
                Koichi Kise and   
              Markus Junker and   
             Andreas Dengel and   
            Keinosuke Matsumoto   Passage-Based Document Retrieval as a
                                  Tool for Text Mining with User's
                                  Information Needs  . . . . . . . . . . . 155
                  Sakir Kocabas   Automated Formulation of Reactions and
                                  Pathways in Nuclear Astrophysics: New
                                  Results  . . . . . . . . . . . . . . . . 170
              Sakir Kocabas and   
                    Pat Langley   An Integrated Framework for Extended
                                  Discovery in Particle Physics  . . . . . 182
              Ronald N. Kostoff   Stimulating Discovery  . . . . . . . . . 196
           Ashesh Mahidadia and   
                   Paul Compton   Assisting Model-Discovery in
                                  Neuroendocrinology . . . . . . . . . . . 214
                Eric Martin and   
                Arun Sharma and   
                  Frank Stephan   A General Theory of Deduction,
                                  Induction, and Learning  . . . . . . . . 228
             Osamu Maruyama and   
          Takayoshi Shoudai and   
             Emiko Furuichi and   
              Satoru Kuhara and   
                  Satoru Miyano   Learning Conformation Rules  . . . . . . 243
          Naohiro Matsumura and   
               Yukio Ohsawa and   
               Mitsuru Ishizuka   Knowledge Navigation on Visualizing
                                  Complementary Documents  . . . . . . . . 258
              Yutaka Matsuo and   
               Yukio Ohsawa and   
               Mitsuru Ishizuka   KeyWorld: Extracting Keywords from a
                                  Document as a Small World  . . . . . . . 271
                Tsuyoshi Murata   A Method for Discovering Purified Web
                                  Communities  . . . . . . . . . . . . . . 282
                Ming Ouyang and   
                  John Case and   
                  Joan Burnside   Divide and Conquer Machine Learning for
                                  a Genomics Analogy Problem (Progress
                                  Report)  . . . . . . . . . . . . . . . . 290
                Joseph Phillips   Towards a Method of Searching a Diverse
                                  Theory Space for Scientific Discovery    304
     Céline Robardet and   
                 Fabien Feschet   Efficient Local Search in Conceptual
                                  Clustering . . . . . . . . . . . . . . . 323
               Kazumi Saito and   
                Pat Langley and   
             Trond Grenager and   
         Christopher Potter and   
          Alicia Torregrosa and   
             Steven A. Klooster   Computational Revision of Quantitative
                                  Scientific Models  . . . . . . . . . . . 336
            Noriko Sugimoto and   
            Hiroki Ishizaka and   
              Takeshi Shinohara   An Efficient Derivation for Elementary
                                  Formal Systems Based on Partial
                                  Unification  . . . . . . . . . . . . . . 350
                Einoshin Suzuki   Worst-Case Analysis of Rule Discovery    365
         Katsuaki Taniguchi and   
           Hiroshi Sakamoto and   
             Hiroki Arimura and   
         Shinichi Shimozono and   
                 Setsuo Arikawa   Mining Semi-structured Data by Path
                                  Expressions  . . . . . . . . . . . . . . 378
        Ljup\vco Todorovski and   
              Sa\vso D\vzeroski   Theory Revision in Equation Discovery    389
              Nobuhisa Ueda and   
                   Taisuke Sato   Simplified Training Algorithms for
                                  Hierarchical Hidden Markov Models  . . . 401
          Koichiro Yamamoto and   
            Masayuki Takeda and   
            Ayumi Shinohara and   
              Tomoko Fukuda and   
                 Ichir\=o Nanri   Discovering Repetitive Expressions and
                                  Affinities from Anthologies of Classical
                                  Japanese Poems . . . . . . . . . . . . . 416
          Hironori Hiraishi and   
             Hisayoshi Kato and   
            Naonori Ohtsuka and   
                Fumio Mizoguchi   Web Site Rating and Improvement Based on
                                  Hyperlink Structure  . . . . . . . . . . 429
             Masahiro Hirao and   
           Shunsuke Inenaga and   
            Ayumi Shinohara and   
            Masayuki Takeda and   
                 Setsuo Arikawa   A Practical Algorithm to Find the Best
                                  Episode Patterns . . . . . . . . . . . . 435
           Harry Hochheiser and   
                Ben Shneiderman   Interactive Exploration of Time Series
                                  Data . . . . . . . . . . . . . . . . . . 441
          Shreevardhan Lele and   
               Bruce Golden and   
              Kimberly Ozga and   
                   Edward Wasil   Clustering Rules Using Empirical
                                  Similarity of Support Sets . . . . . . . 447
               Marin Simina and   
          Michael E. Gorman and   
              Janet L. Kolodner   Computational Lessons from a Cognitive
                                  Study of Invention . . . . . . . . . . . 452
              Yuzuru Tanaka and   
             Tsuyoshi Sugibuchi   Component-Based Framework for Virtual
                                  Information Materialization  . . . . . . 458
                  Lida Tang and   
                Ben Shneiderman   Dynamic Aggregation to Support Pattern
                                  Discovery: a Case Study with Web Logs    464
                 Genta Ueno and   
          Nagatomo Nakamura and   
               Tomoyuki Higuchi   Separation of Photoelectrons via
                                  Multivariate Maxwellian Mixture Model    470
  Alexander P. M. van den Bosch   Logic of Drug Discovery: a Descriptive
                                  Model of a Practice in Neuropharmacology 476
            Yasuhiro Yamada and   
              Daisuke Ikeda and   
                Sachio Hirokawa   SCOOP: a Record Extractor without
                                  Knowledge on Input . . . . . . . . . . . 482
                Premysl Zak and   
               Pavel Spacil and   
               Jaroslava Halova   Meta-analysis of Mutagenes Discovery . . 488
                      Anonymous   Author Index . . . . . . . . . . . . . . 493


Lecture Notes in Computer Science
Volume 2227, 2001

                   J. L. Massey   The Ubiquity of Reed--Muller Codes . . . 1
                       V. Pless   Self-dual Codes-Theme and Variations . . 13
                 A. Shokrollahi   Design of Differential Space-Time Codes
                                  Using Group Theory . . . . . . . . . . . 22
                       M. Sudan   Ideal Error-Correcting Codes: Unifying
                                  Algebraic and Number-Theoretic
                                  Algorithms . . . . . . . . . . . . . . . 36
                  A. Baliga and   
                        J. Chua   Self-dual Codes Using Image Restoration
                                  Techniques . . . . . . . . . . . . . . . 46
                   E. Cadic and   
              J. C. Carlach and   
                  G. Olocco and   
                  A. Otmani and   
                  J. P. Tillich   Low Complexity Tail-Biting Trellises of
                                  Self-dual codes of Length $ 24 $, $ 32 $
                                  and $ 40 $ over $ G F(2) $ and $ \mathbb
                                  {Z}_4 $ of Large Minimum Distance  . . . 57
               B. Kumar Dey and   
                B. Sundar Rajan   $ F_q $-Linear Cyclic Codes over $
                                  F_{q^m} $: DFT Characterization  . . . . 67--76
          Thierry P. Berger and   
                Louis de Maximy   Cyclic Projective Reed--Muller Codes . . 77--81
                T. Laihonen and   
                       S. Ranto   Codes Identifying Sets of Vertices . . . 82
                H. G. Schaathun   Duality and Greedy Weights of Linear
                                  Codes and Projective Multisets . . . . . 92
               K. Betsumiya and   
                  M. Harada and   
                    A. Munemasa   Type II Codes over $ {\mathbb F}_{2^r} $ 102--111
                M. K. Gupta and   
                D. G. Glynn and   
                 T. A. Gulliver   On Senary Simplex Codes  . . . . . . . . 112
             T. A. Gulliver and   
                      M. Harada   Optimal Double Circulant $ {\mathbb Z}_4
                                  $-Codes  . . . . . . . . . . . . . . . . 122
                   V. Guruswami   Constructions of Codes from Number
                                  Fields . . . . . . . . . . . . . . . . . 129
                H. Horimoto and   
                   K. Shiromoto   On Generalized Hamming Weights for Codes
                                  over Finite Chain Rings  . . . . . . . . 141
                 A. Kelarev and   
                   O. Sokratova   Information Rates and Weights of Codes
                                  in Structural Matrix Rings . . . . . . . 151
                    O. Geil and   
              T. Hòholdt   On Hyperbolic Codes  . . . . . . . . . . 159
                      S. Sakata   On Fast Interpolation Method for
                                  Guruswami--Sudan List Decoding of
                                  One-Point Algebraic-Geometry Codes . . . 172
M. C. Rodríguez-Palánquex and   
L. J. García-Villalba and   
              I. Luengo-Velasco   Computing the Genus of a Class of Curves 182
               J. Gutierrez and   
                 D. Gomez-Perez   Iterations of Multivariate Polynomials
                                  and Discrepancy of Pseudorandom Numbers  192
                   M. G. Parker   Even Length Binary Sequence Families
                                  with Low Negaperiodic Autocorrelation    200
                     P. Parraud   On the Non-existence of (Almost-)Perfect
                                  Quaternary Sequences . . . . . . . . . . 210
                 A. Peinado and   
                 F. Montoya and   
            J. Muñoz and   
                    A. J. Yuste   Maximal Periods of $ x + c $ in $
                                  \mathbb {F}_q $  . . . . . . . . . . . . 219
                   P. Udaya and   
                    S. Bozta\cs   On the Aperiodic Correlation Function of
                                  Galois Ring $m$-Sequences  . . . . . . . 229--238
                        L. Wang   Euclidean Modules and Multisequence
                                  Synthesis  . . . . . . . . . . . . . . . 239
                 C. Charnes and   
           M. Rötteler and   
                        T. Beth   On Homogeneous Bent Functions  . . . . . 249
                 S. Encheva and   
                       G. Cohen   Partially Identifying Codes for
                                  Copyright Protection . . . . . . . . . . 260
              I. E. Shparlinski   On the Generalised Hidden Number Problem
                                  and Bit Security of XTR  . . . . . . . . 268
                   V. Ustimenko   CRYPTIM: Graphs as Tools for Symmetric
                                  Encryption . . . . . . . . . . . . . . . 278
          V. Álvarez and   
              J. A. Armario and   
                 M. D. Frau and   
                        P. Real   An Algorithm for Computing Cocyclic
                                  Matrices Developed over Some Semidirect
                                  Products . . . . . . . . . . . . . . . . 287
              M. Giesbrecht and   
           M. Jacobson, Jr. and   
                  A. Storjohann   Algorithms for Large Integer Matrix
                                  Problems . . . . . . . . . . . . . . . . 297
                 I. Honkala and   
            M. G. Karpovsky and   
                      S. Litsyn   On the Identification of Vertices and
                                  Edges Using Cycles . . . . . . . . . . . 308
               V. B. Balakirsky   On Algebraic Soft Decision Decoding of
                                  Cyclic Binary Codes  . . . . . . . . . . 315
                       E. Byrne   Lifting Decoding Schemes over a Galois
                                  Ring . . . . . . . . . . . . . . . . . . 323
                  T. Kasami and   
               H. Tokushige and   
                        Y. Kaji   Sufficient Conditions on Most Likely
                                  Local Sub-codewords in Recursive Maximum
                                  Likelihood Decoding Algorithms . . . . . 333
                 M. Kuijper and   
                M. van Dijk and   
                H. Hollmann and   
                    J. Oostveen   A Unifying System-Theoretic Framework
                                  for Errors-and-Erasures Reed--Solomon
                                  Decoding . . . . . . . . . . . . . . . . 343
                    T. Wadayama   An Algorithm for Computing Rejection
                                  Probability of MLD with Threshold Test
                                  over BSC . . . . . . . . . . . . . . . . 353
                 F. Boulier and   
                        S. Neut   Cartan's Characters and Stairs of
                                  Characteristic Sets  . . . . . . . . . . 363
                  P. Gaudry and   
               É. Schost   On the Invariants of the Quotients of
                                  the Jacobian of a Curve of Genus $2$ . . 373
                A. M. Guidi and   
                A. J. Grant and   
                S. S. Pietrobon   Algebraic Constructions for PSK
                                  Space-Time Coded Modulation  . . . . . . 387
                      Anonymous   Author Index . . . . . . . . . . . . . . 397


Lecture Notes in Computer Science
Volume 2228, 2001

          D. K. Koukopoulos and   
          S. E. Nikoletseas and   
               Paul G. Spirakis   Stability Issues in Heterogeneous and
                                  FIFO Networks under the Adversarial
                                  Queueing Model . . . . . . . . . . . . . 3
                S. Rao Kosaraju   Mesh Algorithms for Multiplication and
                                  Division . . . . . . . . . . . . . . . . 17
              Punit Chandra and   
           Ajay D. Kshemkalyani   Compact Routing in Directed Networks
                                  with Stretch Factor of Two . . . . . . . 24
                   K. Subramani   Parametric Scheduling --- Algorithms and
                                  Complexity . . . . . . . . . . . . . . . 36
                B. S. Panda and   
                   Sajal K. Das   An Efficient Algorithm for Computing
                                  Lower Bounds on Time and Processors for
                                  Scheduling Precedence Graphs on
                                  Multicomputer Systems  . . . . . . . . . 47
                   Achim Streit   On Job Scheduling for HPC-Clusters and
                                  the dynP Scheduler . . . . . . . . . . . 58
                R. Al-Omari and   
             Arun K. Somani and   
                   G. Manimaran   An Adaptive Scheme for Fault-Tolerant
                                  Scheduling of Soft Real-Time Tasks in
                                  Multiprocessor Systems . . . . . . . . . 68
               William D. Gropp   Learning from the Success of MPI . . . . 81
       J. L. V. Lewandowski and   
                  W. W. Lee and   
                         Z. Lin   Gyrokinetic Simulations of Plasma
                                  Turbulence on Massively Parallel
                                  Computers  . . . . . . . . . . . . . . . 95
    Anthony T. Chronopoulos and   
             Andrey B. Kucherov   A Parallel Krylov-Type Method for
                                  Nonsymmetric Linear Systems  . . . . . . 104
              Niloy Ganguly and   
                 Arijit Das and   
              Pradipta Maji and   
               Biplab K. Sikdar   Evolving Cellular Automata Based
                                  Associative Memory for Pattern
                                  Recognition  . . . . . . . . . . . . . . 115
            Bhanu Hariharan and   
                 Srinivas Aluru   Efficient Parallel Algorithms and
                                  Software for Compressed Octrees with
                                  Applications to Hierarchical Methods . . 125
             Victor Salamon and   
                    Paul Lu and   
                 Ben Watson and   
               Dima Brodsky and   
                    Dave Gomboc   A Case Study of Improving Memory
                                  Locality in Polygonal Model
                                  Simplification: Metrics and Performance  137
               Vivek Sarkar and   
                   Julian Dolby   High-Performance Scalable Java Virtual
                                  Machines . . . . . . . . . . . . . . . . 151
         Courtney R. Gibson and   
                  Angelos Bilas   Shared Virtual Memory Clusters with
                                  Next-Generation Interconnection Networks
                                  and Wide Compute Nodes . . . . . . . . . 167
         Johara Shahabuddin and   
             Abhay Chrungoo and   
                Vishu Gupta and   
             Sandeep Juneja and   
              Sanjiv Kapoor and   
                     Arun Kumar   Stream-Packing: Resource Allocation in
                                  Web Server Farms with a QoS Guarantee    182
             Emre Özer and   
            Thomas M. Conte and   
                 Saurabh Sharma   Weld: a Multithreading Technique Towards
                                  Latency-Tolerant VLIW Processors . . . . 192
            Aneesh Aggarwal and   
                 Manoj Franklin   Putting Data Value Predictors to Work in
                                  Fine-Grain Parallel Processors . . . . . 204
      Juan L. Aragón and   
José González and   
José M. García and   
        Antonio González   Confidence Estimation for Branch
                                  Prediction Reversal  . . . . . . . . . . 214
            Rajiv Ravindran and   
                    Rajat Moona   Retargetable Program Profiling Using
                                  High Level Processor Models  . . . . . . 224
                D. Cociorva and   
                 J. Wilkins and   
             G. Baumgartner and   
              P. Sadayappan and   
               J. Ramanujam and   
                 M. Nooijen and   
               D. Bernholdt and   
                    R. Harrison   Towards Automatic Synthesis of
                                  High-Performance Codes for Electronic
                                  Structure Calculations: Data Locality
                                  Optimization . . . . . . . . . . . . . . 237
          Muthian Sivathanu and   
Venkateshwaran Venkataramani and   
        Remzi H. Arpaci-Dusseau   Block Asynchronous I/O: a Flexible
                                  Infrastructure for User-Level
                                  Filesystems  . . . . . . . . . . . . . . 249
       Subramania Sharma T. and   
     Matthew J. Thazhuthaveetil   TWLinuX: Operating System Support for
                                  Optimistic Parallel Discrete Event
                                  Simulation . . . . . . . . . . . . . . . 262--271
                  JinHo Ahn and   
                Sung-Gi Min and   
                 ChongSun Hwang   Low-Cost Garbage Collection for Causal
                                  Message Logging  . . . . . . . . . . . . 272
               Aamer Jaleel and   
                    Bruce Jacob   Improving the Precise Interrupt
                                  Mechanism of Software-Managed TLB Miss
                                  Handlers . . . . . . . . . . . . . . . . 282
            K. V. Manjunath and   
                R. Govindarajan   Hidden Costs in Avoiding False Sharing
                                  in Software DSMs . . . . . . . . . . . . 294
             Tracy D. Braun and   
          Howard Jay Siegel and   
         Anthony A. Maciejewski   Heterogeneous Computing: Goals, Methods,
                                  and Open Problems  . . . . . . . . . . . 307
                  Swades De and   
                   Sajal K. Das   Maximum Achievable Capacity Gain through
                                  Traffic Load Balancing in Cellular Radio
                                  Networks: a Practical Perspective  . . . 321
                  Rahul Jha and   
                   Sridhar Iyer   Performance Evaluation of Mobile Agents
                                  for E-commerce Applications  . . . . . . 331
      Juan Fernández and   
José M. García and   
              José Duato   Performance Evaluation of Real-Time
                                  Communication Services on High-Speed
                                  LANs under Topology Changes  . . . . . . 341
           Mahesh Sivakumar and   
             Suresh Subramaniam   Wavelength Conversion Placement and
                                  Wavelength Assignment in WDM Optical
                                  Networks . . . . . . . . . . . . . . . . 351
                     Smitha and   
                  Inkoo Kim and   
          A. L. Narasimha Reddy   Identifying Long-Term High-Bandwidth
                                  Flows at a Router  . . . . . . . . . . . 361--371
               D. Manjunath and   
                  Biplab Sikdar   Variable Length Packet Switches: Input
                                  Queued Fabrics with Finite Buffers,
                                  Speedup, and Parallelism . . . . . . . . 372
         Masaru Kitsuregawa and   
             Iko Pramudiono and   
              Katsumi Takahashi   Web Mining Is Parallel . . . . . . . . . 385
              Joe Bannister and   
                  Joe Touch and   
         Purushotham Kamath and   
                   Aatash Patel   An Optical Booster for Internet Routers  399
                   Anurag Kumar   Intelligent Traffic Engineering of
                                  Internets: Towards a Model-Based
                                  Approach . . . . . . . . . . . . . . . . 414
        Marco Ajmone Marsan and   
             Marco Gribaudo and   
                Michela Meo and   
                  Matteo Sereno   Performance Analysis of Data Services
                                  over GPRS  . . . . . . . . . . . . . . . 425
                      Anonymous   Author Index . . . . . . . . . . . . . . 437


Lecture Notes in Computer Science
Volume 2229, 2001

            Claus Peter Schnorr   Security of Blind Discrete Log
                                  Signatures against Interactive Attacks   1
                 Dongxi Liu and   
                Xiaoyong Li and   
                    Yingcai Bai   An Intelligent Intruder Model for
                                  Security Protocol Analysis . . . . . . . 13
         Kishan Chand Gupta and   
                Subhamoy Maitra   Primitive Polynomials over GF(2) --- A
                                  Cryptologic Approach . . . . . . . . . . 23
                    Bo Yang and   
               Shixiong Zhu and   
                     Yumin Wang   Unconditionally-Secure Oblivious
                                  Transfer . . . . . . . . . . . . . . . . 35
            Chin-Chen Chang and   
                 Iuon-Chang Lin   Cryptanalysis of the Improved User
                                  Efficient Blind Signatures . . . . . . . 42
            Chin-Chen Chang and   
                 Kuo-Feng Hwang   Towards the Forgery of a Group Signature
                                  without Knowing the Group Center's
                                  Secret . . . . . . . . . . . . . . . . . 47
                Xiaochen Bo and   
              Lincheng Shen and   
                   Wensen Chang   Evaluation of the Image Degradation for
                                  a Typical Watermarking Algorithm in the
                                  Block-DCT Domain . . . . . . . . . . . . 52
              Kazumaro Aoki and   
           Fumitaka Hoshino and   
            Tetsutaro Kobayashi   A Cyclic Window Algorithm for ECC
                                  Defined over Extension Fields  . . . . . 62
              Fangguo Zhang and   
                Futai Zhang and   
                     Yumin Wang   Fast Scalar Multiplication on the
                                  Jacobian of a Family of Hyperelliptic
                                  Curves . . . . . . . . . . . . . . . . . 74
                Dingfeng Ye and   
                Junhui Yang and   
                Zongduo Dai and   
                      Haiwen Ou   Attacks on Two Digital Signature Schemes
                                  Based on Error Correcting Codes  . . . . 84
                 Kanta Matsuura   A Derivative of Digital Objects and
                                  Estimation of Default Risks in
                                  Electronic Commerce  . . . . . . . . . . 90
                Young-Chul Shim   A New Approach for Secure Multicast
                                  Routing in a Large Scale Network . . . . 95
                Hee-Wan Kim and   
             Hae-Kyung Rhee and   
               Tai M. Chung and   
               Young Ik Eom and   
                     Ung-Mo Kim   A Transaction Length-Sensitive Protocol
                                  Based on Altruistic Locking for
                                  Multilevel Secure Database Systems . . . 107
               Sungbaek Cho and   
          Zbigniew Ciechanowicz   Dealing with Uncertainties in Risk
                                  Analysis Using Belief Functions  . . . . 119
           Michael Hitchens and   
             Vijay Varadharajan   RBAC for XML Document Stores . . . . . . 131
              Xian-Mo Zhang and   
                 Josef Pieprzyk   Cheating Immune Secret Sharing . . . . . 144
                   Gideon Samid   Encryption Sticks (Randomats)  . . . . . 150
                Zhimin Song and   
                     Sihan Qing   Applying NCP Logic to the Analysis of
                                  SSL 3.0  . . . . . . . . . . . . . . . . 155
                Ian Herwono and   
                 Ingo Liebhardt   Performance of WTLS and Its Impact on an
                                  $M$-commerce Transaction . . . . . . . . 167
             Carlos Ribeiro and   
André Zúquete and   
                 Paulo Ferreira   Enforcing Obligation with Security
                                  Monitors . . . . . . . . . . . . . . . . 172
                  Peng Ning and   
                 Yiqun Lisa Yin   Efficient Software Implementation for
                                  Finite Field Multiplication in Normal
                                  Basis  . . . . . . . . . . . . . . . . . 177
              Jianying Zhou and   
                     Chunfu Tan   Playing Lottery on the Internet  . . . . 189
                   Feng Bao and   
                    Robert Deng   Privacy Protection for Transactions of
                                  Digital Goods  . . . . . . . . . . . . . 202
             Jie-lü Xu and   
               Han-liang Xu and   
                   Yan Wang and   
               Shu-Wang Lü   Equivalent Characterizations and
                                  Applications of Multi-output
                                  Correlation-Immune Boolean Functions . . 214
                Guilin Wang and   
                 Sihan Qing and   
             Mingsheng Wang and   
                   Zhanfei Zhou   Threshold Undeniable RSA Signature
                                  Scheme . . . . . . . . . . . . . . . . . 221
           Min-Shiang Hwang and   
              Cheng-Chi Lee and   
                Yuan-Liang Tang   Two Simple Batch Verifying Multiple
                                  Digital Signatures . . . . . . . . . . . 233
                  Yeping He and   
                     Sihan Qing   Square Attack on Reduced Camellia Cipher 238
                    Lin You and   
               Yi Xian Yang and   
                  Chun Qi Zhang   Generalization of Elliptic Curve Digital
                                  Signature Schemes  . . . . . . . . . . . 246
               Bruno Crispo and   
                Giancarlo Ruffo   Reasoning about Accountability within
                                  Delegation . . . . . . . . . . . . . . . 251
                   Gang Pan and   
                   Yijun Wu and   
                     Zhaohui Wu   A Novel Data Hiding Method for Two-Color
                                  Images . . . . . . . . . . . . . . . . . 261
                  C.-H. Lee and   
                    X. Deng and   
                         H. Zhu   An Identification Scheme Provably Secure
                                  against Reset Attack . . . . . . . . . . 271
                  Sanna Kunnari   Estimating the Scalability of the
                                  Internet Key Exchange  . . . . . . . . . 280
           Shigeta Kuninobu and   
            Yoshiaki Takata and   
              Hiroyuki Seki and   
                  Katsuro Inoue   An Efficient Information Flow Analysis
                                  of Recursive Programs Based on a Lattice
                                  Model of Security Classes  . . . . . . . 292
                     Baoqing Ye   Defeating Denial-of-Service Attacks on
                                  the Internet . . . . . . . . . . . . . . 304
             Dianlong Zhang and   
             Harald Lukhaub and   
                    Werner Zorn   A Role-Based Access Control Model and
                                  Implementation for Data-Centric
                                  Enterprise Applications  . . . . . . . . 316
  Yongyuth Permpoontanalarp and   
          Chaiwat Rujimethabhas   A Unified Methodology for Verification
                                  and Synthesis of Firewall Configurations 328
                   Yan Chen and   
              Adam Bargteil and   
               David Bindel and   
              Randy H. Katz and   
               John Kubiatowicz   Quantifying Network Denial of Service: a
                                  Location Service Case Study  . . . . . . 340
Juan Manuel González Nieto and   
                 Colin Boyd and   
                      Ed Dawson   A Public Key Cryptosystem Based on the
                                  Subgroup Membership Problem  . . . . . . 352
              Ki-Yoong Hong and   
                       Chul Kim   On a Network Security Model for the
                                  Secure Information Flow on Multilevel
                                  Secure Network . . . . . . . . . . . . . 364
                Wenjian Luo and   
                Xianbin Cao and   
                      Xufa Wang   NIDS Research Based on Artificial
                                  Immunology . . . . . . . . . . . . . . . 371
       Oscar Cánovas and   
        Antonio F. Gómez   AMBAR Protocol: Access Management Based
                                  on Authorization Reduction . . . . . . . 376
                  Xukai Zou and   
           Byrav Ramamurthy and   
           Spyros S. Magliveras   Chinese Remainder Theorem Based
                                  Hierarchical Access Control for Secure
                                  Group Communication  . . . . . . . . . . 381
                   Yan Wang and   
                   Kian-Lee Tan   Dispatching Mobile Agents with Secure
                                  Routes in Parallel . . . . . . . . . . . 386
                    Yu Chen and   
                  Qian Fang and   
                  Zhihui Du and   
             Zhenchun Huang and   
                       Sanli Li   TH-SMS: Security Management System in
                                  Advanced Computational Infrastructure    398
                Ulrich Lang and   
            Dieter Gollmann and   
               Rudolf Schreiner   Cryptography and Middleware Security . . 408
              Kencheng Zeng and   
           Chung-Huang Yang and   
                   T. R. N. Rao   Cryptanalysis of the Hwang-Rao Secret
                                  Error-Correcting Code Schemes  . . . . . 419
                Eric Disson and   
         Danielle Boulanger and   
                  Gilles Dubois   A Role-Based Model for Access Control in
                                  Database Federations . . . . . . . . . . 429
                 Hongpei Li and   
               Lianli Chang and   
                    Xinmei Wang   A Useful Intrusion Detection System
                                  Prototype to Monitor Multi-processes
                                  Based on System Calls  . . . . . . . . . 441
                Hee-Un Park and   
                   Im-Yeong Lee   A Digital Nominative Proxy Signature
                                  Scheme for Mobile Communication  . . . . 451
                   Mi Ra Yi and   
                     Tae Ho Cho   Hierarchical Simulation Model with
                                  Animation for Large Network Security . . 456
              Greg Maitland and   
                     Colin Boyd   Fair Electronic Cash Based on a Group
                                  Signature Scheme . . . . . . . . . . . . 461
               Chuan-Kun Wu and   
             Vijay Varadharajan   Fair Exchange of Digital Signatures with
                                  Offline Trusted Third Party  . . . . . . 466
              Jong Sou Park and   
                Jang-Se Lee and   
               Hwan Kuk Kim and   
            Jeong-Rye Jeong and   
              Dong-Bok Yeom and   
                    Sung-Do Chi   SECUSIM: a Tool for the Cyber-Attack
                                  Simulation . . . . . . . . . . . . . . . 471
                        Yifa Li   A New Semantics of Authentication Logic  476
               Ji Hwan Park and   
              Sook Ee Jeong and   
                  Chang Soo Kim   Robust and Fragile Watermarking
                                  Techniques for Documents Using
                                  Bi-directional Diagonal Profiles . . . . 483
                    Seenil Gram   Redundancy, Obscurity, Self-Containment &
                                  Independence . . . . . . . . . . . . . . 495
                      Anonymous   Author Index . . . . . . . . . . . . . . 503


Lecture Notes in Computer Science
Volume 2230, 2001

                    T. Arts and   
              P. Bovendeerd and   
           A. van der Toorn and   
                  L. Geerts and   
              R. Kerckhoffs and   
                     F. Prinzen   Modules in Cardiac Modeling: Mechanics,
                                  Circulation, and Depolarization Wave . . 1
              Jean-Luc Mari and   
             Laurent Astart and   
                  Jean Sequeira   Geometrical Modeling of the Heart and
                                  Its Main Vessels . . . . . . . . . . . . 10
        Henri Veisterä and   
       Jyrki Lötjönen   Reconstructing $3$D Boundary Element
                                  Heart Models from $2$D Biplane
                                  Fluoroscopy  . . . . . . . . . . . . . . 17
               Igor Dydenko and   
            Denis Friboulet and   
             Isabelle E. Magnin   Introducing Spectral Estimation for
                                  Boundary Detection in Echographic
                                  Radiofrequency Images  . . . . . . . . . 24
               Ayman Mourad and   
                  Luc Biard and   
            Denis Caillerie and   
          Pierre-Simon Jouk and   
               Annie Raoult and   
            Nicolas Szafran and   
                     Yves Usson   Geometrical Modelling of the Fibre
                                  Organization in the Human Left Ventricle 32
  B. Milan Horá\vcek and   
               Kim Simelius and   
                   Rok Hren and   
                  Jukka Nenonen   Challenges in Modelling Human Heart's
                                  Total Excitation . . . . . . . . . . . . 39
                Jan D'hooge and   
                 Fadi Jamal and   
               Bart Bijnens and   
                  Jan Thoen and   
          Frans Van de Werf and   
       George R. Sutherland and   
                   Paul Suetens   Two-Dimensional Ultrasonic Strain Rate
                                  Measurement of the Human Heart in Vivo   47
      Valérie Moreau and   
           Laurent D. Cohen and   
                 Denis Pellerin   Deformation Field Estimation for the
                                  Cardiac Wall Using Doppler Tissue
                                  Imaging  . . . . . . . . . . . . . . . . 53
          Cyril F. Allouche and   
                   S. Makam and   
            Nicholas Ayache and   
        Hervé Delingette   A New Kinetic Modeling Scheme for the
                                  Human Left Ventricle Wall Motion with
                                  MR-Tagging Imaging . . . . . . . . . . . 61
           Patrick Clarysse and   
           Pierre Croisille and   
                Luc Bracoud and   
             Isabelle E. Magnin   Integrated Quantitative Analysis of
                                  Tagged Magnetic Resonance Images . . . . 69
             Elliot McVeigh and   
                 Owen Faris and   
                  Dan Ennis and   
               Patrick Helm and   
                    Frank Evans   Measurement of Ventricular Wall Motion,
                                  Epicardial Electrical Mapping, and
                                  Myocardial Fiber Angles in the Same
                                  Heart  . . . . . . . . . . . . . . . . . 76
      Timo Mäkelä and   
            Quoc-Cuong Pham and   
           Patrick Clarysse and   
   Jyrki Lötjönen and   
              Kirsi Lauerma and   
       Helena Hänninen and   
              Juhani Knuuti and   
               Toivo Katila and   
             Isabelle E. Magnin   A $3$-D Model-Based Approach for the
                                  PET-Functional and MR-Anatomical Cardiac
                                  Imaging Data Fusion  . . . . . . . . . . 83
Frédérique Frouin and   
       Paté Boubacar and   
             Vincent Frouin and   
            Alain De Cesare and   
       Andrew Todd-Pokropek and   
              Pascal Merlet and   
                  Alain Herment   $3$D Regularisation and Segmentation of
                                  Factor Volumes to Process PET H$_2$O
                                  Myocardial Perfusion Studies . . . . . . 91
              M. Nahrendorf and   
               K.-H. Hiller and   
                      K. Hu and   
                  C. Waller and   
                F. Wiesmann and   
                    J. Ruff and   
                    G. Ertl and   
                   A. Haase and   
                    W. R. Bauer   In Vivo Assessment of Rat Hearts with
                                  and without Myocardial Infarction by
                                  Cine NMR --- Comparison of the NMR
                                  Method to Invasive Techniques and
                                  Application to Intervention Studies  . . 97
             Chantal Muller and   
          Mich\`ele Rombaut and   
                    Marc Janier   Dempster Shafer Approach for High Level
                                  Data Fusion Applied to the Assessment of
                                  Myocardial Viability . . . . . . . . . . 104
        Andrew D. McCulloch and   
               Derrick Sung and   
          Mary Ellen Thomas and   
             Anushka Michailova   Experimental and Computational Modeling
                                  of Cardiac Electromechanical Coupling    113
                  N. Ayache and   
                D. Chapelle and   
          F. Clément and   
              Y. Coudi\`ere and   
              H. Delingette and   
J. A. Désidéri and   
               M. Sermesant and   
                  M. Sorine and   
         José M. Urquiza   Towards Model-Based Estimation of the
                                  Cardiac Electro-Mechanical Activity from
                                  ECG Signals and Ultrasound Images  . . . 120
         Dominique Chapelle and   
Frédérique Clément and   
         Frank Génot and   
          Patrick Le Tallec and   
              Michel Sorine and   
         José M. Urquiza   A Physiologically-Based Model for the
                                  Active Cardiac Muscle Contraction  . . . 128
                 Piet Claus and   
               Bart Bijnens and   
            Frank Weidemann and   
           Christoph Dommke and   
              Virginie Bito and   
              Frank Heinzel and   
               Karin Sipido and   
          Ivan De Scheerder and   
        Frank E. Rademakers and   
           George R. Sutherland   Post-Systolic Thickening in Ischaemic
                                  Myocardium: a Simple Mathematical Model
                                  for Simulating Regional Deformation  . . 134
               Kim Simelius and   
              Jukka Nenonen and   
      B. Milan Horá\vcek   Simulation of Anisotropic Propagation in
                                  the Myocardium with a Hybrid Bidomain
                                  Model  . . . . . . . . . . . . . . . . . 140
              Bernhard Tilg and   
               Robert Modre and   
             Gerald Fischer and   
           Friedrich Hanser and   
             Bernd Messnarz and   
         Franz Xaver Roithinger   Imaging of Electrical Function within
                                  the Human Atrium and Ventricle from
                                  Paced ECG Mapping Data . . . . . . . . . 148
                      Anonymous   Author Index . . . . . . . . . . . . . . 157


Lecture Notes in Computer Science
Volume 2231, 2001

             Alessandro Pasetti   1 Introduction and Context . . . . . . . 1
             Alessandro Pasetti   2 Attitude and Orbit Control Systems
                                  (AOCS) . . . . . . . . . . . . . . . . . 17
             Alessandro Pasetti   3 Software Frameworks  . . . . . . . . . 29
             Alessandro Pasetti   4 Framelets and Implementation Cases . . 49
             Alessandro Pasetti   5 Framework Specification  . . . . . . . 69
             Alessandro Pasetti   6 Framework Design . . . . . . . . . . . 79
             Alessandro Pasetti   7 The User's Perspective . . . . . . . . 99
             Alessandro Pasetti   8 General Structure of the AOCS
                                  Framework  . . . . . . . . . . . . . . . 111
             Alessandro Pasetti   9 General Design Principles  . . . . . . 131
             Alessandro Pasetti   10 The System Management Framelet  . . . 141
             Alessandro Pasetti   11 The Object Monitoring Framelet  . . . 147
             Alessandro Pasetti   12 The Operational Mode Management
                                  Framelet . . . . . . . . . . . . . . . . 159
             Alessandro Pasetti   13 The Intercomponent Communication
                                  Framelet . . . . . . . . . . . . . . . . 167
             Alessandro Pasetti   14 The Sequential Data Processing
                                  Framelet . . . . . . . . . . . . . . . . 183
             Alessandro Pasetti   15 The AOCS Unit Framelet  . . . . . . . 193
             Alessandro Pasetti   16 The Reconfiguration Management
                                  Framelet . . . . . . . . . . . . . . . . 209
             Alessandro Pasetti   17 The Manoeuvre Management Framelet . . 217
             Alessandro Pasetti   18 The Failure Detection Management
                                  Framelet . . . . . . . . . . . . . . . . 223
             Alessandro Pasetti   19 The Failure Recovery Management
                                  Framelet . . . . . . . . . . . . . . . . 233
             Alessandro Pasetti   20 The Telecommand Management Framelet   243
             Alessandro Pasetti   21 The Telemetry Management Framelet . . 253
             Alessandro Pasetti   22 The Controller Management Framelet    263
             Alessandro Pasetti   23 The Framework Instantiation Process   271
             Alessandro Pasetti   Appendix . . . . . . . . . . . . . . . . 279
             Alessandro Pasetti   References . . . . . . . . . . . . . . . 285
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 291


Lecture Notes in Computer Science
Volume 2232, 2001

              Amaia Lazcano and   
                 Gustavo Alonso   Process Based E-services . . . . . . . . 1
                 Stephan Heuser   Digital Rights Management --- Dealmaker
                                  for E-business?  . . . . . . . . . . . . 11
             Alejandro Buchmann   E-services: The Next Wave of
                                  Internet-Based Applications  . . . . . . 13
Jaime García-Reinoso and   
        Javier Vales-Alonso and   
Francisco J. González-Castaño and   
    Luis Anido-Rifón and   
Pedro S. Rodríguez-Hernández   A New $M$-commerce Concept: $m$-Mall . . 14
       Simone C. dos Santos and   
      Sérgio Angelim and   
             Silvio R. L. Meira   Building Comparison-Shopping Brokers on
                                  the Web  . . . . . . . . . . . . . . . . 26
         Giacomo Piccinelli and   
          Cesare Stefanelli and   
                 David Trastour   Trusted Mediation for E-service
                                  Provision in Electronic Marketplaces . . 39
             Till Schümmer   GAMA-Mall --- Shopping in Communities    51
                 Torsten Eymann   Markets without Makers --- A Framework
                                  for Decentralized Economic Coordination
                                  in Multiagent Systems  . . . . . . . . . 63
             Philippe Golle and   
         Kevin Leyton-Brown and   
               Ilya Mironov and   
               Mark Lillibridge   Incentives for Sharing in Peer-to-Peer
                                  Networks . . . . . . . . . . . . . . . . 75
               Konrad Wrona and   
               Marko Schuba and   
                  Guido Zavagli   Mobile Payments --- State of the Art and
                                  Open Problems  . . . . . . . . . . . . . 88
                Holger Vogt and   
             Henning Pagnia and   
          Felix C. Gärtner   Using Smart Cards for Fair Exchange  . . 101
     Levente Buttyán and   
             Jean-Pierre Hubaux   Rational Exchange --- A Formal Model
                                  Based on Game Theory . . . . . . . . . . 114
             Dennis Kügler   Enabling Privacy Protection in
                                  E-commerce Applications  . . . . . . . . 127
     János A. Csirik and   
         Michael L. Littman and   
             Satinder Singh and   
                    Peter Stone   FAucS: An FCC Spectrum Auction Simulator
                                  for Autonomous Bidding Agents  . . . . . 139
                    Andrew Byde   A Dynamic Programming Model for
                                  Algorithm Design in Simultaneous
                                  Auctions . . . . . . . . . . . . . . . . 152
                Johan Aberg and   
            Nahid Shahmehri and   
               Dennis Maciuszek   User Modelling for Live Help Systems . . 164
      Gediminas Adomavicius and   
             Alexander Tuzhilin   Multidimensional Recommender Systems: a
                                  Data Warehousing Approach  . . . . . . . 180
            Andreas Bartelt and   
            Winfried Lamersdorf   A Multi-criteria Taxonomy of Business
                                  Models in Electronic Commerce  . . . . . 193
                 Anke Thede and   
           Albrecht Schmidt and   
                 Christian Merz   Integration of Goods Delivery
                                  Supervision into E-commerce Supply Chain 206
          Naftaly H. Minsky and   
             Victoria Ungureanu   Scalable Regulation of Inter-enterprise
                                  Electronic Commerce  . . . . . . . . . . 219
                      Anonymous   Author Index . . . . . . . . . . . . . . 233


Lecture Notes in Computer Science
Volume 2233, 2001

              Tristan Henderson   Latency and User Behaviour on a
                                  Multiplayer Game Server  . . . . . . . . 1
           Sylvia Ratnasamy and   
               Mark Handley and   
               Richard Karp and   
                  Scott Shenker   Application-Level Multicast Using
                                  Content-Addressable Networks . . . . . . 14
            Antony Rowstron and   
       Anne-Marie Kermarrec and   
              Miguel Castro and   
                 Peter Druschel   \sc Scribe: The Design of a Large-Scale
                                  Event Notification Infrastructure  . . . 30
         Ayalvadi J. Ganesh and   
       Anne-Marie Kermarrec and   
       Laurent Massoulié   \sc Scamp: Peer-to-Peer Lightweight
                                  Membership Service for Large-Scale Group
                                  Communication  . . . . . . . . . . . . . 44
           Jörg Widmer and   
                Thomas Fuhrmann   Extremum Feedback for Very Large
                                  Multicast Groups . . . . . . . . . . . . 56
              Laurent Mathy and   
           Roberto Canonico and   
                David Hutchison   An Overlay Tree Building Control
                                  Protocol . . . . . . . . . . . . . . . . 76
                 Yossi Azar and   
                 Meir Feder and   
              Eyal Lubetzky and   
               Doron Rajwan and   
                  Nadav Shulman   The Multicast Bandwidth Advantage in
                                  Serving a Web Site . . . . . . . . . . . 88
                 John Byers and   
                     Gu-In Kwon   STAIR: Practical AIMD Multirate
                                  Multicast Congestion Control . . . . . . 100
             Anthony Busson and   
         Jean Louis Rougier and   
                  Daniel Kofman   Impact of Tree Structure on
                                  Retransmission Efficiency for TRACK  . . 113
                  Yair Amir and   
       Cristina Nita-Rotaru and   
            Jonathan R. Stanton   Framework for Authentication and Access
                                  Control of Client-Server Group
                                  Communication Systems  . . . . . . . . . 128
                  Ning Wang and   
                  George Pavlou   Scalable IP Multicast Sender Access
                                  Control for Bi-directional Trees . . . . 141
             Sandro Rafaeli and   
              Laurent Mathy and   
                David Hutchison   EHBT: An Efficient Protocol for Group
                                  Key Management . . . . . . . . . . . . . 159
                  Aiguo Fei and   
                Junhong Cui and   
                Mario Gerla and   
             Michalis Faloutsos   Aggregated Multicast with Inter-Group
                                  Tree Sharing . . . . . . . . . . . . . . 172
                Micah Adler and   
                    Tian Bu and   
        Ramesh K. Sitaraman and   
                    Don Towsley   Tree Layout for Internal Network
                                  Characterizations in Multicast Networks  189
                      Anonymous   Author Index . . . . . . . . . . . . . . 205


Lecture Notes in Computer Science
Volume 2234, 2001

        Hamideh Afsarmanesh and   
              Ersin Kaletas and   
           Louis O. Hertzberger   The Potential of Grid, Virtual
                                  Laboratories and Virtual Organizations
                                  for Bio-sciences . . . . . . . . . . . . 1
        Bernadette Charron-Bost   Agreement Problems in Fault-Tolerant
                                  Distributed Systems  . . . . . . . . . . 10
          William I. Grosky and   
                      Rong Zhao   Negotiating the Semantic Gap: From
                                  Feature Maps to Semantic Landscapes  . . 33
            Sándor Jenei   Inference in Rule-Based Systems by
                                  Interpolation and Extrapolation
                                  Revisited  . . . . . . . . . . . . . . . 53
            Christos Kaklamanis   Recent Advances in Wavelength Routing    58
             Domenico Laforenza   From Metacomputing to Grid Computing:
                                  Evolution or Revolution? . . . . . . . . 73
                  Simon Lambert   Knowledge-Based Control Systems  . . . . 75
            Jan van Leeuwen and   
       Ji\vrí Wiedermann   Beyond the Turing Limit: Evolving
                                  Interactive Systems  . . . . . . . . . . 90--109
                 Nicola Santoro   Distributed Computations by Autonomous
                                  Mobile Robots  . . . . . . . . . . . . . 110
          Anna Slobodová   Formal Verification Methods for
                                  Industrial Hardware Design . . . . . . . 116
                 Osamu Watanabe   How Can Computer Science Contribute to
                                  Knowledge Discovery? . . . . . . . . . . 136
                       Isto Aho   On the Approximability of Interactive
                                  Knapsack Problems  . . . . . . . . . . . 152
         Pablo Argón and   
           Giorgio Delzanno and   
      Supratik Mukhopadhyay and   
               Andreas Podelski   Model Checking Communication Protocols   160
                   Martin Beran   Pipelined Decomposable BSP Computers . . 171
             Richard Bonner and   
           Rusins Freivalds and   
                Maksim Kravtsev   Quantum versus Probabilistic One-Way
                                  Finite Automata with Counter . . . . . . 181
                 Lubos Brim and   
         Ivana Cerná and   
         Pavel Krcál and   
           Radek Pelánek   How to Employ Reverse Search in
                                  Distributed Single Source Shortest Paths 191
                 Lubos Brim and   
              David Gilbert and   
         Jean-Marie Jacquet and   
Mojmír Kretínský   Multi-agent Systems as Concurrent
                                  Constraint Processes . . . . . . . . . . 201
        Adriano Di Pasquale and   
                Enrico Nardelli   ADST: An Order Preserving Scalable
                                  Distributed Data Structure with Constant
                                  Access Costs . . . . . . . . . . . . . . 211
                 Henning Fernau   Approximative Learning of Regular
                                  Languages  . . . . . . . . . . . . . . . 223
     R\=usi\cn\vs Freivalds and   
                 Andreas Winter   Quantum Finite State Transducers . . . . 233--242
                   Leo Galambos   Lemmatizer for Document Information
                                  Retrieval Systems in JAVA  . . . . . . . 243
                  Maciej Gebala   The Reconstruction of Polyominoes from
                                  Approximately Orthogonal Projections . . 253
             Prasad Jayanti and   
                   King Tan and   
          Gregory Friedland and   
                      Amir Katz   Bounding Lamport's Bakery Algorithm  . . 261
       András Kocsor and   
            János Csirik   Fast Independent Component Analysis in
                                  Kernel Feature Spaces  . . . . . . . . . 271
    Rastislav Královi\vc   On Majority Voting Games in Trees  . . . 282--291
      Richard Královi\vc   Time and Space Complexity of Reversible
                                  Pebbling . . . . . . . . . . . . . . . . 292
            Tomas Plachetka and   
               Olaf Schmidt and   
                 Frank Albracht   The HiQoS Rendering System . . . . . . . 304
           Martin Plátek   Two-Way Restarting Automata and
                                  $J$-Monotonicity . . . . . . . . . . . . 316
                Zdenek Sawa and   
                    Petr Jancar   $P$-Hardness of Equivalence Testing on
                                  Finite-State Processes . . . . . . . . . 326
               Vaughan R. Pratt   Software Geography: Physical and
                                  Economic Aspects . . . . . . . . . . . . 336
                      Anonymous   Author Index . . . . . . . . . . . . . . 347


Lecture Notes in Computer Science
Volume 2235, 2001

            Fernando Arroyo and   
           Angel V. Baranda and   
           Juan Castellanos and   
              Carmen Luengo and   
                  Luis F. Mingo   Structures and Bio-language to Simulate
                                  Transition $P$ Systems on Digital
                                  Computers  . . . . . . . . . . . . . . . 1
  Jean-Pierre Banâtre and   
              Pascal Fradet and   
       Daniel Le Métayer   Gamma and the Chemical Reaction Model:
                                  Fifteen Years After  . . . . . . . . . . 17
              Paolo Bottoni and   
                Bernd Meyer and   
      Francesco Parisi Presicce   Visual Multiset Rewriting: Applications
                                  to Diagram Parsing and Reasoning . . . . 45
Erzsébet Csuhaj-Varjú and   
  Carlos Martín-Vide and   
                 Victor Mitrana   Multiset Automata  . . . . . . . . . . . 69
             Jürgen Dassow   Parikh Mapping and Iteration . . . . . . 85
            Agostino Dovier and   
               Carla Piazza and   
               Gianfranco Rossi   Multiset Constraints and $P$ Systems . . 103
             Manfred Kudlek and   
  Carlos Martín-Vide and   
                Gheorghe P\uaun   Toward a Formal Macroset Theory  . . . . 123
             Manfred Kudlek and   
                 Victor Mitrana   Normal Forms of Grammars, Finite
                                  Automata, Abstract Families, and Closure
                                  Properties of Multiset Languages . . . . 135
        Gianfranco Lamperti and   
          Michele Melchiori and   
                 Marina Zanella   On Multisets in Database Systems . . . . 147
                 Solomon Marcus   Tolerance Multisets  . . . . . . . . . . 217
               Sadaaki Miyamoto   Fuzzy Multisets and Their
                                  Generalizations  . . . . . . . . . . . . 225
               Madhu Mutyam and   
             Kamala Krithivasan   Universality Results for Some Variants
                                  of $P$ Systems . . . . . . . . . . . . . 237
       Taishin Yasunobu Nishida   Multiset and $K$-Subset Transforming
                                  Systems  . . . . . . . . . . . . . . . . 255
               Adam Obtu\lowicz   On $P$ Systems with Active Membranes
                                  Solving the Integer Factorization
                                  Problem in a Polynomial Time . . . . . . 267
                Wolfgang Reisig   The Linear Theory of Multiset Based
                                  Dynamic Systems  . . . . . . . . . . . . 287
            Yasuhiro Suzuki and   
             Yoshi Fujiwara and   
          Junji Takabayashi and   
                 Hiroshi Tanaka   Artificial Life Applications of a Class
                                  of $P$ Systems: Abstract Rewriting
                                  Systems on Multisets . . . . . . . . . . 299
           Apostolos Syropoulos   Mathematics of Multisets . . . . . . . . 347
                      Anonymous   Author Index . . . . . . . . . . . . . . 359


Lecture Notes in Computer Science
Volume 2236, 2001

                   K. Drira and   
                A. Martelli and   
                    T. Villemur   Chapter 1. Introduction  . . . . . . . . 3
                 B. Baurens and   
                 P. Chilaev and   
                V. Krivtsov and   
                  V. Volochinov   Chapter 2. Research and Development
                                  Projects . . . . . . . . . . . . . . . . 7
                   D. Avino and   
                R. Becchini and   
                 P. Chilaev and   
                  H. Follet and   
                V. Krivtsov and   
                A. Martelli and   
                  V. Volochinov   Chapter 3. Relevant Existing Practices   15
                R. Becchini and   
                 P. Chilaev and   
                V. Krivtsov and   
               I. Viglietti and   
                  V. Volochinov   Chapter 4. Middleware  . . . . . . . . . 41
                   K. Drira and   
                  M. Molina and   
                  O. Nabuco and   
    L. M. Rodriguez-Peralta and   
                    T. Villemur   Chapter 5. Product Data and Workflow
                                  Management . . . . . . . . . . . . . . . 107
                 B. Baurens and   
                   L. Costa and   
              A. Dracinschi and   
                   S. Fdida and   
                    V. Roca and   
                        R. Vida   Chapter 6. Communications  . . . . . . . 153
                     B. Baurens   Chapter 7. Groupware . . . . . . . . . . 177
                      Anonymous   Appendix A1. Product Classification
                                  Summary  . . . . . . . . . . . . . . . . 263
                      Anonymous   Appendix A2. Acronyms and Abbreviations  271
                      Anonymous   References . . . . . . . . . . . . . . . 275
                      Anonymous   Author Index . . . . . . . . . . . . . . 281


Lecture Notes in Computer Science
Volume 2237, 2001

                  A. Colmerauer   Solving the Multiplication Constraint in
                                  Several Approximation Spaces . . . . . . 1
                    R. Kowalski   Is Logic Really Dead or Only Just
                                  Sleeping?  . . . . . . . . . . . . . . . 2
                      P. Cousot   Design of Syntactic Program
                                  Transformations by Abstract
                                  Interpretation of Semantic
                                  Transformations  . . . . . . . . . . . . 4
                       A. Gupta   $X$-tegration --- Some Cross-Enterprise
                                  Thoughts . . . . . . . . . . . . . . . . 6
                  J. Wielemaker   Building Real-Life Applications with
                                  Prolog . . . . . . . . . . . . . . . . . 7
É. Villemonte de la Clergerie   Natural Language Tabular Parsing . . . . 8
                        K. Ueda   A Close Look at Constraint-Based
                                  Concurrency  . . . . . . . . . . . . . . 9
             V. S. Subrahmanian   Probabilistic Databases and Logic
                                  Programming  . . . . . . . . . . . . . . 10
               L. F. Castro and   
                    V. S. Costa   Understanding Memory Management in
                                  Prolog Systems . . . . . . . . . . . . . 11
              K. Villaverde and   
                E. Pontelli and   
                     H. Guo and   
                       G. Gupta   PALS: An Or-Parallel Implementation of
                                  Prolog on Beowulf Architectures  . . . . 27
                   R. Rocha and   
                   F. Silva and   
                    V. S. Costa   On a Tabling Engine That Can Exploit
                                  Or-Parallelism . . . . . . . . . . . . . 43
              N. Beldiceanu and   
                    M. Carlsson   Revisiting the Cardinality Operator and
                                  Introducing the Cardinality-Path
                                  Constraint Family  . . . . . . . . . . . 59
                C. Holzbaur and   
M. García de la Banda and   
                 D. Jeffery and   
                  P. J. Stuckey   Optimizing Compilation of Constraint
                                  Handling Rules . . . . . . . . . . . . . 74
M. García de la Banda and   
                 D. Jeffery and   
                K. Marriott and   
              N. Nethercote and   
              P. J. Stuckey and   
                    C. Holzbaur   Building Constraint Solvers with HAL . . 90
                   N. Mazur and   
                    P. Ross and   
                G. Janssens and   
                  M. Bruynooghe   Practical Aspects for a Working Compile
                                  Time Garbage Collection System for
                                  Mercury  . . . . . . . . . . . . . . . . 105
                 J. M. Howe and   
                        A. King   Positive Boolean Functions as
                                  Multiheaded Clauses  . . . . . . . . . . 120
                  M. Codish and   
                  S. Genaim and   
      H. Sòndergaard and   
                  P. J. Stuckey   Higher-Precision Groundness Analysis . . 135
                  H.-F. Guo and   
         C. R. Ramakrishnan and   
             I. V. Ramakrishnan   Speculative Beats Conservative
                                  Justification  . . . . . . . . . . . . . 150
                    S. Basu and   
                  M. Mukund and   
         C. R. Ramakrishnan and   
         I. V. Ramakrishnan and   
                       R. Verma   Local and Symbolic Bisimulation Using
                                  Tabled Constraint Logic Programming  . . 166
                  H.-F. Guo and   
                       G. Gupta   A Simple Scheme for Implementing Tabled
                                  Logic Programming Systems Based on
                                  Dynamic Reordering of Alternatives . . . 181
                    Z. Lonc and   
              M. Truszczy\'nski   Fixed-Parameter Complexity of Semantics
                                  for Logic Programs . . . . . . . . . . . 197
                M. Denecker and   
                   N. Pelov and   
                  M. Bruynooghe   Ultimate Well-Founded and Stable
                                  Semantics for Logic Programs with
                                  Aggregates . . . . . . . . . . . . . . . 212
           K. Narayan Kumar and   
         C. R. Ramakrishnan and   
                   S. A. Smolka   Alternating Fixed Points in Boolean
                                  Equation Systems as Preferred Stable
                                  Models . . . . . . . . . . . . . . . . . 227
                   E. Erdem and   
                   V. Lifschitz   Fages' Theorem for Programs with Nested
                                  Expressions  . . . . . . . . . . . . . . 242
                  F. Orejas and   
               E. Pasarella and   
                        E. Pino   Semantics of Normal Logic Programs with
                                  Embedded Implications  . . . . . . . . . 255
                  J. Medina and   
            M. Ojeda-Aciego and   
               P. Vojtás   A Multi-adjoint Logic Approach to
                                  Abductive Reasoning  . . . . . . . . . . 269
                 W. Drabent and   
                  M. Mi\lkowska   Proving Correctness and Completeness of
                                  Normal Programs --- A Declarative
                                  Approach . . . . . . . . . . . . . . . . 284
                 K. Kaneiwa and   
                        S. Tojo   An Order-Sorted Resolution with
                                  Implicitly Negative Sorts  . . . . . . . 300
                 M. Banbara and   
                 K.-S. Kang and   
                   T. Hirai and   
                      N. Tamura   Logic Programming in a Fragment of
                                  Intuitionistic Temporal Linear Logic . . 315
J. M. Almendros-Jiménez and   
    A. Becerra-Terón and   
J. Sánchez-Hernández   A Computational Model for Functional
                                  Logic Deductive Databases  . . . . . . . 331
                   G. Greco and   
                   S. Greco and   
                     E. Zumpano   A Logic Programming Approach to the
                                  Integration, Repairing and Querying of
                                  Inconsistent Databases . . . . . . . . . 348
                      Anonymous   Author Index . . . . . . . . . . . . . . 365


Lecture Notes in Computer Science
Volume 2239, 2001

              Andrew Eremin and   
                   Mark Wallace   Hybrid Benders Decomposition Algorithms
                                  in Constraint Logic Programming  . . . . 1
      Erlendur S. Thorsteinsson   Branch-and-Check: a Hybrid Framework
                                  Integrating Mixed Integer Programming
                                  and Constraint Logic Programming . . . . 16
           Slim Abdennadher and   
             Christophe Rigotti   Towards Inductive Constraint Solving . . 31
           Susan L. Epstein and   
                 Eugene Freuder   Collaborative Learning for Constraint
                                  Solving  . . . . . . . . . . . . . . . . 46
            Thierry Benoist and   
              Eric Bourreau and   
                Yves Caseau and   
          Beno\^\it Rottembourg   Towards Stochastic Constraint
                                  Programming: a Study of Online
                                  Multi-choice Knapsack with Deadlines . . 61
            Filippo Focacci and   
                Michaela Milano   Global Cut Framework for Removing
                                  Symmetries . . . . . . . . . . . . . . . 77
              Torsten Fahle and   
         Stefan Schamberger and   
               Meinolf Sellmann   Symmetry Breaking  . . . . . . . . . . . 93
             Olivier Dubois and   
                  Gilles Dequen   The Non-existence of $ (3, 1, 2)
                                  $-Conjugate Orthogonal Idempotent Latin
                                  Square of Order $ 10 $ . . . . . . . . . 108
 Alfonso San Miguel Aguirre and   
                 Moshe Y. Vardi   Random $3$-SAT and BDDs: The Plot
                                  Thickens Further . . . . . . . . . . . . 121
  Ramón Béjar and   
              Alba Cabiscol and   
        C\`esar Fern\`andez and   
              Felip Many\`a and   
                    Carla Gomes   Capturing Structure with Satisfiability  137
                 Weixiong Zhang   Phase Transitions and Backbones of
                                  $3$-SAT and Maximum $3$-SAT  . . . . . . 153
             Nikos Mamoulis and   
                Kostas Stergiou   Solving Non-binary CSPs Using the Hidden
                                  Variable Encoding  . . . . . . . . . . . 168
                  Gilles Pesant   A Filtering Algorithm for the Stretch
                                  Constraint . . . . . . . . . . . . . . . 183
         Alexander Bockmayr and   
            Nicolai Pisaruk and   
            Abderrahmane Aggoun   Network Flow Problems in Constraint
                                  Programming  . . . . . . . . . . . . . . 196
             Nicolas Beldiceanu   Pruning for the Minimum Constraint
                                  Family and for the Number of Distinct
                                  Values Constraint Family . . . . . . . . 211
                Ian P. Gent and   
           Robert W. Irving and   
           David F. Manlove and   
            Patrick Prosser and   
               Barbara M. Smith   A Constraint Programming Approach to the
                                  Stable Marriage Problem  . . . . . . . . 225
               Chiu Wo Choi and   
                Martin Henz and   
                     Ka Boon Ng   Components for State Restoration in Tree
                                  Search . . . . . . . . . . . . . . . . . 240
                     Armin Wolf   Adaptive Constraint Handling with CHR in
                                  Java . . . . . . . . . . . . . . . . . . 256
     Marius-C\ualin Silaghi and   
         Djamila Sam-Haroud and   
                   Boi Faltings   Consistency Maintenance for ABT  . . . . 271
           Giorgio Delzanno and   
                  Tevfik Bultan   Constraint-Based Verification of
                                  Client-Server Protocols  . . . . . . . . 286
       Catuscia Palamidessi and   
              Frank D. Valencia   A Temporal Concurrent Constraint
                                  Programming Calculus . . . . . . . . . . 302
             Pedro Meseguer and   
             Javier Larrosa and   
        Mart\`\i Sánchez   Lower Bounds for Non-binary Constraint
                                  Optimization Problems  . . . . . . . . . 317
  Jean-Charles Régin and   
              Thierry Petit and   
       Christian Bessi\`ere and   
     Jean-François Puget   New Lower Bounds of Constraint
                                  Violations for Over-Constrained Problems 332
               Rina Dechter and   
                 Kalev Kask and   
                 Javier Larrosa   A General Scheme for Multiple Lower
                                  Bound Computation in Constraint
                                  Optimization . . . . . . . . . . . . . . 346
               Kim Marriott and   
              Peter Moulder and   
           Peter J. Stuckey and   
                   Alan Borning   Solving Disjunctive Constraints for
                                  Interactive Graphical Applications . . . 361
         Nicolas Beldiceanu and   
                  Mats Carlsson   Sweep as a Generic Pruning Technique
                                  Applied to the Non-overlapping
                                  Rectangles Constraint  . . . . . . . . . 377
         Nicolas Beldiceanu and   
                     Qi Guo and   
                     Sven Thiel   Non-overlapping Constraints between
                                  Convex Polytopes . . . . . . . . . . . . 392
                 Hubie Chen and   
                Carla Gomes and   
                    Bart Selman   Formal Models of Heavy-Tailed Behavior
                                  in Combinatorial Search  . . . . . . . . 408
         Alessandro Armando and   
              Felice Peccia and   
                  Silvio Ranise   The Phase Transition of the Linear
                                  Inequalities Problem . . . . . . . . . . 422
        Phokion G. Kolaitis and   
                 Thomas Raffill   In Search of a Phase Transition in the
                                  AC-Matching Problem  . . . . . . . . . . 433
              Thierry Petit and   
  Jean-Charles Régin and   
           Christian Bessi\`ere   Specific Filtering Algorithms for
                                  Over-Constrained Problems  . . . . . . . 451
             Pedro Meseguer and   
        Mart\`\i Sánchez   Specializing Russian Doll Search . . . . 464
            Martin T. Swain and   
              Graham J. L. Kemp   A CLP Approach to the Protein Side-Chain
                                  Placement Problem  . . . . . . . . . . . 479
              Rolf Backofen and   
                 Sebastian Will   Fast, Constraint-Based Threading of
                                  HP-Sequences to Hydrophobic Cores  . . . 494
                Martin Henz and   
                  Edgar Tan and   
                     Roland Yap   One Flip per Clock Cycle . . . . . . . . 509
              Claude Michel and   
              Michel Rueher and   
                   Yahia Lebbah   Solving Constraints over Floating-Point
                                  Numbers  . . . . . . . . . . . . . . . . 524
              Micha Janssen and   
      Pascal Van Hentenryck and   
                   Yves Deville   Optimal Pruning in Parametric
                                  Differential Equations . . . . . . . . . 539
          Francisco Azevedo and   
                 Pedro Barahona   Interaction of Constraint Programming
                                  and Local Search for Optimisation
                                  Problems . . . . . . . . . . . . . . . . 554
          Hachemi Bennaceur and   
           Mohamed-Salah Affane   Partition-k-AC: An Efficient Filtering
                                  Technique Combining Domain Partition and
                                  Arc Consistency  . . . . . . . . . . . . 560
       Christian Bessi\`ere and   
              Assef Chmeiss and   
                Lakhdar Sa\"\is   Neighborhood-Based Variable Ordering
                                  Heuristics for the Constraint
                                  Satisfaction Problem . . . . . . . . . . 565
                   Marco Cadoli   The Expressive Power of Binary Linear
                                  Programming  . . . . . . . . . . . . . . 570
               Simon Colton and   
                     Ian Miguel   Constraint Generation via Automated
                                  Theory Formation . . . . . . . . . . . . 575
               Kelly Easton and   
           George Nemhauser and   
                  Michael Trick   The Traveling Tournament Problem
                                  Description and Benchmarks . . . . . . . 580
          Eugene C. Freuder and   
 Chavalit Likitvivatanavong and   
             Richard J. Wallace   Deriving Explanations and Implications
                                  for Constraint Satisfaction Problems . . 585
          Eugene C. Freuder and   
               Barry O'Sullivan   Generating Tradeoffs for Interactive
                                  Constraint-Based Configuration . . . . . 590
            Rafael M. Gasca and   
             Juan A. Ortega and   
                    Miguel Toro   Structural Constraint-Based Modeling and
                                  Reasoning with Basic Configuration Cells 595
       Laurent Granvilliers and   
                   Eric Monfroy   Composition Operators for Constraint
                                  Propagation: An Application to Choco . . 600
           Edward A. Hirsch and   
               Arist Kojevnikov   Solving Boolean Satisfiability Using
                                  Local Search Guided by Unit Clause
                                  Elimination  . . . . . . . . . . . . . . 605
          George Katsirelos and   
                 Fahiem Bacchus   GAC on Conjunctions of Constraints . . . 610
               Barbara M. Smith   Dual Models of Permutation Problems  . . 615
               Christine Solnon   Boosting Local Search with Artificial
                                  Ants . . . . . . . . . . . . . . . . . . 620
             Peter van Beek and   
                    Kent Wilken   Fast Optimal Instruction Scheduling for
                                  Single-Issue Processors with Arbitrary
                                  Latencies  . . . . . . . . . . . . . . . 625
             Cecilia Ekelin and   
                    Jan Jonsson   Evaluation of Search Heuristics for
                                  Embedded System Scheduling Problems  . . 640
      Markus P. J. Fromherz and   
               James V. Mahoney   Interpreting Sloppy Stick Figures with
                                  Constraint-Based Subgraph Matching . . . 655
   Gérard Verfaillie and   
             Michel Lema\^\itre   Selecting and Scheduling Observations
                                  for Agile Satellites: Some Lessons from
                                  the Constraint Reasoning Community Point
                                  of View  . . . . . . . . . . . . . . . . 670
          Pragnesh Jay Modi and   
             Hyuckchul Jung and   
               Milind Tambe and   
               Wei-Min Shen and   
             Shriniwas Kulkarni   A Dynamic Distributed Constraint
                                  Satisfaction Approach to Resource
                                  Allocation . . . . . . . . . . . . . . . 685
          Juliette Mattioli and   
             Nicolas Museux and   
                 J. Jourdan and   
      Pierre Savéant and   
                 Simon de Givry   A Constraint Optimization Framework for
                                  Mapping a Digital Signal Processing
                                  Application onto a Parallel Architecture 701
         Christos Voudouris and   
              Raphael Dorne and   
              David Lesaint and   
                     Anne Liret   iOpt: a Software Toolkit for Heuristic
                                  Search Methods . . . . . . . . . . . . . 716
            Sylvain Merchez and   
        Christophe Lecoutre and   
            Frederic Boussemart   AbsCon: a Prototype to Solve CSPs with
                                  Abstraction  . . . . . . . . . . . . . . 730
József Váncza and   
    András Márkus   A Constraint Engine for Manufacturing
                                  Process Planning . . . . . . . . . . . . 745
            Amy M. Beckwith and   
             Berthe Y. Choueiry   On the Dynamic Detection of
                                  Interchangeability in Finite Constraint
                                  Satisfaction Problems  . . . . . . . . . 760
                   Lyndon Drake   Automatic Generation of Implied Clauses
                                  for SAT  . . . . . . . . . . . . . . . . 761
               Fabio Fioravanti   Verification of Infinite-State Systems
                                  by Specialization of CLP Programs  . . . 762
                Marco Gavanelli   Partially Ordered Constraint
                                  Optimization Problems  . . . . . . . . . 763
                Rosella Gennari   Translations for Comparing Soft
                                  Frameworks . . . . . . . . . . . . . . . 764
             Mitchell A. Harris   Counting Satisfiable $k$-CNF Formulas    765
                   Brahim Hnich   High-Level Modelling and Reformulation
                                  of Constraint Satisfaction Problems  . . 766
                 Hyuckchul Jung   Distributed Constraint Satisfaction as a
                                  Computational Model of Negotiation via
                                  Argumentation  . . . . . . . . . . . . . 767
                   Erik Kilborn   Aircraft Assignment Using Constraint
                                  Programming  . . . . . . . . . . . . . . 768
                Zeynep Kiziltan   Labelling Heuristics for CSP Application
                                  Domains  . . . . . . . . . . . . . . . . 769
           Inês Lynce and   
      João Marques-Silva   Improving SAT Algorithms by Using Search
                                  Pruning Techniques . . . . . . . . . . . 770
                  Iain McDonald   Optimum Symmetry Breaking in CSPs Using
                                  Group Theory . . . . . . . . . . . . . . 771
       Christian Bessi\`ere and   
             Arnold Maestre and   
                 Pedro Meseguer   Distributed Dynamic Backtracking . . . . 772
              Pragnesh Jay Modi   Constraint Programming for Distributed
                                  Resource Allocation  . . . . . . . . . . 773
                 Nicoleta Neagu   Exploiting the CSP Structure by
                                  Interchangeability . . . . . . . . . . . 774
                  Andrea Panati   Constraint Processing Techniques for
                                  Model-Based Reasoning about Dynamic
                                  Systems  . . . . . . . . . . . . . . . . 776
               Georg Ringwelski   Distributed Constraint Satisfaction with
                                  Cooperating Asynchronous Solvers . . . . 777
      Louis-Martin Rousseau and   
              Gilles Pesant and   
                Michel Gendreau   Building Negative Reduced Cost Paths
                                  Using Constraint Programming . . . . . . 778
           Miguel A. Salido and   
                Federico Barber   An Incremental and Non-binary CSP
                                  Solver: The Hyperpolyhedron Search
                                  Algorithm  . . . . . . . . . . . . . . . 779
                Sibylle Schwarz   Partial Stable Generated Models of
                                  Generalized Logic Programs with
                                  Constraints  . . . . . . . . . . . . . . 781
                 Frank Seelisch   Heterogeneous Constraint Problems  . . . 783
                Daniel Sheridan   Comparing SAT Encodings for Model
                                  Checking . . . . . . . . . . . . . . . . 784
     Marius-C\ualin Silaghi and   
             Stefan Sab\uau and   
         Djamila Sam-Haroud and   
                   Boi Faltings   Asynchronous Search for Numeric DisCSPs  785
              Frank D. Valencia   Temporal Concurrent Constraint
                                  Programming  . . . . . . . . . . . . . . 786
                      Anonymous   Author Index . . . . . . . . . . . . . . 787


Lecture Notes in Computer Science
Volume 2240, 2001

                    Volker Roth   On the Robustness of Some Cryptographic
                                  Protocols for Mobile Agent Protection    1
               Hock Kim Tan and   
                     Luc Moreau   Trust Relationships in a Mobile Agent
                                  System . . . . . . . . . . . . . . . . . 15
     Sebastian Fischmeister and   
             Giovanni Vigna and   
            Richard A. Kemmerer   Evaluating the Security of Three
                                  Java-Based Mobile Agent Systems  . . . . 31
            Xavier Hannotin and   
                Paolo Maggi and   
                 Riccardo Sisto   Formal Specification and Verification of
                                  Mobile Agent Data Integrity Properties:
                                  a Case Study . . . . . . . . . . . . . . 42
            Bogdan Carbunar and   
        Marco Tulio Valente and   
                      Jan Vitek   Lime Revisited . . . . . . . . . . . . . 54
             Raimund Brandt and   
                  Helmut Reiser   Dynamic Adaptation of Mobile Agents in
                                  Heterogeneous Environments . . . . . . . 70
           Eugene Gendelman and   
             Lubomir F. Bic and   
         Michael B. Dillencourt   Fast File Access for Fast Agents . . . . 88
                   Ichiro Satoh   Flying Emulator: Rapid Building and
                                  Testing of Networked Applications for
                                  Mobile Computers . . . . . . . . . . . . 103
            Prasannaa Thati and   
               Po-Hao Chang and   
                       Gul Agha   Crawlets: Agents for High Performance
                                  Web Search Engines . . . . . . . . . . . 119
                 Xinyu Feng and   
               Jiannong Cao and   
               Jian Lü and   
                     Henry Chan   An Efficient Mailbox-Based Algorithm for
                                  Message Delivery in Mobile Agent Systems 135
               Klaus Haller and   
                  Heiko Schuldt   Using Predicates for Specifying Targets
                                  of Migration and Messages in a
                                  Peer-to-Peer Mobile Agent Environment    152
                Volker Roth and   
                     Jan Peters   A Scalable and Secure Global Tracking
                                  Service for Mobile Agents  . . . . . . . 169
            Lorenzo Bettini and   
                Rocco De Nicola   Translating Strong Mobility into Weak
                                  Mobility . . . . . . . . . . . . . . . . 182
            Torsten Illmann and   
             Tilman Krueger and   
                Frank Kargl and   
                  Michael Weber   Transparent Migration of Mobile Agents
                                  Using the Java Platform Debugger
                                  Architecture . . . . . . . . . . . . . . 198
       Alex Villazón and   
                  Walter Binder   Portable Resource Reification in
                                  Java-Based Mobile Agent Systems  . . . . 213
             Robert S. Gray and   
                 David Kotz and   
         Ronald A. Peterson and   
               Joyce Barton and   
        Daria Chacón and   
               Peter Gerken and   
             Martin Hofmann and   
           Jeffrey Bradshaw and   
              Maggie Breedy and   
              Renia Jeffers and   
                  Niranjan Suri   Mobile-Agent versus Client/Server
                                  Performance: Scalability in an
                                  Information-Retrieval Task . . . . . . . 229
           Marios Dikaiakos and   
           Melinos Kyriakou and   
                 George Samaras   Performance Evaluation of Mobile-Agent
                                  Middleware: a Hierarchical Approach  . . 244
                   Rong Xie and   
                Daniela Rus and   
                    Cliff Stein   Scheduling Multi-task Agents . . . . . . 260
                      Anonymous   Author Index . . . . . . . . . . . . . . 277


Lecture Notes in Computer Science
Volume 2241, 2001

               Alexander Martin   General Mixed Integer Programming:
                                  Computational Issues for Branch-and-Cut
                                  Algorithms . . . . . . . . . . . . . . . 1
                     Egon Balas   Projection and Lifting in Combinatorial
                                  Optimization . . . . . . . . . . . . . . 26
                    Yves Pochet   Mathematical Programming Models and
                                  Formulations for Deterministic
                                  Production Planning Problems . . . . . . 57
       Claude Lemaréchal   Lagrangian Relaxation  . . . . . . . . . 112
               Matthias Elf and   
          Carsten Gutwenger and   
        Michael Jünger and   
               Giovanni Rinaldi   Branch-and-Cut Algorithms for
                                  Combinatorial Optimization and Their
                                  Implementation in ABACUS . . . . . . . . 157
      Laszlo Ladányi and   
              Ted K. Ralphs and   
         Leslie E. Trotter, Jr.   Branch, Cut, and Price: Sequential and
                                  Parallel . . . . . . . . . . . . . . . . 223
            David Applegate and   
               Robert Bixby and   
     Va\vsek Chvátal and   
                   William Cook   TSP Cuts Which Do Not Conform to the
                                  Template Paradigm  . . . . . . . . . . . 261
                      Anonymous   Author Index . . . . . . . . . . . . . . 305


Lecture Notes in Computer Science
Volume 2242, 2001

                  Dennis Gannon   Grid Application Design Using Software
                                  Components and Web Services  . . . . . . 1
              Snigdha Verma and   
            Manish Parashar and   
                Jarek Gawor and   
           Gregor von Laszewski   Design and Implementation of a CORBA
                                  Commodity Grid Kit . . . . . . . . . . . 2
            Alexandre Denis and   
     Christian Pérez and   
                  Thierry Priol   Towards High Performance CORBA and MPI
                                  Middlewares for Grid Computing . . . . . 14
          Nathalie Furmento and   
              Anthony Mayer and   
            Stephen McGough and   
            Steven Newhouse and   
                 Tony Field and   
                John Darlington   An Integrated Grid Environment for
                                  Component Applications . . . . . . . . . 26
            Mario Cannataro and   
             Domenico Talia and   
                  Paolo Trunfio   KNOWLEDGE GRID: High Performance
                                  Knowledge Discovery Services on the Grid 38
          Adriana Iamnitchi and   
                     Ian Foster   On Fully Decentralized Resource
                                  Discovery in Grid Environments . . . . . 51
             Byoung-Dai Lee and   
                Jon B. Weissman   An Adaptive Service Grid Architecture
                                  Using Dynamic Replica Management . . . . 63
        Kavitha Ranganathan and   
                     Ian Foster   Identifying Dynamic Replication
                                  Strategies for a High-Performance Data
                                  Grid . . . . . . . . . . . . . . . . . . 75
            Jon B. Weissman and   
              Pramod Srinivasan   Ensemble Scheduling: Resource
                                  Co-Allocation on the Computational Grid  87
       Dimitrios Katramatos and   
             Marty Humphrey and   
            Andrew Grimshaw and   
                   Steve Chapin   JobQueue: a Computational Grid-Wide
                                  Queuing System . . . . . . . . . . . . . 99
            Anuraag Sarangi and   
               Alok Shriram and   
                Avinash Shankar   A Scheduling Model for Grid Computing
                                  Systems  . . . . . . . . . . . . . . . . 111
                 Micah Beck and   
                Terry Moore and   
                 James S. Plank   Exposed versus Encapsulated Approaches
                                  to Grid Service Architecture . . . . . . 124
           Thomas J. Hacker and   
                 Brian D. Athey   A Methodology for Account Management in
                                  Grid Computing Environments  . . . . . . 133
              Babu Sundaram and   
             Barbara M. Chapman   Policy Engine: a Framework for
                                  Authorization, Accounting Policy
                                  Specification and Evaluation in Grids    145
           Fredrik Vraalsen and   
               Ruth A. Aydt and   
            Celso L. Mendes and   
                 Daniel A. Reed   Performance Contracts: Predicting and
                                  Monitoring Grid Application Behavior . . 154
             Maurice Yarrow and   
            Karen M. McCann and   
               Edward Tejni and   
                  Adrian DeVivo   Production-Level Distributed Parametric
                                  Study Capabilities for the Grid  . . . . 166
                Lee Lueking and   
     Lauri Loebel-Carpenter and   
              Wyatt Merritt and   
            Carmenita Moore and   
                Ruth Pordes and   
              Igor Terekhov and   
              Sinisa Veseli and   
              Matt Vranicar and   
                Steve White and   
                    Vicky White   The D0 Experiment Data Grid --- SAM  . . 177
                      Anonymous   Author Index . . . . . . . . . . . . . . 185


Lecture Notes in Computer Science
Volume 2243, 2001

    Eladio Domínguez and   
        Angel R. Francés   An Axiomatic Approach to Digital
                                  Topology . . . . . . . . . . . . . . . . 3
             Ullrich Köthe   Generic Programming Techniques that Make
                                  Planar Cell Complexes Easy to Use  . . . 17
            Vladimir Kovalevsky   Algorithms and Data Structures for
                                  Computer Topology  . . . . . . . . . . . 38
                 Sergei Matveev   Computer Presentation of $3$-Manifolds   59
              Rueiher Tsaur and   
               Michael B. Smyth   ``Continuous'' Multifunctions in
                                  Discrete Spaces with Applications to
                                  Fixed Point Theory . . . . . . . . . . . 75
                Eric Andres and   
            Rodolphe Breton and   
               Pascal Lienhardt   SpaMod: Design of a Spatial Modeling
                                  Tool . . . . . . . . . . . . . . . . . . 91
                   Luc Brun and   
               Walter Kropatsch   Introduction to Combinatorial Pyramids   108
          Emanuele Danovaro and   
          Leila De Floriani and   
              Paola Magillo and   
                   Enrico Puppo   Representing Vertex-Based Simplicial
                                  Multi-complexes  . . . . . . . . . . . . 129
            Yukiko Kenmochi and   
                  Atsushi Imiya   Discrete Polyhedrization of a Lattice
                                  Point Set  . . . . . . . . . . . . . . . 150
                 Jovi\vsa Zunic   Digital Partitions Encoding  . . . . . . 163
             Andreas Alpers and   
            Peter Gritzmann and   
                 Lionel Thorens   Stability and Instability in Discrete
                                  Tomography . . . . . . . . . . . . . . . 175
        Prabir Bhattacharya and   
           Azriel Rosenfeld and   
                    Isaac Weiss   Point-to-Line Mappings and Hough
                                  Transforms . . . . . . . . . . . . . . . 187
                Ulrich Eckhardt   Digital Lines and Digital Convexity  . . 209
                  Atsushi Imiya   Curvature Flow in Discrete Space . . . . 229
            Christian Ronse and   
                 Mohamed Tajine   Hausdorff Sampling of Closed Sets into a
                                  Boundedly Compact Space  . . . . . . . . 250
                 Julian Webster   Cell Complexes and Digital Convexity . . 272
          Thomas Bülow and   
                Reinhard Klette   Approximation of $3$D Shortest Polygons
                                  in Simple Cube Curves  . . . . . . . . . 285
           David Coeurjolly and   
  Isabelle Debled-Rennesson and   
                Olivier Teytaud   Segmentation and Length Estimation of
                                  $3$D Discrete Curves . . . . . . . . . . 299
                Reinhard Klette   Multigrid Convergence of Geometric
                                  Features . . . . . . . . . . . . . . . . 318
                Lyle Noakes and   
             Ryszard Kozera and   
                Reinhard Klette   Length Estimation for Curves with
                                  Different Samplings  . . . . . . . . . . 339
                Lyle Noakes and   
                 Ryszard Kozera   The $2$-D Leap-Frog: Integrability,
                                  Noise, and Digitization  . . . . . . . . 352
           Fridrich Sloboda and   
                  Bedrich Zatko   On Approximation of Jordan Surfaces in
                                  $3$D . . . . . . . . . . . . . . . . . . 365
      Jos B. T. M. Roerdink and   
                    Henk Bekker   Similarity Measure Computation of Convex
                                  Polyhedra Revisited  . . . . . . . . . . 389
                 Stina Svensson   Reversible Surface Skeletons of $3$D
                                  Objects by Iterative Thinning of
                                  Distance Transforms  . . . . . . . . . . 400
        Jun-ichiro Toriwaki and   
                   Kensaku Mori   Distance Transformation and
                                  Skeletonization of $3$D Pictures and
                                  Their Applications to Medical Images . . 412
         Johan Van Horebeek and   
        Ernesto Tapia-Rodriguez   About the Limiting Behaviour of Iterated
                                  Robust Morphological Operators . . . . . 429
                 Peter Veelaert   Collinearity and Weak Collinearity in
                                  the Digital Plane  . . . . . . . . . . . 439
                      Anonymous   Author Index . . . . . . . . . . . . . . 455


Lecture Notes in Computer Science
Volume 2244, 2001

               Igor V. Pottosin   A. P. Ershov --- A Pioneer and a Leader
                                  of National Programming  . . . . . . . . 1
          Rimma I. Podlovchenko   A. A. Lyapunov and A. P. Ershov in the
                                  Theory of Program Schemes and the
                                  Development of Its Logic Concepts  . . . 8
                  Yuri Gurevich   The Abstract State Machine Paradigm:
                                  What Is in and What Is out . . . . . . . 24
           Svyatoslav S. Lavrov   On Algorithmic Unsolvability . . . . . . 25
           Jan Friso Groote and   
                   Hans Zantema   Resolution and Binary Decision Diagrams
                                  Cannot Simulate Each Other Polynomially  33
          Nikolai V. Shilov and   
                       Kwang Yi   On Expressive and Model Checking Power
                                  of Propositional Program Logics  . . . . 39
                Thomas Baar and   
           Bernhard Beckert and   
               Peter H. Schmitt   An Extension of Dynamic Logic for
                                  Modelling OCL's \em @pre Operator  . . . 47--54
                Valeriy Vyatkin   Optimal Algorithms of Event-Driven
                                  Re-evaluation of Boolean Functions . . . 55
         Natalia Ioustinova and   
               Natalia Sidorova   A Transformation of SDL Specifications
                                  -- A Step towards the Verification . . . 64
      Supratik Mukhopadhyay and   
               Andreas Podelski   Accurate Widenings and Boundedness
                                  Properties of Timed Systems  . . . . . . 79
         Alexandre Riazanov and   
                Andrei Voronkov   Adaptive Saturation-Based Reasoning  . . 95
                Robert Eschbach   A Verification Approach for Distributed
                                  Abstract State Machines  . . . . . . . . 109
                   Thorsten Ehm   Transformational Construction of Correct
                                  Pointer Algorithms . . . . . . . . . . . 116
              Kiyoshi Akama and   
            Hidekatsu Koike and   
                Hiroshi Mabuchi   A Theoretical Foundation of Program
                                  Synthesis by Equivalent Transformation   131
              Kiyoshi Akama and   
            Hidekatsu Koike and   
                Hiroshi Mabuchi   Equivalent Transformation by Safe
                                  Extension of Data Structures . . . . . . 140
           Viktor Sabelfeld and   
  Christian Blumenröhr and   
                       Kai Kapp   Semantics and Transformations in Formal
                                  Synthesis at System Level  . . . . . . . 149
                  Mait Harf and   
           Kristiina Kindel and   
               Vahur Kotkas and   
           Peep Küngas and   
                      Enn Tyugu   Automated Program Synthesis for Java
                                  Programming Language . . . . . . . . . . 157
                Peter D. Mosses   The Varieties of Programming Language
                                  Semantics  . . . . . . . . . . . . . . . 165
             Rogardt Heldal and   
                    John Hughes   Binding-Time Analysis for Polymorphic
                                  Types  . . . . . . . . . . . . . . . . . 191
       Torben Æ. Mogensen   An Investigation of Compact and
                                  Efficient Number Representations in the
                                  Pure Lambda Calculus . . . . . . . . . . 205
          Irina B. Virbitskaite   Observational Semantics for Timed Event
                                  Structures . . . . . . . . . . . . . . . 214
               Andrei Sabelfeld   The Impact of Synchronisation on Secure
                                  Information Flow in Concurrent Programs  225
          Valery A. Sokolov and   
             Eugeny A. Timofeev   Dynamical Priorities without Time
                                  Measurement and Modification of the TCP  240
           Egidio Astesiano and   
              Maura Cerioli and   
                  Gianna Reggio   From ADT to UML-Like Modelling . . . . . 246
          Ella E. Roubtsova and   
            Jan van Katwijk and   
        Ruud C. M. de Rooij and   
                  Hans Toetenel   Transformation of UML Specification to
                                  XTG  . . . . . . . . . . . . . . . . . . 247
              Berndt Farwer and   
                 Irina Lomazova   A Systematic Approach towards
                                  Object-Based Petri Net Formalisms  . . . 255
               Vitaly E. Kozura   Unfoldings of Coloured Petri Nets  . . . 268
             Shengyuan Wang and   
                    Jian Yu and   
                   Chongyi Yuan   A Net-Based Multi-tier Behavior
                                  Inheritance Modelling Method . . . . . . 279
          Alexander K. Petrenko   Specification Based Testing: Towards
                                  Practice . . . . . . . . . . . . . . . . 287
          Igor B. Bourdonov and   
          Alexey V. Demakov and   
            Andrew A. Jarov and   
    Alexander S. Kossatchev and   
         Victor V. Kuliamin and   
      Alexander K. Petrenko and   
              Sergey V. Zelenov   Java Specification Extension for
                                  Automated Test Development . . . . . . . 301
           Jan Jürjens and   
                   Guido Wimmel   Specification-Based Testing of Firewalls 308
         Andrey N. Terekhov and   
                     Len Erlikh   Academic vs. Industrial Software
                                  Engineering: Closing the Gap . . . . . . 317
              Dmitry Koznov and   
      Konstantin Romanovsky and   
                 Alexei Nikitin   A Method for Recovery and Maintenance of
                                  Software Architecture  . . . . . . . . . 324
          Dmitry Boulytchev and   
                   Dmitry Lomov   An Empirical Study of Retargetable
                                  Compilers  . . . . . . . . . . . . . . . 328
                  Kazem Lellahi   Conceptual Data Modeling: An Algebraic
                                  Viewpoint  . . . . . . . . . . . . . . . 336
               Sergio Greco and   
             Luigi Pontieri and   
                  Ester Zumpano   Integrating and Managing Conflicting
                                  Data . . . . . . . . . . . . . . . . . . 349
               Gian Piero Zarri   A Knowledge Engineering Approach to Deal
                                  with `Narrative' Multimedia Documents    363
               Vladimir Sazonov   Using Agents for Concurrent Querying of
                                  Web-Like Databases via a
                                  Hyper-Set-Theoretic Approach . . . . . . 378
           Agostino Cortesi and   
       Baudouin Le Charlier and   
                   Sabina Rossi   Reexecution-Based Analysis of Logic
                                  Programs with Delay Declarations . . . . 395
         Maurice Bruynooghe and   
                Wim Vanhoof and   
                 Michael Codish   \em Pos($ {\mathcal T} $ ): Analyzing
                                  Dependencies in Typed Logic Programs . . 406--420
              Yoon-Chan Jhi and   
               Ki-Chang Kim and   
             Kemal Ebcioglu and   
                  Yong Surk Lee   A Prolog Tailoring Technique on an
                                  Epilog Tailored Procedure  . . . . . . . 421--433
                 Dmitry Ushakov   Hierarchical Constraint Satisfaction
                                  Based on Subdefinite Models  . . . . . . 434
                Vitaly Telerman   Using Constraint Solvers in CAD/CAM
                                  Systems  . . . . . . . . . . . . . . . . 446
       Laurent Granvilliers and   
                   Eric Monfroy   A Graphical Interface for Solver
                                  Cooperations . . . . . . . . . . . . . . 457
         Nikolaj S. Nikitchenko   Abstract Computability of
                                  Non-deterministic Programs over Various
                                  Data Structures  . . . . . . . . . . . . 468
         Guillaume Bonfante and   
           Jean-Yves Marion and   
                Jean-Yves Moyen   On Lexicographic Termination Ordering
                                  with Space Bound Certifications  . . . . 482
      Margarita V. Korovina and   
                Oleg V. Kudinov   Generalised Computability and
                                  Applications to Hybrid Systems . . . . . 494
               Roland Weiss and   
                 Volker Simonis   Exploring Template Template Parameters   500
          Vitaly V. Mikheev and   
          Stanislav A. Fedoseev   Compiler-Cooperative Memory Management
                                  in Java  . . . . . . . . . . . . . . . . 511
            Dietrich Birngruber   A Software Composition Language and Its
                                  Implementation . . . . . . . . . . . . . 519
             Audris Kalnins and   
            Karlis Podnieks and   
              Andris Zarins and   
               Edgars Celms and   
                 Janis Barzdins   Editor Definition Language and Its
                                  Implementation . . . . . . . . . . . . . 530
         Alexey S. Rodionov and   
               Dmitry V. Leskov   Oberon-2 as Successor of Modula-2 in
                                  Simulation . . . . . . . . . . . . . . . 538
                      Anonymous   Author Index . . . . . . . . . . . . . . 547


Lecture Notes in Computer Science
Volume 2245, 2001

                  Eric Allender   When Worlds Collide: Derandomization,
                                  Lower Bounds, and Kolmogorov Complexity  1
                  Sanjeev Arora   Approximation Schemes for Geometric
                                  NP-Hard Problems: a Survey . . . . . . . 16
                David Harel and   
                   Yehuda Koren   On Clustering Using Random Walks . . . . 18
                 Colin Stirling   An Introduction to Decidability of DPDA
                                  Equivalence  . . . . . . . . . . . . . . 42
                      Uri Zwick   Semidefinite Programming Based
                                  Approximation Algorithms . . . . . . . . 57
               Manindra Agrawal   Hard Sets and Pseudo-random Generators
                                  for Constant Depth Circuits  . . . . . . 58
               Manindra Agrawal   The First-Order Isomorphism Theorem  . . 70
           Richard Anderson and   
             Sampath Kannan and   
             Howard Karloff and   
              Richard E. Ladner   Thresholds and Optimal Binary Comparison
                                  Search Trees . . . . . . . . . . . . . . 83
               Lubo\vs Brim and   
       Ivana \vCerná and   
       Pavel Kr\vcál and   
           Radek Pelánek   Distributed LTL Model Checking Based on
                                  Negative Cycle Detection . . . . . . . . 96--107
         Cristiano Calcagno and   
              Hongseok Yang and   
               Peter W. O'Hearn   Computability and Complexity Results for
                                  a Spatial Assertion Language for Data
                                  Structures . . . . . . . . . . . . . . . 108
                Jianer Chen and   
          Donald K. Friesen and   
                 Weijia Jia and   
                   Iyad A. Kanj   Using Nondeterminism to Design
                                  Deterministic Algorithms . . . . . . . . 120
                   Zhe Dang and   
            Oscar H. Ibarra and   
           Pierluigi San Pietro   Liveness Verification of
                                  Reversal-Bounded Multicounter Machines
                                  with a Free Counter  . . . . . . . . . . 132
                  Axel Dold and   
                Vincent Vialard   A Mechanically Verified Compiling
                                  Specification for a Lisp Compiler  . . . 144
                Dana Fisman and   
                    Amir Pnueli   Beyond Regular Model Checking  . . . . . 156
        Jürgen Forster and   
            Matthias Krause and   
     Satyanarayana V. Lokam and   
       Rustam Mubarakzjanov and   
              Niels Schmitt and   
              Hans Ulrich Simon   Relations Between Communication
                                  Complexity, Linear Arrangements, and
                                  Computational Complexity . . . . . . . . 171
              Neelima Gupta and   
               Sumit Chopra and   
                    Sandeep Sen   Optimal, Output-Sensitive Algorithms for
                                  Constructing Upper Envelope of Line
                                  Segments in Parallel . . . . . . . . . . 183
           Venkatesan Guruswami   List Decoding from Erasures: Bounds and
                                  Code Constructions . . . . . . . . . . . 195
               Neeraj Jaggi and   
                    K. Gopinath   Verification of a Leader Election
                                  Algorithm in Timed Asynchronous Systems  207
             Andreas Jakoby and   
        Christian Schindelhauer   Efficient Addition on Field Programmable
                                  Gate Arrays  . . . . . . . . . . . . . . 219
             Radha Krishnan and   
            Balaji Raghavachari   The Directed Minimum-Degree Spanning
                                  Tree Problem . . . . . . . . . . . . . . 232
     Tamás Lukovszki and   
            Anil Maheshwari and   
                    Norbert Zeh   I/O-Efficient Batched Range Counting and
                                  Its Applications to Proximity Problems   244
              P. Madhusudan and   
                   B. Meenakshi   Beyond Message Sequence Graphs . . . . . 256
            Monaldo Mastrolilli   Grouping Techniques for One Machine
                                  Scheduling Subject to Precedence
                                  Constraints  . . . . . . . . . . . . . . 268
             Mogens Nielsen and   
          Vladimiro Sassone and   
               Jirí Srba   Properties of Distributed Timed-Arc
                                  Petri Nets . . . . . . . . . . . . . . . 280
                Doron Peled and   
                Amir Pnueli and   
                    Lenore Zuck   From Falsification to Verification . . . 292
                Erion Plaku and   
            Igor E. Shparlinski   On Polynomial Representations of Boolean
                                  Functions Related to Some Number
                                  Theoretic Problems . . . . . . . . . . . 305
                Amir Pnueli and   
                 Yoav Rodeh and   
                Ofer Shtrichman   Range Allocation for Equivalence Logic   317
                  Ashish Tiwari   Rewrite Closure for Ground and
                                  Cancellative AC Theories . . . . . . . . 334
                      Anonymous   Author Index . . . . . . . . . . . . . . 347


Lecture Notes in Computer Science
Volume 2246, 2001

               Rino Falcone and   
             Munindar Singh and   
                    Yao-Hua Tan   Introduction: Bringing Together Humans
                                  and Artificial Agents in
                                  Cyber-Societies: a New Field of Trust
                                  Research . . . . . . . . . . . . . . . . 1
             Roderick M. Kramer   Trust Rules for Trust Dilemmas: How
                                  Decision Makers Think and Act in the
                                  Shadow of Doubt  . . . . . . . . . . . . 9
       D. Harrison McKnight and   
             Norman L. Chervany   Trust and Distrust Definitions: One Bite
                                  at a Time  . . . . . . . . . . . . . . . 27
               Rino Falcone and   
        Cristiano Castelfranchi   The Socio-cognitive Dynamics of Trust:
                                  Does Trust Create Trust? . . . . . . . . 55
          K. Suzanne Barber and   
                     Joonoo Kim   Belief Revision Process Based on Trust:
                                  Agents Evaluating Reputation of
                                  Information Sources  . . . . . . . . . . 73
             Bart Nooteboom and   
                 Tomas Klos and   
                   Ren\`e Jorna   Adaptive Trust and Co-operation: An
                                  Agent-Based Simulation Approach  . . . . 83
             Mark Witkowski and   
          Alexander Artikis and   
                    Jeremy Pitt   Experiments in Building Experiential
                                  Trust in a Society of Objective-Trust
                                  Based Agents . . . . . . . . . . . . . . 111
                   Andreas Birk   Learning to Trust  . . . . . . . . . . . 133
         Rajatish Mukherjee and   
         Bikramjit Banerjee and   
                     Sandip Sen   Learning Mutual Trust  . . . . . . . . . 145
                  Yosi Mass and   
                    Onn Shehory   Distributed Trust in Open Multi-agent
                                  Systems  . . . . . . . . . . . . . . . . 159
                    Eric Yu and   
                        Lin Liu   Modelling Trust for System Design Using
                                  the i * Strategic Actors Framework . . . 175
                      Anonymous   Author Index . . . . . . . . . . . . . . 195


Lecture Notes in Computer Science
Volume 2247, 2001

                    A. Canteaut   Cryptographic Functions and Design
                                  Criteria for Block Ciphers . . . . . . . 1
              J. Domingo-Ferrer   Mobile Agent Route Protection through
                                  Hash-Based Mechanisms  . . . . . . . . . 17
             M. Kuribayashi and   
                      H. Tanaka   A New Anonymous Fingerprinting Scheme
                                  with High Enciphering Rate . . . . . . . 30
                  P. Sarkar and   
             P. J. Schellenberg   A Parallel Algorithm for Extending
                                  Cryptographic Hash Functions . . . . . . 40
                  B.-M. Goi and   
              M. U. Siddiqi and   
                    H.-T. Chuah   Incremental Hash Function Based on Pair
                                  Chaining & Modular Arithmetic Combining   50
                K. C. Gupta and   
                      S. Maitra   Multiples of Primitive Polynomials over
                                  GF(2)  . . . . . . . . . . . . . . . . . 62
                  J. M. Kim and   
                     I. Yie and   
                   S. I. Oh and   
                  H. D. Kim and   
                         J. Ryu   Fast Generation of Cubic Irreducible
                                  Polynomials for XTR  . . . . . . . . . . 73
                J. Pieprzyk and   
                    X.-M. Zhang   Cheating Prevention in Secret Sharing
                                  over GF ( p t )  . . . . . . . . . . . . 79
                 S. A. Miri and   
                    V. K. Murty   An Application of Sieve Methods to
                                  Elliptic Curves  . . . . . . . . . . . . 91
                       H. Baier   Elliptic Curves of Prime Order over
                                  Optimal Extension Fields for Use in
                                  Cryptography . . . . . . . . . . . . . . 99
                    M. Ciet and   
           J.-J. Quisquater and   
                        F. Sica   A Secure Family of Composite Finite
                                  Fields Suitable for Fast Implementation
                                  of Elliptic Curve Cryptography . . . . . 108
                  P. Sarkar and   
                  D. R. Stinson   Frameproof and IPP Codes . . . . . . . . 117
            R. Safavi-Naini and   
                    H. Wang and   
                        C. Xing   Linear Authentication Codes: Bounds and
                                  Constructions  . . . . . . . . . . . . . 127
                  S. Kremer and   
                  O. Markowitch   Selective Receipt in Certified E-mail    136
                  S. Maitra and   
                D. P. Mukherjee   Spatial Domain Digital Watermarking with
                                  Buyer Authentication . . . . . . . . . . 149
                     B. Lee and   
                     K. Kim and   
                          J. Ma   Efficient Public Auction with One-Time
                                  Registration and Public Verifiability    162
             K. Viswanathan and   
                    C. Boyd and   
                      E. Dawson   An Analysis of Integrity Services in
                                  Protocols  . . . . . . . . . . . . . . . 175
                 S. S. Bedi and   
                   N. R. Pillai   Cryptanalysis of the Nonlinear
                                  FeedForward Generator  . . . . . . . . . 188
                  M. Maurer and   
                 A. Menezes and   
                       E. Teske   Analysis of the GHS Weil Descent Attack
                                  on the ECDLP over Characteristic Two
                                  Finite Fields of Composite Degree  . . . 195
                 A. Youssef and   
                        G. Gong   Cryptanalysis of Imai and Matsumoto
                                  Scheme B Asymmetric Cryptosystem . . . . 214
                      Y. Mu and   
                V. Varadharajan   Robust and Secure Broadcasting . . . . . 223
               K. Srinathan and   
               C. P. Rangan and   
                    V. Kamakoti   Toward Optimal Player Weights in Secure
                                  Distributed Protocols  . . . . . . . . . 232
                      S. Maitra   Autocorrelation Properties of
                                  Correlation Immune Boolean Functions . . 242
                M. Fedorova and   
                  Y. Tarannikov   On the Constructing of Highly Nonlinear
                                  Resilient Boolean Functions by Means of
                                  Special Matrices . . . . . . . . . . . . 254
                      D. Ramesh   A Twin Algorithm for Efficient
                                  Generation of Digital Signatures . . . . 267
                 T. Okamoto and   
                    M. Tada and   
                      A. Miyaji   Efficient ``on the Fly'' Signature
                                  Schemes Based on Integer Factoring . . . 275
                    A. Kholosha   Clock-Controlled Shift Registers and
                                  Generalized Geffe Key-Stream Generator   287
               S. Chowdhury and   
                      S. Maitra   Efficient Software Implementation of
                                  Linear Feedback Shift Registers  . . . . 297
                     S. Lim and   
                     S. Kim and   
                     I. Yie and   
                         J. Kim   Comments on a Signature Scheme Based on
                                  the Third Order LFSR Proposed at
                                  ACISP2001  . . . . . . . . . . . . . . . 308
                  L. Shujun and   
                 M. Xuanqin and   
                    C. Yuanlong   Pseudo-random Bit Generator Based on
                                  Couple Chaotic Systems and Its
                                  Applications in Stream-Cipher
                                  Cryptography . . . . . . . . . . . . . . 316
                       G. Samid   Re-dividing Complexity between
                                  Algorithms and Keys  . . . . . . . . . . 330
                       E. Kiltz   A Tool Box of Cryptographic Functions
                                  Related to the Diffie--Hellman Function  339
                      Anonymous   Author Index . . . . . . . . . . . . . . 351


Lecture Notes in Computer Science
Volume 2248, 2001

               Craig Gentry and   
              Jakob Jonsson and   
              Jacques Stern and   
                 Michael Szydlo   Cryptanalysis of the NTRU Signature
                                  Scheme (NSS) from Eurocrypt 2001 . . . . 1
            Phong Q. Nguyen and   
            Igor E. Shparlinski   On the Insecurity of a Server-Aided RSA
                                  Protocol . . . . . . . . . . . . . . . . 21
                  Dan Boneh and   
                Shai Halevi and   
           Nick Howgrave-Graham   The Modular Inversion Hidden Number
                                  Problem  . . . . . . . . . . . . . . . . 36
         Nicholas J. Hopper and   
                    Manuel Blum   Secure Human Identification Protocols    52
               Arjen K. Lenstra   Unbelievable Security. Matching AES
                                  Security Using Public Key Systems  . . . 67
             Siguna Müller   A Probable Prime Test with Very High
                                  Confidence for $ n \equiv 1 \bmod 4 $    87
          Emmanuel Thomé   Computation of Discrete Logarithms in $
                                  \mathbb {F}_{2^{607}} $  . . . . . . . . 107
               Martijn Stam and   
               Arjen K. Lenstra   Speeding Up XTR  . . . . . . . . . . . . 125
              Jae Choon Cha and   
               Ki Hyoung Ko and   
               Sang Jin Lee and   
                Jae Woo Han and   
                 Jung Hee Cheon   An Efficient Implementation of Braid
                                  Groups . . . . . . . . . . . . . . . . . 144
        Nicolas T. Courtois and   
           Matthieu Finiasz and   
               Nicolas Sendrier   How to Achieve a McEliece-Based Digital
                                  Signature Scheme . . . . . . . . . . . . 157
           Alice Silverberg and   
            Jessica Staddon and   
                 Judy L. Walker   Efficient Traitor Tracing Algorithms
                                  Using List Decoding  . . . . . . . . . . 175
              Makoto Sugita and   
            Kazukuni Kobara and   
                    Hideki Imai   Security of Reduced Version of the Block
                                  Cipher Camellia against Truncated and
                                  Impossible Differential Cryptanalysis    193
                Deukjo Hong and   
               Jaechul Sung and   
               Seokhie Hong and   
                  Wonil Lee and   
                Sangjin Lee and   
                 Jongin Lim and   
                      Okyeon Yi   Known-IV Attacks on Triple Modes of
                                  Operation of Block Ciphers . . . . . . . 208
                Jacques Patarin   Generic Attacks on Feistel Schemes . . . 222
               Akashi Satoh and   
              Sumio Morioka and   
               Kohji Takano and   
                  Seiji Munetoh   A Compact Rijndael Hardware Architecture
                                  with S-Box Optimization  . . . . . . . . 239
               Ju-Sung Kang and   
               Sang-Uk Shin and   
                 Dowon Hong and   
                      Okyeon Yi   Provable Security of KASUMI and 3GPP
                                  Encryption Mode $ f8 $ . . . . . . . . . 255--271
             Duncan S. Wong and   
                  Agnes H. Chan   Efficient and Mutually Authenticated Key
                                  Exchange for Low Power Computing Devices 272
           Emmanuel Bresson and   
          Olivier Chevassut and   
              David Pointcheval   Provably Authenticated Group
                                  Diffie--Hellman Key Exchange --- The
                                  Dynamic Case . . . . . . . . . . . . . . 290
        Pierre-Alain Fouque and   
                  Jacques Stern   Fully Distributed Threshold RSA under
                                  Standard Assumptions . . . . . . . . . . 310
           Anna Lysyanskaya and   
                  Chris Peikert   Adaptive Security in the Threshold
                                  Setting: From Cryptosystems to Signature
                                  Schemes  . . . . . . . . . . . . . . . . 331
        Pierre-Alain Fouque and   
              David Pointcheval   Threshold Cryptosystems Secure against
                                  Chosen-Ciphertext Attacks  . . . . . . . 351
            Yan-Cheng Chang and   
                     Chi-Jen Lu   Oblivious Polynomial Evaluation and
                                  Oblivious Neural Learning  . . . . . . . 369
               Moses Liskov and   
           Anna Lysyanskaya and   
              Silvio Micali and   
              Leonid Reyzin and   
                     Adam Smith   Mutually Independent Commitments . . . . 385
            Nicolas T. Courtois   Efficient Zero-Knowledge Authentication
                                  Based on a Linear Algebra Problem
                                  MinRank  . . . . . . . . . . . . . . . . 402
              Tzafrir Cohen and   
                 Joe Kilian and   
                   Erez Petrank   Responsive Round Complexity and
                                  Concurrent Zero-Knowledge  . . . . . . . 422
         Johan Håstad and   
              Mats Näslund   Practical Construction and Analysis of
                                  Pseudo-Randomness Primitives . . . . . . 442
           Yuriy Tarannikov and   
              Peter Korolev and   
                    Anton Botev   Autocorrelation Coefficients and
                                  Correlation Immunity of Boolean
                                  Functions  . . . . . . . . . . . . . . . 460
            Pierrick Gaudry and   
             Nicolas Gürel   An Extension of Kedlaya's Point-Counting
                                  Algorithm to Superelliptic Curves  . . . 480
            Steven D. Galbraith   Supersingular Curves in Cryptography . . 495
                  Dan Boneh and   
                   Ben Lynn and   
                  Hovav Shacham   Short Signatures from the Weil Pairing   514
                Eric R. Verheul   Self-Blindable Credential Certificates
                                  from the Weil Pairing  . . . . . . . . . 533
           Ronald L. Rivest and   
                 Adi Shamir and   
                    Yael Tauman   How to Leak a Secret . . . . . . . . . . 552
              Mihir Bellare and   
        Alexandra Boldyreva and   
                Anand Desai and   
              David Pointcheval   Key-Privacy in Public-Key Encryption . . 566
               Masayuki Abe and   
                  Miyako Ohkubo   Provably Secure Fair Blind Signatures
                                  with Tight Revocation  . . . . . . . . . 583
                      Anonymous   Author Index . . . . . . . . . . . . . . 603


Lecture Notes in Computer Science
Volume 2249, 2001

                    Khaled Nagi   1 Introduction . . . . . . . . . . . . . 1
                    Khaled Nagi   2 Application Scenario . . . . . . . . . 5
                    Khaled Nagi   3 Overview of Agent Technology . . . . . 21
                    Khaled Nagi   4 Overview of Transaction Processing . . 41
                    Khaled Nagi   5 Proposed Approach: Transactional
                                  Agents . . . . . . . . . . . . . . . . . 63
                    Khaled Nagi   6 The Agent Transaction Model  . . . . . 79
                    Khaled Nagi   7 Robustness Guaranteeing Mechanisms . . 117
                    Khaled Nagi   8 Interacting with the Execution Agent   135
                    Khaled Nagi   9 Simulation Study . . . . . . . . . . . 151
                    Khaled Nagi   10 Simulation Results  . . . . . . . . . 161
                    Khaled Nagi   11 Summary and Future Work . . . . . . . 183
                    Khaled Nagi   Appendix I: Agent Implementation
                                  Prototype  . . . . . . . . . . . . . . . 187
                      Anonymous   Subject Index  . . . . . . . . . . . . . 193
                      Anonymous   References . . . . . . . . . . . . . . . 203


Lecture Notes in Computer Science
Volume 2250, 2001

              Ian Hodkinson and   
               Frank Wolter and   
          Michael Zakharyaschev   Monodic Fragments of First-Order
                                  Temporal Logics: 2000--2001 A.D. . . . . 1
             Orna Kupferman and   
                 Moshe Y. Vardi   On Bounded Specifications  . . . . . . . 24
                Klaus Schneider   Improving Automata Generation for Linear
                                  Temporal Logic by Considering the
                                  Automaton Hierarchy  . . . . . . . . . . 39
             Volker Diekert and   
                    Paul Gastin   Local Temporal Logic Is Expressively
                                  Complete for Cograph Dependence
                                  Alphabets  . . . . . . . . . . . . . . . 55
          Dietmar Berwanger and   
              Erich Grädel   Games and Model Checking for Guarded
                                  Logics . . . . . . . . . . . . . . . . . 70
            Lilia Georgieva and   
            Ullrich Hustadt and   
              Renate A. Schmidt   Computational Space Efficiency and
                                  Minimal Model Generation for Guarded
                                  Formulae . . . . . . . . . . . . . . . . 85
           Natasha Alechina and   
                    Brian Logan   Logical Omniscience and the Cost of
                                  Deliberation . . . . . . . . . . . . . . 100
       Sebastian Sardiña   Local Conditional High-Level Robot
                                  Programs . . . . . . . . . . . . . . . . 110
             Kai Engelhardt and   
         Ron van der Meyden and   
                    Yoram Moses   A Refinement Theory That Supports
                                  Reasoning about Knowledge and Time . . . 125
              Reinhold Letz and   
                   Gernot Stenz   Proof and Model Generation with
                                  Disconnection Tableaux . . . . . . . . . 142
               Joseph D. Horton   Counting the Number of Equivalent Binary
                                  Resolution Proofs  . . . . . . . . . . . 157
                Hans de Nivelle   Splitting through New Proposition
                                  Symbols  . . . . . . . . . . . . . . . . 172
          Christopher Lynch and   
               Barbara Morawska   Complexity of Linear Standard Theories   186
              Matthias Baaz and   
           Agata Ciabattoni and   
    Christian G. Fermüller   Herbrand's Theorem for Prenex Gödel Logic
                                  and Its Consequences for Theorem Proving 201
               Franz Baader and   
              Ralf Küsters   Unification in a Description Logic with
                                  Transitive Closure of Roles  . . . . . . 217
                    Guy Perrier   Intuitionistic Multiplicative Proof Nets
                                  as Models of Directed Acyclic Graph
                                  Descriptions . . . . . . . . . . . . . . 233
                   Yong Luo and   
                    Zhaohui Luo   Coherence and Transitivity in Coercive
                                  Subtyping  . . . . . . . . . . . . . . . 249
         Carsten Schürmann   A Type-Theoretic Approach to Induction
                                  with Higher-Order Encodings  . . . . . . 266
                Jan-Georg Smaus   Analysis of Polymorphically Typed Logic
                                  Programs Using ACI-Unification . . . . . 282
           Miyuki Koshimura and   
             Hiroshi Fujita and   
                 Ryuzo Hasegawa   Model Generation with Boolean
                                  Constraints  . . . . . . . . . . . . . . 299
            Bijan Afshordel and   
         Thomas Hillenbrand and   
           Christoph Weidenbach   First-Order Atom Definitions Extended    309
     Thomas Marthedal Rasmussen   Automated Proof Support for Interval
                                  Logics . . . . . . . . . . . . . . . . . 320
                 Daniel Leivant   The Functions Provable by First Order
                                  Abstraction  . . . . . . . . . . . . . . 330
          Kai Brünnler and   
             Alwen Fernanto Tiu   A Local System for Classical Logic . . . 347
                 Jussi Rintanen   Partial Implicit Unfolding in the
                                  Davis--Putnam Procedure for Quantified
                                  Boolean Formulae . . . . . . . . . . . . 362
                     Toby Walsh   Permutation Problems and Channelling
                                  Constraints  . . . . . . . . . . . . . . 377
                 Alvaro del Val   Simplifying Binary Propositional
                                  Theories into Connected Components Twice
                                  as Fast  . . . . . . . . . . . . . . . . 392
               Thomas Eiter and   
               Michael Fink and   
         Giuliana Sabbatini and   
                   Hans Tompits   Reasoning about Evolving Nonmonotonic
                                  Knowledge Bases  . . . . . . . . . . . . 407
                Andreas Behrend   Efficient Computation of the
                                  Well-Founded Model Using Update
                                  Propagation  . . . . . . . . . . . . . . 422
             Gianluca Amato and   
                   James Lipton   Indexed Categories and Bottom-Up
                                  Semantics of Logic Programs  . . . . . . 438
 F. J. López-Fraguas and   
J. Sánchez-Hernández   Functional Logic Programming with
                                  Failure: a Set-Oriented View . . . . . . 455
               Stephan Kreutzer   Operational Semantics for Fixed-Point
                                  Logics on Constraint Databases . . . . . 470
        Susana Muñoz and   
    Juan José Moreno and   
            Manuel Hermenegildo   Efficient Negation Using Abstract
                                  Interpretation . . . . . . . . . . . . . 485
      Sylvain Boulmé and   
          Grégoire Hamon   Certifying Synchrony for Free  . . . . . 495
               David McMath and   
         Marianna Rozenfeld and   
                 Richard Sommer   A Computer Environment for Writing
                                  Ordinary Mathematical Proofs . . . . . . 507
       Alexander Serebrenik and   
               Danny De Schreye   On Termination of Meta-programs  . . . . 517
       Cristina Borralleras and   
                   Albert Rubio   A Monotonic Higher-Order Semantic Path
                                  Ordering . . . . . . . . . . . . . . . . 531
         Robert Baumgartner and   
              Sergio Flesca and   
                  Georg Gottlob   The Elog Web Extraction Language . . . . 548
            Enrico Franconi and   
      Antonio Laureti Palma and   
               Nicola Leone and   
               Simona Perri and   
            Francesco Scarcello   Census Data Repair: a Challenging
                                  Application of Disjunctive Logic
                                  Programming  . . . . . . . . . . . . . . 561
            Roberto Bagnara and   
            Enea Zaffanella and   
               Roberta Gori and   
               Patricia M. Hill   Boolean Functions for Finite-Tree
                                  Dependencies . . . . . . . . . . . . . . 579
               Marco Comini and   
               Roberta Gori and   
                   Giorgio Levi   How to Transform an Analyzer into a
                                  Verifier . . . . . . . . . . . . . . . . 595
                  Rong Yang and   
                  Steve Gregory   Andorra Model Revised: Introducing
                                  Nested Domain Variables and a Targeted
                                  Search . . . . . . . . . . . . . . . . . 610
                Ofer Arieli and   
          Bert Van Nuffelen and   
              Marc Denecker and   
             Maurice Bruynooghe   Coherent Composition of Distributed
                                  Knowledge-Bases through Abduction  . . . 624
Christian G. Fermüller and   
                Georg Moser and   
                   Richard Zach   Tableaux for Reasoning about Atomic
                                  Updates  . . . . . . . . . . . . . . . . 639
       Alexander Serebrenik and   
               Danny De Schreye   Inference of Termination Conditions for
                                  Numerical Loops in Prolog  . . . . . . . 654
                 Salvador Lucas   Termination of Rewriting with Strategy
                                  Annotations  . . . . . . . . . . . . . . 669
               Samir Genaim and   
                 Michael Codish   Inferring Termination Conditions for
                                  Logic Programs Using Backwards Analysis  685
               Thomas Genet and   
 Valérie Viet Triem Tong   Reachability Analysis of Term Rewriting
                                  Systems with Timbuk  . . . . . . . . . . 695
                Wim Vanhoof and   
             Maurice Bruynooghe   Binding-Time Annotations without
                                  Binding-Time Analysis  . . . . . . . . . 707
             Raúl Monroy   Concept Formation via Proof Planning
                                  Failure  . . . . . . . . . . . . . . . . 723
                      Anonymous   Author Index . . . . . . . . . . . . . . 737


Lecture Notes in Computer Science
Volume 2251, 2001

              John Daugman, OBE   Personal Identification in Real-Time by
                                  Wavelet Analysis of Iris Patterns
                                  (abstract only)  . . . . . . . . . . . . 1--1
                Bruno Torresani   Hybrid Representations of Audiophonic
                                  Signals  . . . . . . . . . . . . . . . . 2
         M. Victor Wickerhauser   Singularity Detection from
                                  Autocovariance via Wavelet Packets . . . 3
              Claudia Schremmer   Empirical Evaluation of Boundary
                                  Policies for Wavelet-Based Image Coding  4
              Song Guoxiang and   
                    Wang Weiwei   Image-Feature Based Second Generation
                                  Watermarking in Wavelet Domain . . . . . 16
                 Wonkoo Kim and   
                 Ching-Chung Li   A Study on Preconditioning Multiwavelet
                                  Systems for Image Compression  . . . . . 22
             Wing-kuen Ling and   
           Peter Kwong-shun Tam   Reduction of Blocking Artifacts in Both
                                  Spatial Domain and Transformed Domain    37
             Wing-kuen Ling and   
           Peter Kwong-shun Tam   Simple and Fast Subband De-blocking
                                  Technique by Discarding the High Band
                                  Signals  . . . . . . . . . . . . . . . . 44
            Guan Lütai and   
                        Lu Feng   A Method with Scattered Data Spline and
                                  Wavelets for Image Compression . . . . . 49
               Li-Chang Liu and   
            Jong-Chih Chien and   
            Henry Y. Chuang and   
                 Ching-Chung Li   A Wavelet-Based Preprocessing for Moving
                                  Object Segmentation in Video Sequences   54
Mbainaibeye Jérôme and   
             Noureddine Ellouze   Embedded Zerotree Wavelet Coding of
                                  Image Sequence . . . . . . . . . . . . . 65
               Detlev Marpe and   
             Thomas Wiegand and   
                  Hans L. Cycon   Wavelet-Based Video Compression Using
                                  Long-Term Memory Motion-Compensated
                                  Prediction and Context-Based Adaptive
                                  Arithmetic Coding  . . . . . . . . . . . 76
                   Yoshito Ueno   Wavelets and Fractal Image Compression
                                  Based on Their Self-Similarity of the
                                  Space-Frequency Plane of Images  . . . . 87
            Stefan Heinrich and   
         Fred J. Hickernell and   
                  Rong-Xian Yue   Integration of Multivariate Haar Wavelet
                                  Series . . . . . . . . . . . . . . . . . 99
               Qu Han-zhang and   
                    Xu Chen and   
                   Zhao Ruizhen   An Application of Continuous Wavelet
                                  Transform in Differential Equations  . . 107
             Paul F. Curran and   
                   Gary McDarby   Stability of Biorthogonal Wavelet Bases
                                  in $ L_2 (R) $ . . . . . . . . . . . . . 117--128
                 Lihua Yang and   
                  Xinge You and   
         Robert M. Haralick and   
          Ihsin T. Phillips and   
                   Yuan Y. Tang   Characterization of Dirac Edge with New
                                  Wavelet Transform  . . . . . . . . . . . 129
               Youjian Shen and   
                        Wei Lin   Wavelet Algorithm for the Numerical
                                  Solution of Plane Elasticity Problem . . 139
              Song Guoxiang and   
                   Zhao Ruizhen   Three Novel Models of Threshold
                                  Estimator for Wavelet Coefficients . . . 145
                  Mingqi Li and   
                Qicong Peng and   
                 Shouming Zhong   The PSD of the Wavelet-Packet Modulation 151
               Shouzhi Yang and   
            Zhengxing Cheng and   
                  Hongyong Wang   Orthogonal Multiwavelets with Dilation
                                  Factor $a$ . . . . . . . . . . . . . . . 157
               Masaaki Kubo and   
              Zaher Aghbari and   
                Kun Seok Oh and   
             Akifumi Makinouchi   A Wavelet-Based Image Indexing,
                                  Clustering, and Retrieval Technique
                                  Based on Edge Feature  . . . . . . . . . 164
               Chew Lim Tan and   
                  Ruini Cao and   
                     Peiyi Shen   Wavelet Applications in Segmentation of
                                  Handwriting in Archival Documents  . . . 176
           Abbas Z. Kouzani and   
                      S. H. Ong   Wavelet Packets for Lighting-Effects
                                  Determination  . . . . . . . . . . . . . 188
                     Kun Ma and   
                    Xiaoou Tang   Translation-Invariant Face Feature
                                  Estimation Using Discrete Wavelet
                                  Transform  . . . . . . . . . . . . . . . 200
                Yujing Guan and   
                    Lixin Zhang   Text Extraction Based on Nonlinear Frame 211
                 Wang Qiang and   
                 Hu Weiping and   
                Hu Jianping and   
                         Hu Kai   A Wavelet Multiresolution Edge Analysis
                                  Method for Recovery of Depth from
                                  Defocused Images . . . . . . . . . . . . 217
                Hanlin Chen and   
                    Silong Peng   Construction of Finite Non-separable
                                  Orthogonal Filter Banks with Linear
                                  Phase and Its Application in Image
                                  Segmentation . . . . . . . . . . . . . . 223
               Yuan Y. Tang and   
                  Yuhua Hou and   
               Jinping Song and   
                    Xiaoyi Yang   Mixture-State Document Segmentation
                                  Using Wavelet-Domain Hidden Markov Tree
                                  Models . . . . . . . . . . . . . . . . . 230
                   Tak Ming Law   Some Experiment Results on Feature
                                  Analyses of Stroke Sequence Free
                                  Matching Algorithms for On-Line Chinese
                                  Character Recognition  . . . . . . . . . 237
                   Tak Ming Law   Automatic Detection Algorithm of
                                  Connected Segments for On-line Chinese
                                  Character Recognition  . . . . . . . . . 242
                 Hu Weiping and   
                Robert Linggard   Speech Signal Deconvolution Using
                                  Wavelet Filter Banks . . . . . . . . . . 248
                Jan Borgosz and   
               Boguslaw Cyganek   A Proposal of Jitter Analysis Based on a
                                  Wavelet Transform  . . . . . . . . . . . 257
                Weichuan Yu and   
              Gerald Sommer and   
              Kostas Daniilidis   Skewness of Gabor Wavelets and Source
                                  Signal Separation  . . . . . . . . . . . 269
               M. MacCallum and   
               A. E. A. Almaini   The Application of the Wavelet Transform
                                  to Polysomnographic Signals  . . . . . . 284
                     Wei Su and   
                    Hong Ma and   
              Yuan Yan Tang and   
                   Michio Umeda   Wavelet Transform Method of Waveform
                                  Estimation for Hilbert Transform of
                                  Fractional Stochastic Signals with Noise 296
                  Juan Zhao and   
                    Hong Ma and   
              Zhi-sheng You and   
                   Michio Umeda   Multiscale Kalman Filtering of Fractal
                                  Signals Using Wavelet Transform  . . . . 305
               Jian Ping Li and   
                  Yuan Yan Tang   General Analytic Construction for
                                  Wavelet Low-Passed Filters . . . . . . . 314
                  Yishu Liu and   
                  Jinyu Cen and   
                   Qian Sun and   
                     Lihua Yang   A Design of Automatic Speech Playing
                                  System Based on Wavelet Transform  . . . 321
                 Lihua Yang and   
                Qiuhui Chen and   
                   Yuan Y. Tang   General Design of Wavelet High-Pass
                                  Filters from Reconstructional Symbol . . 326
             Wing-kuen Ling and   
           Peter Kwong-Shun Tam   Realization of Perfect Reconstruction
                                  Non-uniform Filter Banks via a Tree
                                  Structure  . . . . . . . . . . . . . . . 331
             Wing-kuen Ling and   
           Peter Kwong-Shun Tam   Set of Decimators for Tree Structure
                                  Filter Banks . . . . . . . . . . . . . . 336
             Wing-kuen Ling and   
           Peter Kwong-Shun Tam   Set of Perfect Reconstruction
                                  Non-uniform Filter Banks via a Tree
                                  Structure  . . . . . . . . . . . . . . . 341
          Sharif Md. Raihan and   
                     Yi Wen and   
                      Bing Zeng   Joint Time-Frequency Distributions for
                                  Business Cycle Analysis  . . . . . . . . 347
                Zaidi Razak and   
                Mashkuri Yaacob   The Design of Discrete Wavelet
                                  Transformation Chip  . . . . . . . . . . 359
                  H. Ahmadi and   
                R. Tafreshi and   
                 F. Sassani and   
                      G. Dumont   On the Performance of Informative
                                  Wavelets for Classification and
                                  Diagnosis of Machine Faults  . . . . . . 369
                  S. H. Ong and   
                  A. Z. Kouzani   A Wavelet-Based Ammunition Doppler Radar
                                  System . . . . . . . . . . . . . . . . . 382
               Jian Ping Li and   
               Shang An Yan and   
                  Yuan Yan Tang   The Application of Wavelet Analysis
                                  Method to Civil Infrastructure Health
                                  Monitoring . . . . . . . . . . . . . . . 393
             Wing-kuen Ling and   
           Peter Kwung-Shun Tam   Piecewise Periodized Wavelet Transform
                                  and Its Realization, Properties and
                                  Applications . . . . . . . . . . . . . . 398
                      Hou Zunze   Wavelet Transform and Its Application to
                                  Decomposition of Gravity Anomalies . . . 404
                  Wu Boying and   
                Liu Shaohui and   
                 Deng Zhongxing   Computations of Inverse Problem by Using
                                  Wavelet in Multi-layer Soil  . . . . . . 411
                    Feng Lu and   
               Zhaoxia Yang and   
                    Yuesheng Li   Wavelets Approach in Choosing Adaptive
                                  Regularization Parameter . . . . . . . . 418
                  Jing Zhao and   
               Xiu Wen Yang and   
               Jian Ping Li and   
                  Yuan Yan Tang   DNA Sequences Classification Based on
                                  Wavelet Packet Analysis  . . . . . . . . 424
               Xiu Wen Yang and   
                  Jing Zhao and   
               Jian Ping Li and   
                   Jing Liu and   
                 Shun Peng Zeng   The Application of the Wavelet Transform
                                  to the Prediction of Gas Zones . . . . . 430
                Zeyin Zhang and   
                    Daren Huang   Parameterizations of $M$-Band
                                  Biorthogonal Wavelets  . . . . . . . . . 435
                      Anonymous   Author Index . . . . . . . . . . . . . . 449


Lecture Notes in Computer Science
Volume 2252, 2001

                  Toshio Fukuda   Intelligent Adaptive Interface . . . . . 1
                    Toru Ishida   Digital City: Bridging Technologies and
                                  Humans . . . . . . . . . . . . . . . . . 2
                   Takeo Kanade   Detection, Recognition, and Expression
                                  Analysis of Human Faces  . . . . . . . . 3
                 Oussama Khatib   Digital Interactivity: Human-Centered
                                  Robotics, Haptics, and Simulation  . . . 4
            Hong Heather Yu and   
                   Peng Yin and   
               Samuel Cheng and   
             Xiangyang Kong and   
           Alexander Gelman and   
                 Robert S. Fish   Smart Media: Empower Media with Active
                                  Data Hiding  . . . . . . . . . . . . . . 5
           Hiroto Takahashi and   
                 Yasuo Yonezawa   Congestion Prospect of Network Traffics
                                  by Fluctuation of Internet Transmission
                                  Time . . . . . . . . . . . . . . . . . . 17
            Yukio Horiguchi and   
                Tetsuo Sawaragi   Naturalistic Human-Robot Collaboration
                                  Mediated by Shared Communicational
                                  Modality in Teleoperation System . . . . 24
           Suwimol Sae-Tang and   
        Vatcharaporn Esichaikul   Web Personalization Techniques for
                                  E-commerce . . . . . . . . . . . . . . . 36
                Runhe Huang and   
                 Jianhua Ma and   
                        Qun Jin   A Shopping Negotiation Agent That Adapts
                                  to User Preferences  . . . . . . . . . . 45
              Sofie Goderis and   
              Gustavo Rossi and   
             Andres Fortier and   
                 Juan Cappi and   
                 Daniel Schwabe   Combining Meta-level and Logic-Based
                                  Constructs in Web Personalization  . . . 57
              San Murugesan and   
           Annamalai Ramanathan   Web Personalisation --- An Overview  . . 65
Carlos Alberto Odorico de Moraes Filho and   
      Francilene Procpio Garcia   Business-Oriented Web Personalization: a
                                  Decision-Making Approach . . . . . . . . 77
                  Weihua Li and   
                    Xiaodong Fu   A Personalized Interface Agent with
                                  Feedback Evaluation  . . . . . . . . . . 83
            Andrew Marriott and   
                Simon Beard and   
                John Stallo and   
                     Quoc Huynh   VHML --- Directing a Talking Head  . . . 90
                Simon Beard and   
                Donald Reid and   
            Russell Shepherdson   Believable and Interactive Talking Heads
                                  for Websites: MetaFace and MPEG-4  . . . 101
              Yasmine Arafa and   
                    Abe Mamdani   Building Multi-modal Personal Sales
                                  Agents as Interfaces to E-commerce
                                  Applications . . . . . . . . . . . . . . 113
            Chun Keung Chau and   
              Chak Shun Lai and   
               Bertram Emil Shi   Feature vs. Model Based Vocal Tract
                                  Length Normalization for a Speech
                                  Recognition-Based Interactive Toy  . . . 134
    Stephen Wang-Cheung Lam and   
             Kelvin Yuen-Hin Ho   A Genetic Algorithm Based Approach to
                                  the Synthesis of Three Dimensional
                                  Morphing Sequences . . . . . . . . . . . 144
             Kwang Mong Sim and   
                  Weng Hong Sun   A Comparative Study of ANT-Based
                                  Optimization for Dynamic Routing . . . . 153
Angélica Muñoz-Meléndez and   
                 Alexis Drogoul   What Kind of Cooperation Is Required by
                                  Situated Agents? . . . . . . . . . . . . 165
                YunHee Kang and   
                 HoSang Ham and   
                 ChongSun Hwang   A Fault-Tolerant Scheme of Multi-agent
                                  System for Worker Agents . . . . . . . . 171
                Osamu Katai and   
               Kentaro Toda and   
               Hiroshi Kawakami   Decentralized Control of Multi-agent
                                  Systems Based on Modal Logics and
                                  Extended Higher Order Petri Nets . . . . 182
                   Gu Erdan and   
                Xu Duanqing and   
                      Chen Chun   An Improved Foreground Extraction
                                  Approach . . . . . . . . . . . . . . . . 191
                Xingshan Li and   
                   Chunwei Yuan   Object Detection Simulating Visual
                                  Attention  . . . . . . . . . . . . . . . 199
              Hazem M. El-Bakry   Fast Face Detection Using Neural
                                  Networks and Image Decomposition . . . . 205
                 Ding Huang and   
                    Wei Lin and   
                       Hong Yan   Modeling of Facial Expressions Using
                                  NURBS Curves . . . . . . . . . . . . . . 216
          Samuel P. M. Choi and   
                 Jiming Liu and   
               Sheung-Ping Chan   Evolutionary Negotiation in
                                  Agent-Mediated Commerce  . . . . . . . . 224
          Andy Hon Wai Chun and   
             Rebecca Y. M. Wong   Optimizing Agent-Based Negotiations with
                                  Branch-and-Bound . . . . . . . . . . . . 235
               Chi Kin Chau and   
                 Kwang Mong Sim   Engineering Fuzzy Constraint
                                  Satisfaction Agents for Multi-user
                                  Timetable Scheduling . . . . . . . . . . 244
             Naoaki Mashita and   
            Hiroshi Shigeno and   
              Yutaka Matsushita   An XML-Based Distance Learning System
                                  Capable of Conveying Information on
                                  ``LECTURE EVENT''  . . . . . . . . . . . 255--267
José A. Macías and   
                 Pablo Castells   An Authoring Tool for Building Adaptive
                                  Learning Guidance Systems on the Web . . 268
                Akira Notsu and   
                Osamu Katai and   
               Hiroshi Kawakami   A Framework of Caring Interaction by a
                                  Network Model of Client's Concepts Based
                                  on a Nursing Theory and Naive
                                  Psychological Approaches . . . . . . . . 279
              Shaobai Zhang and   
              Xiefeng Cheng and   
                   Zhiquan Feng   Parallel Design Based on Neural Network  291
                   Tak-Ming Law   Fair Play Protocol . . . . . . . . . . . 297
               Andreas Mild and   
               Thomas Reutterer   Collaborative Filtering Methods for
                                  Binary Market Basket Data Analysis . . . 302
                  Young-Jun Kim   An Implementation and Design of COMOR
                                  System for OOM Reuse . . . . . . . . . . 314
                         Wei Yi   Automatic Aircraft Recognition Using
                                  Maximum Likelihood Ratio Test  . . . . . 321
                    Nong Ye and   
                   Xiangyang Li   A Machine Learning Algorithm Based on
                                  Supervised Clustering and Classification 327
                    Xiaodong Li   Visualization of a Parallel Genetic
                                  Algorithm in Real Time . . . . . . . . . 335
             Bengt Carlsson and   
                Rune Gustavsson   The Rise and Fall of Napster --- An
                                  Evolutionary Approach  . . . . . . . . . 347
                Saul Simhon and   
                  Gregory Dudek   On the Elaboration of Hand-Drawn
                                  Sketches . . . . . . . . . . . . . . . . 355
               Guoying Zhao and   
                  Xinyuan Huang   The Introduction of Three Methods
                                  Generating Stereoscopic Image  . . . . . 365
              Shangfei Wang and   
                Enhong Chen and   
                    Jing Hu and   
                      Xufa Wang   Kansei-Oriented Image Retrieval  . . . . 377
              T. A. Tavares and   
        A. S. Araújo and   
              G. L. Souza Filho   ICSPACE --- An Internet Cultural Space   389
                      Anonymous   Author Index . . . . . . . . . . . . . . 401


Lecture Notes in Computer Science
Volume 2253, 2001

                Toyoaki Nishida   1. Social Intelligence Design --- An
                                  Overview . . . . . . . . . . . . . . . . 3
             Takeshi Ohguro and   
          Kazuhiro Kuwabara and   
               Tatsuo Owada and   
               Yoshinari Shirai   2. FaintPop: In Touch with the Social
                                  Relationships  . . . . . . . . . . . . . 11
                     A. Nijholt   3. From Virtual Environment to Virtual
                                  Community  . . . . . . . . . . . . . . . 19
                 John C. Thomas   4. Collaborative Innovation Tools  . . . 27
                    R. Fruchter   5. Bricks & Bits & Interaction . . . . . . 35
                   Alain Cardon   6. A Distributed Multi-agent System for
                                  the Self-Evaluation of Dialogs . . . . . 43
          Tomohiro Fukuhara and   
            Toyoaki Nishida and   
                Shunsuke Uemura   7. Public Opinion Channel: a System for
                                  Augmenting Social Intelligence of a
                                  Community  . . . . . . . . . . . . . . . 51
                 Keiichi Nakata   8. Enabling Public Discourse . . . . . . 59
                  R. Luehrs and   
                  T. Malsch and   
                        K. Voss   9. Internet, Discourses, and Democracy   67
              Nobuhiko Fujihara   10. How to Evaluate Social Intelligence
                                  Design . . . . . . . . . . . . . . . . . 75
                 Akira Namatame   11. Overview . . . . . . . . . . . . . . 85
          Setsuya Kurahashi and   
                   Takao Terano   12. Analyzing Norm Emergence in Communal
                                  Sharing via Agent-Based Simulation . . . 88
             Keiki Takadama and   
            Katsunori Shimohara   13. Toward Cumulative Progress in
                                  Agent-Based Simulation . . . . . . . . . 99
                  Kiyoshi Izumi   14. Complexity of Agents and Complexity
                                  of Markets . . . . . . . . . . . . . . . 110
               Hiroshi Sato and   
            Hiroyuki Matsui and   
                   Isao Ono and   
                Hajime Kita and   
               Takao Terano and   
            Hiroshi Deguchi and   
             Yoshinori Shiozawa   15. U-Mart Project: Learning Economic
                                  Principles from the Bottom by Both Human
                                  and Software Agents  . . . . . . . . . . 121
            Rikiya Fukumoto and   
                    Hajime Kita   16. A Multi-objective Genetic Algorithm
                                  Approach to Construction of Trading
                                  Agents for Artificial Market Study . . . 132
            Hideyuki Mizuta and   
               Yoshiki Yamagata   17. Agent-Based Simulation for Economic
                                  and Environmental Studies  . . . . . . . 142
                     Yuji Aruka   18. Avatamsaka Game Experiment as a
                                  Nonlinear Polya Urn Process  . . . . . . 153
                    Keji Suzuki   19. Effects of Punishment into Actions
                                  in Social Agents . . . . . . . . . . . . 162
         Tomohisa Yamashita and   
          Hidenori Kawamura and   
          Masahito Yamamoto and   
                   Azuma Ohuchi   20. Analysis of Norms Game with Mutual
                                  Choice . . . . . . . . . . . . . . . . . 174
                   Sung-Bae Cho   21. Cooperative Co-evolution of
                                  Multi-agents . . . . . . . . . . . . . . 185
                Kazuyo Sato and   
                 Akira Namatame   22. Social Interaction as Knowledge
                                  Trading Games  . . . . . . . . . . . . . 195
          Koichi Kurumatani and   
                   Azuma Ohuchi   23. World Trade League as a Standard
                                  Problem for Multi-agent Economics ---
                                  Concept and Background . . . . . . . . . 208
            Hiroshi Deguchi and   
               Takao Terano and   
          Koichi Kurumatani and   
                Taro Yuzawa and   
          Shigeji Hashimoto and   
            Hiroyuki Matsui and   
               Akio Sashima and   
               Toshiyuki Kaneda   24. Virtual Economy Simulation and
                                  Gaming --An Agent Based Approach-- . . . 218
                Takashi Iba and   
               Yohei Takabe and   
         Yoshihide Chubachi and   
           Junichiro Tanaka and   
          Kenichi Kamihashi and   
            Ryunosuke Tsuya and   
              Satomi Kitano and   
          Masaharu Hirokane and   
             Yoshiaki Matsuzawa   25. Boxed Economy Foundation Model:
                                  Model Framework for Agent-Based Economic
                                  Simulations  . . . . . . . . . . . . . . 227
            Shusaku Tsumoto and   
               Shoji Hirano and   
             Masahiro Inuiguchi   26. Workshop on Rough Set Theory and
                                  Granular Computing --- Summary . . . . . 239
               Zdzis\law Pawlak   27. Bayes' Theorem Revised --- The Rough
                                  Set View . . . . . . . . . . . . . . . . 240
                Andrzej Skowron   28. Toward Intelligent Systems: Calculi
                                  of Information Granules  . . . . . . . . 251
                  Sankar K. Pal   29. Soft Computing Pattern Recognition:
                                  Principles, Integrations, and Data
                                  Mining . . . . . . . . . . . . . . . . . 261
                     P. Guo and   
                   Hideo Tanaka   30. Identifying Upper and Lower
                                  Possibility Distributions with Rough Set
                                  Concept  . . . . . . . . . . . . . . . . 272
                 Lech Polkowski   31. On Fractals in Information Systems:
                                  The First Step . . . . . . . . . . . . . 278
               Sadaaki Miyamoto   32. Generalizations of Fuzzy Multisets
                                  for Including Infiniteness . . . . . . . 283
             Takatsugu Koga and   
           Sadaaki Miyamoto and   
                   Osamu Takata   33. Fuzzy $c$-Means and Mixture
                                  Distribution Model for Clustering Based
                                  on $ L_1 $-Space . . . . . . . . . . . . 289--294
         Masahiro Inuiguchi and   
                 Tetsuzo Tanino   34. On Rough Sets under Generalized
                                  Equivalence Relations  . . . . . . . . . 295
                  Hiroshi Sakai   35. Two Procedures for Dependencies
                                  among Attributes in a Table with
                                  Non-deterministic Information: a Summary 301
               Chi-Hwa Song and   
                    Won Don Lee   36. An Application of Extended Simulated
                                  Annealing Algorithm to Generate the
                                  Learning Data Set for Speech Recognition
                                  System . . . . . . . . . . . . . . . . . 306
                Rolly Intan and   
            Masao Mukaidono and   
                      Y. Y. Yao   37. Generalization of Rough Sets with $
                                  \alpha $-Coverings of the Universe
                                  Induced by Conditional Probability
                                  Relations  . . . . . . . . . . . . . . . 311
                  Y. Y. Yao and   
                       Ying Sai   38. On Mining Ordering Rules . . . . . . 316
               Hideo Tanaka and   
          Kazutomi Sugihara and   
                   Yutaka Maeda   39. Non-additive Measures by Interval
                                  Probability Functions  . . . . . . . . . 322
              Ngoc Thanh Nguyen   40. Susceptibility to Consensus of
                                  Conflict Profiles  . . . . . . . . . . . 327
            Hung Son Nguyen and   
            Andrzej Skowron and   
              Marcin S. Szczuka   41. Analysis of Image Sequences for the
                                  Unmanned Aerial Vehicle  . . . . . . . . 333
           V. Uma Maheswari and   
             Arul Siromoney and   
                   K. M. Mehata   42. The Variable Precision Rough Set
                                  Inductive Logic Programming Model and
                                  Web Usage Graphs . . . . . . . . . . . . 339
               Tomoe Entani and   
         Hidetomo Ichihashi and   
                   Hideo Tanaka   43. Optimistic Priority Weights with an
                                  Interval Comparison Matrix . . . . . . . 344
                  Rafa Deja and   
             Dominik \'Sl\cezak   44. Rough Set Theory in Conflict
                                  Analysis . . . . . . . . . . . . . . . . 349
               Chunnian Liu and   
                     Ning Zhong   45. Dealing with Imperfect Data by
                                  RS--ILP  . . . . . . . . . . . . . . . . 354
            Andrzej Skowron and   
        Jaros\law Stepaniuk and   
                James F. Peters   46. Extracting Patterns Using
                                  Information Granules: a Brief
                                  Introduction . . . . . . . . . . . . . . 359
             Dominik \'Sl\cezak   47. Classification Models Based on
                                  Approximate Bayesian Networks  . . . . . 364
         Yoshiyuki Shinkawa and   
             Masao J. Matsumoto   48. Identifying Adaptable Components ---
                                  A Rough Sets Style Approach  . . . . . . 370
           Zdzis\law Pawlak and   
            James F. Peters and   
            Andrzej Skowron and   
                   Z. Suraj and   
                 S. Ramanna and   
                   M. Borkowski   49. Rough Measures and Integrals: a
                                  Brief Introduction . . . . . . . . . . . 375--379
                  T. Y. Lin and   
                     Eric Louie   50. Association Rules in Semantically
                                  Rich Relations: Granular Computing
                                  Approach . . . . . . . . . . . . . . . . 380
              Tetsuya Murai and   
           Michinori Nakata and   
                 Yoshiharu Sato   51. A Note on Filtration and Granular
                                  Reasoning  . . . . . . . . . . . . . . . 385
              Tetsuya Murai and   
           Michinori Nakata and   
                 Yoshiharu Sato   52. A Note on Conditional Logic and
                                  Association Rules  . . . . . . . . . . . 390
          Rachel L. Freeman and   
    Jerzy W. Grzymala-Busse and   
            Laura A. Riffel and   
           Stephen R. Schroeder   53. Analysis of Self-Injurious Behavior
                                  by the LERS Data Mining System . . . . . 395
               Shoji Hirano and   
            Shusaku Tsumoto and   
           Tomohiro Okuzaki and   
                    Yutaka Hata   54. A Clustering Method for Nominal and
                                  Numerical Data Based on Rough Set Theory 400
               Akinori Kanasugi   55. A Design of Architecture for Rough
                                  Set Processor  . . . . . . . . . . . . . 406
                   Yukio Ohsawa   56. The Scope of Chance Discovery  . . . 413
             Peter McBurney and   
                  Simon Parsons   57. Chance Discovery Using Dialectical
                                  Argumentation  . . . . . . . . . . . . . 414
          Helmut Prendinger and   
               Mitsuru Ishizuka   58. Methodological Considerations on
                                  Chance Discovery . . . . . . . . . . . . 425
          Naohiro Matsumura and   
               Yukio Ohsawa and   
               Mitsuru Ishizuka   59. Future Directions of Communities on
                                  the Web  . . . . . . . . . . . . . . . . 435
              Yutaka Matsuo and   
               Yukio Ohsawa and   
               Mitsuru Ishizuka   60. A Document as a Small World  . . . . 444
            Wataru Sunayama and   
               Masahiko Yachida   61. Support System for Creative Activity
                                  by Information Acquirement through
                                  Internet . . . . . . . . . . . . . . . . 449
           Hirohito Shibata and   
                    Koichi Hori   62. An Approach to Support Long-Term
                                  Creative Thinking and Its Feasibility    455
               Hiroko Shoji and   
                    Koichi Hori   63. Chance Discovery by Creative
                                  Communicators Observed in Real Shopping
                                  Behavior . . . . . . . . . . . . . . . . 462
           Tomoya Horiguchi and   
              Tsukasa Hirashima   64. The Role of Counterexamples in
                                  Discovery Learning Environment:
                                  Awareness of the Chance for Learning . . 468
             Yoshikiyo Kato and   
             Takehisa Yairi and   
                    Koichi Hori   65. Integrating Data Mining Techniques
                                  and Design Information Management for
                                  Failure Prevention . . . . . . . . . . . 475
               Yukio Ohsawa and   
                    Yumiko Nara   66. Action Proposal as Discovery of
                                  Context  . . . . . . . . . . . . . . . . 481
         Takuichi Nishimura and   
                    Ryuichi Oka   67. Retrieval of Similar Time-Series
                                  Patterns for Chance Discovery  . . . . . 486
            Vicenç Torra   68. Fuzzy Knowledge Based Systems and
                                  Chance Discovery . . . . . . . . . . . . 491
                 Takashi Washio   69. JSAI KDD Challenge 2001: JKDD01  . . 499
         Hiromitsu Hatazawa and   
                Hidenao Abe and   
                 Mao Komori and   
         Yoshiaki Tachibana and   
             Takahira Yamaguchi   70. Knowledge Discovery Support from a
                                  Meningoencephalitis Dataset Using an
                                  Automatic Composition Tool for Inductive
                                  Applications . . . . . . . . . . . . . . 500
                   T. B. Ho and   
                S. Kawasaki and   
                   D. D. Nguyen   71. Extracting Meningitis Knowledge by
                                  Integration of Rule Induction and
                                  Association Mining . . . . . . . . . . . 508
             Takayuki Ikeda and   
             Takashi Washio and   
                 Hiroshi Motoda   72. Basket Analysis on Meningitis Data   516
              Ayahiko Niimi and   
                Eiichiro Tazaki   73. Extended Genetic Programming Using
                                  Apriori Algorithm for Rule Discovery . . 525
                  Takashi Okada   74. Medical Knowledge Discovery on the
                                  Meningoencephalitis Diagnosis Studied by
                                  the Cascade Model  . . . . . . . . . . . 533
                 Ning Zhong and   
               Ju-Zhen Dong and   
                  Setsuo Ohsuga   75. Meningitis Data Mining by
                                  Cooperatively Using GDT--RS and RSBR . . 541
                      Anonymous   Author Index . . . . . . . . . . . . . . 549
                      Anonymous   Subject Index  . . . . . . . . . . . . . 551


Lecture Notes in Computer Science
Volume 2254, 2001

                   David Garlan   Aura: Distraction-Free Ubiquitous
                                  Computing  . . . . . . . . . . . . . . . 1
                 Saul Greenberg   Supporting Casual Interaction Between
                                  Intimate Collaborators . . . . . . . . . 3
                     Jef Raskin   Turning the Art of Interface Design into
                                  Engineering  . . . . . . . . . . . . . . 5
                Fabio Patern\`o   Towards a UML for Interactive Systems    7
             Eduard Metzker and   
              Michael Offergeld   An Interdisciplinary Approach for
                                  Successfully Integrating Human-Centered
                                  Design Methods into Development
                                  Processes Practiced by Industrial
                                  Software Development Organizations . . . 19
             Hermann Kaindl and   
                   Rudolf Jezek   From Usage Scenarios to Widget Classes   35
                   Len Bass and   
                 Bonnie E. John   Evaluating Software Architectures for
                                  Usability  . . . . . . . . . . . . . . . 37
             Francis Jambon and   
             Patrick Girard and   
            Yamine A\"\it-ameur   Interactive System Safety and Usability
                                  Enforced with the Development Process    39
                Paul Curzon and   
                  Ann Blandford   Detecting Multiple Classes of User
                                  Errors . . . . . . . . . . . . . . . . . 57
                Nicolas Roussel   Exploring New Uses of Video with
                                  VideoSpace . . . . . . . . . . . . . . . 73
           James S. Willans and   
            Michael D. Harrison   Prototyping Pre-implementation Designs
                                  of Virtual Environment Behaviour . . . . 91
           Donatien Grolaux and   
              Peter Van Roy and   
              Jean Vanderdonckt   QTk --- A Mixed Declarative/Procedural
                                  Approach for Designing Executable User
                                  Interfaces . . . . . . . . . . . . . . . 109
            Emmanuel Dubois and   
             Laurence Nigay and   
               Jocelyne Troccaz   Consistency in Augmented Reality Systems 111
                Kevin Baker and   
             Saul Greenberg and   
                    Carl Gutwin   Heuristic Evaluation of Groupware Based
                                  on the Mechanics of Collaboration  . . . 123
                Scott Henninger   An Organizational Learning Method for
                                  Applying Usability Guidelines and
                                  Patterns . . . . . . . . . . . . . . . . 141
        Lawrence D. Bergman and   
          Tatiana Kichkaylo and   
           Guruduth Banavar and   
                 Jeremy Sussman   Pervasive Application Development and
                                  the WYSIWYG Pitfall  . . . . . . . . . . 157
        Gaëlle Calvary and   
         Joëlle Coutaz and   
                 David Thevenin   A Unifying Reference Framework for the
                                  Development of Plastic User Interfaces   173
              Guy Zimmerman and   
               Julie Barnes and   
                Laura Leventhal   Building User-Controlled $3$D Models and
                                  Animations for Inherently-$3$D
                                  Construction Tasks: Which Tool, Which
                                  Representation?  . . . . . . . . . . . . 193
                Tim Salzman and   
           Szymon Stachniak and   
      Wolfgang Stürzlinger   Unconstrained vs. Constrained $3$D Scene
                                  Manipulation . . . . . . . . . . . . . . 207
        Sanshzar Kettebekov and   
                  Rajeev Sharma   Toward Natural Gesture/Speech Control of
                                  a Large Display  . . . . . . . . . . . . 221
         I. Scott MacKenzie and   
                  Shaidah Jusoh   An Evaluation of Two Input Devices for
                                  Remote Pointing  . . . . . . . . . . . . 235
          Carolyn MacGregor and   
                   Alice Thomas   Does Multi-modal Feedback Help in
                                  Everyday Computing Tasks?  . . . . . . . 251
                 Jörg Roth   Information Sharing with Handheld
                                  Appliances . . . . . . . . . . . . . . . 263
                Philip Gray and   
                    Meurig Sage   Dynamic Links for Mobile Connected
                                  Context-Sensitive Systems  . . . . . . . 281
          Philippe Renevier and   
                 Laurence Nigay   Mobile Collaborative Augmented Reality:
                                  The Augmented Stroll . . . . . . . . . . 299
                Philip Gray and   
                  Daniel Salber   Modelling and Using Sensed Context
                                  Information in the Design of Interactive
                                  Applications . . . . . . . . . . . . . . 317
                Andrew Choi and   
                 Hanan Lutfiyya   Delivering Adaptive Web Content Based on
                                  Client Computing Resources . . . . . . . 337
Minna Mäkäräinen and   
            Johanna Tiitola and   
                   Katja Konkka   How Cultural Needs Affect User Interface
                                  Design?  . . . . . . . . . . . . . . . . 357
                      Anonymous   Author Index . . . . . . . . . . . . . . 359


Lecture Notes in Computer Science
Volume 2255, 2001

                     Chris Abts   COTS-Based Systems (CBS) Functional
                                  Density -- A Heuristic for Better CBS
                                  Design . . . . . . . . . . . . . . . . . 1
             Cecilia Albert and   
                Lisa Brownsword   Meeting the Challenges of
                                  Commercial-Off-The-Shelf (COTS)
                                  Products: The Information Technology
                                  Solutions Evolution Process (ITSEP)  . . 10
                Thomas G. Baker   Lessons Learned Integrating COTS into
                                  Systems  . . . . . . . . . . . . . . . . 21
             Keith Ballurio and   
               Betsy Scalzo and   
                       Lou Rose   Risk Reduction in COTS Software
                                  Selection with BASIS . . . . . . . . . . 31
             Gorka Benguria and   
Ana Belén García and   
              David Sellier and   
                      Sandy Tay   European COTS User Working Group:
                                  Analysis of the Common Problems and
                                  Current Practices of the European COTS
                                  Users  . . . . . . . . . . . . . . . . . 44
          X. Burgués and   
                   C. Estay and   
                  X. Franch and   
               J. A. Pastor and   
                        C. Quer   Combined Selection of COTS Components    54
                   L. Davis and   
                    Rose Gamble   Identifying Evolvability for Integration 65
               John C. Dean and   
                          Li Li   Issues in Developing Security Wrapper
                                  Technology for COTS Software Products    76
     Santiago Comella-Dorda and   
               John C. Dean and   
               Edwin Morris and   
             Patricia Oberndorf   A Process for COTS Software Product
                                  Evaluation . . . . . . . . . . . . . . . 86
                   Anthony Earl   Five Hurdles to the Successful Adoption
                                  of Component-Based COTS in a Corporate
                                  Setting  . . . . . . . . . . . . . . . . 97
                  Jerry Gao and   
                Kamal Gupta and   
              Shalini Gupta and   
                     Simon Shim   On Building Testable Software Components 108
                 Ian Gorton and   
                       Anna Liu   Streamlining the Acquisition Process for
                                  Large-Scale COTS Middleware Components   122
              Sallie Gregor and   
              Joseph Hutson and   
                 Colleen Oresky   Storyboard Process to Assist in
                                  Requirements Verification and Adaptation
                                  to Capabilities Inherent in COTS . . . . 132
    Rhoda Shaller Hornstein and   
             John K. Willoughby   Realizing the Potential for COTS
                                  Utilization: a Work in Progress  . . . . 142
            N. A. M. Maiden and   
                     H. Kim and   
                Cornelius Ncube   Rethinking Process Guidance for
                                  Selecting Software Components  . . . . . 151
           Maurizio Morisio and   
                Marco Torchiano   Definition and Classification of COTS: a
                                  Proposal . . . . . . . . . . . . . . . . 165
            Cornelius Ncube and   
                   John C. Dean   The Limitations of Current
                                  Decision-Making Techniques in the
                                  Procurement of COTS Software Components  176
         Nguyen Thanh Quang and   
         Isabelle Comyn-Wattiau   COTS-Based System Engineering: The
                                  Linguistics Approach . . . . . . . . . . 188
               Jamie Payton and   
Ger\ethur Jónsdóttir and   
               Daniel Flagg and   
                    Rose Gamble   Merging Integration Solutions for
                                  Architecture and Security Mismatch . . . 199--208
               Thomas Pfarr and   
                  James E. Reis   The Integration of COTS/GOTS within
                                  NASA's HST Command and Control System    209
              Robert C. Seacord   Replaceable Components and the Service
                                  Provider Interface . . . . . . . . . . . 222
          Susan K. Semancik and   
              Annette M. Conger   The Standard Autonomous File Server, a
                                  Customized, Off-The-Shelf Success Story  234
             James D. Smith and   
                Duane Hybertson   Implementing Large-Scale COTS
                                  Reengineering within the United States
                                  Department of Defense  . . . . . . . . . 245
                      Anonymous   Author Index . . . . . . . . . . . . . . 257


Lecture Notes in Computer Science
Volume 2256, 2001

                   H. A. Abbass   A Memetic Pareto Evolutionary Approach
                                  to Artificial Neural Networks  . . . . . 1
          Grigoris Antoniou and   
               David Billington   Relating Defeasible and Default Logic    13
                 Luis Rueda and   
                 B. John Oommen   Resolving Minsky's Paradox: The
                                  $d$-Dimensional Normal Distribution Case 25
           Matthew Beaumont and   
               Abdul Sattar and   
              Michael Maher and   
                  John Thornton   Solving Overconstrained Temporal
                                  Reasoning Problems . . . . . . . . . . . 37
            Amy M. Beckwith and   
         Berthe Y. Choueiry and   
                        Hui Zou   How the Level of Interchangeability
                                  Embedded in a Finite Constraint
                                  Satisfaction Problem Affects the
                                  Performance of Search  . . . . . . . . . 50
                  Paul A. Boxer   Towards Learning Naive Physics by Visual
                                  Observation: Qualitative Spatial
                                  Representations  . . . . . . . . . . . . 62
              N. J. Bracken and   
              R. I. (Bob) McKay   Phased Array Sub-beam Optimisation . . . 71
                The Duy Bui and   
                Dirk Heylen and   
                Mannes Poel and   
                  Anton Nijholt   Generation of Facial Expressions from
                                  Emotion Using a Fuzzy Rule Based System  83
             Yungcheol Byun and   
               Sungsoo Yoon and   
              Yeongwoo Choi and   
             Gyeonghwan Kim and   
                  Yillbyung Lee   An Efficient Form Classification Method
                                  Using Partial Matching . . . . . . . . . 95
             Mike Cameron-Jones   Gradient Descent Style Leveraging of
                                  Decision Trees and Stumps for
                                  Misclassification Cost Performance . . . 107
               Samir Chopra and   
                   Dongmo Zhang   Postdiction Problems in Dynamic Logic    119
                    Dan Corbett   A Method for Reasoning with Ontologies
                                  Represented as Conceptual Graphs . . . . 130
                  John Debenham   Selection of Tasks and Delegation of
                                  Responsibility in a Multiagent System
                                  for Emergent Process Management  . . . . 142
                 Norman Foo and   
               Abhaya Nayak and   
           Maurice Pagnucco and   
                   Dongmo Zhang   State Minimization Re-visited  . . . . . 153
                     Tim French   Decidability of Quantified Propositional
                                  Branching Time Logics  . . . . . . . . . 165
                 Gyundo Kee and   
             Yungcheol Byun and   
               Kwanyong Lee and   
                  Yillbyung Lee   Improved Techniques for an Iris
                                  Recognition System with High Performance 177
             Graham Kendall and   
                   Mark Willdig   An Investigation of an Adaptive Poker
                                  Player . . . . . . . . . . . . . . . . . 189
           Abdus Salam Khan and   
                 Achim Hoffmann   Acquiring Adaptation Knowledge for CBR
                                  with MIKAS . . . . . . . . . . . . . . . 201
               Jong Bae Kim and   
               Hye Sun Park and   
                Min Ho Park and   
                  Hang Joon Kim   A Real-Time Region-Based Motion
                                  Segmentation Using Adaptive Thresholding
                                  and $K$-Means Clustering . . . . . . . . 213
                Kyungsu Kim and   
              Jeonghee Jeon and   
               WanKyoo Choi and   
                 Pankoo Kim and   
                     Yo-Sung Ho   Automatic Cell Classification in Human's
                                  Peripheral Blood Images Based on
                                  Morphological Image Processing . . . . . 225
                  Mihye Kim and   
                   Paul Compton   Formal Concept Analysis for
                                  Domain-Specific Document Retrieval
                                  Systems  . . . . . . . . . . . . . . . . 237
             Adam Kowalczyk and   
               Bhavani Raskutti   Learner's Self-Assessment: a Case Study
                                  of SVM for Information Retrieval . . . . 249
        Victor V. Kryssanov and   
             Masayuki Okabe and   
                Koh Kakusho and   
                Michihiko Minoh   A Semiotic Model of Communication and
                                  Its Implications for the Digital City
                                  Development  . . . . . . . . . . . . . . 261
             Achim Hoffmann and   
                   Rex Kwok and   
                   Paul Compton   Simulations for Comparing Knowledge
                                  Acquisition and Machine Learning . . . . 273
               Daniel Hulme and   
                    Shuxiang Xu   Application of Genetic Algorithms to the
                                  Optimisation of Neural Network
                                  Configuration for Stock Market
                                  Forecasting  . . . . . . . . . . . . . . 285
   Jérôme Lang and   
             Pierre Marquis and   
             Mary-Anne Williams   Updating Epistemic States  . . . . . . . 297
                 Michael D. Lee   Fast Text Classification Using
                                  Sequential Sampling Processes  . . . . . 309
             Kendall Lister and   
                  Leon Sterling   Agents in a Multi-cultural World:
                                  Towards Ontological Reconciliation . . . 321
                   Chuchang Liu   Logical Foundations for Reasoning about
                                  Trust in Secure Digital Communication    333
            Ndedi Monekosso and   
                Paolo Remagnino   Phe-Q: a Pheromone Based $Q$-Learning    345
            Tomoko Murakami and   
             Ryohei Orihara and   
                 Naomichi Sueda   Specification of Kansei Patterns in an
                                  Adaptive Perceptual Space  . . . . . . . 356
               Emma Norling and   
                Frank E. Ritter   Embodying the JACK Agent Architecture    368
                Chris Nowak and   
                  Richard Raban   Towards an Ontology of Part-of . . . . . 378
         Vineet Padmanabhan and   
          Guido Governatori and   
                   Abdul Sattar   Actions Made Explicit in BDI . . . . . . 390
        Bernhard Pfahringer and   
            Geoffrey Holmes and   
              Gabi Schmidberger   Wrapping Boosters against Noise  . . . . 402
                  Mark Reynolds   Continuous Temporal Models . . . . . . . 414
                  Walid S. Saba   Language and Commonsense Knowledge . . . 426
                Hee Suk Seo and   
                     Tae Ho Cho   Simulation of Network Security with
                                  Collaboration among IDS Models . . . . . 438
               Bradford Starkie   Programming Spoken Dialogs Using
                                  Grammatical Inference  . . . . . . . . . 449
                  Andy Song and   
             Thomas Loveard and   
                 Vic Ciesielski   Towards Genetic Programming for Texture
                                  Classification . . . . . . . . . . . . . 461
               Markus Stumptner   Using Design Information to Identify
                                  Structural Software Faults . . . . . . . 473
             Adam Szarowicz and   
       Juan Amiguet-Vercher and   
                Peter Forte and   
            Jonathan Briggs and   
          Petros Gelepithis and   
                Paolo Remagnino   The Application of AI to Automatically
                                  Generated Animation  . . . . . . . . . . 487
             Michael Thielscher   Planning with Noisy Actions  . . . . . . 495
            Steven Versteeg and   
                     Alan Blair   Getting the Job Done in a Hostile
                                  Environment  . . . . . . . . . . . . . . 507
                Quoc Bao Vo and   
                  Norman Y. Foo   Solving the Qualification Problem  . . . 519
               Peter Wallis and   
             Helen Mitchard and   
                Jyotsna Das and   
                   Damian O'Dea   Dialogue Modelling for a Conversational
                                  Agent  . . . . . . . . . . . . . . . . . 532
               Geoffrey I. Webb   Candidate Elimination Criteria for Lazy
                                  Bayesian Rules . . . . . . . . . . . . . 545
           Michael Winikoff and   
                Lin Padgham and   
                  James Harland   Simplifying the Development of
                                  Intelligent Agents . . . . . . . . . . . 557
                   Wayne Wobcke   An Operational Semantics for a PRS-Like
                                  Agent Architecture . . . . . . . . . . . 569
               Sungsoo Yoon and   
             Yungcheol Byun and   
             Gyeonghwan Kim and   
              Yeongwoo Choi and   
                  Yillbyung Lee   A Model of Unconstrained Digit
                                  Recognition Based on Hypothesis Testing
                                  and Data Reconstruction  . . . . . . . . 581
              Chengqi Zhang and   
                  Shichao Zhang   Collecting Quality Data for Database
                                  Mining . . . . . . . . . . . . . . . . . 593
              Songmao Zhang and   
               Geoffrey I. Webb   Further Pruning for Efficient
                                  Association Rule Discovery . . . . . . . 605
              Shichao Zhang and   
                  Chengqi Zhang   Pattern Discovery in Probabilistic
                                  Databases  . . . . . . . . . . . . . . . 619
                      Yan Zhang   The Complexity of Logic Program Updates  631
                 Zili Zhang and   
                  Chengqi Zhang   Reasoning with Multimedia Information
                                  Using Symbolic Projection  . . . . . . . 643
                  Didier Dubois   Confidence Relations as a Basis for
                                  Uncertainty Modeling, Plausible
                                  Reasoning, and Belief Revision . . . . . 655
                      Anonymous   Author Index . . . . . . . . . . . . . . 665


Lecture Notes in Computer Science
Volume 2257, 2001

              Catherine Meadows   Using a Declarative Language to Build an
                                  Experimental Analysis Tool . . . . . . . 1
                  Veronica Dahl   How to Talk to Your Computer so that It
                                  Will Listen  . . . . . . . . . . . . . . 3
            Robert S. Boyer and   
              J. Strother Moore   Single-Threaded Objects in ACL2  . . . . 9
           Bharat Jayaraman and   
                 Pallavi Tambay   Modeling Engineering Structures with
                                  Constrained Objects  . . . . . . . . . . 28
                 Chuck C. Liang   Compiler Construction in Higher Order
                                  Logic Programming  . . . . . . . . . . . 47
                Olof Torgersson   Declarative Programming and Clinical
                                  Medicine . . . . . . . . . . . . . . . . 64
                Gopal Gupta and   
               Hai-Feng Guo and   
         Arthur I. Karshmer and   
            Enrico Pontelli and   
     Juan Raymundo Iglesias and   
                Desh Ranjan and   
             Brook Milligan and   
               Nayana Datta and   
             Omar El Khatib and   
           Mohammed Noamany and   
                   Xinhong Zhou   Semantics-Based Filtering: Logic
                                  Programming's Killer App?  . . . . . . . 82
             Erik Johansson and   
           Konstantinos Sagonas   Linear Scan Register Allocation in a
                                  High-Performance Erlang Compiler . . . . 101
                  Morten Rhiger   Compiling Embedded Programs to Byte Code 120
           Ralf Lämmel and   
                   Joost Visser   Typed Combinators for Generic Traversal  137
               Zhanyong Wan and   
                 Walid Taha and   
                     Paul Hudak   Event-Driven FRP . . . . . . . . . . . . 155
               Martin Erwig and   
               Margaret Burnett   Adding Apples and Oranges  . . . . . . . 173
                 Peter Thiemann   WASH/CGI: Server-Side Web Scripting with
                                  Sessions and Typed, Compositional Forms  192
                  Oleg Kiselyov   A Better XML Parser through Functional
                                  Programming  . . . . . . . . . . . . . . 209
             Jerzy Karczmarczuk   Functional Approach to Texture
                                  Generation . . . . . . . . . . . . . . . 225
          John P. Gallagher and   
           Germán Puebla   Abstract Interpretation over
                                  Non-deterministic Finite Tree Automata
                                  for Set-Based Analysis of Logic Programs 243
                  Kish Shen and   
            Joachim Schimpf and   
            Stefano Novello and   
                    Josh Singer   A High-Level Generic Interface to
                                  External Programming Languages for
                                  ECLiPSe  . . . . . . . . . . . . . . . . 262
                Peter Bunus and   
                 Peter Fritzson   A Debugging Scheme for Declarative
                                  Equation Based Modeling Languages  . . . 280
          Ruben Vandeginste and   
       Konstantinos Sagonas and   
                    Bart Demoen   Segment Order Preserving and
                                  Generational Garbage Collection for
                                  Prolog . . . . . . . . . . . . . . . . . 299
                  Rong Yang and   
                  Steve Gregory   Exploiting Efficient Control and Data
                                  Structures in Logic Programs . . . . . . 318
      Luís F. Castro and   
             Terrance Swift and   
                David S. Warren   Suspending and Resuming Computations in
                                  Engines for SLG Evaluation . . . . . . . 332
                      Anonymous   Author Index . . . . . . . . . . . . . . 351


Lecture Notes in Computer Science
Volume 2258, 2001

            Francisco Bueno and   
                 the CLIP Group   Agent Programming in Ciao Prolog . . . . 1
                 Peter A. Flach   Multi-relational Data Mining: a
                                  Perspective  . . . . . . . . . . . . . . 3
                    Vasant Dhar   A Comparison of GLOWER and Other Machine
                                  Learning Methods for Investment Decision
                                  Making . . . . . . . . . . . . . . . . . 5
                 Nuno Amado and   
           João Gama and   
                 Fernando Silva   Parallel Implementation of Decision Tree
                                  Learning Algorithms  . . . . . . . . . . 6
              Pavel Brazdil and   
              Carlos Soares and   
                    Rui Pereira   Reducing Rankings of Classifiers by
                                  Eliminating Redundant Classifiers  . . . 14
Francisco J. Ferrer-Troyano and   
Jesús S. Aguilar-Ruiz and   
        José C. Riquelme   Non-parametric Nearest Neighbor with
                                  Local Adaptation . . . . . . . . . . . . 22
              Pablo Gamallo and   
         Alexandre Agustini and   
               Gabriel P. Lopes   Selection Restrictions Acquisition from
                                  Corpora  . . . . . . . . . . . . . . . . 30
           Viktor Jovanoski and   
                  Nada Lavra\vc   Classification Rule Learning with
                                  APRIORI-C  . . . . . . . . . . . . . . . 44
              S. Nascimento and   
                  B. Mirkin and   
                 F. Moura-Pires   Proportional Membership in Fuzzy
                                  Clustering as a Model of Ideal Types . . 52
            Helmut A. Mayer and   
               Roland Schwaiger   Evolution of Cubic Spline Activation
                                  Functions for Artificial Neural Networks 63
              Joaquim Silva and   
          João Mexia and   
           Carlos A. Coelho and   
                  Gabriel Lopes   Multilingual Document Clustering, Topic
                                  Extraction and Data Transformations  . . 74
              Carlos Soares and   
              Johann Petrak and   
                  Pavel Brazdil   Sampling-Based Relative Landmarks:
                                  Systematically Test-Driving Algorithms
                                  before Choosing  . . . . . . . . . . . . 88
            Elizabeth Tapia and   
José Carlos González and   
Javier García-Villalba and   
                  Julio Villena   Recursive Adaptive ECOC models . . . . . 96
                     Luis Torgo   A Study on End-Cut Preference in Least
                                  Squares Regression Trees . . . . . . . . 104
           Pedro de Almeida and   
              Luís Torgo   The Use of Domain Knowledge in Feature
                                  Construction for Financial Time Series
                                  Prediction . . . . . . . . . . . . . . . 116
          Thomas Hellström   Optimizing the Sharpe Ratio for a Rank
                                  Based Trading System . . . . . . . . . . 130
               Luis Antunes and   
          João Faria and   
                  Helder Coelho   Choice: The Key for Autonomy . . . . . . 142
           Rachel A. Bourne and   
                Karen Shoop and   
           Nicholas R. Jennings   Dynamic Evaluation of Coordination
                                  Mechanisms for Autonomous Agents . . . . 155
      Pierangelo Dell'Acqua and   
João Alexandre Leite and   
      Luís Moniz Pereira   Evolving Multi-agent Viewpoints --- An
                                  Architecture . . . . . . . . . . . . . . 169
      Pierangelo Dell'Acqua and   
      Luís Moniz Pereira   Enabling Agents to Update their
                                  Knowledge and to Prefer  . . . . . . . . 183
            Virginia Dignum and   
                   Frank Dignum   Modelling Agent Societies: Co-ordination
                                  Frameworks and Institutions  . . . . . . 191
          Benedita Malheiro and   
        Eugénio Oliveira   Argumentation as Distributed Belief
                                  Revision: Conflict Resolution in
                                  Decentralised Co-operative Multi-agent
                                  Systems  . . . . . . . . . . . . . . . . 205
               Joaquim Reis and   
                    Nuno Mamede   Scheduling, Re-scheduling and
                                  Communication in the Multi-agent
                                  Extended Enterprise Environment  . . . . 219
            Ana Paula Rocha and   
        Eugénio Oliveira   Electronic Institutions as a Framework
                                  for Agents' Negotiation and Mutual
                                  Commitment . . . . . . . . . . . . . . . 232
               Goran Trajkovski   An Imitation-Based Approach to Modeling
                                  Homogeneous Agents Societies . . . . . . 246
          Patrick Blackburn and   
                 Jaap Kamps and   
                   Maarten Marx   Situation Calculus as Hybrid Logic:
                                  First Steps  . . . . . . . . . . . . . . 253
    João Alexandre Leite   A Modified Semantics for LUPS  . . . . . 261
João Alexandre Leite and   
José Júlio Alferes and   
      Luís Moniz Pereira   On the Use of Multi-dimensional Dynamic
                                  Logic Programming to Represent Societal
                                  Agents' Viewpoints . . . . . . . . . . . 276
        Jesús Medina and   
        Manuel Ojeda-Aciego and   
            Peter Vojtás   A Procedural Semantics for Multi-adjoint
                                  Logic Programming  . . . . . . . . . . . 290
              Julio Pacheco and   
         M. a Teresa Escrig and   
               Francisco Toledo   Representing and Reasoning on
                                  Three-Dimensional Qualitative
                                  Orientation Point Objects  . . . . . . . 298
               David Pearce and   
               Hans Tompits and   
                 Stefan Woltran   Encodings for Equilibrium Logic and
                                  Logic Programs with Nested Expressions   306
               Sabine Broda and   
              Luís Damas   A Context-Free Grammar Representation
                                  for Normal Inhabitants of Types in \bf
                                  TA$_\lambda $  . . . . . . . . . . . . . 321
             Maria R. Cravo and   
     João P. Cachopo and   
             Ana C. Cachopo and   
         João P. Martins   Permissive Belief Revision . . . . . . . 335
                 Jorge Cruz and   
                 Pedro Barahona   Global Hull Consistency with Local
                                  Search for Continuous Constraint Solving 349
           Inês Lynce and   
       Luís Baptista and   
      João Marques-Silva   Towards Provably Complete Stochastic
                                  Search Algorithms for Satisfiability . . 363
             Elias Oliveira and   
               Barbara M. Smith   A Combined Constraint-Based Search
                                  Method for Single-Track Railway
                                  Scheduling Problem . . . . . . . . . . . 371
            Antonio Garrido and   
        Eva Onaindía and   
                Federico Barber   A Temporal Planning System for
                                  Time-Optimal Planning  . . . . . . . . . 379
               Eva Onaindia and   
               Oscar Sapena and   
             Laura Sebastia and   
                  Eliseo Marzal   SimPlanner: An Execution-Monitoring
                                  System for Replanning in Dynamic Worlds  393
                   Bhanu Prasad   Hybrid Hierarchical Knowledge
                                  Organization for Planning  . . . . . . . 401
                L. Sebastia and   
                E. Onaindia and   
                      E. Marzal   STeLLa : An Optimal Sequential and
                                  Parallel Planner . . . . . . . . . . . . 409
                      Anonymous   Author Index . . . . . . . . . . . . . . 417


Lecture Notes in Computer Science
Volume 2259, 2001

              Scott Fluhrer and   
               Itsik Mantin and   
                     Adi Shamir   Weaknesses in the Key Scheduling
                                  Algorithm of RC4 . . . . . . . . . . . . 1
              Philip Hawkes and   
                Frank Quick and   
                Gregory G. Rose   A Practical Cryptanalysis of SSC2  . . . 25
              Scott Fluhrer and   
                   Stefan Lucks   Analysis of the $ E_0 $ Encryption
                                  System . . . . . . . . . . . . . . . . . 38--48
                Amr Youssef and   
                     Guang Gong   Boolean Functions with Large Distance to
                                  All Bijective Monomials: $N$ Odd Case    49
               Enes Pasalic and   
                Subhamoy Maitra   Linear Codes in Constructing Resilient
                                  Functions with High Nonlinearity . . . . 60
                Tetsu Iwata and   
         Takayuki Yoshiwara and   
                 Kaoru Kurosawa   New Covering Radius of Reed--Muller
                                  Codes for $t$-Resilient Functions  . . . 75
               Paolo D'Arco and   
                Douglas Stinson   Generalized Zig-zag Functions and
                                  Oblivious Transfer Reductions  . . . . . 87
             Niels Ferguson and   
         Richard Schroeppel and   
                   Doug Whiting   A Simple Algebraic Representation of
                                  Rijndael . . . . . . . . . . . . . . . . 103
               Liam Keliher and   
                Henk Meijer and   
               Stafford Tavares   Improving the Upper Bound on the Maximum
                                  Average Linear Hull Probability for
                                  Rijndael . . . . . . . . . . . . . . . . 112
            Aggelos Kiayias and   
                      Moti Yung   Polynomial Reconstruction Based
                                  Cryptography . . . . . . . . . . . . . . 129
                     Brian King   An Improved Implementation of Elliptic
                                  Curves over GF (2) when Using Projective
                                  Point Arithmetic . . . . . . . . . . . . 134
Jean-Sébastien Coron and   
           David M'Ra\"\ihi and   
               Christophe Tymen   Fast Generation of Pairs $ (k, [k]{P}) $
                                  for Koblitz Elliptic Curves  . . . . . . 151
               Bodo Möller   Algorithms for Multi-exponentiation  . . 165
               Florian Hess and   
            Gadiel Seroussi and   
                 Nigel P. Smart   Two Topics in Hyperelliptic Cryptography 181
        Håvard Raddum and   
                Lars R. Knudsen   A Differential Attack on Reduced-Round
                                  SC2000 . . . . . . . . . . . . . . . . . 190
                   Pascal Junod   On the Complexity of Matsui's Attack . . 199
                Fabian Kuhn and   
             René Struik   Random Walks Revisited: Extensions of
                                  Pollard's Rho Algorithm for Computing
                                  Multiple Discrete Logarithms . . . . . . 212
      Arash Reyhani-Masoleh and   
                 M. Anwar Hasan   Fast Normal Basis Multiplication Using
                                  General Purpose Processors . . . . . . . 230
      Gurgen H. Khachatrian and   
         Melsik K. Kuregian and   
          Karen R. Ispiryan and   
                James L. Massey   Fast Multiplication of Integers for
                                  Public-Key Applications  . . . . . . . . 245
                  Toru Akishita   Fast Simultaneous Scalar Multiplication
                                  on Elliptic Curve with Montgomery Form   255
             Yasuyuki Sakai and   
                Kouichi Sakurai   On the Power of Multidoubling in
                                  Speeding Up Elliptic Scalar
                                  Multiplication . . . . . . . . . . . . . 268
                 Guang Gong and   
                  Lein Harn and   
                     Huapeng Wu   The GH Public-Key Cryptosystem . . . . . 284
                Seongan Lim and   
               Seungjoo Kim and   
                 Ikkwon Yie and   
                Jaemoon Kim and   
                    Hongsub Lee   XTR Extended to GF$ (p^{6m}) $ . . . . . 301--312
                Phong Q. Nguyen   The Two Faces of Lattices in Cryptology  313
              Bert den Boer and   
            Bart Van Rompay and   
               Bart Preneel and   
                Joos Vandewalle   New (Two-Track-)MAC Based on the Two
                                  Trails of RIPEMD . . . . . . . . . . . . 314
       Johannes Blömer and   
                  Alexander May   Key Revocation with Interval Cover
                                  Families . . . . . . . . . . . . . . . . 325
                      Wenbo Mao   Timed-Release Cryptography . . . . . . . 342
                      Anonymous   Author Index . . . . . . . . . . . . . . 359


Lecture Notes in Computer Science
Volume 2260, 2001

                    A. Al Jabri   A Statistical Decoding Algorithm for
                                  General Linear Block Codes . . . . . . . 1
            Christoph Lange and   
                 Andreas Ahrens   On the Undetected Error Probability for
                                  Shortened Hamming Codes on Channels with
                                  Memory . . . . . . . . . . . . . . . . . 9
                     Irfan Siap   The Complete Weight Enumerator for Codes
                                  over $ \mathcal {M}_{n \times s}(\bbb
                                  {F}_q) $ . . . . . . . . . . . . . . . . 20--26
               Maki Yoshida and   
                  Toru Fujiwara   Further Improvement of
                                  Kumar-Rajagopalan-Sahai Coding
                                  Constructions for Blacklisting Problem   27
                Simon Hirst and   
                  Bahram Honary   A Simple Soft-Input/Soft-Output Decoder
                                  for Hamming Codes  . . . . . . . . . . . 38
            Manfred von Willich   A Technique with an
                                  Information-Theoretic Basis for
                                  Protecting Secret Data from Differential
                                  Power Attacks  . . . . . . . . . . . . . 44
               Karl Brincat and   
              Chris J. Mitchell   Key Recovery Attacks on MACs Based on
                                  Properties of Cryptographic APIs . . . . 63
                    N. P. Smart   The Exact Security of ECIES in the
                                  Generic Group Model  . . . . . . . . . . 73
                Eric Filiol and   
              Caroline Fontaine   A New Ultrafast Stream Cipher Design:
                                  COS Ciphers  . . . . . . . . . . . . . . 85
                  Marc Joye and   
        Jean-Jacques Quisquater   On Rabin-Type Signatures . . . . . . . . 99
               Seungjoo Kim and   
             Jung Hee Cheon and   
                  Marc Joye and   
                Seongan Lim and   
             Masahiro Mambo and   
                 Dongho Won and   
                  Yuliang Zheng   Strong Adaptive Chosen-Ciphertext
                                  Attacks with Memory Dump (or: The
                                  Importance of the Order of Decryption
                                  and Validation)  . . . . . . . . . . . . 114
F. Javier Galán-Simón and   
 Edgar Martínez-Moro and   
             Juan G. Tena-Ayuso   Majority-Logic-Decodable Cyclic
                                  Arithmetic-Modular AN-Codes in $1$, $2$,
                                  and $L$ Steps  . . . . . . . . . . . . . 128
             David J. C. MacKay   Almost-Certainly Runlength-Limiting
                                  Codes  . . . . . . . . . . . . . . . . . 138
            Jort van Mourik and   
                 David Saad and   
            Yoshiyuki Kabashima   Weight vs. Magnetization Enumerator for
                                  Gallager Codes . . . . . . . . . . . . . 148
                J. T. Paire and   
                 P. Coulton and   
                  P. G. Farrell   Graph Configurations and Decoding
                                  Performance  . . . . . . . . . . . . . . 158
               P. Benachour and   
              P. G. Farrell and   
                  Bahram Honary   A Line Code Construction for the Adder
                                  Channel with Rates Higher than
                                  Time-Sharing . . . . . . . . . . . . . . 166
           Ahmed Al-Dabbagh and   
                Michael Darnell   The Synthesis of TD-Sequences and Their
                                  Application to Multi-functional
                                  Communication Systems  . . . . . . . . . 176
              Svetla Nikova and   
               Ventzislav Nikov   Improvement of the Delsarte Bound for $
                                  \tau $-Designs in Finite Polynomial
                                  Metric Spaces  . . . . . . . . . . . . . 191
                  Shujun Li and   
                      Qi Li and   
                  Wenmin Li and   
                Xuanqin Mou and   
                   Yuanlong Cai   Statistical Properties of Digital
                                  Piecewise Linear Chaotic Maps and Their
                                  Roles in Cryptography and Pseudo-Random
                                  Coding . . . . . . . . . . . . . . . . . 205
                Joan Daemen and   
                 Vincent Rijmen   The Wide Trail Design Strategy . . . . . 222
           Niklas Borselius and   
          Chris J. Mitchell and   
                   Aaron Wilson   Undetachable Threshold Signatures  . . . 239
           Werner Schindler and   
     François Koeune and   
        Jean-Jacques Quisquater   Improving Divide and Conquer Attacks
                                  against Cryptosystems by Better Error
                                  Detection/Correction Strategies  . . . . 245
        Konstantinos Rantos and   
              Chris J. Mitchell   Key Recovery Scheme Interoperability ---
                                  A Protocol for Mechanism Negotiation . . 268
                Cyril Prissette   Unconditionally Secure Key Agreement
                                  Protocol . . . . . . . . . . . . . . . . 277
                N. Komninos and   
              Bahram Honary and   
                Michael Darnell   An Efficient Stream Cipher Alpha1 for
                                  Mobile and Wireless Devices  . . . . . . 294
                Viktoriya Masol   Investigation of Linear Codes Possessing
                                  Some Extra Properties  . . . . . . . . . 301
                 David Saad and   
        Yoshiyuki Kabashima and   
           Tatsuto Murayama and   
                 Renato Vicente   Statistical Physics of Low Density
                                  Parity Check Error Correcting Codes  . . 307
        Kenneth J. Giuliani and   
                     Guang Gong   Generating Large Instances of the
                                  Gong-Harn Cryptosystem . . . . . . . . . 317
               P. A. Crouch and   
                J. H. Davenport   Lattice Attacks on RSA-Encrypted IP and
                                  TCP  . . . . . . . . . . . . . . . . . . 329
              Matthew G. Parker   Spectrally Bounded Sequences, Codes, and
                                  States: Graph Constructions and
                                  Entanglement . . . . . . . . . . . . . . 339
           Willi Geiselmann and   
          Rainer Steinwandt and   
                    Thomas Beth   Attacking the Affine Parts of SFLASH . . 355
                 Clifford Cocks   An Identity Based Encryption Scheme
                                  Based on Quadratic Residues  . . . . . . 360
               Lejla Batina and   
                 Geeke Muurling   Another Way of Doing RSA Cryptography in
                                  Hardware . . . . . . . . . . . . . . . . 364
Julio César Hernández and   
José María Sierra and   
           Arturo Ribagorda and   
      Benjamín Ramos and   
               J. C. Mex-Perera   Distinguishing TEA from a Random
                                  Permutation: Reduced Round Versions of
                                  TEA Do Not Have the SAC or Do Not
                                  Generate Random Numbers  . . . . . . . . 374--377
       Seyed J. Tabatabaian and   
               Sam Ikeshiro and   
             Murat Gumussoy and   
               Mungal S. Dhanda   A New Search Pattern in Multiple Residue
                                  Method (MRM) and Its Importance in the
                                  Cryptanalysis of the RSA . . . . . . . . 378
               Lee Jongkook and   
               Ryu Shiryong and   
              Kim Jeungseop and   
                   Yoo Keeyoung   A New Undeniable Signature Scheme Using
                                  Smart Cards  . . . . . . . . . . . . . . 387
            Alexandr Y. Lev and   
               Yuliy A. Lev and   
       Vyacheslav N. Okhrymenko   Non-binary Block Inseparable Errors
                                  Control Codes  . . . . . . . . . . . . . 395
           Sabine Leveiller and   
             Joseph Boutros and   
           Philippe Guillot and   
            Gilles Zémor   Cryptanalysis of Nonlinear Filter
                                  Generators with $ \{ 0, 1 \} $-Metric
                                  Viterbi Decoding . . . . . . . . . . . . 402
                      Anonymous   Author Index . . . . . . . . . . . . . . 415


Lecture Notes in Computer Science
Volume 2262, 2001

              Peter Müller   1. Introduction  . . . . . . . . . . . . 1
              Peter Müller   2. Mojave and the Universe Type System   39
              Peter Müller   3. The Semantics of Mojave . . . . . . . 77
              Peter Müller   4. Modular Specification and
                                  Verification of Functional Behavior  . . 123
              Peter Müller   5. Modular Specification and
                                  Verification of Frame Properties . . . . 143
              Peter Müller   6. Modular Specification and
                                  Verification of Type Invariants  . . . . 195
              Peter Müller   7. Conclusion  . . . . . . . . . . . . . 213
              Peter Müller   A. Formal Background and Notations . . . 223
              Peter Müller   B. Predefined Type Declarations  . . . . 227
              Peter Müller   C. Examples  . . . . . . . . . . . . . . 229
              Peter Müller   D. Auxiliary Lemmas, Proofs, and Models  237
                      Anonymous   Bibliography . . . . . . . . . . . . . . 271
                      Anonymous   List of Figures  . . . . . . . . . . . . 285
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 287


Lecture Notes in Computer Science
Volume 2263, 2001

                     Bran Selic   Introduction . . . . . . . . . . . . . . 1
                 Tony Clark and   
                 Andy Evans and   
                    Stuart Kent   A Meta-model Facility for a Family of
                                  UML Constraint Languages . . . . . . . . 4
               Andy Schürr   A New Type Checking Approach for OCL
                                  Version 2.0 ?  . . . . . . . . . . . . . 21
              Mark Richters and   
                 Martin Gogolla   OCL: Syntax, Semantics, and Tools  . . . 42
             Rolf Hennicker and   
          Heinrich Hussmann and   
                  Michel Bidoit   On the Precise Meaning of OCL
                                  Constraints  . . . . . . . . . . . . . . 69
             Martin Gogolla and   
                  Mark Richters   Expressing UML Class Diagrams Properties
                                  with OCL . . . . . . . . . . . . . . . . 85
                 Steve Cook and   
              Anneke Kleppe and   
           Richard Mitchell and   
             Bernhard Rumpe and   
                 Jos Warmer and   
                     Alan Wills   The Amsterdam Manifesto on OCL . . . . . 115
              Stephan Flake and   
               Wolfgang Mueller   An OCL Extension for Real-Time
                                  Constraints  . . . . . . . . . . . . . . 150
                   John Knapman   Statistical Constraints and Verification 172
                 Bernhard Rumpe   $ \ll $Java$ \gg $OCL Based on New
                                  Presentation of the OCL-Syntax . . . . . 189
              Anneke Kleppe and   
                     Jos Warmer   The Semantics of the OCL Action Clause   213
                Stuart Kent and   
                     John Howse   Constraint Trees . . . . . . . . . . . . 228
              Shane Sendall and   
              Alfred Strohmeier   Using OCL and UML to Specify System
                                  Behavior . . . . . . . . . . . . . . . . 250
                      Anonymous   Author Index . . . . . . . . . . . . . . 281


Lecture Notes in Computer Science
Volume 2264, 2001

                Juraj Hromkovic   Randomized Communication Protocols (A
                                  Survey)  . . . . . . . . . . . . . . . . 1
               Thilo Mahnig and   
          Heinz Mühlenbein   Optimal Mutation Rate Using Bayesian
                                  Priors for Estimation of Distribution
                                  Algorithms . . . . . . . . . . . . . . . 33
        Stephen Fitzpatrick and   
               Lambert Meertens   An Experimental Assessment of a
                                  Stochastic, Anytime, Decentralized, Soft
                                  Colourer for Sparse Graphs . . . . . . . 49
               Martin Sauerhoff   Randomized Branching Programs  . . . . . 65
          Philippe Codognet and   
                    Daniel Diaz   Yet Another Local Search Method for
                                  Constraint Solving . . . . . . . . . . . 73
                   Carlo Meloni   An Evolutionary Algorithm for the
                                  Sequence Coordination in Furniture
                                  Production . . . . . . . . . . . . . . . 91
                 Jan Poland and   
        Kosmas Knödler and   
         Alexander Mitterer and   
        Thomas Fleischhauer and   
           Frank Zuber-Goos and   
                   Andreas Zell   Evolutionary Search for Smooth Maps in
                                  Motor Control Unit Calibration . . . . . 107
              Gregory B. Sorkin   Some Notes on Random Satisfiability  . . 117
                Uwe Naumann and   
              Peter Gottschling   Prospects for Simulated Annealing
                                  Algorithms in Automatic Differentiation  131
             Henning Behnke and   
            Michael Kolonko and   
             Ulrich Mertins and   
               Stefan Schnitter   Optimization and Simulation: Sequential
                                  Packing of Flexible Objects Using
                                  Evolutionary Algorithms  . . . . . . . . 145
                Thomas Zeugmann   Stochastic Finite Learning . . . . . . . 155
           Ricard Gavald\`a and   
                 Osamu Watanabe   Sequential Sampling Algorithms: Unified
                                  Analysis and Lower Bounds  . . . . . . . 173
                Peter Damaschke   Approximate Location of Relevant
                                  Variables under the Crossover
                                  Distribution . . . . . . . . . . . . . . 189
                      Anonymous   Author Index . . . . . . . . . . . . . . 203


Lecture Notes in Computer Science
Volume 2267, 2001

                 R. Bardohl and   
       M. Große-Rhode and   
                     M. Simeoni   Interactive Rule-Based Specification
                                  with an Application to Visual Language
                                  Definition . . . . . . . . . . . . . . . 1
              Michel Bidoit and   
             Alexandre Boisseau   Algebraic Abstractions . . . . . . . . . 21
                 C. Caleiro and   
                  P. Mateus and   
                   J. Ramos and   
                    A. Sernadas   Combining Logics: Parchments Revisited   48
      J. Félix Costa and   
             H. Lourenço   Canonical Institutions of Behaviour  . . 71
               Walter Dosch and   
           Sönke Magnussen   The Lübeck Transformation System: a
                                  Transformation System for Equational
                                  Higher Order Algebraic Specifications    85
             Maike Gajewsky and   
      Francesco Parisi-Presicce   On the Compatibility of Model and
                                  Model-Class Transformations  . . . . . . 109
                   N. A. Harman   Verifying a Simple Pipelined
                                  Microprocessor Using Maude . . . . . . . 128
                  Piotr Hoffman   Verifying Architectural Specifications   152
              Franck Ledoux and   
            Agn\`es Arnould and   
            Pascale Le Gall and   
                  Yves Bertrand   Geometric Modelling with CASL  . . . . . 176
       Antónia Lopes and   
         Michel Wermelinger and   
      José Luiz Fiadeiro   A Compositional Approach to Connector
                                  Construction . . . . . . . . . . . . . . 201
           Till Mossakowski and   
                    Bartek Klin   Institution Independent Static Analysis
                                  for C ASL  . . . . . . . . . . . . . . . 221
            Fernando Orejas and   
              Hartmut Ehrig and   
                    Elvira Pino   Tight and Loose Semantics for
                                  Transformation Systems . . . . . . . . . 238
            Wies\law Paw\lowski   Presentations for Abstract Context
                                  Institutions . . . . . . . . . . . . . . 256
              Iman Poernomo and   
           John N. Crossley and   
                 Martin Wirsing   Programs, Proofs and Parametrized
                                  Specifications . . . . . . . . . . . . . 280
          Markus Roggenbach and   
             Lutz Schröder   Towards Trustworthy Specifications I:
                                  Consistency Checks . . . . . . . . . . . 305
                Donald Sannella   The Common Framework Initiative for
                                  Algebraic Specification and Development
                                  of Software: Recent Progress . . . . . . 328
                      Anonymous   Author Index . . . . . . . . . . . . . . 345


Lecture Notes in Computer Science
Volume 2271, 2001

          Burton S. Kaliski Jr.   On Hash Function Firewalls in Signature
                                  Schemes  . . . . . . . . . . . . . . . . 1
                  Marc Joye and   
    Jean-Jacques Quisquater and   
              Sung-Ming Yen and   
                      Moti Yung   Observability Analysis --- Detecting
                                  When Improved Cryptosystems Fail . . . . 17
                Colin D. Walter   Precise Bounds for Montgomery Modular
                                  Multiplication and Some Potentially
                                  Insecure RSA Moduli  . . . . . . . . . . 30
               Lejla Batina and   
                 Geeke Muurling   Montgomery in Practice: How to Do It
                                  More Efficiently in Hardware . . . . . . 40
                Colin D. Walter   M IST : An Efficient, Randomized
                                  Exponentiation Algorithm for Resisting
                                  Power Analysis . . . . . . . . . . . . . 53
     Johannes Wolkerstorfer and   
           Elisabeth Oswald and   
                Mario Lamberger   An ASIC Implementation of the AES SBoxes 67
                  Marc Fischlin   On the Impossibility of Constructing
                                  Non-interactive Statistically-Secret
                                  Protocols from Any Trapdoor One-Way
                                  Function . . . . . . . . . . . . . . . . 79
              Marc Fischlin and   
                 Roger Fischlin   The Representation Problem Based on
                                  Factoring  . . . . . . . . . . . . . . . 96
                 John Black and   
                Phillip Rogaway   Ciphers with Arbitrary Finite Domains    114
              Atsuko Miyaji and   
               Masao Nonaka and   
                Yoshinori Takii   Known Plaintext Correlation Attack
                                  against RC5  . . . . . . . . . . . . . . 131
              Silvio Micali and   
               Ronald L. Rivest   Micropayments Revisited  . . . . . . . . 149
           Markus Jakobsson and   
                  Ari Juels and   
                Phong Q. Nguyen   Proprietary Certificates . . . . . . . . 164
          Giuseppe Ateniese and   
           Cristina Nita-Rotaru   Stateless-Recipient Certified E-Mail
                                  System Based on Verifiable Encryption    182
        Steven D. Galbraith and   
                  Wenbo Mao and   
            Kenneth G. Paterson   RSA-Based Undeniable Signatures for
                                  General Moduli . . . . . . . . . . . . . 200
              Greg Maitland and   
                     Colin Boyd   Co-operatively Formed Group Signatures   218
              Silvio Micali and   
               Ronald L. Rivest   Transitive Signature Schemes . . . . . . 236
             Robert Johnson and   
               David Molnar and   
                  Dawn Song and   
                   David Wagner   Homomorphic Signature Schemes  . . . . . 244
Jean-Sébastien Coron and   
           Helena Handschuh and   
                  Marc Joye and   
            Pascal Paillier and   
          David Pointcheval and   
               Christophe Tymen   GEM: a Generic Chosen-Ciphertext Secure
                                  Encryption Method  . . . . . . . . . . . 263
                   Masayuki Abe   Securing ``Encryption $+$ Proof of
                                  Knowledge'' in the Random Oracle Model   277
                   Qi Cheng and   
             Shigenori Uchiyama   Nonuniform Polynomial Time Algorithm to
                                  Solve Decisional Diffie--Hellman Problem
                                  in Finite Fields under Conjecture  . . . 290
               Cheng-Fen Lu and   
        ShiuhPyng Winston Shieh   Secure Key-Evolving Protocols for
                                  Discrete Logarithm Schemes . . . . . . . 300
                      Anonymous   Author Index . . . . . . . . . . . . . . 311


Lecture Notes in Computer Science
Volume 2273, 2001

                    James Allan   Perspectives on Information Retrieval
                                  and Speech . . . . . . . . . . . . . . . 1
              Eric W. Brown and   
                  Anni R. Coden   Capitalization Recovery for Text . . . . 11
            Oktay Ibrahimov and   
               Ishwar Sethi and   
              Nevenka Dimitrova   Clustering of Imperfect Transcripts
                                  Using a Novel Similarity Measure . . . . 23
      Alain Désilets and   
            Berry de Bruijn and   
                    Joel Martin   Extracting Keyphrases from Spoken Audio
                                  Documents  . . . . . . . . . . . . . . . 36
                     Klaus Ries   Segmenting Conversations by Topic,
                                  Initiative, and Style  . . . . . . . . . 51
                 Jing Huang and   
             Geoffrey Zweig and   
             Mukund Padmanabhan   Extracting Caller Information from
                                  Voicemail  . . . . . . . . . . . . . . . 67
             Mark Sanderson and   
                 Xiao Mang Shou   Speech and Hand Transcribed Retrieval    78
                Jinmook Kim and   
                Douglas W. Oard   The Use of Speech Retrieval Systems: a
                                  Study Design . . . . . . . . . . . . . . 86
              Atsushi Fujii and   
              Katunobu Itou and   
               Tetsuya Ishikawa   Speech-Driven Text Retrieval: Using
                                  Target IR Collections for Statistical
                                  Language Model Adaptation in Speech
                                  Recognition  . . . . . . . . . . . . . . 94
              Eric W. Brown and   
                  Anni R. Coden   WASABI: Framework for Real-Time Speech
                                  Analysis Applications (Demo) . . . . . . 105
                      Anonymous   Author Index . . . . . . . . . . . . . . 109


Lecture Notes in Computer Science
Volume 2274, 2001

            Kouichi Sakurai and   
                Tsuyoshi Takagi   New Semantically Secure Public-Key
                                  Cryptosystems from the RSA-Primitive . . 1
Jean-Sébastien Coron and   
           Helena Handschuh and   
                  Marc Joye and   
            Pascal Paillier and   
          David Pointcheval and   
               Christophe Tymen   Optimal Chosen-Ciphertext Secure
                                  Encryption of Arbitrary-Length Messages  17
                Takeshi Koshiba   On Sufficient Randomness for Secure
                                  Public-Key Cryptosystems . . . . . . . . 34
                 Kaoru Kurosawa   Multi-recipient Public-Key Encryption
                                  with Shortened Ciphertext  . . . . . . . 48
           Goichiro Hanaoka and   
              Junji Shikata and   
              Yuliang Zheng and   
                    Hideki Imai   Efficient and Unconditionally Secure
                                  Digital Signatures and a Security
                                  Analysis of a Multireceiver
                                  Authentication Code  . . . . . . . . . . 64
              Joonsang Baek and   
              Ron Steinfeld and   
                  Yuliang Zheng   Formal Proofs for the Security of
                                  Signcryption . . . . . . . . . . . . . . 80
              Greg Maitland and   
                     Colin Boyd   A Provably Secure Restrictive Partially
                                  Blind Signature Scheme . . . . . . . . . 99
               Masayuki Abe and   
                Koutarou Suzuki   $ {M} $ +1-st Price Auction Using
                                  Homomorphic Encryption . . . . . . . . . 115
         Ivan Damgård and   
                     Mads Jurik   Client/Server Tradeoffs for Online
                                  Elections  . . . . . . . . . . . . . . . 125
            Aggelos Kiayias and   
                      Moti Yung   Self-tallying Elections and Perfect
                                  Ballot Secrecy . . . . . . . . . . . . . 141
                 Wen-Guey Tzeng   Efficient $1$-Out-$n$ Oblivious Transfer
                                  Schemes  . . . . . . . . . . . . . . . . 159
             Kaoru Kurosawa and   
                 Takuya Yoshida   Linear Code Implies Public-Key Traitor
                                  Tracing  . . . . . . . . . . . . . . . . 172
                Chan H. Lee and   
               Xiaotie Deng and   
                     Huafei Zhu   Design and Security Analysis of
                                  Anonymous Group Identification Protocols 188
    Michaël Quisquater and   
               Bart Preneel and   
                Joos Vandewalle   On the Security of the Threshold Scheme
                                  Based on the Chinese Remainder Theorem   199
           Nicolas Courtois and   
               Louis Goubin and   
                Willi Meier and   
             Jean-Daniel Tacier   Solving Underdefined Systems of
                                  Multivariate Quadratic Equations . . . . 211
           Arjen K. Lenstra and   
            Igor E. Shparlinski   Selective Forgery of RSA Signatures with
                                  Fixed-Pattern Padding  . . . . . . . . . 228
            Kazukuni Kobara and   
                    Hideki Imai   New Chosen-Plaintext Attacks on the
                                  One-Wayness of the Modified McEliece PKC
                                  Proposed at Asiacrypt 2000 . . . . . . . 237
                    Roman Novak   SPA-Based Adaptive Chosen-Ciphertext
                                  Attack on RSA Implementation . . . . . . 252
               Werner Schindler   A Combined Timing and Power Attack . . . 263
                Tetsuya Izu and   
                Tsuyoshi Takagi   A Fast Parallel Elliptic Curve
                                  Multiplication Resistant against Side
                                  Channel Attacks  . . . . . . . . . . . . 280
                   Bart Preneel   New European Schemes for Signature,
                                  Integrity and Encryption (NESSIE): a
                                  Status Report  . . . . . . . . . . . . . 297
              Young-Ho Park and   
                  Sangho Oh and   
                Sangjin Lee and   
                 Jongin Lim and   
                  Maenghee Sung   An Improved Method of Multiplication on
                                  Certain Elliptic Curves  . . . . . . . . 310
              Young-Ho Park and   
              Sangtae Jeong and   
              Chang Han Kim and   
                     Jongin Lim   An Alternate Decomposition of an Integer
                                  for Faster Point Multiplication on
                                  Certain Elliptic Curves  . . . . . . . . 323
          Éric Brier and   
                      Marc Joye   Weierstraß Elliptic Curves and
                                  Side-Channel Attacks . . . . . . . . . . 335
                  Marc Joye and   
                  Sung-Ming Yen   One-Way Cross-Trees and Their
                                  Applications . . . . . . . . . . . . . . 346
                  Ari Juels and   
                 Jorge Guajardo   RSA Key Generation with Verifiable
                                  Randomness . . . . . . . . . . . . . . . 357
                  Marc Joye and   
                  Sung-Ming Yen   New Minimal Modified Radix- $r$
                                  Representation with Applications to
                                  Smart Cards  . . . . . . . . . . . . . . 375
                      Anonymous   Author Index . . . . . . . . . . . . . . 385


Lecture Notes in Computer Science
Volume 2275, 2001

                  D. Dubois and   
                   H. Prade and   
                     L. Ughetto   A New Perspective on Reasoning with
                                  Fuzzy Rules  . . . . . . . . . . . . . . 1
                   T. Furuhashi   On Interpretability of Fuzzy Models  . . 12
                   R. Intan and   
                   M. Mukaidono   Degree of Similarity in Fuzzy Partition  20
                    S. Raha and   
                     S. Hossain   Fuzzy Set in Default Reasoning . . . . . 27
         L. T. Kóczy and   
                     L. Muresan   Interpolation in Hierarchical Rule-Bases
                                  with Normal Conclusions  . . . . . . . . 34
                  Y.-C. Kim and   
                  S.-B. Cho and   
                       S.-R. Oh   The Dempster-Shafer Approach to
                                  Map-Building for an Autonomous Mobile
                                  Robot with Fuzzy Controller  . . . . . . 40
                  S. Ionita and   
                      E. Sofron   The Fuzzy Model for Aircraft Landing
                                  Control  . . . . . . . . . . . . . . . . 47
               S. Himavathi and   
                B. Umamaheswari   Implementation of Nonlinear Fuzzy Models
                                  Using Microcontrollers . . . . . . . . . 55
                 R. K. Mudi and   
                K. Majumdar and   
                         C. Dey   A Gain Adaptive Fuzzy Logic Controller   62
                 W. K. Choi and   
                 H. S. Yoon and   
                     K. Kim and   
                I. Y. Chung and   
                      S. J. Lee   A Traffic Light Controlling FLC
                                  Considering the Traffic Congestion . . . 69
                  K. Hirota and   
                    F. Dong and   
                    K. Chen and   
                      Y. Takama   Vehicle Routing, Scheduling and
                                  Dispatching System Based on HIMS Model   76
                H.-C. Myung and   
                     Z. Z. Bien   Similarity between Fuzzy Multi-objective
                                  Control and Eligibility  . . . . . . . . 85
               B. N. Moitra and   
                      B. B. Pal   A Fuzzy Goal Programming Approach for
                                  Solving Bilevel Programming Problems . . 91
                  S. K. Deb and   
           B. Bhattacharyya and   
                  S. K. Sorkhel   Material Handling Equipment Selection by
                                  Fuzzy Multi-criteria Decision Making
                                  Methods  . . . . . . . . . . . . . . . . 99
                      Z. Pawlak   The Rough Set View on Bayes' Theorem . . 106
                      M. Sugeno   Verbalizing Computers --- A Way to
                                  Everyday Language Computing  . . . . . . 117
                 Z. Z. Bien and   
                  J.-B. Kim and   
                  D.-J. Kim and   
                  J.-S. Han and   
                       J.-H. Do   Soft Computing Based Emotion/Intention
                                  Reading for Service Robot  . . . . . . . 121
                   R. Intan and   
                   M. Mukaidono   Generalization of Rough Membership
                                  Function Based on $ \alpha $-Coverings
                                  of the Universe  . . . . . . . . . . . . 129
                   H. C. Taneja   A Class of Quantitative-Qualitative
                                  Measures of Directed-Divergence  . . . . 136
                   S. Ghosh and   
                     S. S. Alam   $ (\alpha, \beta) $ Reduction of
                                  Decision Table: a Rough Approach . . . . 141
               A. K. Tiwari and   
                   K. K. Shukla   Wavelet Transform Based Fuzzy Inference
                                  System for Power Quality Classification  148
                      A. De and   
                  N. Chatterjee   A Fuzzy-Neural Technique for Flashover
                                  Diagnosis of Winding Insulation in
                                  Transformers . . . . . . . . . . . . . . 156
               A. Mukherjee and   
             P. P. Adhikari and   
                    P. K. Nandi   Feature Identification for Fuzzy Logic
                                  Based Adaptive Kalman Filtering  . . . . 163
                  K. Franke and   
              J. Ruiz-del-Solar   Soft-Biometrics: Soft-Computing
                                  Technologies for Biometric-Applications  171
               P. Navarrete and   
              J. Ruiz-del-Solar   Comparative Study between Different
                                  Eigenspace-Based Approaches for Face
                                  Recognition  . . . . . . . . . . . . . . 178
                  K. Franke and   
                Y.-N. Zhang and   
                 M. Köppen   Static Signature Verification Employing
                                  a Kosko-Neuro-fuzzy Approach . . . . . . 185
                  P. K. Roy and   
               J. P. Miller and   
              D. Dutta Majumder   A Control Analysis of Neuronal
                                  Information Processing: a Study of
                                  Electrophysiological Experimentation and
                                  Non-equilibrium Information Theory . . . 191
                T. Yamakawa and   
                       K. Horio   Modeling of Nonlinear Systems by
                                  Employing Self-Organization and
                                  Evaluation --- SOR Network . . . . . . . 204
                 N. Ganguly and   
                    P. Maji and   
                     A. Das and   
               B. K. Sikdar and   
               P. Pal Chaudhuri   Characterization of Non-linear Cellular
                                  Automata Model for Pattern Recognition   214
                S. K. Parui and   
                       A. Datta   On Convergence of a Neural Network Model
                                  Computing MSC  . . . . . . . . . . . . . 221
            U. Bhattacharya and   
                  T. K. Das and   
                   A. Datta and   
                S. K. Parui and   
                B. B. Chaudhuri   Recognition of Handprinted Bangla
                                  Numerals Using Neural Network Models . . 228
                 S.-K. Sung and   
                 J.-W. Jung and   
                  J.-T. Lee and   
                 W.-J. Choi and   
                       S.-J. Ji   Optimal Synthesis Method for Binary
                                  Neural Network Using NETLA . . . . . . . 236
                 B. Chakraborty   A Neural Network Based Seafloor
                                  Classification Using Acoustic
                                  Backscatter  . . . . . . . . . . . . . . 245
             D. Chakraborty and   
                      N. R. Pal   Designing Rule-Based Classifiers with
                                  On-Line Feature Selection: a Neuro-fuzzy
                                  Approach . . . . . . . . . . . . . . . . 251
                   M. Golob and   
                    B. Tovornik   Decomposed Neuro-fuzzy ARX Model . . . . 260
                 C.-W. Tham and   
                 S.-H. Tian and   
                        L. Ding   Weather Forecasting System Based on
                                  Satellite Imageries Using Neuro-fuzzy
                                  Techniques . . . . . . . . . . . . . . . 267
           C. S. Velayutham and   
                    S. Paul and   
                       S. Kumar   Evolutionary Subsethood Product Fuzzy
                                  Neural Network . . . . . . . . . . . . . 274
                U. Yildiran and   
                      O. Kaynak   VSS Learning Based Intelligent Control
                                  of a Bioreactor System . . . . . . . . . 281
               J. C. Bezdek and   
                 R. J. Hathaway   Some Notes on Alternating Optimization   288
                  C.-T. Lin and   
                  D.-J. Liu and   
                   R.-C. Wu and   
                       G.-D. Wu   Noisy Speech Segmentation/Enhancement
                                  with Multiband Analysis and Neural Fuzzy
                                  Networks . . . . . . . . . . . . . . . . 301
                     J. Ryu and   
                      S.-B. Cho   Towards Optimal Feature and Classifier
                                  for Gene Expression Classification of
                                  Cancer . . . . . . . . . . . . . . . . . 310
                    D. Tran and   
                      M. Wagner   Fuzzy C-Means Clustering-Based Speaker
                                  Verification . . . . . . . . . . . . . . 318
                    D. Tran and   
                      M. Wagner   Noise Clustering-Based Speaker
                                  Verification . . . . . . . . . . . . . . 325
             E. Dimitriadou and   
              A. Weingessel and   
                      K. Hornik   A Combination Scheme for Fuzzy
                                  Clustering . . . . . . . . . . . . . . . 332
                    K. Mali and   
                       S. Mitra   Clustering of Symbolic Data and Its
                                  Validation . . . . . . . . . . . . . . . 339
                    D. Tran and   
                      M. Wagner   Generalised Fuzzy Hidden Markov Models
                                  for Speech Recognition . . . . . . . . . 345
           P. Roy Chowdhury and   
                   K. K. Shukla   On Generalization and $K$-Fold Cross
                                  Validation Performance of MLP Trained
                                  with EBPDT . . . . . . . . . . . . . . . 352
          V. Di Gesú and   
                         S. Roy   Pictorial Indexes and Soft Image
                                  Distances  . . . . . . . . . . . . . . . 360
                S. S. Kumar and   
                B. N. Chatterji   Stereo Correspondence Using a Fuzzy
                                  Approach . . . . . . . . . . . . . . . . 367
         M. V. N. K. Prasad and   
               K. K. Shukla and   
                R. N. Mukherjee   Implementation of BTTC Image Compression
                                  Algorithm Using Fuzzy Technique  . . . . 375
                A. Soria-Frisch   Applications of the ILF Paradigm in
                                  Image Processing . . . . . . . . . . . . 382
                  U. Garain and   
                B. B. Chaudhuri   On OCR of Degraded Documents Using Fuzzy
                                  Multifactorial Analysis  . . . . . . . . 388
                   R. Kumar and   
                     P. Rockett   A Bootstrapped Modular Learning Approach
                                  for Scaling and Generalisation of
                                  Grey-Level Corner Detection  . . . . . . 395
              C. V. Jawahar and   
                P. J. Narayanan   Towards Fuzzy Calibration  . . . . . . . 401
                    G. Tolt and   
                    I. Kalaykov   Fuzzy-Similarity-Based Image Noise
                                  Cancellation . . . . . . . . . . . . . . 408
                   A. Mohan and   
                         K. Deb   Genetic-Fuzzy Approach in Robot Motion
                                  Planning Revisited: Rigorous Testing and
                                  towards an Implementation  . . . . . . . 414
                         T. Pal   Evolutionary Approaches to Rule
                                  Extraction for Fuzzy Logic Controllers   421
                   P. Pawar and   
                    G. Nagaraja   Regular Grammatical Inference: a Genetic
                                  Algorithm Approach . . . . . . . . . . . 429
                P. K. Nanda and   
                 D. P. Muni and   
                     P. Kanungo   Parallelized Crowding Scheme Using a New
                                  Interconnection Model  . . . . . . . . . 436
                   S. Ghosh and   
                       A. Ghosh   A GA--FUZZY Approach to Evolve Hopfield
                                  Type Optimum Networks for Object
                                  Extraction . . . . . . . . . . . . . . . 444
            R. Krishnapuram and   
                   M. Kumar and   
                   J. Basak and   
                        V. Jain   Soft Computing in E-Commerce . . . . . . 450
                    V. Loia and   
                  P. Luongo and   
                S. Senatore and   
                    M. I. Sessa   Info-Miner: Bridging Agent Technology
                                  with Approximate Information Retrieval   459
                   J. M. Barone   Fuzzy Points and Fuzzy Prototypes  . . . 466
               A. K. Srivastava   Some Injective Cogenerators in Fuzzy
                                  Topology . . . . . . . . . . . . . . . . 471
                 W. Congxin and   
                W. Guixiang and   
                        W. Cong   Derivative and Differential of Convex
                                  Fuzzy Valued Functions and Application   478
           A. K. Srivastava and   
                   S. P. Tiwari   A Topology for Fuzzy Automata  . . . . . 485
               H. R. Maleki and   
             H. Mishmast N. and   
                   M. Mashinchi   Fuzzy Number Linear Programming: a
                                  Probabilistic Approach . . . . . . . . . 491
                      J. Mi and   
                       W. Zhang   Composition of General Fuzzy
                                  Approximation Spaces . . . . . . . . . . 497
                    D. Chen and   
                       W. Zhang   The Lower and Upper Approximations of
                                  Fuzzy Sets in a Fuzzy Group  . . . . . . 502
                   R. Ameri and   
                   M. M. Zahedi   T-Fuzzy Hyperalgebraic Systems . . . . . 509
                  R. N. Bhaumik   On Some Weaker Forms of Fuzzy
                                  Compactness  . . . . . . . . . . . . . . 515
                   S. K. Bhakat   Some Results on Fuzzy Commutative and
                                  Fuzzy Cyclic Subgroups . . . . . . . . . 520
               S. M. Taheri and   
                  J. Behboodian   Fuzzy Hypotheses Testing with Fuzzy
                                  Data: a Bayesian Approach  . . . . . . . 527
                      Anonymous   Author Index . . . . . . . . . . . . . . 535


Lecture Notes in Computer Science
Volume 2276, 2001

                Ivan A. Sag and   
            Timothy Baldwin and   
               Francis Bond and   
              Ann Copestake and   
                 Dan Flickinger   Multiword Expressions: a Pain in the
                                  Neck for NLP . . . . . . . . . . . . . . 1
                 Roland Hausser   A Hypothesis on the Origin of the Sign
                                  Types  . . . . . . . . . . . . . . . . . 16
            Roussanka Loukanova   Quantification and Intensionality in
                                  Situation Semantics  . . . . . . . . . . 32
            Roussanka Loukanova   Generalized Quantification in Situation
                                  Semantics  . . . . . . . . . . . . . . . 46
Éva Sáfár and   
                   Ian Marshall   Sign Language Translation via DRT and
                                  HPSG . . . . . . . . . . . . . . . . . . 58
                  H. Helbig and   
               C. Gnörlich   Multilayered Extended Semantic Networks
                                  as a Language for Meaning Representation
                                  in NLP Systems . . . . . . . . . . . . . 69
          Atsushi Horiguchi and   
             Seiji Tsuchiya and   
            Kazuhide Kojima and   
            Hirokazu Watabe and   
                Tsukasa Kawaoka   Constructing a Sensuous Judgment System
                                  Based on Conceptual Processing . . . . . 86
              Melanie Knapp and   
                      Jens Woch   Towards a Natural Language Driven
                                  Automated Help Desk  . . . . . . . . . . 96
               Yorick Wilks and   
               Roberta Catizone   Lexical Tuning . . . . . . . . . . . . . 106
                   Ted Pedersen   A Baseline Methodology for Word Sense
                                  Disambiguation . . . . . . . . . . . . . 126
         Satanjeev Banerjee and   
                   Ted Pedersen   An Adapted Lesk Algorithm for Word Sense
                                  Disambiguation Using WordNet . . . . . . 136
      Armando Suárez and   
                 Manuel Palomar   Feature Selection Analysis for Maximum
                                  Entropy-Based WSD  . . . . . . . . . . . 146
      Andrés Montoyo and   
      Armando Suárez and   
                 Manuel Palomar   Combining Supervised-Unsupervised
                                  Methods for Word Sense Disambiguation    156
               Susana Soler and   
          Andrés Montoyo   A Proposal for WSD Using Semantic
                                  Similarity . . . . . . . . . . . . . . . 165
              Ruslan Mitkov and   
              Richard Evans and   
              Constantin Orasan   A New, Fully Automatic Version of
                                  Mitkov's Knowledge-Poor Pronoun
                                  Resolution Method  . . . . . . . . . . . 168
         Jesús Peral and   
       Antonio Ferrández   Pronominal Anaphora Generation in an
                                  English--Spanish MT Approach . . . . . . 187
             Beata Klebanov and   
          Peter Wiemer-Hastings   Using LSA for Pronominal Anaphora
                                  Resolution . . . . . . . . . . . . . . . 197
                  Ivan Meza and   
                    Luis Pineda   The Spanish Auxiliary Verb System in
                                  HPSG . . . . . . . . . . . . . . . . . . 200
              Igor A. Bolshakov   Surface Syntactic Relations in Spanish   210
            Philippe Blache and   
           David-Olivier Azulay   Parsing Ill-Formed Inputs with
                                  Constraint Graphs  . . . . . . . . . . . 220
                 Lourdes Araujo   Part-of-Speech Tagging with Evolutionary
                                  Algorithms . . . . . . . . . . . . . . . 230
         Jorge Graña and   
         Fco. Mario Barcala and   
           Jesús Vilares   Formal Methods of Tokenization for
                                  Part-of-Speech Tagging . . . . . . . . . 240
Héctor Jiménez and   
              Guillermo Morales   Sepe: a POS Tagger for Spanish . . . . . 250
               Dariusz J. Kogut   Fuzzy Set Tagging  . . . . . . . . . . . 260
        Nicoletta Calzolari and   
           Antonio Zampolli and   
               Alessandro Lenci   Towards a Standard for a Multilingual
                                  Lexical Entry: The EAGLES/ISLE
                                  Initiative . . . . . . . . . . . . . . . 264
          Igor A. Bolshakov and   
      Sofia N. Galicia-Haro and   
              Alexander Gelbukh   Quantitative Comparison of Homonymy in
                                  Spanish EuroWordNet and Traditional
                                  Dictionaries . . . . . . . . . . . . . . 280
          Alexander Gelbukh and   
            Grigori Sidorov and   
Liliana Chanona-Hernández   Compilation of a Spanish Representative
                                  Corpus . . . . . . . . . . . . . . . . . 285
           Arantza Casillas and   
         Raquel Martínez   Aligning Multiword Terms Using a Hybrid
                                  Approach . . . . . . . . . . . . . . . . 289
          Alexander Gelbukh and   
                Grigori Sidorov   Automatic Selection of Defining
                                  Vocabulary in an Explanatory Dictionary  300
             Karin Harbusch and   
                      Jens Woch   Integrated Natural Language Generation
                                  with Schema-Tree Adjoining Grammars  . . 304
           Arantza Casillas and   
         Raquel Martínez   Experiments with a Bilingual Document
                                  Generation Environment . . . . . . . . . 314
            Tamotsu Shirado and   
                Hitoshi Isahara   A Computational Model of Change in
                                  Politeness with the Addition of Word
                                  Endings  . . . . . . . . . . . . . . . . 318
              Dj.Sh. Suleymanov   Tartar Morphology Implementation . . . . 327
            Esmeralda Uraga and   
                    Luis Pineda   Automatic Generation of Pronunciation
                                  Lexicons for Spanish . . . . . . . . . . 330
               Rada F. Mihalcea   Diacritics Restoration: Learning from
                                  Letters versus Learning from Words . . . 339
              Ronen Feldman and   
             Yonatan Aumann and   
  Michal Finkelstein-Landau and   
               Eyal Hurvitz and   
               Yizhar Regev and   
              Ariel Yaroshevich   A Comparative Study of Information
                                  Extraction Strategies  . . . . . . . . . 349
              Fabio Rinaldi and   
               Michael Hess and   
         Diego Mollá and   
             Rolf Schwitter and   
              James Dowdall and   
           Gerold Schneider and   
                Rachel Fournier   Answer Extraction in Technical Domains   360
        Carlos Rodríguez   Automatic Extraction of Non-standard
                                  Lexical Data for a Metalinguistic
                                  Information Database . . . . . . . . . . 370
            Fernando Llopis and   
   Antonio Ferrández and   
        José Luis Vicedo   Text Segmentation for Efficient
                                  Information Retrieval  . . . . . . . . . 373
       Jesús Vilares and   
         Fco. Mario Barcala and   
               Miguel A. Alonso   Using Syntactic Dependency-Pairs
                                  Conflation to Improve Retrieval
                                  Performance in Spanish . . . . . . . . . 381
               June-Jei Kuo and   
             Hung-Chia Wung and   
              Chuan-Jie Lin and   
                  Hsin-Hsi Chen   Multi-document Summarization Using
                                  Informative Words and Its Evaluation
                                  with a QA System . . . . . . . . . . . . 391
              Jan \vZi\vzka and   
                  Ale\vs Bourek   Automated Selection of Interesting
                                  Medical Text Documents by the TEA Text
                                  Analyzer . . . . . . . . . . . . . . . . 402
              Shuigeng Zhou and   
                    Jihong Guan   Chinese Documents Classification Based
                                  on N-Grams . . . . . . . . . . . . . . . 405
           Ralf Steinberger and   
            Bruno Pouliquen and   
                   Johan Hagman   Cross-Lingual Document Similarity
                                  Calculation Using the Multilingual
                                  Thesaurus EUROVOC  . . . . . . . . . . . 415
            Pavel Makagonov and   
             Mikhail Alexandrov   Empirical Formula for Testing Word
                                  Similarity and Its Application for
                                  Constructing a Word Frequency List . . . 425
              Shazia Akhtar and   
            Ronan G. Reilly and   
                   John Dunnion   AutoMarkup: a Tool for Automatically
                                  Marking up Text Documents  . . . . . . . 433
             Gerardo Sierra and   
         Rodrigo Alarcón   Identification of Recurrent Patterns to
                                  Extract Definitory Contexts  . . . . . . 436
       Sonia Vázquez and   
         Maria Carmen Calle and   
               Susana Soler and   
          Andrés Montoyo   Specification Marks Method: Design and
                                  Implementation . . . . . . . . . . . . . 439
                      Anonymous   Author Index . . . . . . . . . . . . . . 443


Lecture Notes in Computer Science
Volume 2284, 2001

                Ofer Arieli and   
                  Marc Denecker   Modeling Paraconsistent Reasoning by
                                  Classical Logic  . . . . . . . . . . . . 1
             R. N. Banerjee and   
                      A. Bujosa   Implementing Term Algebra Syntactic
                                  Unification in Free Modules over Certain
                                  Rings  . . . . . . . . . . . . . . . . . 15
          Leopoldo Bertossi and   
                Camilla Schwind   Analytic Tableaux and Database Repairs:
                                  Foundations  . . . . . . . . . . . . . . 32
             Joachim Biskup and   
                  Piero Bonatti   Controlled Query Evaluation for Known
                                  Policies by Combining Lying and Refusal  49
              Sandra de Amo and   
        Walter A. Carnielli and   
                   Jo ao Marcos   A Logical Framework for Integrating
                                  Inconsistent Information in Multiple
                                  Databases  . . . . . . . . . . . . . . . 67
   János Demetrovics and   
         Gyula O. H. Katona and   
          Dezs\Ho Miklós   Functional Dependencies in Presence of
                                  Errors . . . . . . . . . . . . . . . . . 85
                V. N. Huynh and   
                Y. Nakamori and   
                   T. B. Ho and   
                     G. Resconi   A Context Model for Constructing
                                  Membership Functions of Fuzzy Concepts
                                  Based on Modal Logic . . . . . . . . . . 93
         Gabriele Kern-Isberner   The Principle of Conditional
                                  Preservation in Belief Revision  . . . . 105
                 Christoph Koch   Query Rewriting with Symmetric
                                  Constraints  . . . . . . . . . . . . . . 130
                 Yingjiu Li and   
                 Sencun Zhu and   
                Lingyu Wang and   
                 Sushil Jajodia   A Privacy-Enhanced Microaggregation
                                  Method . . . . . . . . . . . . . . . . . 148
                 Sebastian Link   Towards a Tailored Theory of Consistency
                                  Enforcement in Databases . . . . . . . . 160
                Oded Maimon and   
                    Lior Rokach   Improving Supervised Learning by Feature
                                  Decomposition  . . . . . . . . . . . . . 178
       Krisztián Tichler   Extremal Theorems for Databases  . . . . 197
José María Turull Torres   Relational Databases and Homogeneity in
                                  Logics with Counting . . . . . . . . . . 212
              Stephen J. Hegner   Uniqueness of Update Strategies for
                                  Database Views . . . . . . . . . . . . . 230
             J\=anis C\=\irulis   Knowledge Representation in Extended
                                  Pawlak's Information Systems: Algebraic
                                  Aspects  . . . . . . . . . . . . . . . . 250
               Konrad Engel and   
                  Sven Hartmann   Minimal Sample Databases for Global
                                  Cardinality Constraints  . . . . . . . . 268
                      Anonymous   Author Index . . . . . . . . . . . . . . 289


Lecture Notes in Computer Science
Volume 2300, 2001

               Jean Berstel and   
                    Luc Boasson   Balanced Grammars and Their Languages    3
             Volker Diekert and   
                    Paul Gastin   Safety and Liveness Properties for Real
                                  Traces and a Direct Translation from LTL
                                  to Monoids . . . . . . . . . . . . . . . 26
               Joost Engelfriet   The Delta Operation: From Strings to
                                  Trees to Strings . . . . . . . . . . . . 39
                Vesa Halava and   
                     Tero Harju   Infinite Solutions of Marked Post
                                  Correspondence Problem . . . . . . . . . 57
      Juhani Karhumäki and   
                      Ion Petre   The Branching Point Approach to Conway's
                                  Problem  . . . . . . . . . . . . . . . . 69
                   Aldo de Luca   A Survey of Some Quantitative Approaches
                                  to the Notion of Information . . . . . . 77
         Alexandru Mateescu and   
                   Arto Salomaa   Nondeterministic Trajectories  . . . . . 96
            Antonio Restivo and   
                  Sergio Salemi   Binary Patterns in Infinite Binary Words 107
        Hans-Jörg Kreowski   A Sight-seeing Tour of the Computational
                                  Landscape of Graph Transformation  . . . 119
                  Dirk Janssens   Local Action Systems and DPO Graph
                                  Transformation . . . . . . . . . . . . . 138
               Paolo Baldan and   
           Andrea Corradini and   
                  Ugo Montanari   Bisimulation Equivalences for Graph
                                  Grammars . . . . . . . . . . . . . . . . 158
              Hartmut Ehrig and   
           Kathrin Hoffmann and   
              Julia Padberg and   
               Paolo Baldan and   
                   Reiko Heckel   High-Level Net Processes . . . . . . . . 191
           Maurice ter Beek and   
                   Jetty Kleijn   Petri Net Control for Grammar Systems    220
              P. S. Thiagarajan   Regular Event Structures and Finite
                                  Petri Nets: a Conjecture . . . . . . . . 244
              Gregor Engels and   
               Luuk Groenewegen   Towards Team-Automata-Driven
                                  Object-Oriented Collaborative Work . . . 257
                 Javier Esparza   Grammars as Processes  . . . . . . . . . 277
             Mogens Nielsen and   
              Frank D. Valencia   Temporal Concurrent Constraint
                                  Programming: Applications and Behavior   298
              Paolo Bottoni and   
               Anna Labella and   
  Carlos Martín-Vide and   
                  Gheorghe Paun   Rewriting P Systems with Conditional
                                  Communication  . . . . . . . . . . . . . 325
                       Tom Head   An Aqueous Algorithm for Finding the
                                  Bijections Contained in a Binary
                                  Relation . . . . . . . . . . . . . . . . 354
      Hendrik Jan Hoogeboom and   
                Nik\`e van Vugt   Upper Bounds for Restricted Splicing . . 361
                  Lila Kari and   
                  Rob Kitto and   
               Gabriel Thierrin   Codes, Involutions, and DNA Encodings    376
              David M. Prescott   DNA Manipulations in Ciliates  . . . . . 394
           Takashi Yokomori and   
        Yasubumi Sakakibara and   
              Satoshi Kobayashi   A Magic Pot: Self-assembly Computation
                                  Revisited  . . . . . . . . . . . . . . . 418
                      Anonymous   Author Index . . . . . . . . . . . . . . 431