Table of contents for issues of Lecture Notes in Computer Science

Last update: Thu Mar 22 11:49:36 MDT 2018                Valid HTML 3.2!

Volume 1357, 1998
Volume 1358, 1998
Volume 1359, 1998
Volume 1360, 1998
Volume 1361, 1998
Volume 1362, 1998
Volume 1363, 1998
Volume 1364, 1998
Volume 1365, 1998
Volume 1366, 1998
Volume 1367, 1998
Volume 1368, 1998
Volume 1369, 1998
Volume 1370, 1998
Volume 1371, 1998
Volume 1372, 1998
Volume 1373, 1998
Volume 1374, 1998
Volume 1375, 1998
Volume 1376, 1998
Volume 1377, 1998
Volume 1378, 1998
Volume 1379, 1998
Volume 1380, 1998
Volume 1381, 1998
Volume 1382, 1998
Volume 1383, 1998
Volume 1384, 1998
Volume 1385, 1998
Volume 1386, 1998
Volume 1387, 1998
Volume 1388, 1998
Volume 1389, 1998
Volume 1390, 1998
Volume 1391, 1998
Volume 1392, 1998
Volume 1393, 1998
Volume 1394, 1998
Volume 1395, 1998
Volume 1396, 1998
Volume 1397, 1998
Volume 1398, 1998
Volume 1399, 1998
Volume 1400, 1998
Volume 1401, 1998
Volume 1402, 1998
Volume 1403, 1998
Volume 1404, 1998
Volume 1405, 1998
Volume 1406, 1998
Volume 1407, 1998
Volume 1408, 1998
Volume 1411, 1998
Volume 1412, 1998
Volume 1413, 1998
Volume 1414, 1998
Volume 1415, 1998
Volume 1416, 1998
Volume 1417, 1998
Volume 1418, 1998
Volume 1419, 1998
Volume 1420, 1998
Volume 1421, 1998
Volume 1422, 1998
Volume 1423, 1998
Volume 1424, 1998
Volume 1425, 1998
Volume 1427, 1998
Volume 1429, 1998
Volume 1430, 1998
Volume 1431, 1998
Volume 1432, 1998
Volume 1433, 1998
Volume 1434, 1998
Volume 1435, 1998
Volume 1436, 1998
Volume 1437, 1998
Volume 1438, 1998
Volume 1439, 1998
Volume 1440, 1998
Volume 1441, 1998
Volume 1442, 1998
Volume 1443, 1998
Volume 1444, 1998
Volume 1445, 1998
Volume 1446, 1998
Volume 1447, 1998
Volume 1448, 1998
Volume 1449, 1998
Volume 1450, 1998
Volume 1644, 1999


Lecture Notes in Computer Science
Volume 1357, 1998

                Simon Znaty and   
             Jean-Pierre Hubaux   I: Object-Oriented Technology for
                                  Telecommunications Services Engineering  1
                Simon Znaty and   
             Jean-Pierre Hubaux   Telecommunications Services Engineering:
                                  Principles Architectures and Tools . . . 3
                Arve Meisingset   Difficulties with Mapping OMT
                                  Specifications into GDMO . . . . . . . . 12
                       D. Sidou   Towards a ``Good'' Functional and
                                  Executable Behavior Model  . . . . . . . 17
     Jorge L. Tellez Portas and   
               David Watrin and   
               Tayeb Ben Meriem   The Formalization and Simulation of a
                                  Network Management Model . . . . . . . . 23
         J. L. Tellez Porta and   
                  D. Watrin and   
                  T. Ben Meriem   The Formalization and Simulation of a
                                  Network Management Model . . . . . . . . 23
         Lisandro Granville and   
            Luciano Gaspary and   
                Janilce Almeida   OST --- An Object-Oriented Computer
                                  Networks System Specification Tool . . . 29
                Jarmo Harju and   
        Bilhanan Silverajan and   
                 Ilkka Toivanen   Experiences in Telecommunications
                                  Protocols with an OO Based
                                  Implementation Framework . . . . . . . . 34
                      Luca Deri   Rapid Network Management Application
                                  Development  . . . . . . . . . . . . . . 39
            Zi\`ed Choukair and   
               Antoine Beugnard   Real-Time Object-Oriented Distributed
                                  Processing with COREMO . . . . . . . . . 45
             S. E. Mitchell and   
                   R. J. Stroud   II: Reflective Real-Time Object-Oriented
                                  Programming and Systems  . . . . . . . . 51
             Ashish Singhai and   
                 Aamod Sane and   
                   Roy Campbell   Reflective ORBs: Supporting Robust,
                                  Time-Critical Distribution . . . . . . . 55
              Shigeru Chiba and   
          Takeshi Nishimura and   
             Kenichi Kourai and   
             Atsushi Ohnoki and   
                 Takashi Masuda   Weak Protection for Reflective Operating
                                  Systems  . . . . . . . . . . . . . . . . 62
               Michael Golm and   
     Jürgen Kleinöder   Implementing Real-Time Actors with
                                  MetaJava . . . . . . . . . . . . . . . . 68
             S. E. Mitchell and   
                   A. Burns and   
                 A. J. Wellings   Adaptive Scheduling Using Reflection . . 74
              Jack Goldberg and   
               Robert J. Stroud   Adaptive Fault-Tolerant Systems and
                                  Reflective Architectures . . . . . . . . 80
                  Jan Bosch and   
           Görel Hedin and   
                  Kai Koskimies   III: Language Support for Design
                                  Patterns and Frameworks  . . . . . . . . 89
                   J. Bosch and   
                   G. Hedin and   
                   K. Koskimies   Language Support for Design Patterns and
                                  Frameworks . . . . . . . . . . . . . . . 89
               Ellen Agerbo and   
                   Aino Cornils   Implementing GoF Design Patterns in BETA 92
        Stéphane Ducasse   Message Passing Abstractions as
                                  Elementary Bricks for Design Pattern
                                  Implementation: An Experiment  . . . . . 96
              Amnon H. Eden and   
                 Amiram Yehudai   Patterns of the Agenda . . . . . . . . . 100
          Ey\ethun Eli Jacobsen   Design Patterns as Program Extracts  . . 105
                 Joseph Gil and   
                David H. Lorenz   Design Patterns vs. Language Design  . . 108
             Frank Matthijs and   
              Wouter Joosen and   
                Bert Robben and   
              Bart Vanhaute and   
               Pierre Verbaeten   Multi-level Patterns . . . . . . . . . . 112
                   Palle Nowack   Architectural Abstractions for
                                  Frameworks . . . . . . . . . . . . . . . 116
           Antti-Pekka Tuovinen   A Framework for Processors of Visual
                                  Languages  . . . . . . . . . . . . . . . 119
               K. De Volder and   
                   W. De Meuter   Type Oriented Programming  . . . . . . . 123
             Kris De Volder and   
             Wolfgang De Meuter   Type Oriented Programming  . . . . . . . 123
              Yardena Peres and   
           Jerry W. Malcolm and   
              Pnina Vortman and   
                     Gabi Zodik   A Framework Registration Language  . . . 126
        Elizabeth Bjarnason and   
               Görel Hedin   Tool Support for Framework-Specific
                                  Language Extensions  . . . . . . . . . . 129
                      Jan Bosch   Design Patterns & Frameworks: On the
                                  Issue of Language Support  . . . . . . . 133
               Görel Hedin   Language Support for Design Patterns
                                  Using Attribute Extension  . . . . . . . 137
               Maarit Harsu and   
        Juha Hautamäki and   
                  Kai Koskimies   A Language Implementation Framework in
                                  Java . . . . . . . . . . . . . . . . . . 141
                 Haim Kilov and   
                 Bernhard Rumpe   IV: Precise Semantics for
                                  Object-Oriented Modeling Techniques  . . 145
        Jean Bézivin and   
                Richard Lemesle   Ontology-Based Layered Semantics for
                                  Precise OA&D Modeling . . . . . . . . . . 151
           J. C. Bicarregui and   
                 K. C. Lano and   
               T. S. E. Maibaum   Formalizing Object-Oriented Models in
                                  the Object Calculus  . . . . . . . . . . 155
                       B. Cohen   Set Theory as a Semantic Framework for
                                  Object-Oriented Modeling . . . . . . . . 161
              Gary W. Daugherty   Unification of the Models for Types,
                                  Classes and State Machines . . . . . . . 169
          Jürgen Ebert and   
          Roger Süttenbach   Integration of Z-based Semantics of
                                  OO-Notations . . . . . . . . . . . . . . 173
           Robert B. France and   
              Jean-Michel Bruel   Integrated Informal Object-Oriented and
                                  Formal Modeling Techniques . . . . . . . 178
                Stuart Kent and   
                  Ali Hamie and   
                 John Howse and   
             Franco Civello and   
               Richard Mitchell   Semantics Through Pictures . . . . . . . 182
                 Haim Kilov and   
                   Ian Simmonds   Business Rules: From Business
                                  Specification to Design  . . . . . . . . 188
         Reino Kurki-Suonio and   
                 Tommi Mikkonen   Liberating Object-Oriented Modeling from
                                  Programming-Level Abstractions . . . . . 195
                  Geoff Mullery   Discovering, Displaying and Agreeing
                                  Semantics in an Environment of Conflicts 200
                  Ruth Breu and   
                 Radu Grosu and   
                Franz Huber and   
             Bernhard Rumpe and   
              Wolfgang Schwerin   Towards a Precise Semantics for
                                  Object-Oriented Modeling Techniques  . . 205
                 A. Schuerr and   
                   A. J. Winter   Formal Definition and Refinement of
                                  UML's Module/Package Concept . . . . . . 211
           Andy Schürr and   
              Andreas J. Winter   Formal Definition and Refinement of
                                  UML's Module/Package Concept . . . . . . 211
                 Jos Warmer and   
                  John Hogg and   
                 Steve Cook and   
                     Bran Selic   Experience with Formal Specification of
                                  CMM and UML  . . . . . . . . . . . . . . 216
        Rémi Bastide and   
                   Didier Buchs   V: Models, Formalisms and Methods for
                                  Object-Oriented Distributed Computing    221
             Eduardo Casais and   
                 Ari Jaaksi and   
                 Thomas Lindner   VI: FAMOOS Workshop on Object-Oriented
                                  Software Evolution and Re-engineering    257
            Eliezer Kantorowitz   On Implementation and Extension
                                  Complexities . . . . . . . . . . . . . . 264
              Tamar Richner and   
                     Robb Nebbe   Analyzing Dependencies to Solve
                                  Low-Level Problems . . . . . . . . . . . 266
              Markku Ruonavaara   Adding Architecture to Design  . . . . . 268
                  Oliver Ciupke   Analysis of Object-Oriented Programs
                                  Using Graphs . . . . . . . . . . . . . . 270
           Tarja Systä and   
                  Kai Koskimies   Extracting State Diagrams from Legacy
                                  Systems  . . . . . . . . . . . . . . . . 272
                  T. Systae and   
                   K. Koskimies   Extracting State Diagrams from Legacy
                                  Systems  . . . . . . . . . . . . . . . . 272
                   Kim Mens and   
                   Tom Mens and   
           Patrick Steyaert and   
                  Koen De Hondt   Combining Software Descriptions  . . . . 274
                 Roland Trauter   Re-engineering with UML  . . . . . . . . 276
Hél\`ene Bachat\`ene and   
                  Pierre Arnaud   Evolution of Telecommunication Software
                                  Using OO: Organizational and Technical
                                  Issues . . . . . . . . . . . . . . . . . 278
              Serge Demeyer and   
          Theo-Dirk Meijler and   
                Matthias Rieger   Design Pattern Restructuring . . . . . . 280
             Akila Sarirete and   
                   Jean Vaucher   Similarity Measures for the Object Model 283
         Klaas van den Berg and   
               Mehmet Aksit and   
          Pim van den Broek and   
             Leon Osterweil and   
            Karl Lieberherr and   
           Francesco Marcelloni   VII: Modeling Software Processes and
                                  Artifacts  . . . . . . . . . . . . . . . 285
            K. Van den Berg and   
                   M. Aksit and   
           P. Van den Broek and   
                    L. Osterwel   Modeling Software Processes and
                                  Artifacts  . . . . . . . . . . . . . . . 285
             Reidar Conradi and   
                   Chunnian Liu   Revised PMLs and PSEEs for Industrial
                                  SPI  . . . . . . . . . . . . . . . . . . 289
       Francesco Marcelloni and   
                   Mehmet Aksit   Applying Fuzzy Logic Techniques in
                                  Object-Oriented Software Development . . 295
              Wiebke Reimer and   
       Wilhelm Schäfer and   
                  Thomas Schmal   Towards a Dedicated Object-Oriented
                                  Software Process Modeling Language . . . 299
                    Pavel Hruby   The Object Model for a Product Based
                                  Development Process  . . . . . . . . . . 303
               Mehmet Aksit and   
       Francesco Marcelloni and   
         Bedir Tekinerdogan and   
         Klaas van den Berg and   
              Pim van den Broek   Active Software Artifacts  . . . . . . . 307
            Jean Bézivin   General Software Process Organization in
                                  the OSMOSIS Project  . . . . . . . . . . 311
                        Jun Han   Object-Oriented Modeling of Software
                                  Processes and Artifacts: Promises and
                                  Challenges . . . . . . . . . . . . . . . 315
                   I. Bider and   
                   M. Khomyakov   Object-Oriented Model for Representing
                                  Software Production Processes  . . . . . 319
                  Jan Bosch and   
          Clemens Szyperski and   
                  Wolfgang Weck   VIII: Component-Oriented Programming . . 323
            Vito Baggiolini and   
              Jürgen Harms   Toward Automatic, Run-Time Fault
                                  Management for Component-Based
                                  Applications . . . . . . . . . . . . . . 327
          Martin Büchi and   
                Emil Sekerinski   Formal Methods for Component Software:
                                  The Refinement Calculus Perspective  . . 332
                  M. Buechi and   
                  E. Sekerinski   Formal Methods for Component Software:
                                  The Refinement Calculus Perspective  . . 332
                K. De Hondt and   
                   C. Lucas and   
                    P. Steyaert   Reuse Contracts as Component Interface
                                  Descriptions . . . . . . . . . . . . . . 338
              Koen De Hondt and   
               Carine Lucas and   
               Patrick Steyaert   Reuse Contracts as Component Interface
                                  Descriptions . . . . . . . . . . . . . . 338
               Philippe Lalanda   A Control Model for the Dynamic
                                  Selection and Configuration of Software
                                  Components . . . . . . . . . . . . . . . 343
           Michael Goedicke and   
                  Torsten Meyer   Design and Evaluation of Distributed
                                  Component-Oriented Software Systems  . . 348
           Leonid Mikhajlov and   
                Emil Sekerinski   The Fragile Base Class Problem and Its
                                  Impact on Component Systems  . . . . . . 353
                   Tobias Murer   The Challenge of the Global Software
                                  Process  . . . . . . . . . . . . . . . . 359
               Stefan Schreyjak   Coupling of Workflow and
                                  Component-Oriented Systems . . . . . . . 364
Jòrgen Steensgaard-Madsen   A Generator for Composition Interpreters 369
              Jose M. Troya and   
             Antonio Vallecillo   On the Addition of Properties to
                                  Components . . . . . . . . . . . . . . . 374
                      Jan Bosch   Adapting Object-Oriented Components  . . 379
                  Wolfgang Weck   Inheritance Using Contracts & Object
                                  Composition  . . . . . . . . . . . . . . 384
                        W. Week   Inheritance Using Contracts and Object
                                  Composition  . . . . . . . . . . . . . . 384
             Frank Gerhardt and   
               Lutz Wohlrab and   
                     Erik Ernst   IX: The 7th Workshop for PhD Students in
                                  Object-Oriented Systems  . . . . . . . . 389
             Leonor Barroca and   
                Eugene Durr and   
        François Terrier   X: Object-Oriented Real-Time Systems . . 433
                 K. C. Lano and   
                    S. Goldsack   Formalizing Real-Time System Design  . . 436
        Jorge Amador Monteverde   Object-Oriented Real-Time Software in
                                  the European Space Agency  . . . . . . . 446
              Laurent Rioux and   
           Patrick Vanuxeem and   
        François Terrier   Scheduling Mechanisms for Efficient
                                  Implementation of Real-Time Objects  . . 450
          Christian Toinard and   
              Nicolas Chevassus   An Object Communication Architecture for
                                  Real-Time Distributed Process Control    460
              T. Cornilleau and   
             E. Gressier-Soudan   RT-Objects Based on Temporal Causal
                                  Consistency: A New Approach for Fieldbus
                                  Systems  . . . . . . . . . . . . . . . . 464
             Julien Maisonneuve   Configuring Realtime CORBA Systems for
                                  Telecom Applications . . . . . . . . . . 468
               Kim Clohessy and   
                Brian Barry and   
                   Peter Tanner   New Complexities in the Embedded World
                                  --- The OTI Approach . . . . . . . . . . 472
                   Kim Mens and   
             Cristina Lopes and   
         Bedir Tekinerdogan and   
                Gregor Kiczales   XI: Aspect-Oriented Programming  . . . . 483
            Henning Schmidt and   
             Frank Schubert and   
                   Lutz Wohlrab   XII: Object-Orientation and Operating
                                  Systems  . . . . . . . . . . . . . . . . 497
           Antonio J. Nebro and   
           Ernesto Pimentel and   
           José M. Troya   Applying Distributed Shared Memory
                                  Techniques for Implementing Distributed
                                  Objects  . . . . . . . . . . . . . . . . 499
 Jürgen Kleinöder and   
                   Michael Golm   MetaJava --- A Platform for Adaptable
                                  Operating-System Mechanisms  . . . . . . 507
              J. Kleinoeder and   
                        M. Golm   MetaJava --- A Platform for Adaptable
                                  Operating-System Mechanisms  . . . . . . 507
                 Frank Schubert   A Reflective Architecture for an
                                  Adaptable Object-Oriented Operating
                                  System Based on C++  . . . . . . . . . . 515
                   Lutz Wohlrab   Configuration and Adaptation Management
                                  for Object-Oriented Operating Systems    523
                  Danilo Beuche   An Approach for Managing Highly
                                  Configurable Operating Systems . . . . . 531
      D. Alvarez Guitierrez and   
          L. Tajes Martinez and   
          F. Alvarez Garcia and   
              M. A. Diaz Fondon   An Object-Oriented Abstract Machine as
                                  the Substrate for an Object-Oriented
                                  Operating Systems  . . . . . . . . . . . 537
Darío Álvarez Gutiérrez and   
Lourdes Tajes Martínez and   
Fernando Álvarez García and   
María Ángeles Díaz Fondón and   
Raúl Izquierdo Castanedo and   
      Juan Manuel Cueva Lovelle   An Object-Oriented Abstract Machine as
                                  the Substrate for an Object-Oriented
                                  Operating System . . . . . . . . . . . . 537
                  Sven Graupner   Objects in Different Execution
                                  Environments . . . . . . . . . . . . . . 545


Lecture Notes in Computer Science
Volume 1358, 1998

                M. Albrecht and   
                E. Buchholz and   
            A. Duesterhoeft and   
                    B. Thalheim   An Informal and Efficient Approach for
                                  Obtaining Semantic Constraints Using
                                  Sample Data and Natural Language
                                  Processing . . . . . . . . . . . . . . . 1
                      J. Biskup   Achievements of Relational Database
                                  Schema Design Theory Revisited . . . . . 29
                S. Davidson and   
                 P. Buneman and   
                       A. Kosky   Semantics of Database Transformations    55
                 G. Gottlob and   
                     M. Schrefl   The Evolving Algebra Semantics of Class
                                  and Role Hierarchies . . . . . . . . . . 92
                B. Kuijpers and   
               J. Paredaens and   
                  L. Vandeurzen   Semantics in Spatial Databases . . . . . 114
                  M. Levene and   
                      G. Loizou   The Additivity Problem for Data
                                  Dependencies in Incomplete Relational
                                  Databases  . . . . . . . . . . . . . . . 136
                      L. Libkin   A Semantics-Based Approach to Design of
                                  Query Languages for Partial Information  170
                   P. Z. Revesz   Constraint Databases: A Survey . . . . . 209
                  M. W. Vincent   Redundancy Elimination and a New Normal
                                  Form for Relational Database Design  . . 247


Lecture Notes in Computer Science
Volume 1359, 1998

            S. Padmanabhuni and   
                    A. K. Ghose   Inductive constraint logic programming:
                                  An overview  . . . . . . . . . . . . . . 1--8
                G. Antoniou and   
                 M.-A. Williams   Some approaches to reasoning with
                                  incomplete and changing information  . . 9--44
            S. Padmanabhuni and   
                  R. Goebel and   
                    K. Furukawa   Curried least general generalization: A
                                  framework for higher order concept
                                  learning . . . . . . . . . . . . . . . . 45--60
                   H. E. Kyburg   Approximate validity . . . . . . . . . . 61--77
                      M. Bulmer   Inductive theories from equational
                                  systems  . . . . . . . . . . . . . . . . 78--91
                A. K. Ghose and   
            S. Padmanabhuni and   
                      R. Goebel   The role of default representations in
                                  incremental learning . . . . . . . . . . 92--105
                 M. Harries and   
                        K. Horn   Learning stable concepts in a changing
                                  world  . . . . . . . . . . . . . . . . . 106--122
                  B. McCane and   
                  T. Caelli and   
                      O. De Vel   Inducing complex spatial descriptions in
                                  two dimensional scenes . . . . . . . . . 123--132
            S. Padmanabhuni and   
                  J.-H. You and   
                    A. K. Ghose   A framework for learning constraints:
                                  Preliminary report . . . . . . . . . . . 133--147
                   M. Sebag and   
               C. Rouveirol and   
                    J.-F. Puget   Induction of Constraint Logic Programs   148--167
                  N. Jitnah and   
                A. E. Nicholson   Belief network algorithms: A study of
                                  performance based on domain
                                  characterization . . . . . . . . . . . . 168--187
           N. Karacapilidis and   
                    D. Papadias   A group decision and negotiation support
                                  system for argumentation based reasoning 188--205
              C. K. MacNish and   
                 M.-A. Williams   From belief revision to design revision:
                                  Applying theory change to changing
                                  requirements . . . . . . . . . . . . . . 206--220
                    J. A. Pinto   Using histories to model observations in
                                  theories of action . . . . . . . . . . . 221--233
              M. Prokopenko and   
                      P. Peppas   Modelling inertia in action languages
                                  (Extended Report)  . . . . . . . . . . . 234--247
                       A. Ramer   Combinatorial interpretation of
                                  uncertainty and conditioning . . . . . . 248--255
               A. C. Restificar   Probabilistic diagnosis as an update
                                  problem  . . . . . . . . . . . . . . . . 256--266
                  Choh Man Teng   Cooperative combination of default logic
                                  and autoepistemic logic  . . . . . . . . 267--283


Lecture Notes in Computer Science
Volume 1360, 1998

                       D. Kapur   Automated Geometric Reasoning: Dixon
                                  Resultants, Gröbner Bases, and
                                  Characteristic Sets  . . . . . . . . . . 1
                      Q.-N Tran   Extended Dixon's Resultant and Its
                                  Applications . . . . . . . . . . . . . . 37
                   T. Sturm and   
                V. Weispfenning   Computational Geometry Problems in
                                  REDLOG . . . . . . . . . . . . . . . . . 58
                G. C. Ferro and   
                   G. Gallo and   
                     R. Gennaro   Probabilistic Verification of Elementary
                                  Geometry Statements  . . . . . . . . . . 87
                    T. F. Havel   Computational Synthetic Geometry with
                                  Clifford Algebra . . . . . . . . . . . . 102
                        D. Wang   Clifford Algebraic Calculus for
                                  Geometric Reasoning with Application to
                                  Computer Vision  . . . . . . . . . . . . 115
         D. Fearnley-Sander and   
                      T. Stokes   Area in Grassmann Geometry . . . . . . . 141
                    L. Yang and   
                  X.-S. Gao and   
                 S.-C. Chou and   
                    J.-Z. Zhang   Automated Production of Readable Proofs
                                  for Theorems in Non-Euclidean Geometries 171
              E. Hillgarter and   
                     F. Winkler   Points on Algebraic Curves and the
                                  Parametrization Problem  . . . . . . . . 189
                     H. Shi and   
                         F. Zou   Flat Central Configurations of Four
                                  Planet Motions . . . . . . . . . . . . . 208
                       S. Fevre   Integration of Reasoning and Algebraic
                                  Calculus in Geometry . . . . . . . . . . 218


Lecture Notes in Computer Science
Volume 1361, 1998

             R. J. Anderson and   
                  V. Matyas and   
           F. A. Petitcolas and   
                   I. E. Buchan   Secure Books: Protecting the
                                  Distribution of Knowledge  . . . . . . . 1
                 M. G. Reed and   
             P. F. Syverson and   
               D. M. Goldschlag   Protocols Using Anonymous Connections:
                                  Mobile Applications  . . . . . . . . . . 13
                     T. Okamoto   Receipt-Free Electronic Voting Schemes
                                  for Large Scale Elections  . . . . . . . 25
                  E. Solana and   
                       J. Harms   Flexible Internet Secure Transactions
                                  Based on Collaborative Domains . . . . . 37
                      B. Crispo   How to Build Evidence in a Public-Key
                                  Infrastructure for Multi-domain
                                  Environments . . . . . . . . . . . . . . 53
                H. Petersen and   
                     M. Michels   On Signature Schemes with Threshold
                                  Verification Detecting Malicious
                                  Verifiers  . . . . . . . . . . . . . . . 67
                       S. Lucks   Open Key Exchange: How to Defeat
                                  Dictionary Attacks Without Encrypting
                                  Public Keys  . . . . . . . . . . . . . . 79
                  J. Kelsey and   
                B. Schneier and   
                      D. Wagner   Protocol Interactions and the Chosen
                                  Protocol Attack  . . . . . . . . . . . . 91--104
            B. Christianson and   
                  J. A. Malcolm   Binding Bit Patterns to Real World
                                  Entities . . . . . . . . . . . . . . . . 105
                     F. Bao and   
                 R. H. Deng and   
                  Y. F. Han and   
                  A. B. R. Jeng   Breaking Public Key Cryptosystems on
                                  Tamper Resistant Devices in the Presence
                                  of Transient Faults  . . . . . . . . . . 115
             R. J. Anderson and   
                        M. Kuhn   Low Cost Attacks on Tamper Resistant
                                  Devices  . . . . . . . . . . . . . . . . 125
            S. Blake-Wilson and   
                     A. Menezes   Entity Authentication and Authenticated
                                  Key Transport Protocols Employing
                                  Asymmetric Techniques  . . . . . . . . . 137
                    S. Guergens   SG Logic --- A Formal Analysis Technique
                                  for Authentication Protocols . . . . . . 159
                    H. Petersen   How to Convert any Digital Signature
                                  Scheme into a Group Signature Scheme . . 177
                     T. Okamoto   Threshold Key-Recovery Systems for RSA   191
                      K. Kiefer   A Weakness of the Menezes-Vanstone
                                  Cryptosystem . . . . . . . . . . . . . . 201
                    P. Paillier   On Ideal Non-perfect Secret Sharing
                                  Schemes  . . . . . . . . . . . . . . . . 207


Lecture Notes in Computer Science
Volume 1362, 1998

      Evangelos P. Markatos and   
    Manolis G. H. Katevenis and   
                Penny Vatsolaki   The Remote Enqueue Operation on Networks
                                  of Workstations  . . . . . . . . . . . . 1
                    Jeff Larson   The HAL Interconnect PCI Card  . . . . . 15
             Shailabh Nagar and   
                  Dale Seed and   
          Anand Sivasubramaniam   Implementing Protected Multi-User
                                  Communication for Myrinet  . . . . . . . 30
             Gordon Brebner and   
                     Rob Pooley   ECOLE: A Configurable Environment for a
                                  Local Optical Network of Workstations    45
              Chan Wai Ming and   
             Samuel Chanson and   
                   Mounir Hamdi   The Design of a Parallel Programming
                                  System for a Network of Workstations: An
                                  Object-Oriented Approach . . . . . . . . 59
        Manjunath Bangalore and   
          Anand Sivasubramaniam   Remote Subpaging Across a Fast Network   74
                    F. Munz and   
                 T. Stephan and   
                   U. Maier and   
                  T. Ludwig and   
                    A. Bode and   
                 S. Ziegler and   
                 S. Nekolla and   
             P. Bartenstein and   
                   M. Schwaiger   Improved Functional Imaging through
                                  Network Based Parallel Processing  . . . 88
Delphine Stéphanie Goujon and   
             Martial Michel and   
             Jasper Peeters and   
           Judith Ellen Devaney   AutoMap and AutoLink: Tools for
                                  Communicating Complex and Dynamic
                                  Data-Structures Using MPI  . . . . . . . 98
                 Norman Matloff   Analysis of a Programmed Backoff Method
                                  for Parallel Processing on Ethernets . . 110
                     N. Matloft   Analysis of a Programmed Backoff Method
                                  for Parallel Processing on Ethernets . . 110
        Alexander I-Chi Lai and   
                 Chin-Laung Lei   Improving Dynamic Token-Based
                                  Distributed Synchronization Performance
                                  via Optimistic Broadcasting  . . . . . . 118
                  G. Chiola and   
                     G. Ciaccio   Fast Barrier Synchronization on Shared
                                  Fast Ethernet  . . . . . . . . . . . . . 132
                Xipeng Xiao and   
                   Lionel M. Ni   Parallel Routing Table Computation for
                                  Scalable IP Routers  . . . . . . . . . . 144
              Rafael Casado and   
            Blanca Caminero and   
               Pedro Cuenca and   
           Francisco Quiles and   
            Antonio Garrido and   
              José Duato   A Tool for the Analysis of
                                  Reconfiguration and Routing Algorithms
                                  in Irregular Networks  . . . . . . . . . 159
               Cheng-Chi Yu and   
            Sourav Bhattacharya   Real-Time Traffic Management on Optical
                                  Networks Using Dynamic Control of Cycle
                                  Duration . . . . . . . . . . . . . . . . 174
              Sven Karlsson and   
                  Mats Brorsson   A Comparative Characterization of
                                  Communication Patterns in Applications
                                  Using MPI and Shared Memory on an IBM
                                  SP2  . . . . . . . . . . . . . . . . . . 189
               JunSeong Kim and   
                 David J. Lilja   Characterization of Communication
                                  Patterns in Message-Passing Parallel
                                  Scientific Application Programs  . . . . 202
            Giulio Iannello and   
               Mario Lauria and   
              Stefano Mercolino   Cross-Platform Analysis of Fast Messages
                                  for Myrinet  . . . . . . . . . . . . . . 217
                     Knut Omang   Performance of a Cluster of PCI Based
                                  UltraSparc Workstations Interconnected
                                  with SCI . . . . . . . . . . . . . . . . 232


Lecture Notes in Computer Science
Volume 1363, 1998

                    Fred Glover   A Template for Scatter Search and Path
                                  Relinking  . . . . . . . . . . . . . . . 13
              Jens Gottlieb and   
                      Nico Voss   Representations, Fitness Functions and
                                  Genetic Operators for the Satisfiability
                                  Problem  . . . . . . . . . . . . . . . . 55
              Cathy Escazut and   
               Philippe Collard   Genetic Algorithms at the Edge of a
                                  Dream  . . . . . . . . . . . . . . . . . 69
             Mathieu Peyral and   
       Antoine Ducoulombier and   
     Caroline Ravisé and   
            Marc Schoenauer and   
                Mich\`ele Sebag   Mimetic Evolution  . . . . . . . . . . . 81
                A. E. Eiben and   
             J. K. Van Der Hauw   Adaptive Penalties for Evolutionary
                                  Graph Coloring . . . . . . . . . . . . . 95
            Cristina Cuenca and   
             Jean-Claude Heudin   An Agent System for Learning Profiles in
                                  Broadcasting Applications on the
                                  Internet . . . . . . . . . . . . . . . . 109
              A. Piccolboni and   
                       G. Mauri   Application of Evolutionary Algorithms
                                  to Protein Folding Prediction  . . . . . 123
            Isabelle Servet and   
Louise Travé-Massuy\`es and   
                   Daniel Stern   Telephone Network Traffic Overloading
                                  Diagnosis and Evolutionary Computation
                                  Techniques . . . . . . . . . . . . . . . 137
           Christine Gaspin and   
                  Thomas Schiex   Genetic Algorithms for Genetic Mapping   145
             Benoit Leblanc and   
             Evelyne Lutton and   
             Jean-Paul Allouche   Inverse Problems for Finite Automata: A
                                  Solution Based on Genetic Algorithms . . 157
                 Julio Tanomaru   Evolving Turing Machines from Examples   167
               Alexandru Agapie   Genetic Algorithms: Minimal Conditions
                                  for Convergence  . . . . . . . . . . . . 183
                Sangyeop Oh and   
                   Hyunsoo Yoon   An Analysis of Punctuated Equilibria in
                                  Simple Genetic Algorithms  . . . . . . . 195
                Bart Naudts and   
               Alain Verschoren   SGA Search Dynamics on Second Order
                                  Functions  . . . . . . . . . . . . . . . 207
            Günter Rudolph   Asymptotical Convergence Rates of Simple
                                  Evolutionary Algorithms under
                                  Factorizing Mutation Distributions . . . 223
                Eric Dedieu and   
           Olivier Lebeltel and   
              Pierre Bessi\`ere   Wings Were Not Designed to Let Animals
                                  Fly  . . . . . . . . . . . . . . . . . . 237
               Ralf Salomon and   
              Peter Eggenberger   Adaptation on the Evolutionary Time
                                  Scale: A Working Hypothesis and Basic
                                  Experiments  . . . . . . . . . . . . . . 251
           Christine Crisan and   
          Heinz Mühlenbein   The Frequency Assignment Problem: A Look
                                  at the Performance of Evolutionary
                                  Search . . . . . . . . . . . . . . . . . 263
                  S. Rochet and   
               G. Venturini and   
                 M. Slimane and   
              E. M. El Kharoubi   A Critical and Empirical Study of
                                  Epistasis Measures for Predicting GA
                                  Performances: A Summary  . . . . . . . . 275
               Leila Kallel and   
                Marc Schoenauer   A Priori Comparison of Binary Crossover
                                  Operators: No Universal Statistical
                                  Measure, But a Set of Hints  . . . . . . 287
                A. Loeffler and   
                 J. Klahold and   
                    U. Rueckert   The Dynamical Nightwatch's Problem
                                  Solved by the Autonomous Micro-Robot
                                  Khepera  . . . . . . . . . . . . . . . . 303
            A. Löffler and   
                 J. Klahold and   
                U. Rückert   The Dynamical Nightwatch's Problem
                                  Solved by the Autonomous Micro-Robot
                                  Khepera  . . . . . . . . . . . . . . . . 303
                 Felix Gers and   
              Hugo de Garis and   
                 Michael Korkin   CoDi-1Bit: A Simplified Cellular
                                  Automata Based Neuron Model  . . . . . . 315
                H. De Garis and   
                    L. Kang and   
                      Q. He and   
                         Z. Pan   Million Module Neural Systems Evolution
                                  --- The Next Step in ATR's Billion
                                  Neuron Artificial Brain (``CAM-Brain'')
                                  Project  . . . . . . . . . . . . . . . . 335
              Hugo de Garis and   
                Lishan Kang and   
                  Qiming He and   
               Zhengjun Pan and   
            Masahiro Ootani and   
                  Edmund Ronald   Million Module Neural Systems Evolution
                                  --- The Next Step in ATR's Billion
                                  Neuron Artificial Brain (``CAM-Brain'')
                                  Project  . . . . . . . . . . . . . . . . 335


Lecture Notes in Computer Science
Volume 1364, 1998

                   W. Conen and   
                     G. Neumann   A Perspective on Technology-Assisted
                                  Collaboration  . . . . . . . . . . . . . 1
            P. M. Schiefloe and   
                T. G. Syvertsen   Coordination in Knowledge-Intensive
                                  Organizations  . . . . . . . . . . . . . 9
                  P. Bernus and   
                   G. Uppington   Co-ordination of Management Activities
                                  --- Mapping Organisational Structure to
                                  the Decision Structure . . . . . . . . . 25
               G. Fernandez and   
               I. Wijegunaratne   A Cooperative Approach to Distributed
                                  Applications Engineering . . . . . . . . 39
                   P. Tarau and   
                    V. Dahl and   
                K. De Bosschere   Towards Logic Programming Based
                                  Coordination in Virtual Worlds . . . . . 49
               K. Nishimoto and   
                    Y. Sumi and   
                        K. Mase   Enhancement of Creative Aspects of a
                                  Daily Conversation with a Topic
                                  Development Agent  . . . . . . . . . . . 63
                   K. S. Decker   Coordinating Human and Computer Agents   77
                  G. Kappel and   
           S. Rausch-Schott and   
              W. Retschitzegger   Coordination in Workflow Management
                                  Systems --- A Rule-Based Approach  . . . 99
                    C. A. Ellis   A Framework and Mathematical Model for
                                  Collaboration Technology . . . . . . . . 121
                  K.-H. Kim and   
                       S.-K Pak   Practical Experiences and Requirements
                                  on Workflow  . . . . . . . . . . . . . . 145
                       M. Klein   Coordination Science: Challenges and
                                  Directions . . . . . . . . . . . . . . . 161
                  M. Berger and   
                G. Voelksen and   
                      A. Schill   Supporting Autonomous Work and
                                  Reintegration in Collaborative Systems   177
              J. Schlichter and   
                    M. Koch and   
                     M. Buerger   Workspace Awareness for Distributed
                                  Teams  . . . . . . . . . . . . . . . . . 199
                 M. Sivadas and   
                   G. Fernandez   GeM and WeBUSE: Towards a WWW-Database
                                  Interface  . . . . . . . . . . . . . . . 219
                   E. Kuehn and   
                     G. Nozicka   Post-Client/Server Coordination Tools    231
                  D.-H. Kim and   
                  K.-H. Lee and   
                 M.-G. Kang and   
                      G.-H. Han   An Experimental Delay Analysis for Local
                                  Audio Video Streams for Desktop
                                  Collaborations . . . . . . . . . . . . . 255
                     T. Lee and   
                    J. Park and   
             Seok Hwan Yoon and   
                Pyeong Jung Kim   Supporting Both Client-Server and
                                  Peer-to-Peer Models in a Framework of a
                                  Distributed Object Management System . . 263


Lecture Notes in Computer Science
Volume 1365, 1998

                   D. Kinny and   
                   J. Treur and   
                  L. Gasser and   
                       S. Clark   Panel: Methodologies for Multi-Agent
                                  Systems  . . . . . . . . . . . . . . . . 1
               M. Schoppers and   
                     D. Shapiro   Designing Embedded Agents to Optimize
                                  End-User Objectives  . . . . . . . . . . 3
                  J. Bryson and   
                   B. McGonigle   Agent Architecture as Object Oriented
                                  Design . . . . . . . . . . . . . . . . . 15
             E. M. Verharen and   
                  F. Dignum and   
                         S. Bos   Implementation of a Cooperative Agent
                                  Architecture Based on the
                                  Language-Action Perspective  . . . . . . 31
                 V. Parunak and   
                  J. Sauter and   
                       S. Clark   Toward the Specification and Design of
                                  Industrial Synthetic Ecosystems  . . . . 45
                R. Schwartz and   
                       S. Kraus   Bidding Mechanisms for Data Allocation
                                  in Multi-Agent Environments  . . . . . . 61
                    M. P. Singh   A Customizable Coordination Service for
                                  Autonomous Agents  . . . . . . . . . . . 93
              S. Coradeschi and   
                    L. Karlsson   A Behavior-Based Approach to Reactivity
                                  and Coordination: A Preliminary Report   107
                     J. Lee and   
                   E. H. Durfee   On Explicit Plan Languages for
                                  Coordinating Multiagent Plan Execution   113
              G. A. Kaminka and   
                       M. Tambe   Social Comparison for Failure Detection
                                  and Recovery . . . . . . . . . . . . . . 127
              O. M. Shehory and   
                  K. Sycara and   
                         S. Jha   Multi-Agent Coordination through
                                  Coalition Formation  . . . . . . . . . . 143
               M. D'Inverno and   
                   D. Kinny and   
                    M. Luck and   
                  M. Wooldridge   A Formal Specification of dMARS  . . . . 155
                  C. Sierra and   
             N. R. Jennings and   
                 P. Noriega and   
                     S. Parsons   A Framework for Argumentation-Based
                                  Negotiation  . . . . . . . . . . . . . . 177
                  M. Mulder and   
                   J. Treur and   
                      M. Fisher   Agent Modelling in MetateM and DESIRE    193
                  Y. Labrou and   
                       T. Finin   Semantics for an Agent Communication
                                  Language . . . . . . . . . . . . . . . . 209
             K. V. Hindriks and   
              F. S. De Boer and   
            W. Van der Hoek and   
                 J.-J. C. Meyer   Formal Semantics for an Abstract Agent
                                  Programming Language . . . . . . . . . . 215
                  F. Dignum and   
                       R. Conte   Intentional Agents and Goal Formation    231
                 C. G. Jung and   
                     K. Fischer   A Layered Agent Calculus with
                                  Concurrent, Continuous Processes . . . . 245
                     F. Koriche   Approximate Reasoning about Combined
                                  Knowledge  . . . . . . . . . . . . . . . 259
                    Ho Ngoc Duc   On the Epistemic Foundations of Agent
                                  Theories . . . . . . . . . . . . . . . . 275
               M. H. Nodine and   
                       A. Unruh   Facilitating Open Communication in Agent
                                  Systems: The InfoSleuth Infrastructure   281
            W. Van de Velde and   
                  S. Geldof and   
                   R. Schrooten   Competition for Attention  . . . . . . . 297
             C. A. Iglesias and   
                  M. Garijo and   
             J. C. Gonzalez and   
                  J. R. Velasco   Analysis and Design of Multiagent
                                  Systems Using MAS-CommonKADS . . . . . . 313
               R. E. Gustavsson   Multi-Agent Systems as Open Societies
                                  --- A Design Framework . . . . . . . . . 329
                 R. S. Cost and   
                I. Soboroff and   
                 J. Lakhani and   
                       T. Finin   TKQML: A Scripting Tool for Building
                                  Agents . . . . . . . . . . . . . . . . . 339


Lecture Notes in Computer Science
Volume 1366, 1998

                N. Mitchell and   
                  L. Carter and   
                J. Ferrante and   
                   K. Hoegstedt   Quantifying the Multi-level Nature of
                                  Tiling Interactions  . . . . . . . . . . 1
                     J. Xue and   
                    C.-H. Huang   Reuse-Driven Tiling for Data Locality    16
                 K.-P. Shih and   
                 J.-P. Sheu and   
                    C.-H. Huang   Table-Lookup Approach for Compiling
                                  Two-Level Data-Processor Mappings in HPF 34
               J. Ramanujam and   
                   S. Dutta and   
                 A. Venkatachar   Code Generation for Complex Subscripts
                                  in Data-Parallel Programs  . . . . . . . 49
         M. Damian-Iordache and   
                S. V. Pemmaraju   Automatic Data Decomposition for
                                  Message-Passing Machines . . . . . . . . 64
                  A. Sawdey and   
                     M. O'Keefe   Program Analysis of Overlap Area Usage
                                  in Self-Similar Parallel Programs  . . . 79
                      V. Sarkar   Analysis and Optimization of Explicitly
                                  Parallel Programs Using the Parallel
                                  Program Graph Representation . . . . . . 94
                     J. Lee and   
              S. P. Midkiff and   
                    D. A. Padua   Concurrent Static Single Assignment Form
                                  and Constant Propagation for Explicitly
                                  Parallel Programs  . . . . . . . . . . . 114
                Y.-S. Hwang and   
                       J. Saltz   Identifying DEF/USE Information of
                                  Statements that Construct and Traverse
                                  Dynamic Recursive Data Structures  . . . 131
                 J.-Y. Tsai and   
                   Z. Jiang and   
                      P.-C. Yew   Program Optimization for Concurrent
                                  Multithreaded Architectures  . . . . . . 146
                    I. Park and   
                    M. Voss and   
               B. Armstrong and   
                   R. Eigenmann   Interactive Compilation and Performance
                                  Analysis with Ursa Minor . . . . . . . . 163
                T.-C. Huang and   
                      P.-H. Hsu   The SPNT Test: A New Technology for
                                  Run-Time Speculative Parallelization of
                                  Loops  . . . . . . . . . . . . . . . . . 177
                J. Borowiec and   
                        A. Veen   Lowering HPF Procedure Interface to a
                                  Canonical Representation . . . . . . . . 192
                   G. Zhang and   
               B. Carpenter and   
                     G. Fox and   
                          X. Li   PCRC-based HPF Compilation . . . . . . . 204
              G. P. Trabado and   
                   E. L. Zapata   Data Parallel Language Extensions for
                                  Exploiting Locality in Irregular
                                  Problems . . . . . . . . . . . . . . . . 218
          J. Mellor-Crummey and   
                        V. Adve   Simplifying Control Flow in
                                  Compiler-Generated Parallel Code . . . . 235
                     H. Han and   
                C.-W. Tseng and   
                     P. Keleher   Reducing Synchronization Overhead for
                                  Compiler-Parallelized Codes on Software
                                  DSMs . . . . . . . . . . . . . . . . . . 240
                    X. Yuan and   
                   R. Gupta and   
                      R. Melhem   An Array Data Flow Analysis Based
                                  Communication Optimizer  . . . . . . . . 246
          B. L. Chamberlain and   
                 S.-E. Choi and   
                      L. Snyder   A Compiler Abstraction for Machine
                                  Independent Parallel Communication
                                  Generation . . . . . . . . . . . . . . . 261
                H. G. Dietz and   
               T. I. Mattoz and   
               G. Krishnamurthy   The Aggregate Function API: It's Not
                                  Just for PAPERS Anymore  . . . . . . . . 277
              R. W. Numrich and   
              J. L. Steidel and   
              B. H. Johnson and   
          B. Dupont de Dinechin   Definition of the $ F_{--} $ Extension
                                  to Fortran 90  . . . . . . . . . . . . . 292
                 E. Ayguade and   
               X. Martorell and   
                 J. Labarta and   
                    M. Gonzalez   Exploiting Parallelism Through
                                  Directives on the Nano-Threads
                                  Programming Model  . . . . . . . . . . . 307
                D. Banerjee and   
                   Y. C. Browne   ``Optimal'' Parallelism through
                                  Integration of Data and Control
                                  Parallelism: A Case Study in Complete
                                  Parallelization  . . . . . . . . . . . . 322
               B. Carpenter and   
                Y.-J. Chang and   
                     G. Fox and   
                          X. Li   Java as a Language for Scientific
                                  Parallel Programming . . . . . . . . . . 340
               A. J. C. Bik and   
             J. E. Villacis and   
                   D. B. Gannon   Experience with Loop Parallelization in
                                  javar (A Prototype Restructuring
                                  Compiler for Java) . . . . . . . . . . . 355
                 L. V. Kale and   
              M. Bhandarkar and   
                 R. Brunner and   
                     N. Krawetz   NAMD: A Case Study in Multilingual
                                  Parallel Programming . . . . . . . . . . 367
          B. Dupont de Dinechin   A Unified Software Pipeline Construction
                                  Scheme for Modulo Scheduled Loops  . . . 382
                 G. Bilardi and   
              A. A. Nicolau and   
                      J. Hummel   A Systematic Approach to Branch
                                  Speculation  . . . . . . . . . . . . . . 394
                G.-H. Hwang and   
                  J. K. Lee and   
                    D.-C. R. Ju   Integrating Automatic Data Alignment and
                                  Array Operation Synthesis to Optimize
                                  Data Parallel Programs . . . . . . . . . 412
                   M. Gupta and   
                  S. P. Midkiff   A Compiler for the IBM Scalable Shared
                                  Memory Project Machine . . . . . . . . . 416
                      U. Kremer   Automatic Data Layout with Read-Only
                                  Replication and Memory Constraints . . . 419
               D. K. Arvind and   
                    T. A. Lewis   Static Analysis of Recursive Data
                                  Structures . . . . . . . . . . . . . . . 423


Lecture Notes in Computer Science
Volume 1367, 1998

                  Thomas Jansen   1. Introduction to the Theory of
                                  Complexity and Approximation Algorithms  5
                Artur Andrzejak   2. Introduction to Randomized Algorithms 29
                 Detlef Sieling   3. Derandomization . . . . . . . . . . . 41
                Stefan Hougardy   4. Proof Checking and
                                  Non-approximability  . . . . . . . . . . 63
                Volker Heun and   
            Wolfgang Merkle and   
                 Ulrich Weigand   5. Proving the PCP-Theorem . . . . . . . 83
                  C. Groepl and   
                    M. Skutella   Parallel Repetition of MIP(2,1) Systems  161
         Clemens Gröpl and   
                Martin Skutella   6. Parallel Repetition of MIP(2,1)
                                  Systems  . . . . . . . . . . . . . . . . 161
          Sebastian Seibert and   
                   Thomas Wilke   7. Bounds for Approximating \sc
                                  MaxLinEq3-2 and \sc MaxE$k$Sat . . . . . 179--211
                 Claus Rick and   
               Hein Röhrig   8. Deriving Non-approximability Results
                                  by Reductions  . . . . . . . . . . . . . 213
            Martin Mundhenk and   
          Anna Slobodová   9. Optimal Non-approximability of \sc
                                  MaxClique  . . . . . . . . . . . . . . . 235
                Alexander Wolff   10. The Hardness of Approximating Set
                                  Cover  . . . . . . . . . . . . . . . . . 249
          Thomas Hofmeister and   
              Martin Hühne   11. Semidefinite Programming and Its
                                  Applications to Approximation Algorithms 263
                     Katja Wolf   12. Dense Instances of Hard Optimization
                                  Problems . . . . . . . . . . . . . . . . 299
               Richard Mayr and   
               Annette Schelten   13. Polynomial Time Approximation
                                  Schemes for Geometric Optimization
                                  Problems in Euclidean Metric Spaces  . . 313
                      Anonymous   Bibliography . . . . . . . . . . . . . . 325
                      Anonymous   Author Index . . . . . . . . . . . . . . 335
                      Anonymous   Subject Index  . . . . . . . . . . . . . 337
                      Anonymous   List of Contributors . . . . . . . . . . 343


Lecture Notes in Computer Science
Volume 1368, 1998

                      K. Tamura   WWC and the Hyper Information Age  . . . 1
                        K. Chon   Global High Performance Research
                                  Network: An Asia-Pacific Perspective . . 6
                   G. L. Steele   Java Applications and Implementations    18
                      M. Tokoro   Back to Home: Where Computers and
                                  Networking Should Go . . . . . . . . . . 32
                       G. Glass   ObjectSpace Voyager --- The Agent ORB
                                  for Java . . . . . . . . . . . . . . . . 38
               K. Matsubara and   
                 T. Maekawa and   
                        K. Kato   Worldwide Component Scripting with the
                                  Planet Mobile Object System  . . . . . . 56
                A. Nakamura and   
                T. Nishioka and   
                Y. Hamazaki and   
                   M. Tsukamoto   Scalability in Object-Oriented
                                  Distributed Systems Environment OZ . . . 72
                  D. C. Luckham   Rapide: A Language and Toolset for
                                  Causal Event Modeling of Distributed
                                  System Architectures . . . . . . . . . . 88
                  M. Aoyama and   
               T. Yamashita and   
                      S. Kobori   An Architecture of Software Commerce
                                  Broker over the Internet . . . . . . . . 97
              M. Matsushita and   
                  M. Oshita and   
                    H. Iida and   
                       K. Inoue   Distributed Process Management System
                                  Based on Object-Centered Process
                                  Modeling . . . . . . . . . . . . . . . . 108
                    R. Rajkumar   Systems Software for Multimedia
                                  Computing  . . . . . . . . . . . . . . . 120
                T. Nakajima and   
                    H. Aizu and   
               M. Kobayashi and   
                   K. Shimamoto   Environment Server: A System Support for
                                  Adaptive Distributed Applications  . . . 142
                Y. Furukawa and   
                   E. Shibayama   Compiler-Generated Protection Domains
                                  and a Light Weight Runtime Protection
                                  Technique  . . . . . . . . . . . . . . . 158
                   V. Gupta and   
              G. Montenegro and   
                    J. Rulifson   Complete Computing . . . . . . . . . . . 174
                K. Matsuura and   
                   Y. Zheng and   
                        H. Imai   Compact and Flexible Resolution of CBT
                                  Multicast Key-Distribution . . . . . . . 190
              A. Shionozaki and   
               K. Yamashita and   
                  S. Utsumi and   
                         K. Cho   Integrating Resource Reservation with
                                  Rate-Based Transport Protocols in AMInet 206
                     K. Lai and   
            M. Roussopoulos and   
                    D. Tang and   
                        X. Zhao   Experiences with a Mobile Testbed  . . . 222
                M. Ishiyama and   
                   A. Inoue and   
                A. Fukumoto and   
                     T. Okamoto   Design and Implementation of Mobile IP
                                  System with Security Consideration . . . 238
                  K. Uehara and   
                 T. Tateoka and   
                Y. Watanabe and   
                    H. Sunahara   A Network Architecture for Continuous
                                  Mobility . . . . . . . . . . . . . . . . 254
             Kok Yong Leong and   
                     H. Liu and   
                          O. Wu   Towards Internationalized Web Creation   270
                P. De Maria and   
                      C. De Mei   ISCM, Information System Conceptual
                                  Model Oriented to Security Problems and
                                  a Tool Implementing It . . . . . . . . . 282
                      T.-K Park   Design of EDI Security MIB Based on SNMP
                                  Protocol . . . . . . . . . . . . . . . . 293
                    Y. Masunaga   The Block-World Data Model for a
                                  Collaborative Virtual Environment  . . . 309
                   P. Pulli and   
               T. Pyssysalo and   
                  K. Kuutti and   
                     J. Similae   CyPhone --- Mobile Multimodal Personal
                                  Augmented Reality  . . . . . . . . . . . 325
                         W. Kim   On Business Intelligence Systems . . . . 337
                     J. C. Tang   Supporting Collaboration through
                                  Teleproximity  . . . . . . . . . . . . . 349
                   S. Honda and   
                K.-I. Okada and   
                  Y. Matsushita   A Home Office System Based on a Virtual
                                  Shared Room: An Environment
                                  Corresponding to Degree of Concentration 364
                A. Hazeyama and   
                      M. Hanawa   Electronic Binder System: Promotion of
                                  an ISO9001-Based Quality System Using
                                  the WWW and Experience from Its
                                  Application  . . . . . . . . . . . . . . 381
                      C. Pu and   
                         L. Liu   Update Monitoring: The CQ Project  . . . 396
                  H. Looser and   
                     T. Haerder   dLIMIT --- A Middleware Framework for
                                  Loosely-Coupled Database Federations . . 412
                     Y. Guo and   
                Y. Hiranaka and   
                    T. Akatsuka   Autonomic Buffer Control of Web Proxy
                                  Server . . . . . . . . . . . . . . . . . 428
                   T. Matsumoto   Getting Users' Attributes Without
                                  Violating Anonymity  . . . . . . . . . . 439
              L. F. G. Sarmenta   Bayanihan: Web-Based Volunteer Computing
                                  Using Java . . . . . . . . . . . . . . . 444
                     T. Morioka   Architecture of a User Interface Module
                                  for Structured Internet Messages . . . . 462


Lecture Notes in Computer Science
Volume 1369, 1998

               J. Paredaens and   
                B. Kuijpers and   
                   G. Kuper and   
                  L. Vandeurzen   Euclid, Tarski, and Engeler Encompassed  1
                      P. Wadler   Functional Programming: An Angry
                                  Half-Dozen . . . . . . . . . . . . . . . 25
                   S. Cluet and   
                  R. Connor and   
                    R. Hull and   
                       D. Maier   Metadata for Database Interoperation . . 35
                S. Grumbach and   
                  P. Rigaux and   
                  M. Scholl and   
                    L. Segoufin   DEDALE, a Spatial Constraint Database    38
                    B. Kuijpers   Degrees of Monotonicity of Spatial
                                  Transformations  . . . . . . . . . . . . 60
                      S. Alagic   Constrained Matching is Type Safe  . . . 78
                      R. Connor   Existentially Quantified Procedures: A
                                  Mechanism for Abstracting Type in
                                  Dynamic Typing Constructs  . . . . . . . 97
               A. J. Bonner and   
                       G. Mecca   Querying Sequence Databases with
                                  Transducers  . . . . . . . . . . . . . . 118
               M. Fernandez and   
                    L. Popa and   
                       D. Suciu   A Structure-Based Approach to Querying
                                  Semi-structured Data . . . . . . . . . . 136
              T. Abdessalem and   
                      G. Jomier   VQL: A Query Language for Multiversion
                                  Databases  . . . . . . . . . . . . . . . 160
                 Z. Lacroix and   
                 C. Delobel and   
                      P. Breche   Object Views and Database Restructuring  180
               A. Kawaguchi and   
                 D. Lieuwen and   
                  I. Mumick and   
                        K. Ross   Implementing Incremental View
                                  Maintenance in Nested Data Models  . . . 202
                  L. Libkin and   
                        L. Wong   Incremental Recomputation of Recursive
                                  Queries with Nested Sets and Aggregate
                                  Functions  . . . . . . . . . . . . . . . 222
                   C. Beeri and   
                    T. Milo and   
                     P. Ta-Shma   Towards a Language for the Fully Generic
                                  Queries  . . . . . . . . . . . . . . . . 239
                  L. Libkin and   
                        L. Wong   On the Power of Aggregation in
                                  Relational Query Languages . . . . . . . 260
                  M. Cadoli and   
                L. Palopoli and   
                   M. Lenzerini   Datalog and Description Logics:
                                  Expressive Power . . . . . . . . . . . . 281
                F. J. Faase and   
                 S. J. Even and   
                R. A. De By and   
                 P. M. G. Apers   Integrating Organisational and
                                  Transactional Aspects of Cooperative
                                  Activities . . . . . . . . . . . . . . . 336
                     F. Matthes   Business Conversations: A High-Level
                                  System Model for Agent Coordination  . . 355
                   A. J. Bonner   Transaction Datalog: A Compositional
                                  Language for Transaction Programming . . 373
                   D. Spelt and   
                    H. Balsters   Automatic Verification of Transactions
                                  on an Object-Oriented Database . . . . . 396
                   G. Amaro and   
               F. Giannotti and   
                    G. Mainetto   Static Analysis of Transactions for
                                  Conservative Multigranularity Locking    413


Lecture Notes in Computer Science
Volume 1370, 1998

                    Mark Weiser   The Invisible Interface: Increasing the
                                  Power of the Environment through Calm
                                  Technology . . . . . . . . . . . . . . . 1
               John Worthington   Working Place for the Knowledge Economy  2
         Norbert A. Streitz and   
    Jörg Geißler and   
                 Torsten Holmer   Roomware for Cooperative Buildings:
                                  Integrated Design of Architectural
                                  Spaces and Information Spaces  . . . . . 4
             Craig Wisneski and   
              Hiroshi Ishii and   
              Andrew Dahley and   
                Matt Gorbet and   
                Scott Brave and   
               Brygg Ullmer and   
                     Paul Yarin   Ambient Displays: Turning Architectural
                                  Space into an Interface between People
                                  and Digital Information  . . . . . . . . 22
                   Jun Rekimoto   Multiple-Computer User Interfaces: A
                                  Cooperative Environment Consisting of
                                  Multiple Digital Devices . . . . . . . . 33
                Michael H. Coen   A Prototype Intelligent Environment  . . 41
               Lisa M. Covi and   
            Judith S. Olson and   
                Elena Rocco and   
          William J. Miller and   
                     Paul Allie   A Room of Your Own: What Do We Learn
                                  about Support of Teamwork from Assessing
                                  Teams in Dedicated Project Rooms?  . . . 53
      Geraldine Fitzpatrick and   
               Simon Kaplan and   
                 Sara Parsowith   Experience in Building a Cooperative
                                  Distributed Organization: Lessons for
                                  Cooperative Buildings  . . . . . . . . . 66
                  Susan Yee and   
        William J. Mitchell and   
               Ryusuke Naka and   
            Mitsuo Morozumi and   
             Sigeyuki Yamaguchi   The Kumamoto-Kyoto-MIT Collaborative
                                  Project: A Case Study of the Design
                                  Studio of the Future . . . . . . . . . . 80
                    David Kirsh   Adaptive Rooms, Virtual Collaboration
                                  and Cognitive Workflow . . . . . . . . . 94
  Hans-Rüdiger Pfister and   
       Christian Schuckmann and   
       Jennifer Beck-Wilson and   
                 Martin Wessner   The Metaphor of Virtual Rooms in the
                                  Cooperative Learning Environment CLear   107
                     Kai Bender   Integrated Architecture of Electronic
                                  Mall Systems --- How Strategies,
                                  Processes and Organizations Influence
                                  Information System Design  . . . . . . . 114
           Albrecht Schmidt and   
          Alexander Specker and   
            Gerhard Partsch and   
              Michael Weber and   
            Siegfried Höck   An Agent-Based Telecooperation Framework 122
                    John Frazer   The Co-operative Evolution of Buildings
                                  and Cities . . . . . . . . . . . . . . . 130
              Lyn Pemberton and   
           Richard N. Griffiths   The Timeless Way: Making Living
                                  Cooperative Buildings with Design
                                  Patterns . . . . . . . . . . . . . . . . 142
                 Niklaus Kohler   Sustainability of New Work Practises and
                                  Building Concepts  . . . . . . . . . . . 154
                Ivar Moltke and   
            Hans H. K. Andersen   Cooperative Buildings --- The Case of
                                  office VISION  . . . . . . . . . . . . . 163
                Robert Hunt and   
             Andrea Vanecko and   
                Steven Poltrock   Future@Work: An Experimental Exhibit
                                  Investigating Integrated Workplace
                                  Design . . . . . . . . . . . . . . . . . 177
        Rüdiger Lainer and   
                     Ina Wagner   Connecting Qualities of Social Use with
                                  Spatial Qualities  . . . . . . . . . . . 191
                   Rob H. Hagen   Law Enforcement of Working Space
                                  Requirements in Office Buildings --- The
                                  Policy of the Labour Inspectorate in The
                                  Netherlands  . . . . . . . . . . . . . . 204
              Karin Joeckle and   
          Monika Schneiders and   
            Thomas Sieverts and   
              Marianne Koch and   
                Hartmut Chodura   Organizing Space in Time --- Discovering
                                  Existing Resources . . . . . . . . . . . 208
            Christian Falkowski   A Room Management System . . . . . . . . 219
          Stefan Junestrand and   
                 Konrad Tollmar   The Dwelling as a Place for Work . . . . 230
                John Hughes and   
                Jon O'Brien and   
                     Tom Rodden   Understanding Technology in Domestic
                                  Environments: Lessons for Cooperative
                                  Buildings  . . . . . . . . . . . . . . . 248


Lecture Notes in Computer Science
Volume 1371, 1998

                 Alan Wexelblat   Research Challenges in Gesture: Open
                                  Issues and Unsolved Problems . . . . . . 1
         Alistair D. N. Edwards   Progress in Sign Language Recognition    13
                Sotaro Kita and   
          Ingeborg van Gijn and   
            Harry van der Hulst   Movement Phases in Signs and Co-speech
                                  Gestures, and Their Transcription by
                                  Human Coders . . . . . . . . . . . . . . 23
                    Axel Kramer   Classifying Two Dimensional Gestures in
                                  Interactive Systems  . . . . . . . . . . 37
               Shuichi Nobe and   
            Satoru Hayamizu and   
             Osamu Hasegawa and   
              Hideaki Takahashi   Are Listeners Paying Attention to the
                                  Hand Gestures of an Anthropomorphic
                                  Agent? An Evaluation Using a Gaze
                                  Tracking Method  . . . . . . . . . . . . 49
           Monica Bordegoni and   
              Franco De Angelis   Gesture-Based and Haptic Interaction for
                                  Human Skill Acquisition  . . . . . . . . 61
             Gerhard Rigoll and   
            Andreas Kosmala and   
                Stefan Eickeler   High Performance Real-Time Gesture
                                  Recognition Using Hidden Markov Models   69
           Frank G. Hofmann and   
                Peter Heyer and   
             Günter Hommel   Velocity Profile Based Recognition of
                                  Dynamic Gestures with Discrete Hidden
                                  Markov Models  . . . . . . . . . . . . . 81
              Marcell Assan and   
                  Kirsti Grobel   Video-Based Sign Language Recognition
                                  Using Hidden Markov Models . . . . . . . 97
                   S. Gibet and   
              J. Richardson and   
               T. Lebourque and   
                    A. Braffort   Corpus of $3$D Natural Movements and
                                  Sign Language Primitives of Movement . . 111
        Karin Husballe Munk and   
                    Erik Granum   On the Use of Context and A Priori
                                  Knowledge in Motion Analysis for Visual
                                  Gesture Recognition  . . . . . . . . . . 123
              Hermann Hienz and   
                  Kirsti Grobel   Automatic Estimation of Body Regions
                                  from Video Images  . . . . . . . . . . . 135
        Frank Godenschweger and   
          Thomas Strothotte and   
                 Hubert Wagener   Rendering Gestures as Line Drawings  . . 147
       Karen McKenzie Mills and   
                  James L. Alty   Investigating the Role of Redundancy in
                                  Multimodal Input Systems . . . . . . . . 159
               M. Froehlich and   
                   I. Wachsmuth   Gesture Recognition of the Upper Limbs
                                  --- From Signal to Symbol  . . . . . . . 173
       Martin Fröhlich and   
                 Ipke Wachsmuth   Gesture Recognition of the Upper Limbs
                                  --- From Signal to Symbol  . . . . . . . 173
       Marc Erich Latoschik and   
                 Ipke Wachsmuth   Exploiting Distant Pointing Gestures for
                                  Object Selection in a Virtual
                                  Environment  . . . . . . . . . . . . . . 185
           Caroline Hummels and   
                Gerda Smets and   
                 Kees Overbeeke   An Intuitive Two-Handed Gestural
                                  Interface for Computer Supported Product
                                  Design . . . . . . . . . . . . . . . . . 197
                 C. Noelker and   
                      H. Ritter   Detection of Fingertips in Human Hand
                                  Movement Sequences . . . . . . . . . . . 209
        Claudia Nölker and   
                   Helge Ritter   Detection of Fingertips in Human Hand
                                  Movement Sequences . . . . . . . . . . . 209
        Hans-Joachim Boehme and   
            Anja Brakensiek and   
      Ulf-Dietrich Braumann and   
             Markus Krabbes and   
            Horst-Michael Gross   Neural Architecture for Gesture-Based
                                  Human-Machine-Interaction  . . . . . . . 219
             Jochen Triesch and   
     Christoph von der Malsburg   Robotic Gesture Recognition  . . . . . . 233
    Axel Christian Varchmin and   
                 Robert Rae and   
                   Helge Ritter   Image Based Recognition of Gaze
                                  Direction Using Adaptive Methods . . . . 245
                    Shan Lu and   
                  Seiji Igi and   
             Hideaki Matsuo and   
                 Yuji Nagashima   Towards a Dialogue System Based on
                                  Recognition and Synthesis of Japanese
                                  Sign Language  . . . . . . . . . . . . . 259
             Hideaki Matsuo and   
                  Seiji Igi and   
                    Shan Lu and   
             Yuji Nagashima and   
                Yuji Takata and   
               Terutaka Teshima   The Recognition Algorithm with
                                  Non-contact for Japanese Sign Language
                                  Using Morphological Analysis . . . . . . 273
                  Markus Kohler   Special Topics of Gesture Recognition
                                  Applied in Intelligent Home Environments 285
               Morten Fjeld and   
             Martin Bichsel and   
            Matthias Rauterberg   BUILD-IT: An Intuitive Design Tool Based
                                  on Direct Object Manipulation  . . . . . 297


Lecture Notes in Computer Science
Volume 1372, 1998

        Ali Aydin Selçuk   New Results in Linear Cryptanalysis of
                                  RC5  . . . . . . . . . . . . . . . . . . 1
               Shiho Moriai and   
          Takeshi Shimoyama and   
               Toshinobu Kaneko   Higher Order Differential Attack of a
                                  CAST Cipher  . . . . . . . . . . . . . . 17
            Don Coppersmith and   
               David Wagner and   
             Bruce Schneier and   
                    John Kelsey   Cryptanalysis of TWOPRIME  . . . . . . . 32--48
      Hervé Chabanne and   
                Emmanuel Michon   JEROBOAM . . . . . . . . . . . . . . . . 49
                  J. Daemen and   
                 C. S. K. Clapp   Fast Hashing and Stream Encryption with
                                  PANAMA . . . . . . . . . . . . . . . . . 60--74
              Craig S. K. Clapp   Joint Hardware \slash Software Design of
                                  a Fast Stream Cipher . . . . . . . . . . 75
      Kanat S. Abdukhalikov and   
                       Chul Kim   On the Security of the Hashing Scheme
                                  Based on SL$_2$  . . . . . . . . . . . . 93
                Jacques Patarin   About Feistel Schemes with Six (or more)
                                  Rounds . . . . . . . . . . . . . . . . . 103
                 Adam Young and   
                      Moti Yung   Monkey: Black-Box Symmetric Ciphers
                                  Designed for MON\em opolizing KEY\em s   122--133
           Rei Safavi-Naini and   
          Shahram Bakhtiari and   
                  Chris Charnes   MRD Hashing  . . . . . . . . . . . . . . 134
             William Aiello and   
               Stuart Haber and   
         Ramarathnam Venkatesan   New Constructions for Secure Hash
                                  Functions  . . . . . . . . . . . . . . . 150
                John Kelsey and   
             Bruce Schneier and   
               David Wagner and   
                     Chris Hall   Cryptanalytic Attacks on Pseudorandom
                                  Number Generators  . . . . . . . . . . . 168--188
              Jacques Stern and   
                 Serge Vaudenay   CS-CIPHER  . . . . . . . . . . . . . . . 189
            Lars R. Knudsen and   
             Vincent Rijmen and   
           Ronald L. Rivest and   
          Matthew J. B. Robshaw   On the Design and Security of RC2  . . . 206
                  Eli Biham and   
              Ross Anderson and   
                Lars R. Knudsen   Serpent: A New Block Cipher Proposal . . 222
                   Stefan Lucks   Attacking Triple Encryption  . . . . . . 239
                   David Wagner   Cryptanalysis of some Recently-Proposed
                                  Multiple Modes of Operation  . . . . . . 254--269
            Bart Van Rompay and   
            Lars R. Knudsen and   
                 Vincent Rijmen   Differential Cryptanalysis of the ICE
                                  Encryption Algorithm . . . . . . . . . . 270
              B. Van Rompay and   
              L. R. Knudsen and   
                      V. Rijmen   Differential Cryptanalysis of the ICE
                                  Encryption Algorithm . . . . . . . . . . 270
                 Hans Dobbertin   The First Two Rounds of MD4 are Not
                                  One-Way  . . . . . . . . . . . . . . . . 284
                   David Wagner   Differential Cryptanalysis of KHF  . . . 293


Lecture Notes in Computer Science
Volume 1373, 1998

                     R. M. Karp   Random Graphs, Random Walks,
                                  Differential Equations and the
                                  Probabilistic Analysis of Algorithms . . 1
                 J. Janssen and   
                 D. Krizanc and   
               L. Narayanan and   
                      S. Shende   Distributed Online Frequency Assignment
                                  in Cellular Networks . . . . . . . . . . 3
                      M. Thorup   Floats, Integers, and Single Source
                                  Shortest Paths . . . . . . . . . . . . . 14
                   M. Habib and   
                    C. Paul and   
                     L. Viennot   A Synthesis on Partition Refinement: A
                                  Useful Routine for Strings, Graphs,
                                  Boolean Matrices and Automata  . . . . . 25
                J. C. Bradfield   Simplifying the Modal $ \lambda
                                  $-calculus Alternation Hierarchy . . . . 39
                   T. Eiter and   
                 T. Ibaraki and   
                      K. Makino   On Disguised Double Horn Functions and
                                  Extensions . . . . . . . . . . . . . . . 50
                   S. Demri and   
                 P. Schnoebelen   The Complexity of Propositional Linear
                                  Temporal Logics in Simple Cases  . . . . 61
        D. A. M. Barrington and   
                   C.-J. Lu and   
            P. B. Miltersen and   
                       S. Skyum   Searching Constant Width Mazes Captures
                                  the AC00 Hierarchy . . . . . . . . . . . 73
                 L. Fortnow and   
                    S. Laplante   Nearly Optimal Language Compression
                                  Using Extractors . . . . . . . . . . . . 84
              J. H. Spencer and   
                    K. St. John   Random Sparse Bit Strings at the
                                  Threshold of Adjacency . . . . . . . . . 94
                   M. Sauerhoff   Lower Bounds for Randomized
                                  Read-$k$-Times Branching Programs  . . . 105
                 J. Mazoyer and   
                    I. Rapaport   Inducing an Order on Cellular Automata
                                  by a Grouping Operation  . . . . . . . . 116
                 G. Manzini and   
                     L. Margara   Attractors of D-dimensional Linear
                                  Cellular Automata  . . . . . . . . . . . 128
              C. Mereghetti and   
                  G. Pighizzini   Optimal Simulations Between Unary
                                  Automata . . . . . . . . . . . . . . . . 139
                    A. Mateescu   Shuffle of omega-words: Algebraic
                                  Aspects  . . . . . . . . . . . . . . . . 150
                 H. Buhrman and   
           D. Van Melkebeek and   
                K. W. Regan and   
                   D. Sivakumar   A Generalization of Resource-Bounded
                                  Measure, With an Application . . . . . . 161
                  V. Arvind and   
                  R. Beigel and   
                      A. Lozano   The Complexity of Modular Graph
                                  Automorphism . . . . . . . . . . . . . . 172
                  L. Libkin and   
                        L. Wong   Unary Quantifiers, Transitive Closure,
                                  and Relations of Large Degree  . . . . . 183
                  P. Buergisser   On the Structure of Valiant's Complexity
                                  Classes  . . . . . . . . . . . . . . . . 194
                     D. Sieling   On the Existence of Polynomial Time
                                  Approximation Schemes for
                                  OBDD-Minimization  . . . . . . . . . . . 205
              J. Feigenbaum and   
                  S. Kannan and   
                M. Y. Vardi and   
                 M. Viswanathan   Complexity of Problems on Graphs
                                  Represented as OBDDs . . . . . . . . . . 216
                 J. Behrens and   
                       S. Waack   Equivalence Test and Ordering
                                  Transformation for Parity-OBDDs of
                                  Different Variable Ordering  . . . . . . 227
                  C. Groepl and   
              H. J. Proemel and   
                   A. Srivastav   Size and Structure of Random Ordered
                                  Binary Decision Diagrams . . . . . . . . 238
                    S. Vaudenay   Provable Security for Block Ciphers by
                                  Decorrelation  . . . . . . . . . . . . . 249
                  C. Bazgan and   
                  M. Santha and   
                        Z. Tuza   On the Approximation of Finding
                                  a(nother) Hamiltonian Cycle in Cubic
                                  Hamiltonian Graphs . . . . . . . . . . . 276
                      K. Jansen   The Mutual Exclusion Scheduling Problem
                                  for Permutation and Comparability Graphs 287
              N. H. Bshouty and   
                L. J. Burroughs   Massaging a Linear Programming Solution
                                  to Give a $2$-Approximation for a
                                  Generalization of the Vertex Cover
                                  Problem  . . . . . . . . . . . . . . . . 298
                   K. S. Larsen   Partially Persistent Search Trees with
                                  Transcript Operations  . . . . . . . . . 309
                D. Niwinski and   
                 I. Walukiewicz   Relating Hierarchies of Word and Tree
                                  Automata . . . . . . . . . . . . . . . . 320
                   H. Straubing   Languages Defined with Modular Counting
                                  Quantifiers  . . . . . . . . . . . . . . 332
                     M. Jantzen   Hierarchies of Principal Twist-Closed
                                  Trios  . . . . . . . . . . . . . . . . . 344
                       T. Safer   Radix Representations of Algebraic
                                  Number Fields and Finite Automata  . . . 356
                     T. Hagerup   Sorting and Searching on the Word RAM    366
                  M. Diallo and   
                A. Ferreira and   
                 A. Rau-Chaplin   Communication-Efficient Deterministic
                                  Parallel Algorithms for Planar Point
                                  Location and 2D Voronoi Diagram  . . . . 399
                        C. Rueb   On Batcher's Merge Sorts as Parallel
                                  Sorting Algorithms . . . . . . . . . . . 410
                     J. Gustedt   Minimum Spanning Trees for Minor-Closed
                                  Graph Classes in Parallel  . . . . . . . 421
                A. Dessmark and   
                  A. Lingas and   
                  H. Olsson and   
                    H. Yamamoto   Optimal Broadcasting in Almost Trees and
                                  Partial $k$-trees  . . . . . . . . . . . 432
              T. Schwentick and   
                 K. Barthelmann   Local Normal Forms for First-Order Logic
                                  with Applications to Games and Automata  444
                        Z. Esik   Axiomatizing the Equational Theory of
                                  Regular Tree Languages . . . . . . . . . 455
                   A. Monti and   
                       A. Peron   A Logical Characterization of Systolic
                                  Languages  . . . . . . . . . . . . . . . 466
                 J. Messner and   
                       J. Toran   Optimal Proof Systems for Propositional
                                  Logic and Complete Sets  . . . . . . . . 477
                   M. Serna and   
                L. Trevisan and   
                       F. Xhafa   The (Parallel) Approximability of
                                  Non-Boolean Satisfiability Problems and
                                  Restricted Integer Programming . . . . . 488
                  S. Ivanov and   
                M. De Rougemont   Interactive Protocols on the Reals . . . 499
            G. Di Crescenzo and   
                 K. Sakurai and   
                        M. Yung   Result-Indistinguishable Zero-Knowledge
                                  Proofs: Increased Power and
                                  Constant-Round Protocols . . . . . . . . 511
             S. De Agostino and   
                   R. Silvestri   Bounded Size Dictionary Compression:
                                  SC0k-Completeness and NC Algorithms  . . 522
                   R. Meyer and   
                       A. Petit   Expressive Completeness of LTrL on
                                  Finite Traces: An Algebraic Proof  . . . 533
                     A. E. Frid   On the Uniform DOL Words . . . . . . . . 544
                  K. Lodaya and   
                        P. Weil   Series-Parallel Posets: Algebra,
                                  Automata and Languages . . . . . . . . . 555
                        R. Kemp   On the Expected Number of Nodes at Level
                                  k in 0-balanced Trees  . . . . . . . . . 566
             M. C. Golumbic and   
                      H. Kaplan   Cell Flipping in Permutation Diagrams    577
                M. Dorkenoo and   
        M.-C. Eglin-Leclerc and   
                      E. Remila   Construction of Non-intersecting Colored
                                  Flows Through a Planar Cellular Figure   587
               C. S. Calude and   
             P. H. Hertling and   
             B. Khoussainov and   
                        Y. Wang   Recursively Enumerable Reals and Chaitin
                                  Omega Numbers  . . . . . . . . . . . . . 596
                   S. Kosub and   
                 H. Schmitz and   
                     H. Vollmer   Uniformly Defining Complexity Classes of
                                  Functions  . . . . . . . . . . . . . . . 607
                     D. Lapoire   Recognizability Equals Monadic
                                  Second-Order Derinability, for Sets of
                                  Graphs of Bounded Tree-Width . . . . . . 618


Lecture Notes in Computer Science
Volume 1374, 1998

                     Harry Bunt   Issues in Multimodal Human-Computer
                                  Communication  . . . . . . . . . . . . . 1
                Mark T. Maybury   Toward Cooperative Multimedia
                                  Interaction  . . . . . . . . . . . . . . 13--38
                 Harry Bunt and   
            René Ahn and   
           Robbert-Jan Beun and   
              Tijn Borghuis and   
              Kees van Overveld   Multimodal Cooperation with the \sc DenK
                                  System . . . . . . . . . . . . . . . . . 39--67
        Catherine Pelachaud and   
            Justine Cassell and   
              Norman Badler and   
              Mark Steedman and   
              Scott Prevost and   
                  Matthew Stone   Synthesizing Cooperative Conversation    68
                  Bonnie Webber   Instructing Animated Agents: Viewing
                                  Language in Behavioral Terms . . . . . . 89
             Jacques Siroux and   
              Marc Guyomard and   
              Franck Multon and   
           Christophe Remondeau   Modeling and Processing of Oral and
                                  Tactile Activities in the GEORAL System  101
                Adam Cheyer and   
                      Luc Julia   Multimodal Maps: An Agent-Based Approach 111
                     Y. Hah and   
                    I. Zukerman   Using Cooperative Agents to Plan
                                  Multimodal Presentations . . . . . . . . 122
                     Yi Han and   
                Ingrid Zukerman   Using Cooperative Agents to Plan
                                  Multimodal Presentations . . . . . . . . 122
               J. C. Martin and   
                 R. Veldman and   
              D. Béroule   Developing Multimodal Interfaces: A
                                  Theoretical Framework and Guided
                                  Propagation Networks . . . . . . . . . . 158
            Patrick Bourdot and   
                  Mike Krus and   
                  Rachid Gherbi   Cooperation between Reactive $3$D
                                  Objects and a Multimodal X Window Kernel
                                  for CAD  . . . . . . . . . . . . . . . . 188
           Fergal McCaffery and   
             Michael McTear and   
                 Maureen Murphy   A Multimedia Interface for Circuit Board
                                  Assembly . . . . . . . . . . . . . . . . 213
                Kent Wittenburg   Visual Language Parsing: If I Had a
                                  Hammer\ldots . . . . . . . . . . . . . . 231
                   John Lee and   
                 Keith Stenning   Anaphora in Multimodal Discourse . . . . 250
                Laurel Fais and   
         Kyung-ho Loken-Kim and   
                 Young-Duk Park   Speakers' Responses to Requests for
                                  Repetition in a Multimedia Language
                                  Processing Environment . . . . . . . . . 264
                  Anita Cremers   Object Reference in Task-Oriented
                                  Keyboard Dialogues . . . . . . . . . . . 279
              Tsuneaki Kato and   
               Yukiko I. Nakano   Referent Identification Requests in
                                  Multi-Modal Dialogs  . . . . . . . . . . 294
                 Carla Huls and   
                      Edwin Bos   Studies into Full Integration of
                                  Language and Action  . . . . . . . . . . 312
  Marie-Christine Bressolle and   
             Bernard Pavard and   
                  Marcel Leroux   The Role of Multimodal Communication in
                                  Cooperation: The Cases of Air Traffic
                                  Control  . . . . . . . . . . . . . . . . 326


Lecture Notes in Computer Science
Volume 1375, 1998

                   N. Rudaz and   
               R. D. Hersch and   
                V. Ostromoukhov   An Interface for the Interactive Design
                                  of Artistic Screens  . . . . . . . . . . 1
           Adam Finkelstein and   
                   Marisa Range   Image Mosaics  . . . . . . . . . . . . . 11
                 Cameron Browne   Font Decoration by Automatic Mesh
                                  Fitting  . . . . . . . . . . . . . . . . 23--43
                Jacky Hertz and   
               Changyuan Hu and   
         Jakob Gonczarowski and   
                Roger D. Hersch   A Window-Based Method for Automatic
                                  Typographic Parameter Extraction . . . . 44--54
                 ByungHoon Kang   Unified Table Approach for Typographic
                                  Rendering  . . . . . . . . . . . . . . . 55--65
             Jakob Gonczarowski   Producing the Skeleton of a Character    66
                     Beat Stamm   Visual TrueType: A Graphical Method for
                                  Authoring Font Intelligence  . . . . . . 77--92
               Ariel Shamir and   
                  Ari Rappoport   Feature-Based Design of Fonts Using
                                  Constraints  . . . . . . . . . . . . . . 93
                  Uwe Schneider   An Object-Oriented Model for the
                                  Hierarchical Composition of Letterforms
                                  in Computer-Aided Typeface Design  . . . 109
         Yannis Haralambous and   
                    John Plaice   The Design and Use of a
                                  Multiple-Alphabet Font with $ \Omega $   126--137
             Yannis Haralambous   Simplification of the Arabic Script:
                                  Three Different Approaches and their
                                  Implementations  . . . . . . . . . . . . 138--156
                  S. K. Mohanty   The Formulation of Parameters for Type
                                  Design of Indian Scripts Based on
                                  Calligraphic Studies . . . . . . . . . . 157--166
               Richard Southall   Metafont in the Rockies: The Colorado
                                  Typemaking Project . . . . . . . . . . . 167--180
                Vincent Connare   Designing and Using Scalable Type for
                                  Display as Graphic Elements on Digital
                                  Devices  . . . . . . . . . . . . . . . . 181
            Victor Ostromoukhov   Mathematical Tools for
                                  Computer-Generated Ornamental Patterns   193--223
                    Qun Lou and   
                   Peter Stucki   Fundamentals of $3$D Halftoning  . . . . 224
Frédéric Bapst and   
                    Rolf Ingold   Using Typography in Document Image
                                  Analysis . . . . . . . . . . . . . . . . 240
                Do-Hoon Lee and   
                   Hwan-Gue Cho   The Beta-Velocity Model for Simulating
                                  Handwritten Korean Scripts . . . . . . . 252
                    Peter Karow   Two Decades of Typographic Research at
                                  URW: A Retrospective . . . . . . . . . . 265--280
               R. A. Morris and   
               R. D. Hersch and   
                     A. Coimbra   Legibility of Condensed
                                  Perceptually-Tuned Grayscale Fonts . . . 281--293
              Mary C. Dyson and   
                Gary J. Kipping   Exploring the Effect of Layout on
                                  Reading from Screen  . . . . . . . . . . 294
          Tomoko I. Kataoka and   
             Yutaka Kataoka and   
            Kazutomo Uezono and   
                Hiroyoshi Ohara   Internationalized Text Manipulation
                                  Covering Perso-Arabic Enhanced for
                                  Mongolian Scripts  . . . . . . . . . . . 305--318
            Nabil Bouzaiene and   
            Lo\"\ic Le Gall and   
           Emmanuel Saint-James   Une biblioth\`eque informatique pour la
                                  notation musicale baroque  . . . . . . . 319
          Hél\`ene Richy   Document Style Design by Direct
                                  Manipulation . . . . . . . . . . . . . . 331
               Rolf Brugger and   
Frédéric Bapst and   
                    Rolf Ingold   A DTD Extension for Document Structure
                                  Recognition  . . . . . . . . . . . . . . 343
                 Peter King and   
              Helen Cameron and   
              Howard Bowman and   
                 Simon Thompson   Synchronization in Multimedia Documents  355
             Muriel Jourdan and   
       Cécile Roisin and   
                 Laurent Tardif   Édition et visualisation interactive de
                                  documents multimédia  . . . . . . . . . . 370
        Terry Cumaranatunge and   
                Ethan V. Munson   Memory Scalability in Constraint-Based
                                  Multimedia Style Sheet Systems . . . . . 381
              Marc Dymetman and   
                  Max Copperman   Intelligent Paper  . . . . . . . . . . . 392
              Heather Brown and   
             Robert Harding and   
                 Steven Lay and   
             Peter Robinson and   
               Dan Sheppard and   
                  Richard Watts   Active Alice: Using Real Paper to
                                  Interact with Electronic Text  . . . . . 407
               Kazem Taghva and   
               Allen Condit and   
                  Julie Borsack   Autotag: A Tool for Creating Structured
                                  Document Collections from Printed
                                  Materials  . . . . . . . . . . . . . . . 420
               P. Froehitch and   
                   N. Henze and   
                       W. Nejdl   Hyperbook Data Modeling  . . . . . . . . 432
        Peter Fröhlich and   
               Nicola Henze and   
                 Wolfgang Nejdl   Hyperbook Data Modeling  . . . . . . . . 432
              T. Brettbauer and   
   A. Brüggemann-Klein and   
                 S. Hermann and   
                       R. Klein   A Component Architecture for Cross-media
                                  Formatters . . . . . . . . . . . . . . . 444
          Thomas Bretthauer and   
 Anne Brüggemann-Klein and   
             Stefan Hermann and   
                     Rolf Klein   A Component Architecture for Cross-media
                                  Formatters . . . . . . . . . . . . . . . 444
             Terrence A. Brooks   The Effect of Textual Aesthetics on
                                  Information Retrieval  . . . . . . . . . 454--463
                  A. Ballim and   
                   G. Coray and   
                  A. Linden and   
                  C. Vanoirbeek   The Use of Automatic Alignment on
                                  Structured Multilingual Documents  . . . 464
              Helena Ahonen and   
          Barbara Heikkinen and   
            Oskari Heinonen and   
              Jani Jaakkola and   
     Pekka Kilpeläinen and   
           Greger Lindén   Design and Implementation of a Document
                                  Assembly Workbench . . . . . . . . . . . 476
    François Paradis and   
      Anne-Marie Vercoustre and   
                  Brendan Hills   A Virtual Document Interpreter for Reuse
                                  of Information . . . . . . . . . . . . . 487
      Anne-Marie Vercoustre and   
        François Paradis   Reuse of Linked Documents through
                                  Virtual Document Prescriptions . . . . . 499
             Isabel F. Cruz and   
              Slava Borisov and   
           Michael A. Marks and   
                Timothy R. Webb   Measuring Structural Similarity Among
                                  Web Documents: Preliminary Results . . . 513
             Shueh-Cheng Hu and   
                 Richard Furuta   A Tool for Maintaining Multi-variant
                                  Hypertext Documents  . . . . . . . . . . 525
            Habib Rhissassi and   
                     Alain Lelu   Projet Hypermap: pour un environnement
                                  complet de génération automatique
                                  d'hypertexte . . . . . . . . . . . . . . 537
              Steve Probets and   
        David F. Brailsford and   
                   Les Carr and   
                     Wendy Hall   Dynamic Link Inclusion in Online PDF
                                  Journals . . . . . . . . . . . . . . . . 550
         Subhasish Mazumdar and   
                  Gary Yuan and   
                Weifeng Bao and   
                 Jonathan Price   Adding Semantics to SGML Databases . . . 563


Lecture Notes in Computer Science
Volume 1376, 1998

                   H. Ehrig and   
                M. Gajewsky and   
                      U. Wolter   From Abstract Data Types to Algebraic
                                  Development Techniques: A Shift of
                                  Paradigms  . . . . . . . . . . . . . . . 1
                    J. Meseguer   Membership Algebra as a Logical
                                  Framework for Equational Specification   18
                J. Meseguer and   
                   U. Montanari   Mapping Tile Logic into Rewriting Logic  62
                  D. Ancona and   
                       E. Zucca   An algebra of mixin modules  . . . . . . 92
               T. Borzyszkowski   Correctness of a logical system for
                                  structured specifications  . . . . . . . 107
                   R. Bruni and   
                   U. Montanari   Zero-safe nets: The individual token
                                  approach . . . . . . . . . . . . . . . . 122
                 M. Cerioli and   
                       E. Zucca   Implementation of derived programs
                                  (almost) for free  . . . . . . . . . . . 141
                  S. Cherki and   
                      C. Choppy   A method for FORTRAN programs reverse
                                  engineering using algebraic
                                  specifications . . . . . . . . . . . . . 156
                     C. Cirstea   Coalgebra semantics for hidden algebra:
                                  Parameterised objects and inheritance    174
                   A. Corradini   A completeness result for equational
                                  deduction in coalgebraic specification   190
             F. M. Dionisio and   
                   U. W. Lipeck   Specifying with defaults: Compositional
                                  semantics  . . . . . . . . . . . . . . . 206
                F. Gadducci and   
                      R. Heckel   An inductive view of graph
                                  transformation . . . . . . . . . . . . . 223
                 M. Gogolla and   
                    M. Richters   On combining semiformal and formal
                                  object specification techniques  . . . . 238
                    B. Gramlich   Modular aspects of rewrite-based
                                  specifications . . . . . . . . . . . . . 253
                M. Grosse-Rhode   From algebra transformation to labelled
                                  transition systems . . . . . . . . . . . 269
                      S. Lasota   Open maps as a bridge between algebraic
                                  observational equivalence and
                                  bisimilarity . . . . . . . . . . . . . . 285
                 A. Martini and   
                      U. Welter   A systematic study of mappings between
                                  institutions . . . . . . . . . . . . . . 300
                 T. Mossakowski   Colimits of order-sorted specifications  316
             T. Mossakowski and   
             B. Krieg-Brueckner   Static semantic analysis and theorem
                                  proving for CASL . . . . . . . . . . . . 333
             T. Mossakowski and   
                A. Tarlecki and   
                   W. Pawtowski   Combining and representing logical
                                  systems using model-theoretic parchments 349
                    P. Padawitz   Towards the one-tiered design of data
                                  types and transition systems . . . . . . 365
                   W. Pawtowski   Context parchments . . . . . . . . . . . 381
                    B. Reus and   
                   A. Knapp and   
             P. Cenciarelli and   
                     M. Wirsing   Verifying a compiler optimization for
                                  Multi-Threaded Java  . . . . . . . . . . 402
                 M. Walicki and   
                    M. Bialasik   Categories of relational structures  . . 418


Lecture Notes in Computer Science
Volume 1377, 1998

                 Gerhard Weikum   On the Ubiquity of Information Services
                                  and the Absence of Guaranteed Service
                                  Quality  . . . . . . . . . . . . . . . . 3
              Paolo Ciaccia and   
              Marco Patella and   
                   Pavel Zezula   Processing Complex Similarity Queries
                                  with Distance-Based Access Methods . . . 9
               Norbert Fuhr and   
            Thomas Rölleke   HySpirit --- A Probabilistic Inference
                                  Engine for Hypermedia Retrieval in Large
                                  Databases  . . . . . . . . . . . . . . . 24
                 E. Bertino and   
                 B. Catania and   
                  B. Shidlovsky   Towards Optimal Indexing for Segment
                                  Databases  . . . . . . . . . . . . . . . 39
             Ramana Yerneni and   
    Yannis Papakonstantinou and   
            Serge Abiteboul and   
           Hector Garcia-Molina   Fusion Queries over Internet Databases   57
        Giansalvatore Mecca and   
       Alberto O. Mendelzon and   
                 Paolo Merialdo   Efficient Queries over Web Views . . . . 72
          George A. Mihaila and   
             Louiqa Raschid and   
                Anthony Tomasic   Equal Time for Data on the Internet with
                                  WebSemantics . . . . . . . . . . . . . . 87
                  Dao-I Lin and   
                   Zvi M. Kedem   Pincer Search: A New Algorithm for
                                  Discovering the Maximum Frequent Set . . 105
                Shin-Chung Shao   Multivariate and Multidimensional OLAP   120
               Martin Ester and   
          Rüdiger Wittmann   Incremental Generalization for Mining in
                                  a Data Warehousing Environment . . . . . 135
                Wolfgang Lehner   Modeling Large Scale OLAP Scenarios  . . 153--167
            Sunita Sarawagi and   
             Rakesh Agrawal and   
                 Nimrod Megiddo   Discovery-Driven Exploration of OLAP
                                  Data Cubes . . . . . . . . . . . . . . . 168
               Luca Cabibbo and   
               Riccardo Torlone   A Logical Approach to Multidimensional
                                  Databases  . . . . . . . . . . . . . . . 183
         Wolfgang Scheufele and   
                Guido Moerkotte   Efficient Dynamic Programming Algorithms
                                  for Ordering Expensive Joins and
                                  Selections . . . . . . . . . . . . . . . 201
           Stefan Berchtold and   
        Christian Böhm and   
             Hans-Peter Kriegel   Improving the Query Performance of
                                  High-Dimensional Index Structures by
                                  Bulk Load Operations . . . . . . . . . . 216
          Jaber A. Al-Marri and   
        Shahram Ghandeharizadeh   An Evaluation of Alternative Disk
                                  Scheduling Techniques in Support of
                                  Variable Bit Rate Continuous Media . . . 231
                    L. Feng and   
                      H. Lu and   
                  Y. C. Tay and   
                     K. H. Tung   Buffer Management in Distributed
                                  Database Systems: A Data Mining-Based
                                  Approach . . . . . . . . . . . . . . . . 246
            Kenneth A. Ross and   
          Divesh Srivastava and   
        Damianos Chatziantoniou   Complex Aggregation at Multiple
                                  Granularities  . . . . . . . . . . . . . 263
                  T. Fukuda and   
                   H. Matsuzawa   Parallel Processing of Multiple
                                  Aggregate Queries on Shared-Nothing
                                  Multiprocessors  . . . . . . . . . . . . 278
             Fukuda Takeshi and   
             Hirofumi Matsuzawa   Parallel Processing of Multiple
                                  Aggregate Queries on Shared-Nothing
                                  Multiprocessors  . . . . . . . . . . . . 278
               M. O. Akinde and   
               O. G. Jensen and   
              M. H. Böhlen   Minimizing Detail Data in Data
                                  Warehouses . . . . . . . . . . . . . . . 293
  Véronique Benzaken and   
                Xavier Schaefer   Static Management of Integrity in
                                  Object-Oriented Databases: Design and
                                  Implementation . . . . . . . . . . . . . 311
Jérôme Darmont and   
             Bertrand Petit and   
               Michel Schneider   OCB: A Generic Benchmark to Evaluate the
                                  Performances of Object-Oriented Database
                                  Systems  . . . . . . . . . . . . . . . . 326
              Sin Yeung Lee and   
                  Tok Wang Ling   A Path Removing Technique for Detecting
                                  Trigger Termination  . . . . . . . . . . 341
              Anisoara Nica and   
                 Amy J. Lee and   
          Elke A. Rundensteiner   The CVS Algorithm for View
                                  Synchronization in Evolvable Large-Scale
                                  Information Systems  . . . . . . . . . . 359
                  Dimitra Vista   Integration of Incremental View
                                  Maintenance into Query Optimizers  . . . 374
                   Jun Yang and   
                 Jennifer Widom   Maintaining Temporal Views Over
                                  Non-temporal Information Sources for
                                  Data Warehousing . . . . . . . . . . . . 389
              B. Ludaescher and   
                         W. May   Referential Actions: From Logical
                                  Semantics to Implementation  . . . . . . 404
     Bertram Ludäscher and   
                   Wolfgang May   Referential Actions: From Logical
                                  Semantics to Implementation  . . . . . . 404
           Piero Fraternali and   
                  Paolo Paolini   A Conceptual Model and a Tool
                                  Environment for Developing More
                                  Scalable, Dynamic, and Customizable Web
                                  Applications . . . . . . . . . . . . . . 421
               Paolo Atzeni and   
        Giansalvatore Mecca and   
                 Paolo Merialdo   Design and Maintenance of Data-Intensive
                                  Web Sites  . . . . . . . . . . . . . . . 436
           Motomichi Toyama and   
              Takuhiro Nagafuji   Dynamic and Structured Presentation of
                                  Database Contents on the Web . . . . . . 451
             Rakesh Agrawal and   
        Dimitrios Gunopulos and   
                  Frank Leymann   Mining Process Models from Workflow Logs 469
                  Jian Tang and   
                  San-Yih Hwang   A Scheme to Specify and Implement Ad-Hoc
                                  Recovery in Workflow Systems . . . . . . 484
           Anthony S. Kosky and   
              I-Min A. Chen and   
        Victor M. Markowitz and   
                   Ernest Szeto   Exploring Heterogeneous Biological
                                  Databases: Tools and Applications  . . . 499


Lecture Notes in Computer Science
Volume 1378, 1998

                Michael Mislove   Generalizing Domain Theory . . . . . . . 1
                 Luca Aceto and   
                Wan Fokkink and   
Anna Ingólfsdóttir   A Cook's Tour of Equational
                                  Axiomatizations for Prefix Iteration . . 20
          Can Adam Albayrak and   
                    Thomas Noll   The WHILE Hierarchy of Program Schemes
                                  Is Infinite  . . . . . . . . . . . . . . 35
          Roberto M. Amadio and   
          Solange Coupet-Grimal   Analysis of a Guard Condition in Type
                                  Theory . . . . . . . . . . . . . . . . . 48
               Paolo Baldan and   
           Andrea Corradini and   
                  Ugo Montanari   An Event Structure Semantics for P/T
                                  Contextual Nets: Asymmetric Event
                                  Structures . . . . . . . . . . . . . . . 63
            Dani\`ele Beauquier   Pumping Lemmas for Timed Automata  . . . 81
            Michele Boreale and   
            Rocco De Nicola and   
               Rosario Pugliese   Asynchronous Observations of Processes   95
              Anne Bottreau and   
           Yves Métivier   Minor Searching, Normal Forms of Graph
                                  Relabelling: Two Applications Based on
                                  Enumerations by Graph Relabelling  . . . 110
         Michael A. Bukatin and   
           Svetlana Yu. Shorina   Partial Metrics and Co-continuous
                                  Valuations . . . . . . . . . . . . . . . 125
              Luca Cardelli and   
               Andrew D. Gordon   Mobile Ambients  . . . . . . . . . . . . 140
           Andrea Corradini and   
                 Fabio Gadducci   Rational Term Rewriting  . . . . . . . . 156
              Reinhold Heckmann   The Appearance of Big Integers in Exact
                                  Real Arithmetic Based on Linear
                                  Fractional Transformations . . . . . . . 172
       Renate Klempien-Hinrichs   Net Refinement by Pullback Rewriting . . 189
                    Oliver Matz   On Piecewise Testable, Starfree, and
                                  Recognizable Picture Languages . . . . . 203
                  Eugenio Moggi   Functor Categories and Two-Level
                                  Languages  . . . . . . . . . . . . . . . 211
              Anca Muscholl and   
                Doron Peled and   
                    Zhendong Su   Deciding Properties for Message Sequence
                                  Charts . . . . . . . . . . . . . . . . . 226
            Gundula Niemann and   
                 Friedrich Otto   The Church--Rosser Languages Are the
                                  Deterministic Variants of the Growing
                                  Context-Sensitive Languages  . . . . . . 243
             Sylvain Porrot and   
                Max Dauchet and   
               Bruno Durand and   
        Nikolai K. Vereshchagin   Deterministic Rational Transducers and
                                  Random Sequences . . . . . . . . . . . . 258
                  Julian Rathke   Resource Based Models for Asynchrony . . 273


Lecture Notes in Computer Science
Volume 1379, 1998

                Jan Willem Klop   Origin Tracking in Term Rewriting  . . . 1
                   Satoshi Okui   Simultaneous Critical Pairs and
                                  Church--Rosser Property  . . . . . . . . 2
                 Enno Ohlebusch   Church--Rosser Theorems for Abstract
                                  Reduction Modulo an Equivalence Relation 17
             Friedrich Otto and   
       Andrea Sattler-Klein and   
                 Klaus Madlener   Automatic Monoids Versus Monoids with
                                  Finite Convergent Presentations  . . . . 32
                     Jordi Levy   Decidable and Undecidable Second-Order
                                  Unification Problems . . . . . . . . . . 47
Manfred Schmidt-Schauß and   
                Klaus U. Schulz   On the Exponent of Periodicity of
                                  Minimal Solutions of Context Equations   61
         Florent Jacquemard and   
            Christoph Meyer and   
           Christoph Weidenbach   Unification in Extensions of Shallow
                                  Equational Theories  . . . . . . . . . . 76
                   Qing Guo and   
          Paliath Narendran and   
              Sandeep K. Shukla   Unification and Matching in Process
                                  Algebras . . . . . . . . . . . . . . . . 91
              Renate A. Schmidt   E-Unification for Subsystems of S4 . . . 106--120
     Sébastien Limet and   
             Pierre Réty   Solving Disequations Modulo Some Class
                                  of Rewrite Systems . . . . . . . . . . . 121
                   Hubert Comon   About Proofs by Consistency  . . . . . . 136
              Johannes Waldmann   Normalization of S-Terms Is Decidable    138
                   Thomas Genet   Decidable Approximations of Sets of
                                  Descendants and Sets of Normal Forms . . 151
            Rakesh M. Verma and   
        Michael Rusinowitch and   
                   Denis Lugiez   Algorithms and Reductions for Rewriting
                                  Problems . . . . . . . . . . . . . . . . 166
          Anatoli Degtyarev and   
              Yuri Gurevich and   
          Paliath Narendran and   
              Margus Veanes and   
                Andrei Voronkov   The Decidability of Simultaneous Rigid
                                  E-Unification with One Variable  . . . . 181
         Martin Müller and   
                Joachim Niehren   Ordering Constraints over Feature Trees
                                  Expressed in Second-Order Monadic Logic  196
          Witold Charatonik and   
               Andreas Podelski   Co-definite Set Constraints  . . . . . . 211
                Thomas Arts and   
              Jürgen Giesl   Modularity of Termination Using
                                  Dependency Pairs . . . . . . . . . . . . 226
       Claude Marché and   
                  Xavier Urbain   Termination of Associative-Commutative
                                  Rewriting by Dependency Pairs  . . . . . 241
              Takahito Aoto and   
               Yoshihito Toyama   Termination Transformation by Tree
                                  Lifting Ordering . . . . . . . . . . . . 256
                     Hongwei Xi   Towards Automated Termination Proofs
                                  Through ``Freezing'' . . . . . . . . . . 271
              Olivier Danvy and   
 Kristoffer Hògsbro Rose   Higher-Order Rewriting and Partial
                                  Evaluation . . . . . . . . . . . . . . . 286
                    Yohji Akama   SN Combinators and Partial Combinatory
                                  Algebras . . . . . . . . . . . . . . . . 302
                     Dirk Fuchs   Coupling Saturation-Based Provers by
                                  Exchanging Positive/Negative Information 317
          Nachum Dershowitz and   
                   Ralf Treinen   An On-line Problem Database  . . . . . . 332


Lecture Notes in Computer Science
Volume 1380, 1998

             Daniel Panario and   
                  Alfredo Viola   Analysis of Rabin's Polynomial
                                  Irreducibility Test  . . . . . . . . . . 1
                Peter Damaschke   A Chip Search Problem on Binary Numbers  11
             Esteban Feuerstein   Uniform Service Systems with k Servers   23
    David Fernández-Baca   Faster Non-linear Parametric Search with
                                  Applications to Optimization and Dynamic
                                  Geometry . . . . . . . . . . . . . . . . 33
Frédérique Bassino and   
   Marie-Pierre Béal and   
               Dominique Perrin   Super-State Automata and Rational Trees  42
              Nicolas Bedon and   
                 Olivier Carton   An Eilenberg Theorem for Words on
                                  Countable Ordinals . . . . . . . . . . . 53
                  A. P. Do Lago   Maximal Groups in Free Burnside
                                  Semigroups . . . . . . . . . . . . . . . 65
          Alair Pereira do Lago   Maximal Groups in Free Burnside
                                  Semigroups . . . . . . . . . . . . . . . 65
           Jean-Éric Pin   Positive Varieties and Infinite Words    76
      Marcos Veloso Peixoto and   
               Laurent Fribourg   Unfolding Parametric Automata  . . . . . 88
               Alain Finkel and   
           Philippe Schnoebelen   Fundamental Structures in
                                  Well-Structured Infinite Transition
                                  Systems  . . . . . . . . . . . . . . . . 102
           Herbert Edelsbrunner   Shape Reconstruction with Delaunay
                                  Complex  . . . . . . . . . . . . . . . . 119
            Anamaria Gomide and   
                   Jorge Stolfi   Bases for Non-homogeneous Polynomial $
                                  \vec {C}_k $ Splines on the Sphere . . . 133
              Luerbio Faria and   
Celina Miraglia Herrera de Figueiredo and   
Candido Ferreira Xavier de Mendonça Neto   The Splitting Number of the $4$-Cube . . 141
               James Abello and   
                  Emden Gansner   Short and Smooth Polygonal Paths . . . . 151
            Gilles Brassard and   
         Peter Hòyer and   
                     Alain Tapp   Quantum Cryptanalysis of Hash and
                                  Claw-Free Functions  . . . . . . . . . . 163
              Mihir Bellare and   
              Juan A. Garay and   
                      Tal Rabin   Batch Verification with Applications to
                                  Cryptography and Checking  . . . . . . . 170
            Alejandro Hevia and   
                    Marcos Kiwi   Strength of Two Data Encryption Standard
                                  Implementations Under Timing Attacks . . 192
                      Noga Alon   Spectral Techniques in Graph Algorithms  206
             Michael Molloy and   
                     Bruce Reed   Colouring Graphs Whose Chromatic Number
                                  Is Almost Their Maximum Degree . . . . . 216
                Orlando Lee and   
            Yoshiko Wakabayashi   Circuit Covers in Series-Parallel Mixed
                                  Graphs . . . . . . . . . . . . . . . . . 226
                 Elias Dahlhaus   A Linear Time Algorithm to Recognize
                                  Clustered Planar Graphs and Its
                                  Parallelization  . . . . . . . . . . . . 239
                   Klaus Jansen   A New Characterization for Parity Graphs
                                  and a Coloring Problem with Costs  . . . 249
           Marisa Gutierrez and   
           João Meidanis   On the Clique Operator . . . . . . . . . 261
           Andrei Z. Broder and   
             Alan M. Frieze and   
                      Eli Upfal   Dynamic Packet Routing on Arrays with
                                  Bounded Buffers  . . . . . . . . . . . . 273
               Alan Roberts and   
              Antonios Symvonis   On-Line Matching Routing on Trees  . . . 282
               Dana Randall and   
                  Prasad Tetali   Analyzing Glauber Dynamics by Comparison
                                  of Markov Chains . . . . . . . . . . . . 292
     Joachim von zur Gathen and   
               Igor Shparlinski   The CREW PRAM Complexity of Modular
                                  Inversion  . . . . . . . . . . . . . . . 305
          J. Von Zur Gathen and   
                 I. Shparlinski   The CREW PRAM Complexity of Modular
                                  Inversion  . . . . . . . . . . . . . . . 305
        F. M. Auf Der Heide and   
                 G. T. Martinez   Communication-Efficient Parallel
                                  Multiway and Approximate Minimum Cut
                                  Computation  . . . . . . . . . . . . . . 316
Friedhelm Meyer auf der Heide and   
  Gabriel Terán Martinez   Communication-Efficient Parallel
                                  Multiway and Approximate Minimum Cut
                                  Computation  . . . . . . . . . . . . . . 316
             Richard Beigel and   
                   Egemen Tanin   The Geometry of Browsing . . . . . . . . 331
        Ricardo Baeza-Yates and   
                Gonzalo Navarro   Fast Two-Dimensional Approximate Pattern
                                  Matching . . . . . . . . . . . . . . . . 341
                Gonzalo Navarro   Improved Approximate Pattern Matching on
                                  Hypertext  . . . . . . . . . . . . . . . 352
       Claudio Gutiérrez   Solving Equations in Strings: On
                                  Makanin's Algorithm  . . . . . . . . . . 358
             Marie-France Sagot   Spelling Approximate Repeated or Common
                                  Motifs Using a Suffix Tree . . . . . . . 374


Lecture Notes in Computer Science
Volume 1381, 1998

                    Gert Smolka   Concurrent Constraint Programming Based
                                  on Functional Programming  . . . . . . . 1
        Martín Abadi and   
               Andrew D. Gordon   A Bisimulation Method for Cryptographic
                                  Protocols  . . . . . . . . . . . . . . . 12
         Maurice Bruynooghe and   
           Michael Leuschel and   
           Konstantinos Sagonas   A Polyvariant Binding-Time Analysis for
                                  Off-line Partial Deduction . . . . . . . 27
         Luís Caires and   
           Luís Monteiro   Verifiable and Executable Logic
                                  Specifications of Concurrent Objects in
                                  $ \mathcal {L}_{\pi } $  . . . . . . . . 42
      Ramkrishna Chatterjee and   
           Barbara G. Ryder and   
               William A. Landi   Complexity of Concrete Type-Inference in
                                  the Presence of Exceptions . . . . . . . 57
              Wei-Ngan Chin and   
            Siau-Cheng Khoo and   
                    Tat-Wee Lee   Synchronisation Analysis to Stop Tupling 75
            Christian Fecht and   
                   Helmut Seidl   Propagating Differences: An Efficient
                                  New Fixpoint Algorithm for Distributive
                                  Constraint Systems . . . . . . . . . . . 90
              Ulrich Hensel and   
            Marieke Huisman and   
                Bart Jacobs and   
                   Hendrik Tews   Reasoning about Classes in
                                  Object-Oriented Languages: Logical
                                  Models and Tools . . . . . . . . . . . . 105
                Kohei Honda and   
       Vasco T. Vasconcelos and   
                    Makoto Kubo   Language Primitives and Type Discipline
                                  for Structured Communication-Based
                                  Programming  . . . . . . . . . . . . . . 122
                  C. B. Jay and   
                 P. A. Steckler   The Functional Imperative: Shape!  . . . 139
                 Jens Knoop and   
        Oliver Rüthing and   
               Bernhard Steffen   Code Motion and Code Placement: Just
                                  Synonyms?  . . . . . . . . . . . . . . . 154
                 K. R. M. Leino   Recursive Object Types in a Logic of
                                  Object-Oriented Programs . . . . . . . . 170
                  K. Rustan and   
                       M. Leino   Recursive Object Types in a Logic of
                                  Object-Oriented Programs . . . . . . . . 170
        Florence Maraninchi and   
             Yann Rémond   Mode-Automata: About Modes and States
                                  for Reactive Systems . . . . . . . . . . 185
             Didier Rémy   From Classes to Objects via Subtyping    200
               John L. Ross and   
                    Mooly Sagiv   Building a Bridge between Pointer
                                  Aliases and Program Dependences  . . . . 221
             Salvatore Ruggieri   A Complete Declarative Debugger of
                                  Missing Answers  . . . . . . . . . . . . 236
            William L. Scherlis   Systematic Change of Data
                                  Representation: Program Manipulations
                                  and a Case Study . . . . . . . . . . . . 252
                 Peter Thiemann   A Generic Framework for Specialization
                                  (Abridged Version) . . . . . . . . . . . 267


Lecture Notes in Computer Science
Volume 1382, 1998

                      Kent Beck   Extreme Programming: A Humanistic
                                  Discipline of Software Development . . . 1
                 Cliff B. Jones   Some Mistakes I Have Made and What I
                                  Have Learned from Them . . . . . . . . . 7
               Robert Allen and   
        Rémi Douence and   
                   David Garlan   Specifying and Analyzing Dynamic
                                  Software Architectures . . . . . . . . . 21
            Narjes Berregeb and   
              Adel Bouhoula and   
       Michaël Rusinowitch   Observational Proofs with Critical
                                  Contexts . . . . . . . . . . . . . . . . 38
             Steven Bradley and   
          William Henderson and   
              David Kendall and   
                  Adrian Robson   Integrating AORTA with Model-Based Data
                                  Specification Languages  . . . . . . . . 54
                 R. Buessow and   
                 R. Geisler and   
                        M. Klar   Specifying Safety-Critical Embedded
                                  Systems with Statecharts and Z: A Case
                                  Study  . . . . . . . . . . . . . . . . . 71
         Robert Büssow and   
             Robert Geisler and   
                    Marcus Klar   Specifying Safety-Critical Embedded
                                  Systems with Statecharts and Z: A Case
                                  Study  . . . . . . . . . . . . . . . . . 71
         Wolfgang Grieskamp and   
             Maritta Heisel and   
                Heiko Dörr   Specifying Embedded Systems with
                                  Statecharts and Z: An Agenda for Cyclic
                                  Software Components  . . . . . . . . . . 88
       Martin Große-Rhode   Algebra Transformation Systems and Their
                                  Composition  . . . . . . . . . . . . . . 107
                  Ali Hamie and   
                 John Howse and   
                    Stuart Kent   Navigation Expressions in
                                  Object-Oriented Modelling  . . . . . . . 123
                   Reiko Heckel   Compositional Verification of Reactive
                                  Systems Specified by Graph
                                  Transformation . . . . . . . . . . . . . 138
               Stefan Kahrs and   
                Donald Sannella   Reflections on the Design of a
                                  Specification Language . . . . . . . . . 154
                 Ulrike Lechner   Constructs, Concepts, and Criteria for
                                  Reuse in Concurrent Object-Oriented
                                  Languages  . . . . . . . . . . . . . . . 171
           Tiziana Margaria and   
               Bernhard Steffen   Backtracking-Free Design Planning by
                                  Automatic Synthesis in M ETA Frame . . . 188
             Alexandre Mota and   
                Augusto Sampaio   Model-Checking CSP-Z . . . . . . . . . . 205
                 J. Padberg and   
                M. Gajewsky and   
                       C. Ermel   Rule-Based Refinement of High-Level Nets
                                  Preserving Safety Properties . . . . . . 221
                 J. N. Reed and   
              D. M. Jackson and   
                 B. Deianov and   
                     G. M. Reed   Automated Formal Analysis of Networks:
                                  FDR Models of Arbitrary Topologies and
                                  Flow-Control Mechanisms  . . . . . . . . 239
         Hanne Riis Nielson and   
              Torben Amtoft and   
               Flemming Nielson   Behaviour Analysis and Safety
                                  Conditions: A Case Study in CML  . . . . 255
            Anders Sandholm and   
        Michael I. Schwartzbach   Distributed Safety Controllers for Web
                                  Services . . . . . . . . . . . . . . . . 270
                   Peter Scholz   A Refinement Calculus for Statecharts    285
             Bettina Eva Sucrow   Refining Formal Specifications of Human
                                  Computer Interaction by Graph Rewrite
                                  Rules  . . . . . . . . . . . . . . . . . 302
                Ralf Behnke and   
          Rudolf Berghammer and   
                Erich Meyer and   
                Peter Schneider   RELVIEW --- A System for Calculating
                                  with Relations and Relational
                                  Programming  . . . . . . . . . . . . . . 318
                    Eric Dubois   ALBERT: A Formal Language and Its
                                  Supporting Tools for Requirements
                                  Engineering  . . . . . . . . . . . . . . 322
                   Josef Tapken   \sc MOBY/PLC --- A Design Tool for
                                  Hierarchical Real-Time Automata  . . . . 326


Lecture Notes in Computer Science
Volume 1383, 1998

                 K. Brouwer and   
               W. Gellerich and   
                 E. Ploedereder   Myths and facts about the efficient
                                  implementation of finite automata and
                                  lexical analysis . . . . . . . . . . . . 1
               A. Johnstone and   
                       E. Scott   Generalised recursive descent parsing
                                  and follow-determinism . . . . . . . . . 16
                  J. T. Boyland   Analyzing direct non-local dependencies
                                  in attribute grammars  . . . . . . . . . 31
               K. Mizushima and   
                    T. Katayama   Storage allocation strategies for
                                  recursive attribute evaluators . . . . . 50
                   J. Knoop and   
             D. Koschuetzki and   
                     B. Steffen   Basic-block graphs: living dinosaurs?    65
                  F. Martin and   
                     M. Alt and   
                 R. Wilhelm and   
                   C. Ferdinand   Analysis of loops  . . . . . . . . . . . 80
               P. Malacaria and   
                      C. Hankin   A new approach to control flow analysis  95
              H. R. Nielson and   
                     F. Nielson   Flow logics for constraint based
                                  analysis . . . . . . . . . . . . . . . . 109
               C. Lapkowski and   
                  L. J. Hendren   Extended SSA numbering: introducing SSA
                                  properties to languages with multi-level
                                  pointers . . . . . . . . . . . . . . . . 128
                 R. Kennedy and   
                    F. Chow and   
                    P. Dahl and   
                      S.-M. Liu   Strength reduction via SSAPRE  . . . . . 144
                   R. Ghiya and   
              L. J. Hendren and   
                         Y. Zhu   Detecting parallelism in C programs with
                                  recursive data structures  . . . . . . . 159
               K. D. Cooper and   
                  L. T. Simpson   Live range splitting in a graph coloring
                                  register allocator . . . . . . . . . . . 174
                  M. M. Burnett   Invited lecture (abstract): Challenges
                                  and opportunities visual programming
                                  languages bring to programming language
                                  research . . . . . . . . . . . . . . . . 188
              M. Maierhofer and   
                     M. A. Ertl   Local stack allocation . . . . . . . . . 189
                  S. Lelait and   
                  G. R. Gao and   
                   C. Eisenbeis   A new fast algorithm for optimal
                                  register allocation in modulo scheduled
                                  loops  . . . . . . . . . . . . . . . . . 204
                       R. Gupta   A code motion framework for global
                                  instruction scheduling . . . . . . . . . 219
                E. Stuempel and   
                   M. Thies and   
                     U. Kastens   VLIW compilation techniques for
                                  superscalar architectures  . . . . . . . 234
          R. L. Engelbrecht and   
                      D. Kourie   Issues in translating Smalltalk to Java  249
                     C. Steindl   Intermodular slicing of object-oriented
                                  programs . . . . . . . . . . . . . . . . 264
                  M. Pettersson   Portable debugging and profiling . . . . 279
                 U. Kastens and   
                 P. Pfahler and   
                        M. Jung   The Eli system . . . . . . . . . . . . . 294
                  M. Kuiper and   
                     J. Saraiva   Lrc --- a generator for incremental
                                  language-oriented tools  . . . . . . . . 298
             K. R. M. Leino and   
                      G. Nelson   An extended static checker for Modula-3  302
                   V. Braun and   
                   J. Knoop and   
                 D. Koschuetzki   Cool: a control-flow generator for
                                  system analysis  . . . . . . . . . . . . 306


Lecture Notes in Computer Science
Volume 1384, 1998

               Randal E. Bryant   Formal Verification of Pipelined
                                  Processors . . . . . . . . . . . . . . . 1
                 Xinxin Liu and   
         C. R. Ramakrishnan and   
                Scott A. Smolka   Fully Local and Efficient Evaluation of
                                  Alternating Fixed Points (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 5
               Karen Laster and   
                  Orna Grumberg   Modular Model Checking of Software . . . 20
              Michaela Huhn and   
              Peter Niebert and   
                  Frank Wallner   Verification Based on Local States . . . 36
                   K. Ajami and   
                  S. Haddad and   
               J-M. Ilié   Exploiting Symmetry in Linear Time
                                  Temporal Logic Model Checking: One Step
                                  Beyond . . . . . . . . . . . . . . . . . 52
                 Hubert Garavel   OPEN/CAESAR: An Open Software
                                  Architecture for Verification,
                                  Simulation, and Testing  . . . . . . . . 68
            Perdita Stevens and   
                 Colin Stirling   Practical Model Checking Using Games . . 85
                Bernd Grahlmann   Combining Finite Automata, Parallel
                                  Programs and SDL Using Petri Nets  . . . 102
  Hanêne Ben-Abdallah and   
                    Stefan Leue   \sc MESA: Support for Scenario-Based
                                  Design of Concurrent Systems . . . . . . 118
          Miroslav N. Velev and   
               Randal E. Bryant   Efficient Modeling of Memory Arrays in
                                  Symbolic Ternary Simulation  . . . . . . 136
                  A. Pnueli and   
                  M. Siegel and   
                   E. Singerman   Translation Validation . . . . . . . . . 151
             Christoph Sprenger   A Verified Model Checker for the Modal $
                                  \mu $-Calculus in Coq  . . . . . . . . . 167--183
            Alexander Aiken and   
      Manuel Fähndrich and   
                    Zhendong Su   Detecting Races in Relay Ladder Logic
                                  Programs . . . . . . . . . . . . . . . . 184
   Jòrn Lind-Nielsen and   
       Henrik Reif Andersen and   
              Gerd Behrmann and   
            Henrik Hulgaard and   
   Kåre Kristoffersen and   
                  Kim G. Larsen   Verification of Large State/Event
                                  Systems Using Compositionality and
                                  Dependency Analysis  . . . . . . . . . . 201
             Udo Brockmeyer and   
                 Gunnar Wittich   Tamagotchis Need Not Die ---
                                  Verification of \sc Statemate Designs    217
                      T. Cartel   Modeling and Verification of sC++
                                  Applications . . . . . . . . . . . . . . 232
                 Thierry CATTEL   Modeling and Verification of sC++
                                  Applications . . . . . . . . . . . . . . 232
        David James Sherman and   
                Nicolas Magnier   Factotum: Automatic and Systematic
                                  Sharing Support for Systems Analyzers    249
                 Luca Aceto and   
    Augusto Burgueño and   
                  Kim G. Larsen   Model Checking via Reachability Testing
                                  for Timed Automata . . . . . . . . . . . 263
             Magnus Lindahl and   
            Paul Pettersson and   
                        Wang Yi   Formal Design and Analysis of a Gear
                                  Controller . . . . . . . . . . . . . . . 281
        Parosh Aziz Abdulla and   
                  Bengt Jonsson   Verifying Networks of Timed Processes
                                  (Extended Abstract)  . . . . . . . . . . 298
               Conrado Daws and   
               Stavros Tripakis   Model Checking of Real-Time Reachability
                                  Properties Using Abstractions  . . . . . 313
                Rajeev Alur and   
        Thomas A. Henzinger and   
             Sriram K. Rajamani   Symbolic Exploration of Transition
                                  Hierarchies  . . . . . . . . . . . . . . 330
                 R. Kurshan and   
                   V. Levin and   
                   M. Minea and   
                   D. Peled and   
                H. Yenigün   Static Partial Order Reduction . . . . . 345
                 R. Kutshah and   
                   V. Levin and   
                   M. Minea and   
                       D. Peled   Static Partial Order Reduction . . . . . 345
          Witold Charatonik and   
               Andreas Podelski   Set-Based Analysis of Reactive
                                  Infinite-State Systems . . . . . . . . . 358
             N. S. Bjoerner and   
                  M. C. Pichora   Deciding Fixed and Non-fixed Size
                                  Bit-Vectors  . . . . . . . . . . . . . . 376
  Nikolaj S. Bjòrner and   
                Mark C. Pichora   Deciding Fixed and Non-fixed Size
                                  Bit-vectors  . . . . . . . . . . . . . . 376
               Theo C. Ruys and   
                    Ed Brinksma   Experience with Literate Programming in
                                  the Modelling and Validation of Systems  393
           Henrik E. Jensen and   
                 Nancy A. Lynch   A Proof of Burns $N$-Process Mutual
                                  Exclusion Algorithm Using Abstraction    409
        E. Pascal Gribomont and   
                     Guy Zenner   Automated Verification of Szymanski's
                                  Algorithm  . . . . . . . . . . . . . . . 424
         Franz Regensburger and   
                  Aenne Barnard   Formal Verification of SDL Systems at
                                  the Siemens Mobile Phone Department  . . 439


Lecture Notes in Computer Science
Volume 1385, 1998

                Alain Lardenois   The Web Impact: A White Paper  . . . . . 8
                    Pamela Zave   'Calls Considered Harmful' and Other
                                  Observations: A Tutorial on Telephony    8
                Maurizio Decina   Convergence of Telecommunications and
                                  Computing on Networking Models for
                                  Integrated Services and Applications . . 28
               S. Handschub and   
                 U. Lechner and   
               D.-M. Lincke and   
                      B. Schmid   The Net Academy --- A New Concept for
                                  Online Publishing and Knowledge
                                  Management . . . . . . . . . . . . . . . 29
        Siegfried Handschuh and   
             Ulrike Lechner and   
       David-Michael Lincke and   
                Beat Schmid and   
             Petra Schubert and   
                Dorian Selz and   
    Katarina Stanoevska-Slabeva   The NetAcademy --- A New Concept for
                                  Online Publishing and Knowledge
                                  Management . . . . . . . . . . . . . . . 29
                Robert Hess and   
               Dagmar Geske and   
             Sascha Kuemmel and   
                Henrik Thuermer   Distributed Compression of Live Video
                                  --- An Application for Active Networks   44
              Ken'ichi Kakizaki   Incremental Scene Graph Distribution
                                  Method for Distributed Virtual
                                  Environments . . . . . . . . . . . . . . 61
     André Hergenhan and   
           Christoph Weiler and   
       Karlheinz Weiß and   
            Wolfgang Rosenstiel   Value-Added Services in Industrial
                                  Automation . . . . . . . . . . . . . . . 75
                   Dirk O. Keck   Requirements and a Proposal for the
                                  Prevention of a Class of Service
                                  Interactions in Intelligent Networks . . 90
                Hyunsook Do and   
              Seongyong Bae and   
                     Sangki Kim   INAP Protocol Test Suite Verification
                                  Method Using the IUT Simulator for AIN
                                  System Conformance Testing . . . . . . . 106
                 P. Florschuetz   Testing IN Protocol Implementation . . . 117
             P. Florschütz   Testing IN Protocol Implementation . . . 117
             Sahin Albayrak and   
             Jens Meinköhn   Agent-Based Data Services in Future
                                  IN-Platforms . . . . . . . . . . . . . . 128
               M. B. Oezcan and   
                P. W. Parry and   
               I. C. Morrey and   
                  J. I. Siddiqi   Visualisation of Executable Formal
                                  Specifications for User Validation . . . 142
           M. B. Özcan and   
                P. W. Parry and   
               I. C. Morrey and   
                  J. I. Siddiqi   Visualisation of Executable Formal
                                  Specifications for User Validation . . . 142
                  M. Lusini and   
                     E. Vicario   Design and Evaluation of a Visual
                                  Formalism for Real Time Logics . . . . . 158
           Carla Capellmann and   
   Sòren Christensen and   
                     Uwe Herzog   Visualising the Behaviour of Intelligent
                                  Networks . . . . . . . . . . . . . . . . 174
           Tiziana Margaria and   
                   Volker Braun   Formal Methods and Customized
                                  Visualization: A Fruitful Symbiosis  . . 190
                 R. Schloer and   
                   B. Josko and   
                       D. Werth   Using a Visual Formalism for Design
                                  Verification in Industrial Environments  208
         Rainer Schlör and   
             Bernhard Josko and   
                   Dieter Werth   Using a Visual Formalism for Design
                                  Verification in Industrial Environments  208
               Volker Braun and   
           Tiziana Margaria and   
           Bernhard Steffen and   
                   Haiseung Yoo   Automatic Error Location for IN Service
                                  Definition . . . . . . . . . . . . . . . 222
                Jeomja Kang and   
              Jeonghun Choi and   
                   Sehyeong Cho   The Generation of Service Database
                                  Schema Through Service Creation
                                  Environment  . . . . . . . . . . . . . . 238
          L. Orozco-Barbosa and   
                D. Makrakis and   
                N. D. Georganas   A Study of Intelligent Multimedia
                                  Services over PSTNs and the Internet . . 250
  Manuel Duque-Antón and   
          Ralf Günther and   
            Raschid Karabek and   
              Thomas Meuser and   
                    Josef Wasel   Open Switching for ATM Networks  . . . . 265
                Hee Jin Lim and   
                   Go Bong Choi   Application of INAP to AIN Intelligent
                                  Peripheral . . . . . . . . . . . . . . . 278
                 H. J. Lira and   
                     G. B. Choi   Application of INAP to AIN Intelligent
                                  Peripheral . . . . . . . . . . . . . . . 278
                 S. Biacchi and   
                 G. Ferrari and   
                       R. Gobbi   IN Evolution to Support Mobility in DECT
                                  Access Networks  . . . . . . . . . . . . 291
                D. Blaiotta and   
                  L. Faglia and   
                 M. Varisco and   
                     L. Vezzoli   A Mobile Broadband Service Switching
                                  Point: A New Network Element for
                                  Multimedia and Mobile Services . . . . . 306


Lecture Notes in Computer Science
Volume 1386, 1998

                A. Balluchi and   
            M. Di Benedetto and   
                 C. Pinello and   
                       C. Rossi   Hybrid Control for Automotive Engine
                                  Management: The Cut-Off Case . . . . . . 13
                 A. Beydoun and   
                 L. Y. Wang and   
                     J. Sun and   
                 S. Sivashankar   Hybrid Control of Automotive Powertrain
                                  Systems: A Case Study  . . . . . . . . . 33
                  S. Bornot and   
                     J. Sifakis   On the Composition of Hybrid Systems . . 49
                L. Bushnell and   
                O. Beldiman and   
                       G. Walsh   An Equivalence between a Control Network
                                  and a Switched Hybrid System . . . . . . 64
                 B. Carlson and   
                       V. Gupta   Hybrid cc with Interval Constraints  . . 80
                    T. Dang and   
                       O. Maler   Reachability Analysis via Face Lifting   96
                     A. Fehnker   Automotive Control Revisited: Linear
                                  Inequalities as Approximation of
                                  Reachable Sets . . . . . . . . . . . . . 110
             E. D. Farreira and   
                    B. H. Krogh   Switching Controllers Based on
                                  Neural-Network Estimates of Stability
                                  Regions and Controller Performance . . . 126
                     V. Friesen   A Logic for the Specification of
                                  Continuous Systems . . . . . . . . . . . 143
          M. R. Greenstreet and   
                    I. Mitchell   Integrating Projections  . . . . . . . . 159
                   K. X. He and   
                   M. D. Lemmon   Lyapunov Stability of Continuous-Valued
                                  Systems under the Supervision of
                                  Discrete-Event Transition Systems  . . . 175
            T. A. Henzinger and   
                        V. Rusu   Reachability Verification for Hybrid
                                  Automata . . . . . . . . . . . . . . . . 190
             G. Lafferriere and   
               G. J. Pappas and   
                      S. Sastry   Subanalytic Stratifications and
                                  Bisimulations  . . . . . . . . . . . . . 205
              G. Lehrenfeld and   
                 R. Naumann and   
                  R. Rasche and   
                        C. Rust   Integrated Design and Simulation of
                                  Hybrid Systems . . . . . . . . . . . . . 221
                E. S. Lemch and   
                   P. E. Caines   Hierarchical Hybrid Systems: Partition
                                  Deformations and Applications to the
                                  Acrobot System . . . . . . . . . . . . . 237
                 C. Livadas and   
                    N. A. Lynch   Formal Verfication of Safety-Critical
                                  Hybrid Systems . . . . . . . . . . . . . 253
                 J. Lygeros and   
                    N. A. Lynch   Strings of Vehicles: Modeling and Safety
                                  Conditions . . . . . . . . . . . . . . . 273
                 J. Lygeros and   
               G. J. Pappas and   
                      S. Sastry   An Approach to the Verification of the
                                  Center-TRACON Automation System  . . . . 289
                   Z. Manna and   
                    H. B. Sipma   Deductive Verification of Hybrid Systems
                                  Using STeP . . . . . . . . . . . . . . . 305
              A. S. Matveev and   
                   A. V. Savkin   Reduction and Decomposition of
                                  Differential Automata: Theory and
                                  Applications . . . . . . . . . . . . . . 319
                   B. M. Miller   Optimization of Generalized Solutions on
                                  Nonlinear Hybrid (Discrete-Continuous)
                                  Systems  . . . . . . . . . . . . . . . . 334
                   T. W. Neller   Information-Based Optimization
                                  Approaches to Dynamical System Safety
                                  Verification . . . . . . . . . . . . . . 346
                  C. Tomlin and   
                 J. Lygeros and   
                      S. Sastry   Synthesizing Controllers for Nonlinear
                                  Hybrid Systems . . . . . . . . . . . . . 360
             J. H. Van Schuppen   A Sufficient Condition for
                                  Controllability of a Class of Hybrid
                                  Systems  . . . . . . . . . . . . . . . . 374
                      X. Li and   
                   T. Zheng and   
                     J. Hou and   
                        J. Zhao   Hybrid Regular Expressions . . . . . . . 384
                  M. Zefran and   
                  J. W. Burdick   Stabilization of Systems with Changing
                                  Dynamics . . . . . . . . . . . . . . . . 400


Lecture Notes in Computer Science
Volume 1387, 1998

                  Ah Chung Tsoi   Recurrent Neural Network Architectures:
                                  An Overview  . . . . . . . . . . . . . . 1
                  Ah Chung Tsoi   Gradient Based Learning Methods  . . . . 27
                Eric A. Wan and   
      Françoise Beaufays   Diagrammatic Methods for Deriving and
                                  Relating Temporal Neural Network
                                  Algorithms . . . . . . . . . . . . . . . 63
                 Paolo Frasconi   An Introduction to Learning Structured
                                  Information  . . . . . . . . . . . . . . 99
            Alessandro Sperduti   Neural Networks for Processing Data
                                  Structures . . . . . . . . . . . . . . . 121
                     Marco Gori   The Loading Problem: Topics in
                                  Complexity . . . . . . . . . . . . . . . 145
              Zoubin Ghahramani   Learning Dynamic Bayesian Networks . . . 168
                   Pierre Baldi   Probabilistic Models of Neuronal Spike
                                  Trains . . . . . . . . . . . . . . . . . 198
                 Lucas C. Parra   Temporal Models in Blind Source
                                  Separation . . . . . . . . . . . . . . . 229
                  Marco Maggini   Recursive Neural Networks and Automata   248
                  G. Z. Sun and   
                C. L. Giles and   
                     H. H. Chen   The Neural Network Pushdown Automaton:
                                  Architecture, Dynamics and Training  . . 296
             Hava T. Siegelmann   Neural Dynamics with Stochasticity . . . 346
           Michael C. Mozer and   
                   Debra Miller   Parsing the Stream of Time: The Value of
                                  Event-Based Segmentation in a Complex
                                  Real-World Control Problem . . . . . . . 370
      Hervé Bourlard and   
                  Nelson Morgan   Hybrid HMM/ANN Systems for Speech
                                  Recognition: Overview and New Research
                                  Directions . . . . . . . . . . . . . . . 389
                   P. Gallinari   Predictive Models for Sequence
                                  Modelling, Application to Speech and
                                  Character Recognition  . . . . . . . . . 418


Lecture Notes in Computer Science
Volume 1388, 1998

                   G. Ghare and   
                      S.-Y. Lee   Dynamic Reconfiguration of a PMMLA for
                                  High-Throughput Applications . . . . . . 1
              W. Fornaciari and   
                       V. Piuri   Virtual FPGAs: Some Steps Behind the
                                  Physical Barriers  . . . . . . . . . . . 7
               P. Baglietto and   
                 M. Maresca and   
                   M. Migliardi   A Parallel Algorithm for Minimum Cost
                                  Path Computation on Polymorphic
                                  Processor Array  . . . . . . . . . . . . 13
                 J. Walrath and   
                      R. Vemuri   A Performance Modeling and Analysis
                                  Environment for Reconfigurable Computers 19
                 G. Brebner and   
                      A. Donlin   Runtime Reconfigurable Routing . . . . . 25
                  I. Ouaiss and   
            S. Govindarajan and   
              V. Srinivasan and   
                        M. Kaul   An Integrated Partitioning and Synthesis
                                  System for Dynamically Reconfigurable
                                  Multi-FPGA Architectures . . . . . . . . 31
                J. Spillane and   
                        H. Owen   Temporal Partioning for
                                  Partially-Reconfigurable-Field-Programmable Gate 37
                   D. Davis and   
                    M. Bart and   
                 T. Bennett and   
                     S. Edwards   A Java Development and Runtime
                                  Environment for Reconfigurable Computing 43
                    K. Rath and   
                          J. Li   Synthesizing Reconfigurable Sequential
                                  Machines Using Tabular Models  . . . . . 49
                  A. Abnous and   
                    K. Seno and   
                Y. Ichikawa and   
                         M. Wan   Evaluation of a Low-Power Reconfigurable
                                  DSP Architecture . . . . . . . . . . . . 55
              A. Kirschbaum and   
                  J. Becker and   
                     M. Glesner   A Reconfigurable Hardware-Monitor for
                                  Communication Analysis in Distributed
                                  Real-Time Systems  . . . . . . . . . . . 61
          R. W. Hartenstein and   
                    M. Herz and   
                T. Hoffmann and   
                 U. Nageldinger   On Reconfigurable Co-processing Units    67
              S. M. Scalera and   
               J. J. Murray and   
                       S. Lease   A Mathematical Benefit Analysis of
                                  Context Switching Reconfigurable
                                  Computing  . . . . . . . . . . . . . . . 73
               B. Pudipeddi and   
                A. L. Abbot and   
                  P. M. Athanas   A Configurable Computing Approach
                                  Towards Real-Time Target Tracking  . . . 79
                 Y. Shibata and   
                H. Miyazaki and   
                    X. Ling and   
                       H. Amano   HOSMII: A Virtual Hardware Integrated
                                  with DRAM  . . . . . . . . . . . . . . . 85
              J. L. Beuchat and   
               J. O. Haenni and   
                     E. Sanchez   Hardware Reconfigurable Neural Networks  91
                 C. Steckel and   
              M. Middendorf and   
                 H. ElGindy and   
                     H. Schmeck   A Simulator for the Reconfigurable Mesh
                                  Architecture . . . . . . . . . . . . . . 99
                   R. Kolla and   
                   O. Springauf   PACE: Processor Architectures for
                                  Circuit Emulation  . . . . . . . . . . . 105
                 L. V. Kale and   
              M. Bhandarkar and   
                 R. Brunner and   
                       J. Yelon   Multiparadigm, Multilingual
                                  Interoperability: Experience with
                                  Converse . . . . . . . . . . . . . . . . 111
                  C. C. Lim and   
                  Y. H. Low and   
                     W. Cai and   
                      W. J. Hsu   An Empirical Comparison of Runtime
                                  Systems for Conservative Parallel
                                  Simulation . . . . . . . . . . . . . . . 123
                   T. Ruehl and   
                      H. E. Bal   Synchronizing Operations on Multiple
                                  Objects  . . . . . . . . . . . . . . . . 135
          M. V. Nibhanupudi and   
                B. K. Szymanski   Runtime Support for Virtual BSP Computer 147
                   S. Petri and   
                    M. Bolz and   
               H. Langendoerfer   Migration and Rollback Transparency for
                                  Arbitrary Distributed Applications in
                                  Workstation Clusters . . . . . . . . . . 159
          H. Tangmunarunkit and   
                  P. Steenkiste   Network-Aware Distributed Computing: A
                                  Case Study . . . . . . . . . . . . . . . 171
         D. S. Nikolopoulos and   
     E. D. Polychronopoulos and   
            T. S. Papatheodorou   Efficient Runtime Thread Management for
                                  the Nano-Threads Programming Model . . . 183
                       J. Nolte   A Topology Based Approach to Coordinated
                                  Multicast Operations . . . . . . . . . . 195
J. L. Fernandez-Villacañas and   
                J. M. Fatah and   
                        S. Amin   Computing with Evolving Proteins . . . . 207
                 L. S. Ochi and   
               D. S. Vianna and   
          L. M. A. Drummond and   
                   A. O. Victor   A Parallel Evolutionary Algorithm for
                                  the Vehicle Routing Problem with
                                  Heterogeneous Fleet  . . . . . . . . . . 216
                     C. Leopold   Locality Optimization for Program
                                  Instances  . . . . . . . . . . . . . . . 225
                 J.-F. Jenq and   
                       W. N. Li   Artificial Neural Networks on
                                  Reconfigurable Meshes  . . . . . . . . . 234
                       T. Szuba   A Molecular Quasi-Random Model of
                                  Computations Applied to Evaluate
                                  Collective Intelligence  . . . . . . . . 243
                      X. He and   
                   T. Hintz and   
                     U. Szewcow   Replicated Shared Object Model for Edge
                                  Detection with Spiral Architecture . . . 252
                  F. Seredynski   Scheduling Tasks of a Parallel Program
                                  in Two-Processor Systems with Use of
                                  Cellular Automata  . . . . . . . . . . . 261
                   T. Elrad and   
                         J. Lin   Evolving Processes and Evolution
                                  Schedulers for Concurrent Scheduling
                                  Controls and Parallel Evolutionary
                                  Computation  . . . . . . . . . . . . . . 270
                      R. Nossal   An Evolutionary Approach to
                                  Multiprocessor Scheduling of Dependent
                                  Tasks  . . . . . . . . . . . . . . . . . 279
                  S. Salleh and   
                   A. Y. Zomaya   Multiprocessor Scheduling Using
                                  Mean-Field Annealing . . . . . . . . . . 288
               R. O. Rogers and   
               D. B. Skillicorn   Using the BSP Cost Model to Optimise
                                  Parallel Neural Network Training . . . . 297
                E.-G. Talbi and   
                 J.-M. Geib and   
                  Z. Hafidi and   
                      D. Kebbal   A Fault-Tolerant Parallel Heuristic for
                                  Assignment Problems  . . . . . . . . . . 306
                     C. Gil and   
                  J. Ortega and   
                 A. F. Diaz and   
                  M. G. Montoya   Meta-heuristics for Circuit Partitioning
                                  in Parallel Test Generation  . . . . . . 315
                     D. Krizanc   A Survey of Randomness and Parallelism
                                  in Comparison Problems . . . . . . . . . 324
                     D. Hsu and   
              L. E. Kavraki and   
              J. C. Latombe and   
                     R. Motwani   Capturing the Connectivity of
                                  High-Dimensional Geometric Spaces by
                                  Parallelizable Random Sampling
                                  Techniques . . . . . . . . . . . . . . . 330
                   A. Cohen and   
              Y. Rabinovich and   
                A. Schuster and   
                    H. Shachnai   Optimal Bounds on Tail Probabilities ---
                                  A Simplified Approach  . . . . . . . . . 341
                       R. Raman   Random Sampling Techniques in Parallel
                                  Computation  . . . . . . . . . . . . . . 351
               S. Muthukrishnan   Randomization in Parallel Stringology    361
                   P. J. Varman   Randomized Parallel Prefetching and
                                  Buffer Management  . . . . . . . . . . . 363
                   B. Ravikumar   Parallel Algorithms for Finite Automata
                                  Problems . . . . . . . . . . . . . . . . 373
                   D. S. L. Wei   Randomized Routing and PRAM Emulation on
                                  Parallel Machines  . . . . . . . . . . . 374
                        T. Suel   On Randomized and Deterministic Schemes
                                  for Routing and Sorting on
                                  Fixed-Connection Networks  . . . . . . . 384
                J. Dongarra and   
                  J. Wasniewski   High Performance Linear Algebra Package
                                  LAPACK90 . . . . . . . . . . . . . . . . 387--391
                A. Dessmark and   
               C. Dorgerloh and   
                  A. Lingas and   
                     J. Wirtgen   Ultrafast Randomized Parallel
                                  Construction and Approximation
                                  Algorithms for Spanning Forests in Dense
                                  Graphs . . . . . . . . . . . . . . . . . 392
                   S. Ramaswami   Parallel Randomized Techniques for Some
                                  Fundamental Geometric Problems: A Survey 400
                   L. Narayanan   Randomized Algorithms on the Mesh  . . . 408
                  M. Bumble and   
                      L. Coraor   Implementing Parallelism in Random
                                  Discrete Event-Driven Simulation . . . . 418
              J. L. Sanchez and   
               J. M. Garcia and   
                   F. J. Alfaro   Reconfigurable Wormhole Networks: A
                                  Realistic Approach . . . . . . . . . . . 428
                 A. Moukrim and   
                    A. Quilliot   Scheduling with Communication Delays and
                                  Data Routing in Message Passing
                                  Architectures  . . . . . . . . . . . . . 438
               P. K. Nilsen and   
                     N. Prcovic   Parallel Optimisation in the SCOOP
                                  Library  . . . . . . . . . . . . . . . . 452
                  S. Venema and   
                    H. Shen and   
                   F. Suraweera   NC Algorithms for the Single Most Vital
                                  Edge Problem with Respect to All Pairs
                                  Shortest Paths . . . . . . . . . . . . . 464
                  L. Prylli and   
                 B. Tourancheau   BIP: A New Protocol Designed for High
                                  Performance Networking on Myrinet  . . . 472
                  Y. Tanaka and   
                 M. Matsuda and   
                    M. Ando and   
                      K. Kubota   COMPaS: A Pentium Pro PC-based SMP
                                  Cluster and Its Experience . . . . . . . 486
                 J. M. Blum and   
             T. M. Warschko and   
                    W. F. Tichy   PULC: ParaStation User-Level
                                  Communication. Design and Overview . . . 498
                 S. J. Ryan and   
                      H. Bryhni   Eliminating the Protocol Stack for
                                  Socket Based Communication in Shared
                                  Memory Interconnects . . . . . . . . . . 510
                 G. Ciaccio and   
                  V. Di Martino   Porting a Molecular Dynamics Application
                                  on a Low-Cost Cluster of Personal
                                  Computer Running GAMMA . . . . . . . . . 524
                     G. Ciaccio   Optimal Communication Performance on
                                  Fast Ethernet with GAMMA . . . . . . . . 534
                   M. Baker and   
                         G. Fox   MPI on NT: A Preliminary Evaluation of
                                  the Available Environments . . . . . . . 549
                    J. Zabarsky   Failure Recovery for Distributed
                                  Processes in Single System Image
                                  Clusters . . . . . . . . . . . . . . . . 564
                   R. C. Brower   The QCD Abacus: A Cellular Automata
                                  Formulation for Continuous Gauge
                                  Symmetries . . . . . . . . . . . . . . . 584
                   I. Chang and   
             M. A. Hiltunen and   
              R. D. Schlichting   Affordable Fault Tolerance Through
                                  Adaptation . . . . . . . . . . . . . . . 585
                     J.-C Fabre   Designand Implementation of the FRIENDS
                                  System . . . . . . . . . . . . . . . . . 604
                   K. Huang and   
                      J. Wu and   
                E. B. Fernandez   A Generalized Forward Recovery
                                  Checkpointing Scheme . . . . . . . . . . 623
                  C. Fetzer and   
                    F. Cristian   Derivation of Fail-Aware Membership
                                  Service Specifications . . . . . . . . . 644
                  S. Mishra and   
                  C. Fetzer and   
                    F. Cristian   The Timewheel Group Membership Protocol  664
              B. Almohammad and   
                        B. Bose   Fault-Tolerant Broadcasting in Toroidal
                                  Networks . . . . . . . . . . . . . . . . 681
              A. C. Doering and   
                W. Obeloeer and   
                  G. Lustig and   
                      E. Maehle   A Flexible Approach for a Fault-Tolerant
                                  Router . . . . . . . . . . . . . . . . . 693
               L. Zakrevski and   
                   M. Karpovsky   Fault-Tolerant Message Routing for
                                  Multiprocessors  . . . . . . . . . . . . 714
             M. Rooholamini and   
                 S. H. Hosseini   Self-Testing Fault-Tolerant Real-Time
                                  Systems  . . . . . . . . . . . . . . . . 731
                 F. Quaglia and   
                 B. Ciciani and   
                     R. Baldoni   Checkpointing Protocols in Distributed
                                  Systems with Mobile Hosts: A Performance
                                  Analysis . . . . . . . . . . . . . . . . 742
                    S. Biaz and   
                   N. H. Vaidya   Performance Analysis of a Fault-Tolerant
                                  Scheme for Location Management of Mobile
                                  Hosts  . . . . . . . . . . . . . . . . . 756
                 C. Shields and   
                    V. Jain and   
                  S. Ntafos and   
                     R. Prakash   Fault Tolerant Mobility Planning for
                                  Rapidly Deployable Wireless Networks . . 770
               D. B. Skillicorn   Building BSP Programs Using the
                                  Refinement Calculus  . . . . . . . . . . 790
                   R. A. Gamboa   Mechanically Verifying the Correctness
                                  of the Fast Fourier Transform in ACL2    796
             J. P. Bodeveix and   
                      M. Filali   On the Automatic Validation of
                                  Parameterized Unity Programs . . . . . . 807
             M. Charpentier and   
                  M. Filali and   
                  P. Mauran and   
                      G. Padiou   Tailoring UNITY to Distributed Program
                                  Design . . . . . . . . . . . . . . . . . 820
                    X. Thirioux   Automatically Proving UNITY Safety
                                  Properties with Arrays and Quantifiers   833
               B. L. Massingill   Experiments with Program Parallelization
                                  Using Archetypes and Stepwise Refinement 844
                R. Nalumasu and   
              G. Copalakrishnan   Deriving Efficient Cache Coherence
                                  Protocols through Refinement . . . . . . 857
           R. Gruia-Catalin and   
                   P. J. McCann   An Introduction to Mobile UNITY  . . . . 871
                       J. Misra   An Object Model for Multiprogramming . . 881
               K. M. Chandy and   
         P. A. G. Sivilotti and   
                   J. R. Kiniry   A Cottage Industry of Software
                                  Publishing: Implications for Theories of
                                  Composition  . . . . . . . . . . . . . . 890
                  J. Draper and   
                   J. Block and   
                  J. Koller and   
                      C. Steele   Thermal Management in Embedded Systems
                                  Using MEMS . . . . . . . . . . . . . . . 900
                D. Scherrer and   
                      H. Eberle   A Scalable Multiprocessor for Real-Time
                                  Signal Processing  . . . . . . . . . . . 902
                  C. Steele and   
                  J. Draper and   
                      J. Koller   Safety Net: Secure Communications for
                                  Embedded High-Performance Computing  . . 908
                 O. Diessei and   
                     H. Elgindy   Partial Rearrangements of Space-Shared
                                  FPGAs  . . . . . . . . . . . . . . . . . 913
               V. Lakamraju and   
                   Z. Koren and   
                   I. Koren and   
                  C. M. Krishna   Measuring the Vulnerability of
                                  Interconnection Networks in Embedded
                                  Systems  . . . . . . . . . . . . . . . . 919
                     S. H. Russ   All Architecture for Rapid Distributed
                                  Fault Tolerance  . . . . . . . . . . . . 925
               B. Ravindran and   
                L. R. Welch and   
              C. Bruggerman and   
                  B. A. Shirazi   A Resource Management Model for Dynamic,
                                  Scalable, Dependable, Real-Time Systems  931
                     M. Lee and   
                     W. Liu and   
                 V. K. Prasanna   A Mapping Methodology for Designing
                                  Software Task Pipelines for Embedded
                                  Signal Processing  . . . . . . . . . . . 937
                  J. Fogler and   
                   T. Robey and   
                       M. Young   Toward Embedded Development from
                                  Advanced Khoros  . . . . . . . . . . . . 945
                 J. Nuetzel and   
                   B. Daene and   
                     W. Fengler   Object Nets for the Design and
                                  Verification of Distributed and Embedded
                                  Applications . . . . . . . . . . . . . . 953
                  S. Kubica and   
                   T. Robey and   
                     C. Moorman   Data Parallel Programming with the
                                  Khoros Data Services Library . . . . . . 963
                     M. Krueger   A Development Tool Environment for
                                  Configuration, Build, and Launch of
                                  Complex Applications . . . . . . . . . . 969
                 J. M. West and   
                  J. K. Antonio   Simulation of the Communication Time for
                                  a Space-Time Adaptive Processing
                                  Algorithm on a Parallel Embedded System  979
                  S. Kubica and   
                   T. Robey and   
                     C. Moorman   Optimal Configuration of Compute Nodes
                                  for Synthetic Aperture Radar Processing  987
             J. G. Martinez and   
         J. L. D. De Arriba and   
       J. E. Castaño and   
              D. F. G. Martinez   Performance Analysis of Parallel
                                  Embedded Real Time Systems Based on
                                  Measurement and Visualization  . . . . . 1015
                      X.-H. Sun   Performance Range Comparison via
                                  Crossing Point Analysis  . . . . . . . . 1025
                  V. Mincev and   
                     D. Milicev   A Tree-Driven Multiple-Rate Model of
                                  Time Measuring in Object-Oriented
                                  Real-Time Systems  . . . . . . . . . . . 1037
                    T. Nakajima   Resource Reservation for Adaptive QOS
                                  Mapping in Real-Time Mach  . . . . . . . 1047
            R. Lichtenecker and   
                K. Gotthart and   
                    J. Zalewski   Automated Verification of Communication
                                  Protocols Using CCS and BDDs . . . . . . 1057
                 M. Horauer and   
                  U. Schmid and   
                 K. Schossmaier   NTI: A Network Time Interface M-Module
                                  for High-Accuracy Clock Synchronization  1067
              L. P. Gaspary and   
               M. J. B. Almeida   Modeling and Validation Support for
                                  Interactive Networked Multimedia
                                  Applications . . . . . . . . . . . . . . 1077
               M. A. Livani and   
                      J. Kaiser   EDF Consensus on CAN Bus Access for
                                  Dynamic Real-Time Applications . . . . . 1088
                  R. Haimes and   
                   K. E. Jordan   Using PVM and MPI for Co-processed,
                                  Distributed and Parallel Scientific
                                  Visualization  . . . . . . . . . . . . . 1098
                   Z. Koren and   
                   I. Koren and   
                  C. M. Krishna   Surge Handling as a Measure of Real-Time
                                  System Dependability . . . . . . . . . . 1106
                      S. H. Son   Partial Security and Timeliness in
                                  Real-Time Database Systems . . . . . . . 1117
                  K. Ishida and   
                       K. Amano   A Synthesis Method for Fault-Tolerant
                                  Multicast Routing Protocol . . . . . . . 1121
                 C. Guenzel and   
         F. Riemenschneider and   
                     J. Wirtgen   Improved Videotransmission over Lossy
                                  Channels Using Parallelization . . . . . 1131
             A. D. Kshemkalyani   Testing of Synchronization Conditions
                                  for Distributed Real-Time Applications   1140
                 P. M. Irey and   
                 R. W. Hott and   
                   D. T. Marlow   An Architecture for Network Resource
                                  Monitoring in a Distributed Environment  1153


Lecture Notes in Computer Science
Volume 1389, 1998

                 D. S. Doermann   An Introduction to Vectorization and
                                  Segmentation . . . . . . . . . . . . . . 1
                  L. Wenyin and   
                        D. Dori   Genericity in Graphics Recognition
                                  Algorithms . . . . . . . . . . . . . . . 9
                    G. Agam and   
                    I. Dinstein   Directional Decomposition of
                                  Line-Drawing Images Based on Regulated
                                  Morphological Operations . . . . . . . . 21
                     H. Luo and   
                     R. Kasturi   Improved Directional Morphological
                                  Operations for Separation of Characters
                                  from Maps/Graphics . . . . . . . . . . . 35
                J. Y. Ramel and   
                 N. Vincent and   
                      H. Emptoz   A Coarse Vectorization as an Initial
                                  Representation for the Understanding of
                                  Line Drawing Images  . . . . . . . . . . 48
                     A. Vialard   Euclidean Paths for Representing and
                                  Tranforming Scanned Characters . . . . . 58
                  A. K. Chhabra   Graphic Symbol Recognition: An Overview  68
                     C. Ah-Soon   A Constraint Network for Symbol
                                  Detection in Architectural Drawings  . . 80
                  J. Llados and   
                 G. Sanchez and   
                       E. Marti   A String Based Method to Recognize
                                  Symbols and Structural Textures in
                                  Architectural Plans  . . . . . . . . . . 91
             E. Francesconi and   
                P. Frasconi and   
                    M. Gori and   
                     S. Marinai   Logo Recognition by Recursive Neural
                                  Networks . . . . . . . . . . . . . . . . 104
                 Y.-W. Choi and   
                      Y.-B Kwon   Methods for Korean Business Forms
                                  Processing . . . . . . . . . . . . . . . 118
                 J.- Y. Yoo and   
                  M.-K. Kim and   
             Sang Yong Hang and   
                     Y.-B. Kwon   Information Extraction from a Skewed
                                  Form Document in the Presence of
                                  Crossing Characters  . . . . . . . . . . 139
                     K. Lee and   
                    H. Byun and   
                         Y. Lee   Robust Reconstruction of Damaged
                                  Character Images on the Form Documents   149
                N. Yokokura and   
                    T. Watanabe   Layout-Based Approach for Extracting
                                  Constructive Elements of Bar-Charts  . . 163
          M. P. Deseilligny and   
                 R. Mariani and   
                 J. Labiche and   
                      R. Mullot   Topographic Maps Automatic
                                  Interpretation: Some Proposed Strategies 175
                  F. Dupont and   
          M. P. Deseilligny and   
                     M. Gondran   Automatic Interpretation of Scanned
                                  Maps: Reconstruction of Contour Lines    194
            S. Frischknecht and   
                      E. Kanani   Automatic Interpretation of Scanned
                                  Topographic Maps: A Raster-Based
                                  Approach . . . . . . . . . . . . . . . . 207
                  J. S. Centeno   Segmentation of Thematic Maps Using
                                  Colour and Spatial Attributes  . . . . . 221
       J. G. M. Schavemaker and   
              M. J. T. Reinders   Information Fusion for Conflict
                                  Resolution in Map Interpretation . . . . 231
                    M. Roux and   
                      H. Maitre   Map Analysis for Guided Interpretation
                                  of Aerial Images . . . . . . . . . . . . 243
                      K. Tombre   Analysis of Engineering Drawings: State
                                  of the Art and Challenges  . . . . . . . 257
                      M. H. Kuo   A Systematic Approach Towards
                                  Reconstructing $3$D Curved Models from
                                  Multiple $2$D Views  . . . . . . . . . . 265
            J. F. Poliakoff and   
                   P. D. Thomas   Error Correction in Scanned Engineering
                                  Drawings Using $3$-D Knowledge-Based
                                  Reconstruction . . . . . . . . . . . . . 280
                 L. S. Baum and   
                J. H. Boose and   
                   R. J. Kelley   Graphics Recognition for a Large-Scale
                                  Airplane Information System  . . . . . . 291
                    G. Nagy and   
                   A. Samal and   
                    S. Seth and   
                      T. Fisher   A Prototype for Adaptive Association of
                                  Street Names with Streets on Maps  . . . 302
                J. F. Arias and   
                 A. Chhabra and   
                       V. Misra   A Practical Application of Graphics
                                  Recognition: Helping with the Extraction
                                  of Information from Telephone Company
                                  Drawings . . . . . . . . . . . . . . . . 314
                    K. Yagi and   
                   M. Minoh and   
                       K. Ikeda   Time-Based Segmentation of Artistic
                                  Drawings . . . . . . . . . . . . . . . . 322
         A. W. M. Smeulders and   
                     C. De Boer   Design and Performance in Object
                                  Recognition  . . . . . . . . . . . . . . 335
                 C. De Boer and   
             A. W. M. Smeulders   Simulating Graphics for Performance
                                  Analysis Purposes by Combining Real
                                  World Background and Synthetic
                                  Foreground Data  . . . . . . . . . . . . 347
                  L. Wenyin and   
                        D. Dori   A Proposed Scheme for Performance
                                  Evaluation of Graphics/Text Separation
                                  Algorithms . . . . . . . . . . . . . . . 359
             I. T. Phillips and   
                   J. Liang and   
              A. K. Chhabra and   
                    R. Haralick   A Performance Evaluation Protocol for
                                  Graphics Recognition Systems . . . . . . 372
              A. K. Chhabra and   
                 I. T. Phillips   The Second International Graphics
                                  Recognition Contest --- Raster to Vector
                                  Conversion: A Report . . . . . . . . . . 390


Lecture Notes in Computer Science
Volume 1390, 1998

           Christian Scheideler   1. Introduction  . . . . . . . . . . . . 1
           Christian Scheideler   2. Communication Mechanisms Used in
                                  Practice . . . . . . . . . . . . . . . . 15
           Christian Scheideler   3. Terminology . . . . . . . . . . . . . 27
           Christian Scheideler   4. Introduction to Store-and-Forward
                                  Routing  . . . . . . . . . . . . . . . . 41
           Christian Scheideler   5. The Routing Number  . . . . . . . . . 47
           Christian Scheideler   6. Offline Routing Protocols . . . . . . 57
           Christian Scheideler   7. Oblivious Routing Protocols . . . . . 73
           Christian Scheideler   8. Adaptive Routing Protocols  . . . . . 115
           Christian Scheideler   9. Compact Routing Protocols . . . . . . 139
           Christian Scheideler   10. Introduction to Wormhole Routing . . 163
           Christian Scheideler   11. Oblivious Routing Protocols  . . . . 167
           Christian Scheideler   12. Protocols for All-Optical Networks   179
           Christian Scheideler   13. Summary and Future Directions  . . . 209
                  C. Scheideler   Universal Routing Strategies for
                                  Interconnection Networks . . . . . . . . ??


Lecture Notes in Computer Science
Volume 1391, 1998

              Riccardo Poli and   
                  W. B. Langdon   A Review of Theoretical and Experimental
                                  Results on Schemata in Genetic
                                  Programming  . . . . . . . . . . . . . . 1
          David E. Goldberg and   
               Una-May O'Reilly   Where Does the Good Stuff Go, and Why?
                                  How Contextual Semantics Influences
                                  Program Structure in Simple Genetic
                                  Programming  . . . . . . . . . . . . . . 16
              W. B. Langdon and   
                        R. Poli   Fitness Causes Bloat: Mutation . . . . . 37
        Nikolay I. Nikolaev and   
                   Vanio Slavov   Concepts of Inductive Genetic
                                  Programming  . . . . . . . . . . . . . . 49
                   Ricardo Aler   Immediate Transfer of Global
                                  Improvements to All Individuals in a
                                  Population Compared to Automatically
                                  Defined Functions for the
                                  EVEN-5,6-PARITY Problems . . . . . . . . 60
                 Takuya Ito and   
                Hitoshi Iba and   
                   Satoshi Sato   Non-destructive Depth-Dependent
                                  Crossover for Genetic Programming  . . . 71
                 Conor Ryan and   
              J. J. Collins and   
               Michael O. Neill   Grammatical Evolution: Evolving Programs
                                  for an Arbitrary Language  . . . . . . . 83
              W. B. Langdon and   
                        R. Poli   Genetic Programming Bloat with Dynamic
                                  Fitness  . . . . . . . . . . . . . . . . 97
             Markus Conrads and   
               Peter Nordin and   
               Wolfgang Banzhaf   Speech Sound Discrimination with Genetic
                                  Programming  . . . . . . . . . . . . . . 113
       J. C. Figueira Pujol and   
                        R. Poli   Efficient Evolution of Asymmetric
                                  Recurrent Neural Networks Using a
                                  PDGP-inspired Two-Dimensional
                                  Representation . . . . . . . . . . . . . 130
João Carlos Figueira Pujol and   
                  Riccardo Poli   Efficient Evolution of Asymmetric
                                  Recurrent Neural Networks Using a
                                  PDGP-inspired Two-Dimensional
                                  Representation . . . . . . . . . . . . . 130
            Giovanni Adorni and   
          Federico Bergenti and   
                Stefano Cagnoni   A Cellular-Programming Approach to
                                  Pattern Classification . . . . . . . . . 142
            Claes Andersson and   
                Mats G. Nordahl   Evolving Coupled Map Lattices for
                                  Computation  . . . . . . . . . . . . . . 151
  Stéphane Calderoni and   
                Pierre Marcenac   Genetic Programming for Automatic Design
                                  of Self-Adaptive Robots  . . . . . . . . 163
                A. E. Eiben and   
              A. E. Koudijs and   
                     F. Slisser   Genetic Modelling of Customer Retention  178
               Luiz S. Ochi and   
      Dalessandro S. Vianna and   
Lúcia M. A. Drummond and   
         André O. Victor   An Evolutionary Hybrid Metaheuristic for
                                  Solving the Vehicle Routing Problem with
                                  Heterogeneous Fleet  . . . . . . . . . . 187
               Tom Lenaerts and   
              Bernard Manderick   Building a Genetic Programming
                                  Framework: The Added-Value of Design
                                  Patterns . . . . . . . . . . . . . . . . 196
            Philip G. K. Reiser   Evolutionary Computation and the
                                  Tinkerer's Evolving Toolbox  . . . . . . 209
               Alain Racine and   
            Marc Schoenauer and   
                 Philippe Dague   A Dynamic Lattice to Evolve
                                  Hierarchically Shared Subroutines  . . . 220


Lecture Notes in Computer Science
Volume 1392, 1998

              Andreas Barth and   
               Michael Breu and   
              Albert Endres and   
                 Arnoud de Kemp   Preface  . . . . . . . . . . . . . . . . 0
                   A. Barth and   
                    M. Breu and   
   A. Brüggemann-Klein and   
                  A. Endres and   
                     A. de Kemp   The MeDoc Digital Library Project ---
                                  Its Goals and Major Achievements . . . . 1
                   D. Boles and   
                  M. Dreger and   
        K. Großjohann and   
                   C. Haber and   
                A. Kusserow and   
                  S. Lohrum and   
                   D. Menke and   
                   J. Meyer and   
             G. Möller and   
                       R. Weber   The MeDoc System --- A Digital
                                  Publication and Reference Service for
                                  Computer Science . . . . . . . . . . . . 13
                   J. Meyer and   
                H.-J. Appelrath   Design and Implementation of the MeDoc
                                  Fulltext System  . . . . . . . . . . . . 21
                   D. Boles and   
                A. Kusserow and   
             G. Möller and   
            H.-J. Appelrath and   
                     D. Fellner   Conception of the User Agent --- The
                                  User Interface of the MeDoc System . . . 35
                   D. Menke and   
           C. Gnörlich and   
                      H. Helbig   Access to Bibliographic Data Bases ---
                                  The Provider Agents in MeDoc . . . . . . 51
                  M. Dreger and   
                    N. Fuhr and   
        K. Großjohann and   
                      S. Lohrum   Provider Selection --- Design and
                                  Implementation of the MeDoc Broker . . . 67--78
        K. Großjohann and   
                       D. Menke   Query Transformation for Heterogeneous
                                  Provider Systems in MeDoc  . . . . . . . 79
              Markus Dreger and   
              Stefan Lohrum and   
              Peter Müller   The MeDoc Communication Protocol . . . . 89
   A. Brüggemann-Klein and   
                       C. Haber   The MeDoc Library: Security Aspects  . . 103
                   R. Weber and   
                    M. Breu and   
                      A. Endres   Cost Models and Accounting in MeDoc  . . 115
                  M. Dreger and   
                  S. Lohrum and   
                H. Schweppe and   
                  C. D. Ziegler   Ariadne, an Interactive Navigation and
                                  Search System for Computer --- Science
                                  Information on the World-Wide Web  . . . 127
                   S. Adler and   
                  U. Berger and   
   A. Brüggemann-Klein and   
                   C. Haber and   
              W. Lamersdorf and   
              M. Münke and   
             S. Rücker and   
                       H. Spahn   Grey Literature and Multiple Collections
                                  in NCSTRL  . . . . . . . . . . . . . . . 145
              Dieter W. Fellner   Digital Publishing for Conference
                                  Proceedings on CD-ROM  . . . . . . . . . 171
                      U. Schwab   Books and Journals in MeDoc ---
                                  Experiences on Bringing Publications
                                  Online . . . . . . . . . . . . . . . . . 179
                  Hubert Feyrer   Experiences in Document Conversions
                                  During the MeDoc Project . . . . . . . . 187
                   Michael Breu   Digital Books in MeDoc --- A First
                                  Analysis of Usage Patterns . . . . . . . 193
               Andreas Spillner   Use of MeDoc Offerings in Technical
                                  Education  . . . . . . . . . . . . . . . 207
             M. Roescheisen and   
               M. Baldonado and   
                   K. Chang and   
                     L. Gravano   The Stanford InfoBus and Its Service
                                  Layers: Augmenting the Internet with
                                  Higher-Level Information Management
                                  Protocols  . . . . . . . . . . . . . . . 213
     Martin Röscheisen and   
         Michelle Baldonado and   
                Kevin Chang and   
               Luis Gravano and   
            Steven Ketchpel and   
                Andreas Paepcke   The Stanford InfoBus and Its Service
                                  Layers: Augmenting the Internet with
                                  Higher-Level Information Management
                                  Protocols  . . . . . . . . . . . . . . . 213
                 Joost Dijkstra   Objectives, Results and Conclusions of
                                  the European DECOMATE Project: Delivery
                                  of Copyright Material to End Users . . . 231


Lecture Notes in Computer Science
Volume 1393, 1998

            Jean-Raymond Abrial   On B . . . . . . . . . . . . . . . . . . 1
                 Carroll Morgan   The Generalised Substitution Language
                                  Extended to Probabilistic Programs . . . 9
               Patrick Behm and   
           Pierre Desforges and   
            Jean-Marc Meynadier   MÉTÉOR : An Industrial Success in Formal
                                  Development  . . . . . . . . . . . . . . 26
       François Pilarski   Cost Effectiveness of Formal Methods in
                                  the Development of Avionics Systems at
                                  AÉROSPATIALE  . . . . . . . . . . . . . . 27
               Patrick Behm and   
               Lilian Burdy and   
            Jean-Marc Meynadier   Well Defined B . . . . . . . . . . . . . 29
          Marie-Laure Potet and   
                   Yann Rouzaud   Composition and Refinement in the
                                  B-Method . . . . . . . . . . . . . . . . 46
                Pierre Chartier   Formalisation of B in Isabelle/HOL . . . 66
        Jean-Raymond Abrial and   
                   Louis Mussat   Introducing Dynamic Constraints in B . . 83
               R. H. Banach and   
                M. R. Poppleton   Retrenchment: An Engineering Variation
                                  on Refinement  . . . . . . . . . . . . . 129
             Brian Matthews and   
              Brian Ritchie and   
                Juan Bicarregui   Synthesising Structure from Flat
                                  Specifications . . . . . . . . . . . . . 148
            Alexander Malioukov   An Object-Based Approach to the B Formal
                                  Method . . . . . . . . . . . . . . . . . 162
                Emil Sekerinski   Graphical Design of Reactive Systems . . 182
Jean-François Pétin and   
        Gérard Morel and   
      Dominique Méry and   
               Patrick Lamboley   Process Control Engineering:
                                  Contribution to a Formal Structuring
                                  Framework with the B Method  . . . . . . 198
Souâd Taouil-Traverson and   
                  Sylvie Vignes   Designing a B Model for Safety-Critical
                                  Software Systems . . . . . . . . . . . . 210
              Bill Stoddart and   
                Steve Dunne and   
              Andy Galloway and   
                  Richard Shore   Abstract State Machines: Designing
                                  Distributed Systems with State Machines
                                  and B  . . . . . . . . . . . . . . . . . 226
               M. Waldén   Layering Distributed Algorithms within
                                  the B-Method . . . . . . . . . . . . . . 243
              Philipp Heuberger   Two Strategies to Data-Refine an
                                  Equivalence to a Forest  . . . . . . . . 261
           Jacques Julliand and   
              Bruno Legeard and   
         Thierry Machicoane and   
            Benoit Parreaux and   
           Bruno Tatibouët   Specification of an Integrated Circuit
                                  Card Protocol Application Using the B
                                  Method and Linear Temporal Logic . . . . 273
                H. Treharne and   
                  J. Draper and   
                   S. Schneider   Test Case Preparation Using a Prototype  293


Lecture Notes in Computer Science
Volume 1394, 1998

             D. W. Albrecht and   
            A. E. Nicholson and   
                    I. Zukerman   Knowledge Acquisition for Goal
                                  Prediction in a Multi-user Adventure
                                  Game . . . . . . . . . . . . . . . . . . 1--12
                S. S. Anand and   
                   J. G. Hughes   Hybrid Data Mining Systems: The Next
                                  Generation . . . . . . . . . . . . . . . 13--24
                S. S. Anand and   
               D. Patterson and   
               J. G. Hughes and   
                     D. A. Bell   Discovering Case Knowledge Using Data
                                  Mining . . . . . . . . . . . . . . . . . 25--35
                O. Buechter and   
                       R. Wirth   Discovery of Association Rules over
                                  Ordinal Data: A New and Faster Algorithm
                                  and Its Application to Basket Analysis   36--47
               D. W. Cheung and   
                        Y. Xiao   Effect of Data Skewness in Parallel
                                  Mining of Association Rules  . . . . . . 48--60
                         H. Dai   Trend Directed Learning: A Case Study    61--71
                    G. Dong and   
                          J. Li   Interestingness of Discovered
                                  Association Rules in Terms of
                                  Neighborhood-Based Unexpectedness  . . . 72--86
                 D. L. Dowe and   
               R. A. Baxter and   
               J. J. Oliver and   
                  C. S. Wallace   Point Estimation Using the
                                  Kullback--Leibler Loss Function and MML  87--95
              R. T. Edwards and   
                     D. L. Dowe   Single Factor Analysis in MML Mixture
                                  Modelling  . . . . . . . . . . . . . . . 96--100
         V. Estivill-Castro and   
                   A. T. Murray   Discovering Associations in Spatial Data
                                  --- An Efficient Medoid Based Approach   110--121
                 Y. Frayman and   
                        L. Wang   Data Mining Using Dynamically
                                  Constructed Recurrent Fuzzy Neural
                                  Networks . . . . . . . . . . . . . . . . 122--131
                    B. Gray and   
                 M. E. Orlowska   CCAIIA: Clustering Categorical
                                  Attributes into Interesting Association
                                  Rules  . . . . . . . . . . . . . . . . . 132--143
                     J. Han and   
              N. Stefanovic and   
                    K. Koperski   Selective Materialization: An Efficient
                                  Method for Spatial Data Cube
                                  Construction . . . . . . . . . . . . . . 144--158
            R. J. Hilderman and   
               C. L. Carter and   
             H. J. Hamilton and   
                     N. Cercone   Mining Market Basket Data Using Share
                                  Measures and Characterized Itemsets  . . 159--170
                  Y. Iizuka and   
                H. Shiohara and   
                  T. Iizuka and   
                       S. Isobe   Automatic Visualization Method for
                                  Visual Data Mining . . . . . . . . . . . 171--185
               W. Kowalczyk and   
                      Z. Piasta   Rough Set-Inspired Approach to Knowledge
                                  Discovery in Business Databases  . . . . 186--197
                M. Kryszkiewicz   Representative Association Rules . . . . 198--209
                     H. Liu and   
                      H. Lu and   
                         J. Yao   Identifying Relevant Databases for
                                  Multidatabase Mining . . . . . . . . . . 210--221
               J. J. Oliver and   
               R. A. Baxter and   
                  C. S. Wallace   Minimum Message Length Segmentation  . . 222--233
                   G. Paass and   
                  J. Kindermann   Bayesian Classification Trees with
                                  Overlapping Leaves Applied to
                                  Credit-Scoring . . . . . . . . . . . . . 234--245
                  P. Perrin and   
                       F. Petry   Contextual Text Representation for
                                  Unsupervised Knowledge Discovery in
                                  Texts  . . . . . . . . . . . . . . . . . 246--257
                   A. Ragel and   
                  B. Cremilleux   Treatment of Missing Values for
                                  Association Rules  . . . . . . . . . . . 258--270
                 B.-Y. Sher and   
                 S.-C. Shao and   
                    W.-S. Hsieh   Mining Regression Rules and Regression
                                  Trees  . . . . . . . . . . . . . . . . . 271--282
                T. Shintani and   
                 M. Kitsuregawa   Mining Algorithms for Sequential
                                  Patterns in Parallel: Hash Based
                                  Approach . . . . . . . . . . . . . . . . 283--294
              Z. R. Struzik and   
                      A. Siebes   Wavelet Transform in Similarity Paradigm 295--309
                M. R. Tolun and   
                   H. Sever and   
                      M. Uludag   Improved Rule Discovery Performance on
                                  Uncertainty  . . . . . . . . . . . . . . 310--321
                  O. De Vel and   
                 D. Coomans and   
                     S. Patrick   Feature Mining and Mapping of Collinear
                                  Data . . . . . . . . . . . . . . . . . . 322--335
              J. Zeleznikow and   
                   A. Stranieri   Knowledge Discovery in Discretionary
                                  Legal Domains  . . . . . . . . . . . . . 336--347
                       Z. Zheng   Scaling Up the Rule Generation of C4.5   348--359
                   N. Zhong and   
                    J. Dong and   
                      S. Ohsuga   Data Mining Based on the Generalization
                                  Distribution Table and Rough Sets  . . . 360--373
                C.-H. Chang and   
                      C.-C. Hsu   Constructing Personalized Information
                                  Agents . . . . . . . . . . . . . . . . . 374--375
                     V. Cho and   
                   B. Wuethrich   Towards Real Time Discovery from
                                  Distributed Information Sources  . . . . 376--377
                    R. Cole and   
                  P. Eklund and   
                      D. Walker   Constructing Conceptual Scales in Formal
                                  Concept Analysis . . . . . . . . . . . . 378--379
                 D. L. Dowe and   
                 L. Allison and   
                     G. Pringle   The Hunter and the Hunted --- Modelling
                                  the Relationship Between Web Pages and
                                  Search Engines . . . . . . . . . . . . . 380--382
                   K. M. Ho and   
                    P. D. Scott   An Efficient Global Discretization
                                  Method . . . . . . . . . . . . . . . . . 383--384
               F. Jacquenet and   
                      P. Brenot   Learning User Preferences on the WEB . . 385--387
                   I. Jagielska   Using Rough Sets for Knowledge Discovery
                                  in the Development of a Decision Support
                                  System for Issuing Smog Alerts . . . . . 388--389
                T. Koshizen and   
                   H. Ogawa and   
                     J. Fulcher   Empirical Results on Data Dimensionality
                                  Reduction Using the Divided
                                  Self-Organizing Map  . . . . . . . . . . 390--391
                    Deyi Li and   
                Kaichang Di and   
                   Deren Li and   
                     Xuemei Shi   Mining Association Rules with Linguistic
                                  Cloud Models . . . . . . . . . . . . . . 392--393
                     Y. Liu and   
                    H. Chen and   
                   J. X. Yu and   
                        N. Ohbo   A Data Mining Approach for Query
                                  Refinement . . . . . . . . . . . . . . . 394--396
                      Y. Lu and   
                     H. Liu and   
                      C. L. Tan   CFMD: A Conflict-Free Multivariate
                                  Discretization Algorithm . . . . . . . . 397--398
                   A. Maeda and   
                    H. Maki and   
                     H. Akimori   Characteristic Rule Induction Algorithm
                                  for Data Mining  . . . . . . . . . . . . 399--400
                   M. K. Ng and   
                   Z. Huang and   
                     M. Hegland   Data-Mining Massive Time Series
                                  Astronomical Data Sets --- A Case Study  401--402
                       C. Nowak   Multiple Databases, Partial Reasoning,
                                  and Knowledge Discovery  . . . . . . . . 403--404
               C. M. De Oca and   
                   D. L. Carver   Design Recovery with Data Mining
                                  Techniques . . . . . . . . . . . . . . . 405--406
               A. R. Pearce and   
                      T. Caelli   The CLARET Algorithm . . . . . . . . . . 407--408
                C. L. Tsien and   
               S. M. Hamish and   
               S. F. Fraser and   
                   I. S. Kohane   LR Tree: A Hybrid Technique for
                                  Classifying Myocardial Infarction Data
                                  Containing Unknown Attribute Values  . . 409--411
                    G. Wets and   
              J. Vanthienen and   
                  H. Timmermans   Modelling Decision Tables from Data  . . 412--413
                M. Vazirgiannis   A Classification and Relationship
                                  Extraction Scheme for Relational
                                  Databases Based on Fuzzy Logic . . . . . 414--416
                  T. Washio and   
                H. Matsuura and   
                      H. Motoda   Mining Association Rules for Estimation
                                  and Prediction . . . . . . . . . . . . . 417--419
                     H. Xue and   
                         Q. Cai   Rule Generalization by Condition
                                  Combination  . . . . . . . . . . . . . . 420--422


Lecture Notes in Computer Science
Volume 1395, 1998

                  H. Kitano and   
                   M. Asada and   
               Y. Kuniyoshi and   
                        I. Noda   RoboCup: A Challenge Problem for AI and
                                  Robotics . . . . . . . . . . . . . . . . 1
                    I. Noda and   
                  S. Suzuki and   
               H. Matsubara and   
                       M. Asada   Overview of RoboCup-97 . . . . . . . . . 20
                   M. Asada and   
                   P. Stone and   
                  H. Kitano and   
                     A. Drogoul   The RoboCup Physical Agent Challenge:
                                  Goals and Protocols for Phase I  . . . . 42
                  H. Kitano and   
                   M. Tambe and   
                   P. Stone and   
                      M. Veloso   The RoboCup Synthetic Agent Challenge 97 62
                  J. Riekki and   
                     J. Roening   Playing Soccer by Modifying and
                                  Combining Primitive Reactions  . . . . . 74
                   A. Price and   
                A. Jennings and   
                   J. Kneen and   
                     E. Kendall   Learning, Deciding, Predicting: The
                                  Soccer Playing Mind  . . . . . . . . . . 88
                   P. Stone and   
                      M. Veloso   Using Decision Tree Confidence Factors
                                  for Multiagent Control . . . . . . . . . 99
              S. Coradeschi and   
                    L. Karlsson   A Role-Based Decision-Mechanism for
                                  Teams of Reactive and Coordinating
                                  Agents . . . . . . . . . . . . . . . . . 112
                   M. Tambe and   
                   J. Adibi and   
              Y. Al-Onaizan and   
                       A. Erdem   Using an Explicit Model of Teamwork in
                                  RoboCup-97 . . . . . . . . . . . . . . . 123
               A. Matsumoto and   
                       H. Nagai   Decision Making by the Characteristics
                                  and the Interaction in Multi-agent
                                  Robotics Soccer  . . . . . . . . . . . . 132
                   G. Cheng and   
                    A. Zelinsky   Real-Time Vision Processing for a Soccer
                                  Playing Mobile Robot . . . . . . . . . . 144
                  H. Mizuno and   
                 M. Kourogi and   
                Y. Kawamoto and   
                     Y. Muraoka   A Method Applied for Soccer's Behaviors
                                  Using Proper Feedback and Feedforward
                                  Control  . . . . . . . . . . . . . . . . 156
                  M. Fujita and   
                  H. Kitano and   
                    K. Kageyama   A Legged Robot for RoboCup Based on
                                  ``OPENR''  . . . . . . . . . . . . . . . 168
                       T. Balch   JavaSoccer . . . . . . . . . . . . . . . 181
                     A. Shinjoh   RoboCup-$3$D: The Construction of
                                  Intelligent Navigation System  . . . . . 188
                   E. Andre and   
                  G. Herzog and   
                        T. Rist   Generating Multimedia Presentations for
                                  RoboCup Soccer Games . . . . . . . . . . 200
                       I. Frank   Football in Recent Times: What We Can
                                  Learn from the Newspapers  . . . . . . . 216
                   I. M. Verner   The Value of Project-Based Education in
                                  Robotics . . . . . . . . . . . . . . . . 231
                  M. Veloso and   
                   P. Stone and   
                     K. Han and   
                       S. Achim   The CMUnited-97 Small Robot Team . . . . 242
                    T. Nakamura   Development of Self-Learning
                                  Vision-Based Mobile Robots for Acquiring
                                  Soccer Robots Behaviors  . . . . . . . . 257
                  S. Rocher and   
                 V. Idasiak and   
                 S. Doncker and   
                     A. Drogoul   MICROB: The French Experiment in RoboCup 277
                   A. Oller and   
                  R. Garcia and   
                J. A. Ramon and   
                    A. Figueras   Description of Rogi-Team . . . . . . . . 286
                 W.-M. Shen and   
                   J. Adibi and   
                R. Adobbati and   
                         B. Cho   Autonomous Soccer Robots . . . . . . . . 295
                  S. Suzuki and   
               Y. Takahashi and   
                  E. Uchibe and   
                    M. Nakamura   Vision-Based Robot Learning Towards
                                  RoboCup: Osaka University ``Trackies''   305
                   A. Price and   
                A. Jennings and   
                       J. Kneen   RoboCup97: An Omnidirectional
                                  Perspective  . . . . . . . . . . . . . . 320
                  K. Yokota and   
                   K. Ozaki and   
               A. Matsumoto and   
                    K. Kawabata   Omni-directional Autonomous Robots
                                  Cooperating for Team Play  . . . . . . . 333
                   B. Brian and   
        M. Schneider-Fontan and   
                 R. Sargent and   
                       C. Witty   The Spirit of Bolivia: Complex Behavior
                                  Through Minimal Control  . . . . . . . . 348
             H.-D. Burkhard and   
              M. Hannebauer and   
                     J. Wendler   AT Humboldt --- Development, Practice
                                  and Theory . . . . . . . . . . . . . . . 357
                       T. Andou   Refinement of Soccer Agents' Positions
                                  Using Reinforcement Learning . . . . . . 373
                   P. Stone and   
                      M. Veloso   The CMUnited-97 Simulator Team . . . . . 389
                    S. Luke and   
                    C. Hohn and   
                  J. Farris and   
                     G. Jackson   Co-evolving Soccer Softbot Team
                                  Coordination with Genetic Programming    398
                        M. Ohta   Learning Cooperative Behaviors in
                                  RoboCup Agents . . . . . . . . . . . . . 412
                H. Igarashi and   
                   S. Kosue and   
                M. Miyahara and   
                       T. Umaba   Individual Tactical Play and Action
                                  Decision Based on a Short-Term Goal ---
                                  Team Descriptions of Team Miya and Team
                                  Niken  . . . . . . . . . . . . . . . . . 420
                      S. Takaki   The Reactive Motion Planning in the
                                  Passive Situation  . . . . . . . . . . . 428
                 E. Pagello and   
              F. Montesello and   
                A. D'Angelo and   
                     C. Ferrari   A Reactive Architecture for RoboCup
                                  Competition  . . . . . . . . . . . . . . 434
                   T. Inden and   
                   T. Takahashi   Team: Kasuga-bitos with Modulation of
                                  Playing  . . . . . . . . . . . . . . . . 443
                     J. Fry and   
                   L. Huang and   
                      S. Peters   Team Sicily  . . . . . . . . . . . . . . 450
                   S. Ch'ng and   
                     L. Padgham   Team Description: Building Teams Using
                                  Roles, Responsibilities, and Strategies  458
                      P. Scerri   A Multi-Layered Behavior Based System
                                  for Controlling RoboCup Agents . . . . . 467
                V. Matellan and   
                 D. Borrajo and   
                   C. Fernandez   Using ABC02 in the RoboCup Domain  . . . 475
                       T. Balch   Integrating Learning with Motor
                                  Schema-Based Control for a Robot Soccer
                                  Team . . . . . . . . . . . . . . . . . . 483
                     N. Ito and   
                   T. Hotta and   
                       N. Ishii   Describing Soccer Game in EAMMO  . . . . 492
                        I. Noda   Team GAMMA: Agent Programming on Gaea    500
                   Y. Zhang and   
                A. K. Mackworth   Using Reactive Deliberation for
                                  Real-Time Control of Soccer-Playing
                                  Robots . . . . . . . . . . . . . . . . . 508
                     R. Iso and   
                     H. Inazumi   A Multi-layered Planning Architecture
                                  for Soccer Agent . . . . . . . . . . . . 513


Lecture Notes in Computer Science
Volume 1396, 1998

              G. R. Blakley and   
                      I. Borosh   A General Theory of Codes, II: Paradigms
                                  and Homomorphisms  . . . . . . . . . . . 1
               T. Shimoyama and   
                  S. Moriai and   
                      T. Kaneko   Improving the Higher Order Differential
                                  Attack and Cryptanalysis of the KN
                                  Cipher . . . . . . . . . . . . . . . . . 32
                  H. Tanaka and   
                  T. Ohishi and   
                      T. Kaneko   An Optimised Linear Attack on
                                  Pseudorandom Generators Using a Non
                                  linear Combiner  . . . . . . . . . . . . 43
                     B. Preneel   Cryptanalysis of Message Authentication
                                  Codes  . . . . . . . . . . . . . . . . . 55
         R. Balasubramanian and   
                  S. V. Nagaraj   The Least Witness of a Composite Number  66
                H. Kuwakado and   
                      H. Tanaka   Fast Algorithm for Finding a Small Root
                                  of a Quadratic Modular Equation  . . . . 75
                     F. Bao and   
                 R. H. Deng and   
                     X. Gao and   
                    Y. Igarashi   Modified Finite Automata Public Key
                                  Cryptosystem . . . . . . . . . . . . . . 82
                D. Nakamura and   
                   K. Kobayashi   Modified ElGamal Cryptosystem  . . . . . 96
                        K. Ohta   Remarks on Blind Decryption  . . . . . . 109
                  G. Davida and   
                     R. Peralta   High-Speed Cryptography  . . . . . . . . 116
                  J. Kelsey and   
                B. Schneier and   
                    C. Hall and   
                      D. Wagner   Secure Applications of Low-Entropy Keys  121--134
                   Y. Sameshima   A Key Escrow System of the RSA
                                  Cryptosystem . . . . . . . . . . . . . . 135
                 K. Sakurai and   
                  Y. Yamane and   
                S. Miyazaki and   
                       T. Inoue   A Key Escrow System with Protecting
                                  User's Privacy by Blind Decoding . . . . 147
                     Y. Desmedt   Some Recent Research Aspects of
                                  Threshold Cryptography . . . . . . . . . 158
                   A. Satoh and   
               Y. Kobayashi and   
                 H. Niijima and   
                        N. Ooba   A High-Speed Small RSA Encryption LSI
                                  with Low Power Dissipation . . . . . . . 174
               C. Markantonakis   The Case for a Secure Multi-Application
                                  Smart Card Operating System  . . . . . . 188
                  K. Koyama and   
                      R. Terada   An Augmented Family of Cryptographic
                                  Parity Circuits  . . . . . . . . . . . . 198
                      X. Yi and   
               Kwok Yan Lam and   
              Shi Xin Cheng and   
                    Xiao Hu You   A New Byte-Oriented Block Cipher . . . . 209
                     M. Bellare   Practice-Oriented Provable-Security  . . 221
                   J. Leiwo and   
                       Y. Zheng   A Framework for the Management of
                                  Information Security . . . . . . . . . . 232
           J.-M Kabasele-Tenday   Specifying Security in a Composite
                                  System . . . . . . . . . . . . . . . . . 246
                       K. Zhang   On Rough Sets and Inference Analysis . . 256
                   T. Hwang and   
                     C.-H. Wang   Arbitrated Unconditionally Secure
                                  Authentication Scheme with Multi-senders 266
                     S. Kim and   
                    S. Park and   
                         D. Won   Group Signatures for Hierarchical
                                  Multigroups  . . . . . . . . . . . . . . 273
                       K. Zhang   Threshold Proxy Signature Schemes  . . . 282
                       Y. Zheng   Signcryption and Its Applications in
                                  Efficient Public Key Solutions . . . . . 291
          Khanh Quoc Nguyen and   
                      Y. Mu and   
                V. Varadharajan   A New Digital Cash Scheme Based on Blind
                                  Nyberg-Rueppel Digital Signature . . . . 313
                 A. Fuchsberger   An Incremental Payment Method for
                                  Internet Based Streaming Real-Time Media 321
                S. Saeednia and   
                R. Safavi-Naini   A New Identity-Based Key Exchange
                                  Protocol Minimizing Computation and
                                  Communication  . . . . . . . . . . . . . 328
                H. Sakazaki and   
                 E. Okamoto and   
                       M. Mambo   The Application of ID-Based Key
                                  Distribution Systems to an Elliptic
                                  Curve  . . . . . . . . . . . . . . . . . 335
                K. Yamazaki and   
                   M. Osaki and   
                      O. Hirota   On Reconciliation of Discrepant
                                  Sequences Shared through Quantum
                                  Mechanical Channels  . . . . . . . . . . 345


Lecture Notes in Computer Science
Volume 1397, 1998

                N. G. de Bruijn   Philosophical Aspects of Computerized
                                  Verification of Mathematics  . . . . . . 1
                N. G. De Bruijn   Philosophical Aspects of Computerized
                                  Verification of Mathematics  . . . . . . 1
                     Alan Bundy   A Science of Reasoning . . . . . . . . . 10
           Edmund M. Clarke and   
                 Sergey Berezin   Model Checking: Historical Perspective
                                  and Example  . . . . . . . . . . . . . . 18
             Peter Balsiger and   
                Alain Heuerding   Comparison of Theorem Provers for Modal
                                  Logics --- Introduction and Summary  . . 25
               Ian Horrocks and   
       Peter F. Patel-Schneider   FaCT and DLP . . . . . . . . . . . . . . 27
                    Michel Levy   Prover KT4 . . . . . . . . . . . . . . . 31
           Bernhard Beckert and   
             Rajeev Goré   lean K 2.0 . . . . . . . . . . . . . . . 33
             Peter Balsiger and   
            Alain Heuerding and   
            Stefan Schwendimann   Logics Workbench 1.0 . . . . . . . . . . 35
            Ullrich Hustadt and   
          Renate A. Schmidt and   
           Christoph Weidenbach   Optimised Functional Translation and
                                  Resolution . . . . . . . . . . . . . . . 36
                    Jeremy Pitt   Benchmark Evaluation of $ \Box $KE . . . 38--39
            G. L. J. M. Janssen   Implementation of Propositional Temporal
                                  Logics Using BDDs  . . . . . . . . . . . 40
          Ján Komara and   
                   Paul J. Voda   Computer Programming as Mathematics in a
                                  Programming Language and Proof System CL 42
             Matteo Baldoni and   
             Laura Giordano and   
               Alberto Martelli   A Tableau Calculus for Multimodal Logics
                                  and some (Un)decidability Results  . . . 44
              Peter Baumgartner   Hyper Tableau --- The Next Generation    60
           Bernhard Beckert and   
                     Dov Gabbay   Fibring Semantic Tableaux  . . . . . . . 77
           Bernhard Beckert and   
                 Ulrike Hartmer   A Tableau Calculus for Quantifier-Free
                                  Set Theoretic Formulae . . . . . . . . . 93
              Howard Bowman and   
                 Simon Thompson   A Tableau Method for Interval Temporal
                                  Logic with Projection  . . . . . . . . . 108
          Serenella Cerrito and   
            Marta Cialdea Mayer   Bounded Model Search in Linear Temporal
                                  Logic and Its Application to Planning    124
                   Uwe Egly and   
                   Hans Tompits   On Proof Complexity of Circumscription   141
           C. G. Fermueller and   
                 H. Langsteiner   Tableaux for Finite-Valued Logics with
                                  Arbitrary Distribution Modalities  . . . 156
Christian G. Fermüller and   
            Herbert Langsteiner   Tableaux for Finite-Valued Logics with
                                  Arbitrary Distribution Modalities  . . . 156
                 R. Haehnle and   
               N. V. Murray and   
                   E. Rosenthal   Some Remarks on Completeness, Connection
                                  Graph Resolution and Link Deletion . . . 172
         Reiner Hähnle and   
             Neil V. Murray and   
                 Erik Rosenthal   Some Remarks on Completeness, Connection
                                  Graph Resolution, and Link Deletion  . . 172
            Ullrich Hustadt and   
              Renate A. Schmidt   Simplification and Backjumping in Modal
                                  Tableau  . . . . . . . . . . . . . . . . 187
        P. J. Martín and   
               A. Gavilanes and   
                       J. Leach   Free Variable Tableaux for a Logic with
                                  Term Declarations  . . . . . . . . . . . 202
                 Fabio Massacci   Simplification: A General Constraint
                                  Propagation Technique for Propositional
                                  and Modal Tableaux . . . . . . . . . . . 217
              Christof Monz and   
               Maarten de Rijke   A Tableaux Calculus for Ambiguous
                                  Quantification . . . . . . . . . . . . . 232
                 Sara Negri and   
                  Jan von Plato   From Kripke Models to Algebraic
                                  Counter-Valuations . . . . . . . . . . . 247
            Stephan Schmitt and   
               Christoph Kreitz   Deleting Redundancy in Proof
                                  Reconstruction . . . . . . . . . . . . . 262
            Stefan Schwendimann   A New One-Pass Tableau Calculus for \sf
                                  PLTL . . . . . . . . . . . . . . . . . . 277--291
                    Klaus Weich   Decision Procedures for Intuitionistic
                                  Propositional Logic by Program
                                  Extraction . . . . . . . . . . . . . . . 292
                   Ian Horrocks   The FaCT System  . . . . . . . . . . . . 307
                Christian Urban   Implementation of Proof Search in the
                                  Imperative Programming Language Pizza    313
                   Andreas Wolf   P-SETHEO: Strategy Parallelism in
                                  Automated Theorem Proving  . . . . . . . 320
                      Anonymous   Author Index . . . . . . . . . . . . . . 325


Lecture Notes in Computer Science
Volume 1398, 1998

                     K. De Jong   Learning in Agent-Oriented Worlds  . . . 3
                    D. D. Lewis   Naive (Bayes) at Forty: The Independence
                                  Assumption in Information Retrieval  . . 4
              N. M. Marques and   
           G. Pereira Lopes and   
                   C. A. Coelho   Learning Verbal Transitivity Using
                                  LogLinear Models . . . . . . . . . . . . 19
                 L. Marquez and   
                   H. Rodriguez   Part-of-Speech Tagging Using Decision
                                  Trees  . . . . . . . . . . . . . . . . . 25
                   F. Coste and   
                     J. Nicolas   Inference of Finite Automata: Reducing
                                  the Search Space with an Ordering of
                                  Pairs of States  . . . . . . . . . . . . 37
                   R. Schneider   Automatic Acquisition of Lexical
                                  Knowledge from Sparse and Noisy Data . . 43
              S. Letourneau and   
                  S. Matwin and   
                      F. Famili   A Normalization Method for Contextual
                                  Data: Experience from a Large-Scale
                                  Application  . . . . . . . . . . . . . . 49
                  C. Sammut and   
                      T. Zrimec   Learning to Classify X-Ray Images Using
                                  Relational Learning  . . . . . . . . . . 55
                S. Dzeroski and   
                  N. Jacobs and   
                  M. Molina and   
                       C. Moure   ILP Experiments in Detecting Traffic
                                  Problems . . . . . . . . . . . . . . . . 61
                        F. Neri   Simulating Children Learning and
                                  Explaining Elementary Heat Transfer
                                  Phenomena: A Multistrategy System at
                                  Work . . . . . . . . . . . . . . . . . . 67
               P. Kontkanen and   
              P. Myllymaeki and   
                T. Silander and   
                       H. Tirri   Bayes Optimal Instance-Based Learning    77
               P. Kontkanen and   
              P. Myllymaeki and   
                T. Silander and   
                       H. Tirri   Bayesian and Information-Theoretic
                                  Priors for Bayesian Network Parameters   89
                    D. Mladenic   Feature Subset Selection in Text
                                  Learning . . . . . . . . . . . . . . . . 95
                     H. Liu and   
                  H. Motoda and   
                        M. Dash   A Monotonic Measure for Optimal Feature
                                  Selection  . . . . . . . . . . . . . . . 101
                     R. Camacho   Inducing Models of Human Control Skills  107
                    H. Bensusan   God doesn't Always Shave with Occam's
                                  Razor --- Learning When and How to Prune 119
                       L. Torgo   Error Estimators for Pruning Regression
                                  Trees  . . . . . . . . . . . . . . . . . 125
             J. P. Bradford and   
                    C. Kunz and   
                  R. Kohavi and   
                       C. Brunk   Pruning Decision Trees with
                                  Misclassification Costs  . . . . . . . . 131
                    T. Joachims   Text Categorization with Support Vector
                                  Machines: Learning with many Relevant
                                  Features . . . . . . . . . . . . . . . . 137
                 R. Rossius and   
                  G. Zenker and   
                  A. Ittner and   
                      W. Dilger   A Short Note About the Application of
                                  Polynomial Kernels with Fractional
                                  Degree in Support Vector Learning  . . . 143
             M. Viswanathan and   
                     G. I. Webb   Classification Learning Using All Rules  149
                 M. Moreira and   
                     E. Mayoraz   Improved Pairwise Coupling
                                  Classification with Correcting
                                  Classifiers  . . . . . . . . . . . . . . 160
                 J. Jelonek and   
                 J. Stefanowski   Experiments on Solving Multiclass
                                  Learning Problems by n02-classifier  . . 172
                        J. Gama   Combining Classifiers with Constructive
                                  Induction  . . . . . . . . . . . . . . . 178
                 K. M. Ting and   
                       Z. Zheng   Boosting Trees for Cost-Sensitive
                                  Classifications  . . . . . . . . . . . . 190
                       Z. Zheng   Naive Bayesian Classifier Committees . . 196
               P. Kontkanen and   
              P. Myllymaeki and   
                T. Silander and   
                       H. Tirri   Batch Classifications with Discrete
                                  Finite Mixtures  . . . . . . . . . . . . 208
                  U. Schmid and   
                    F. Wysotzki   Induction of Recursive Program Schemes   214
                    H. Bostroem   Predicate Invention and Learning from
                                  Positive Examples Only . . . . . . . . . 226
               D. Bouthinon and   
                     H. Soldano   An Inductive Logic Programming Framework
                                  to Learn a Concept from Ambiguous
                                  Examples . . . . . . . . . . . . . . . . 238
                  M. Craven and   
                S. Slattery and   
                       K. Nigam   First-Order Learning for Web Mining  . . 250
                    S. Schroedl   Explanation-Based Generalization in Game
                                  Playing: Quantitative Results  . . . . . 256
                N. Lachiche and   
                     P. Marquis   Scope Classification: An Instance-Based
                                  Learning Algorithm with a Rule-Based
                                  Characterization . . . . . . . . . . . . 268
                   F. Ricci and   
                      D. W. Aha   Error-Correcting Output Codes for Local
                                  Learners . . . . . . . . . . . . . . . . 280
                G. Bontempi and   
               M. Birattari and   
                     H. Bersini   Recursive Lazy Learning for Modeling and
                                  Control  . . . . . . . . . . . . . . . . 292
            E. Mephu Nguifo and   
                     P. Njiwoua   Using Lattice-Based Framework as a Tool
                                  for Feature Extraction . . . . . . . . . 304
            J. J. Furtado Vasco   Determining Property Relevance in
                                  Concept Formation by Computing
                                  Correlation between Properties . . . . . 310
                L. Talavera and   
                       J. Roure   A Buffering Strategy to Avoid Ordering
                                  Effects in Clustering  . . . . . . . . . 316
                 C. Anglano and   
                A. Giordana and   
                G. Lo Bello and   
                      L. Saitta   Coevolutionary, Distributed Search for
                                  Inducing Concept Descriptions  . . . . . 322
            A. Ducoulombier and   
                       M. Sebag   Continuous Mimetic Evolution . . . . . . 334
                      B. Olsson   A Host-Parasite Genetic Algorithm for
                                  Asymetric Tasks  . . . . . . . . . . . . 346
                 M. Wiering and   
                 J. Schmidhuber   Speeding Up Q(lambda)-Learning . . . . . 352
                   A. Giani and   
                  A. Sticca and   
                 F. Baiardi and   
                     A. Starita   Q-Learning and Redundancy Reduction in
                                  Classifier Systems with Internal State   364
                    C. Drummond   Composing Functions to Speed Up
                                  Reinforcement Learning in a Changing
                                  World  . . . . . . . . . . . . . . . . . 370
                  D. Precup and   
               R. S. Sutton and   
                       S. Singh   Theoretical Results on Reinforcement
                                  Learning with Temporally Abstract
                                  Options  . . . . . . . . . . . . . . . . 382
                       R. Munos   A General Convergence Method for
                                  Reinforcement Learning in the Continuous
                                  Case . . . . . . . . . . . . . . . . . . 394
                T. Weijters and   
           A. Van den Bosch and   
               J. Van den Herik   Interpretable Neural Networks with
                                  BP-SOM . . . . . . . . . . . . . . . . . 406
              M. H. Mohamed and   
                T. Minamoto and   
                     K. Niijima   Convergence Rate of Minimization
                                  Learning for Neural Networks . . . . . . 412


Lecture Notes in Computer Science
Volume 1399, 1998

        Iqbal A. Goralwalla and   
         M. Tamer Özsu and   
                  Duane Szafron   An Object-Oriented Framework for
                                  Temporal Data Models . . . . . . . . . . 1
            Claudio Bettini and   
               X. Sean Wang and   
                 Sushil Jajodia   An Architecture for Supporting
                                  Interoperability among Temporal
                                  Databases  . . . . . . . . . . . . . . . 36
               Opher Etzion and   
                Avigdor Gal and   
                     Arie Segev   Extended Update Functionality in
                                  Temporal Databases . . . . . . . . . . . 56
                    Avigdor Gal   On Transaction Management in Temporal
                                  Databases  . . . . . . . . . . . . . . . 96
              Ramez Elmasri and   
                  Jae Young Lee   Implementation Options for Time-Series
                                  Data . . . . . . . . . . . . . . . . . . 115
         Abdullah Uz Tansel and   
                      Erkan Tin   Expressive Power of Temporal Relational
                                  Query Languages and Temporal
                                  Completeness . . . . . . . . . . . . . . 129
       Richard T. Snodgrass and   
     Michael H. Böhlen and   
        Christian S. Jensen and   
                Andreas Steiner   Transitioning Temporal Support in TSQL2
                                  to SQL3  . . . . . . . . . . . . . . . . 150
                    Hugh Darwen   Valid Time and Transaction Time
                                  Proposals: Language Design Aspects . . . 195
                    David Toman   Point-Based Temporal Extensions of SQL
                                  and Their Efficient Implementation . . . 211
                Shashi K. Gadia   Applicability of Temporal Data Models to
                                  Query Multilevel Security Databases: A
                                  Case Study . . . . . . . . . . . . . . . 238
           Ajit K. Patankar and   
                     Arie Segev   An Architecture and Construction of a
                                  Business Event Manager . . . . . . . . . 257
              Gideon Berger and   
             Alexander Tuzhilin   Discovering Unexpected Patterns in
                                  Temporal Data Using Temporal Logic . . . 281
           A. Prasad Sistla and   
               Ouri Wolfson and   
            Sam Chamberlain and   
                        Son Dao   Querying the Uncertain Position of
                                  Moving Objects . . . . . . . . . . . . . 310
                      Yu Wu and   
             Sushil Jajodia and   
                   X. Sean Wang   Temporal Database Bibliography Update    338
        Christian S. Jensen and   
          Curtis E. Dyreson and   
        Michael Böhlen and   
             James Clifford and   
              Ramez Elmasri and   
            Shashi K. Gadia and   
               Fabio Grandi and   
                  Pat Hayes and   
             Sushil Jajodia and   
        Wolfgang Käfer and   
                 Nick Kline and   
            Nikos Lorentzos and   
         Yannis Mitsopoulos and   
           Angelo Montanari and   
               Daniel Nonen and   
              Elisa Peressi and   
            Barbara Pernici and   
            John F. Roddick and   
           Nandlal L. Sarda and   
          Maria Rita Scalas and   
                 Arie Segev and   
       Richard T. Snodgrass and   
                Mike D. Soo and   
            Abdullah Tansel and   
              Paolo Tiberio and   
                 Gio Wiederhold   The Consensus Glossary of Temporal
                                  Database Concepts --- February 1998
                                  Version  . . . . . . . . . . . . . . . . 367
            Claudio Bettini and   
          Curtis E. Dyreson and   
           William S. Evans and   
       Richard T. Snodgrass and   
                   X. Sean Wang   A Glossary of Time Granularity Concepts  406--413
The Dagstuhl Seminar Researchers   Summaries of Current Work  . . . . . . . 414


Lecture Notes in Computer Science
Volume 1400, 1998

             Michael M. Richter   1. Introduction  . . . . . . . . . . . . 1
           Hans-Dieter Burkhard   2. Extending some Concepts of CBR ---
                                  Foundations of Case Retrieval Nets . . . 17
                 Mario Lenz and   
                Eric Auriol and   
                  Michel Manago   3. Diagnosis and Decision Support  . . . 51
             Wolfgang Wilke and   
                 Mario Lenz and   
                    Stefan Wess   4. Intelligent Sales Support with CBR    91
                 Mario Lenz and   
   André Hübner and   
                   Mirjam Kunze   5. Textual CBR . . . . . . . . . . . . . 115
             Wolfgang Wilke and   
                Barry Smyth and   
      Pádraig Cunningham   6. Using Configuration Techniques for
                                  Adaptation . . . . . . . . . . . . . . . 139
             Ralph Bergmann and   
Héctor Muñoz-Avila and   
             Manuela Veloso and   
                    Erica Melis   7. CBR Applied to Planning . . . . . . . 169
                     K. Boerner   CBR for Design . . . . . . . . . . . . . 201
               Katy Börner   8. CBR for Design  . . . . . . . . . . . 201
       Klaus-Dieter Althoff and   
               Andreas Birk and   
Christiane Gresse von Wangenheim and   
                  Carsten Tautz   9. CBR for Experimental Software
                                  Engineering  . . . . . . . . . . . . . . 235
              Gerhard Weber and   
               Thomas J. Schult   10. CBR for Tutoring and Help Systems    255
               Lothar Gierl and   
               Mathias Bull and   
                 Rainer Schmidt   11. CBR in Medicine  . . . . . . . . . . 273
             Ralph Bergmann and   
           Klaus-Dieter Althoff   12. Methodology for Building CBR
                                  Applications . . . . . . . . . . . . . . 299
                  Gerd Kamp and   
              Steffen Lange and   
               Christoph Globig   13. Related Areas  . . . . . . . . . . . 327


Lecture Notes in Computer Science
Volume 1401, 1998

                C. Barberet and   
                  L. Brunie and   
                 F. Desprez and   
                 G. Lebourgeois   Technology Transfer within the ProHPC
                                  TTN at ENS Lyon  . . . . . . . . . . . . 3
                   W. Loeve and   
                M. E. S. Vogels   Competence Management in Engineering
                                  Environments with HPCN . . . . . . . . . 13
             R. Groothuizen and   
                 H. Van der Ven   A NICE HPCN Centre for Flow Simulation   23
                     J. Stadler   Industrial Applications of High
                                  Performance Computing --- The
                                  Experiences from HWW . . . . . . . . . . 30
                 D. Anguita and   
                    A. Boni and   
                 M. Chirico and   
                     F. Giudici   High Performance Neurocomputing:
                                  Industrial and Medical Applications of
                                  the RAIN System  . . . . . . . . . . . . 34
             J. C. Gonzalez and   
                 J. Herrera and   
                  S. Garcia and   
                   F. H. Priano   An Intranet Solution for Geographically
                                  Dispersed Educational Centres:
                                  PINCEL-NET . . . . . . . . . . . . . . . 44
                       A. Marsh   EUROMED --- A 21st Century WWW-based
                                  Telemedical Information Society  . . . . 54
             L. Grandinetti and   
                D. Conforti and   
                     L. De Luca   CAMD and TeleEEG: Software Tools for
                                  Telemedicine Applications  . . . . . . . 64
                A. Meliones and   
                 A. Karidis and   
                S. Perrakis and   
                     V. Siganos   Distributed Audio-Visual Content
                                  Development  . . . . . . . . . . . . . . 74
                M. Beccaria and   
                 G. Buresti and   
                  A. Ciampa and   
                       G. Curci   High Performance Roadvehicle Optimized
                                  Aerodynamic Design: Application of
                                  Parallel Computing to Car Design . . . . 86
                 J. Derksen and   
               H. Van den Akker   Parallel Simulation of Turbulent Fluid
                                  Flow in a Mixing Tank  . . . . . . . . . 96
               P. Palazzari and   
              P. D'Atanasio and   
                    F. Ragusini   Simulation of Patch Array Antennas
                                  through the Implementation of
                                  Finite-Difference Time-Domain (FD-TD)
                                  Algorithm on Distributed Memory
                                  Massively Parallel Systems . . . . . . . 105
              C. H. Q. Ding and   
               P. M. Lyster and   
               J. W. Larson and   
                         J. Guo   Atmospheric Data Assimilation on
                                  Distributed-Memory Parallel
                                  Supercomputers . . . . . . . . . . . . . 115
   H. Öksüzo\uglu and   
              A. G. M. Van Hees   A Barotropic Global Ocean Model and Its
                                  Parallel Implementation on Unstructured
                                  Grids  . . . . . . . . . . . . . . . . . 125
                  S. Hummel and   
           I. J. P. Elshoff and   
                   A. E. Mynett   Distributed Engineering Systems in
                                  Coastal Zone Management  . . . . . . . . 133
                 J. G. Blom and   
                W. M. Lioen and   
                   J. G. Verwer   HPCN and Air Quality Modeling  . . . . . 141
                S. Nicastro and   
                F. Valentinotti   Parallel Implementation of a
                                  Meteorological Model on a SIMD
                                  Architecture . . . . . . . . . . . . . . 151
               M. Bernaschi and   
             F. Castiglione and   
                       S. Succi   A Parallel Simulator of the Immune
                                  Response . . . . . . . . . . . . . . . . 163
                 D. Kandhai and   
               D. Dubbeldam and   
             A. G. Hoekstra and   
                 P. M. A. Sloot   Parallel Lattice-Boltzmann Simulation of
                                  Fluid Flow in Centrifugal Elutriation
                                  Chambers . . . . . . . . . . . . . . . . 173
                   N. Attig and   
                 S. Guesken and   
                  P. Lacock and   
                     T. Lippert   Running a Code for Lattice Quantum
                                  Chromodynamics Efficiently on CRAY T3E
                                  Systems  . . . . . . . . . . . . . . . . 183
                   F. Banse and   
             J.-L. Dekeyser and   
           R. Fauquembergue and   
                    F. Dessenne   Implementation of a Bi-Parallel Monte
                                  Carlo Device Simulation on Two
                                  Architectures  . . . . . . . . . . . . . 193
              B. Di Martino and   
               S. Briguglio and   
                    G. Vlad and   
                   P. Sguazzero   Parallel Plasma Simulation in High
                                  Performance Fortran  . . . . . . . . . . 203
                    G. Fogaccia   Parallel Implementation of a Lattice
                                  Boltzmann Algorithm for the
                                  Electrostatic Plasma Turbulence  . . . . 213
                  C. H. Q. Ding   Evaluations of HPF for Practical
                                  Scientific Algorithms on T3E . . . . . . 223
                 R. Keppens and   
                  S. Poedts and   
                J. P. Goedbloed   Data Parallel Simulations of the
                                  Magnetohydrodynamics of Plasma Loops . . 233
               A. Van der Ploeg   Parallelization of a Block Tridiagonal
                                  Solver in HPF on an IBM SP2  . . . . . . 242
              J.-Y. Berthou and   
                      L. Plagne   Parallel HPF-MPI Implementation of the
                                  TBSCM Poisson Solver . . . . . . . . . . 252
             A. N. Meliones and   
                 I. Barosan and   
               T. T. Varvarigou   Efficient Distributed Execution of
                                  Computationally Intensive Tasks  . . . . 262
                 A. Corradi and   
                L. Leonardi and   
                  F. Zambonelli   On the Effectiveness of Different
                                  Diffusive Load Balancing Policies in
                                  Dynamic Applications . . . . . . . . . . 274
                 F. Baiardi and   
                 P. Becuzzi and   
                    P. Mori and   
                       M. Paoli   Load Balancing and Locality in
                                  Hierarchical $N$-Body Algorithms on
                                  Distributed Memory Architectures . . . . 284
             G. Xirogiannis and   
                      H. Taylor   A Dynamic Task Distribution and Engine
                                  Allocation Strategy for Distributed
                                  Execution of Logic Programs  . . . . . . 294
                  L. Cherkasova   Scheduling Strategy to Improve Response
                                  Time for Web Applications  . . . . . . . 305
       D. A. L. Piriyakumar and   
            C. S. R. Murthy and   
                        P. Levi   A New A0* Based Optimal Task Scheduling
                                  in Heterogeneous Multiprocessor Systems
                                  Applied to Computer Vision . . . . . . . 315
                   F. Andre and   
                   C. Morin and   
                  M.-T. Segarra   Mechanisms for Global Processor and
                                  Memory Management on a NoW . . . . . . . 324
             J. M. MacLaren and   
                     J. M. Bull   Lessons Learned when Comparing Shared
                                  Memory and Message Passing Codes on
                                  Three Modern Parallel Architectures  . . 337
                 D. Aharoni and   
                       A. Barak   Asynchronous Parallel Discontinuous
                                  Finite Element Method  . . . . . . . . . 347
                K. Kitagawa and   
                H. Nakamura and   
                      G. Yagawa   Comparison Between Substructure Method
                                  and Domain Decomposition Method  . . . . 358
                    G. Toth and   
                     R. Keppens   Comparison of Different Computer
                                  Platforms for Running the Versatile
                                  Advection Code . . . . . . . . . . . . . 368
                  A. Waheed and   
                         J. Yan   Parallelization of NAS Benchmarks for
                                  Shared Memory Multiprocessors  . . . . . 377
                       F. Diard   The Photon$4$D Distributed Engine: A
                                  Distribution Layer for High Quality
                                  Rendering in Shared Virtual Immersion    387
             H. Van der Ven and   
             B. Schultheiss and   
                     S. Doi and   
                   H. Matsumoto   Real-Time Visualization of Large Data
                                  Sets on NLR's NEC SX-4 . . . . . . . . . 397
                 J. Blasiak and   
                     W. Dzwinel   Visual Clustering of Multidimensional
                                  and Large Data Sets Using Parallel
                                  Environments . . . . . . . . . . . . . . 403
              G. S. Hodgson and   
                   P. Dzwig and   
              H. M. Liddell and   
                   D. Parkinson   Application of HPC to Medium-size
                                  Stochastic Systems with Non-linear
                                  Constraints in Finance . . . . . . . . . 411
                   U. Nowak and   
                   R. Ehrig and   
                  L. Oeverdieck   Parallel Extrapolation Methods and Their
                                  Application in Chemical Engineering  . . 419
                K. E. Kerry and   
                   K. A. Hawick   Kriging Interpolation on
                                  High-Performance Computers . . . . . . . 429
                 T. Lippert and   
               K. Schilling and   
                  F. Toschi and   
                   S. Trentmann   Transpose Algorithm for FFT on APE\slash
                                  Quadrics . . . . . . . . . . . . . . . . 439
              M.-T. Kechadi and   
                  D. F. Hegarty   A Parallel Technique for Partitioning
                                  Nodes of Weighted Graphs . . . . . . . . 449
                  G. Dodero and   
                V. Gianuzzi and   
                 M. Moscati and   
                       M. Corvi   A Scalable Parallel Algorithm for
                                  Matching Pursuit Signal Decomposition    458
         A. J. H. Peddemors and   
              L. O. Hertzberger   A High Performance Distributed Database
                                  System for Enhanced Internet Services    469
               N. Zingirian and   
                 M. Maresca and   
                       S. Nalin   Efficiency of Standard Software
                                  Architectures for Java-Based Access to
                                  Remote Databases . . . . . . . . . . . . 479
               J. M. Donato and   
             J. C. Schryver and   
               G. C. Hinkel and   
                 R. L. Schmoyer   Mining Multi-Dimensional Data for
                                  Decision Support . . . . . . . . . . . . 489
                  D. Taniar and   
                       Y. Jiang   A High Performance Object-Oriented
                                  Distributed Parallel Database
                                  Architecture . . . . . . . . . . . . . . 498
                      D. Taniar   Towards an Ideal Data Placement Scheme
                                  for High Performance Object-Oriented
                                  Database Systems . . . . . . . . . . . . 508
              P. Beaugendre and   
                   T. Priol and   
                  G. Allion and   
                    D. Delavaux   A Client/Server Approach for HPC
                                  Applications within a Networking
                                  Environment  . . . . . . . . . . . . . . 518
                  V. Sander and   
                   D. Erwin and   
                       V. Huber   High-Performance Computer Management
                                  Based on Java  . . . . . . . . . . . . . 526
                    I. Park and   
                   R. Eigenmann   URSA MAJOR: Exploring Web Technology for
                                  Design and Evaluation of
                                  High-Performance Systems . . . . . . . . 535
           J. Chattratichat and   
              J. Darlington and   
                     Y. Guo and   
                     S. Hedvall   A Software Architecture for Deploying
                                  High Performance Solution on the
                                  Internet . . . . . . . . . . . . . . . . 545
                R. Williams and   
                       B. Sears   Paraflow: A Data flow Distributed
                                  Data-Computing System  . . . . . . . . . 556
                      M. Schulz   SISCI-Pthreads SMP-like Programming on
                                  an SCI-cluster . . . . . . . . . . . . . 566
              B. G. Herland and   
                   M. Eberl and   
                  H. Hellwagner   A Common Messaging Layer for MPI and PVM
                                  over SCI . . . . . . . . . . . . . . . . 576
                  H. Nakajo and   
                  H. Tanaka and   
               Y. Nakanishi and   
                      M. Kohata   Distributed Shared-Memory for a
                                  Workstation Cluster with a High Speed
                                  Serial Interface . . . . . . . . . . . . 588
               K. A. Hawick and   
                H. A. James and   
               C. J. Patten and   
                  F. A. Vaughan   DISCWorld: A Distributed High
                                  Performance Computing Environment  . . . 598
                  H. Nakada and   
                  H. Takagi and   
                S. Matsuoka and   
                   U. Nagashima   Utilizing the Metaserver Architecture in
                                  the Ninf Global Computing System . . . . 607
               B. Buehlmann and   
                       H. Bieri   Supercomputing at the Desktop: An
                                  Improved Interface Using Internet
                                  Facilities . . . . . . . . . . . . . . . 617
                  P. Launay and   
                     J.-L Pazat   A Framework for Parallel Programming in
                                  Java . . . . . . . . . . . . . . . . . . 628
                A. Aggarwal and   
                    D. Grunwald   Effects of Network Bandwidth on
                                  Performance in Software DSM Systems  . . 638
            F. Cortes Gomez and   
                     R. Lueling   A Parallel Continuous Media Server for
                                  Internet Environments  . . . . . . . . . 648
               D. Cavendish and   
                     A. Fei and   
                   M. Gerla and   
                         R. Rom   On the Construction of Low Cost
                                  Multicast Trees with Bandwidth
                                  Reservation  . . . . . . . . . . . . . . 658
               J. Carretero and   
                      J. No and   
                 S.-S. Park and   
                   A. Choudhary   COMPASSION: A Parallel I/O Runtime
                                  System Including Chunking and
                                  Compression for Irregular Applications   668
               F. B. Maciel and   
                  N. Sagawa and   
                      T. Tanaka   Dynamic Gateways: A Novel Approach to
                                  Improve Networking Performance and
                                  Availability on Parallel Servers . . . . 678
               P. Cremonesi and   
                 C. Gennaro and   
                      R. Marega   I/O Performance in Hybrid MIMD $+$ SIMD
                                  Machines . . . . . . . . . . . . . . . . 688
                   N. Osawa and   
                        T. Yuba   Lazy and Differential Replication in a
                                  Recoverable Distributed Shared Memory
                                  System . . . . . . . . . . . . . . . . . 698
                J. C. Cunha and   
                J. Lourenco and   
                  J. Vieira and   
                      B. Moscao   A Framework to Support Parallel and
                                  Distributed Debugging  . . . . . . . . . 708
             D. J. Kerbyson and   
          E. Papaefstathiou and   
                     G. R. Nudd   Application Execution Steering Using
                                  On-the-fly Performance Prediction  . . . 718
                  P. Kacsuk and   
                   G. Dozsa and   
                 T. Fadgyas and   
                       R. Lovas   The GRED Graphical Editor for the GRADE
                                  Parallel Program Development Environment 728
                N. Mirenkov and   
             O. G. Monakhov and   
                O. J. Chunikhin   A Multimedia System for the
                                  Investigation of Mapping Algorithms  . . 738
                   E. Laure and   
                     B. Chapman   Interprocedural Array Alignment Analysis 747
                  C.-H. Chi and   
                   C. M. Cheung   Data Prefetching for Non-linear Memory
                                  References . . . . . . . . . . . . . . . 757
         M. A. Kartawidjaja and   
                 A. G. Hoekstra   Memory Efficiency of Parallel Programs
                                  and Memory Bounded Speedup . . . . . . . 766
            S. R. Donaldson and   
              J. M. D. Hill and   
               D. B. Skillicorn   Communication Performance Optimisation
                                  Requires Minimising Variance . . . . . . 776
               M. Migliardi and   
               P. Baglietto and   
                     M. Maresca   Virtual Parallelism Allows Relaxing the
                                  Synchronization Constraints of SIMD
                                  Computing Paradigm . . . . . . . . . . . 784
                     S. Benkner   HPF+: High Performance Fortran for
                                  Advanced Industrial Applications . . . . 797
              M. Calzarossa and   
                 L. Massari and   
                   A. Merlo and   
                     M. Pantano   Integration of a Compilation System and
                                  a Performance Tool: The HPF+ Approach    809
                 S. Benkner and   
                 K. Sanjari and   
                 V. Sipkova and   
                      B. Velkov   Parallelizing Irregular Applications
                                  with the Vienna HPF+ Compiler VFC  . . . 816
               J. H. Merlin and   
                S. B. Baden and   
                 S. J. Fink and   
                  B. M. Chapman   Multiple Data Parallelism with HPF and
                                  KeLP . . . . . . . . . . . . . . . . . . 828
            R. Slootmaekers and   
              H. Van Wulpen and   
                      W. Joosen   Modelling Genetic Search Agents with a
                                  Concurrent Object-Oriented Language  . . 843
               A. E. Doroshenko   Coordination Facilities to Enhance
                                  Concurrency of Race Free Parallel
                                  Algorithms . . . . . . . . . . . . . . . 854
                    P. Christen   Dynamic Load Balancing within a Parallel
                                  Iterative Linear System Solver . . . . . 857
                 C. M. Dury and   
                  R. Knecht and   
                   G. H. Ristow   Size Segregation of Granular Materials
                                  in a $3$D Rotating Drum  . . . . . . . . 860
                    M. Pourquie   LES and DNS on Parallel and Vector
                                  Platforms  . . . . . . . . . . . . . . . 863
               P. Wijnandts and   
                M. E. S. Vogels   High-Level Versus Low-Level DO-loop
                                  Parallelization: Results for One
                                  Testcase of a Multi-block Solver on a
                                  Shared Memory Parallel Vector Computer   866
          A. V. Bukhanovsky and   
                 A. M. Samsonov   Numerical Simulation of Strain Solitons
                                  in Elastic Wave Guides Using Vector and
                                  Massive Parallel Supercomputers  . . . . 869
                  M. A. Botchev   Experiments with MRAI Time Stepping
                                  Schemes on a Distributed Memory Parallel
                                  Environment  . . . . . . . . . . . . . . 872
                G. Chillemi and   
                       N. Sanna   Molecular Dynamics Using $p$-threads . . 875
                  J. Plazek and   
                   K. Banas and   
                    J. Kitowski   Finite Element Message-Passing/DSM
                                  Simulation Algorithm for Parallel
                                  Computers  . . . . . . . . . . . . . . . 878
                 W. Dzwinel and   
                    W. Alda and   
                J. Kitowski and   
                   J. Moscinski   Large-Scale Molecular Dynamics
                                  Experiments on Cray T3E System . . . . . 881
                 G. Ciaccio and   
               V. DiMartino and   
                    P. Lanucara   Porting the Flame Front Propagation
                                  Problem on GAMMA . . . . . . . . . . . . 884
                K. Garatani and   
                H. Nakamura and   
                      G. Yagawa   Parallel Finite Element Structural
                                  Analysis Code Using DDM  . . . . . . . . 887
                K. Demuynck and   
              J. Broeckhove and   
                      F. Arickx   Building a Software Platform for
                                  Distributed VR Applications  . . . . . . 890
             A. V. Bogdanov and   
                N. Y. Bykov and   
                 G. A. Lukianov   Distributed and Parallel Direct
                                  Simulation Monte Carlo of Rarefied Gas
                                  Flows  . . . . . . . . . . . . . . . . . 893
                 R. Sakellariou   Solving Diophantine Equations on a
                                  Network of Workstations  . . . . . . . . 896
              S. Stramaglia and   
            G. Pasquariello and   
               L. Guerriero and   
                    A. Distante   Interferometric SAR Phase Unwrapping by
                                  Parallel Tempering on a APE100\slash
                                  Quadrics Supercomputer . . . . . . . . . 898
             E. N. Stankova and   
                 E. V. Zudilova   Numerical Simulation by Means of
                                  Supercomputers . . . . . . . . . . . . . 901
                K. Nakajima and   
                H. Nakamura and   
                       H. Okuda   Highly Stable Localized ILU
                                  Preconditioning for Unstructured Grids   904
                   M. Horoi and   
                      R. Enbody   Efficient Implementation of a Lanczos
                                  Eigenvalue Solver on a Cray T3E-900  . . 907
          R. A. E. Maekinen and   
                   T. Rossi and   
                    J. Toivanen   A Parallel Fast Direct Solver with
                                  Applications . . . . . . . . . . . . . . 910
                   F. J. Lingen   ScaFiEP: The Scalable Finite Element
                                  Package  . . . . . . . . . . . . . . . . 913
               C. Greenough and   
                      R. Fowler   Software for Partitioning Finite Element
                                  Meshes . . . . . . . . . . . . . . . . . 916
             A. V. Bogdanov and   
               A. Gevorkyan and   
                   A. Grigoryan   First Principle Calculations of Quantum
                                  Chaos and Its Self-Organisation in the
                                  Framework of $1$D Model of Random
                                  Quantum Reactive Harmonic Oscillator . . 919
                G. Mondelli and   
              G. Castellano and   
                G. Attolico and   
                    C. Distante   Parallel Genetic Evolution of Membership
                                  Functions and Rules for a Fuzzy
                                  Controller . . . . . . . . . . . . . . . 922
               A. V. Spirov and   
                  A. S. Kadyrov   Transposon Element Technique Applied to
                                  GA-based John Muir's Trail Test  . . . . 925
                        T. Jung   Remote Control of Virtual Environments
                                  via Low-Bandwidth Connections  . . . . . 929
                  G. Folino and   
                G. Spezzano and   
                       D. Talia   Performance Evaluation and Modelling of
                                  MPI Communications on the Meiko CS-2 . . 932
                  D. Taniar and   
                J. Wenny Rahayu   Divide and Partial Broadcast Method for
                                  Parallel Collection Join Queries . . . . 937
                   D. Sueur and   
             J.-L. Dekeyser and   
                     P. Marquet   DPFS: A Data-Parallel File System
                                  Environment  . . . . . . . . . . . . . . 940
                    C. Lefebvre   Visual Edition of HPF Mappings with
                                  HPF-Builder  . . . . . . . . . . . . . . 943
                    H. D. Hoang   Adaptive Bandwidth Scheduling in B-ISDN  946
                J. C. Cunha and   
                P. Medeiros and   
                J. Lourenco and   
                      V. Duarte   The DOTPAR Project: Towards a Framework
                                  Supporting Domain Oriented Tools for
                                  Parallel and Distributed Processing  . . 952
               A. E. Doroshenko   Coordination Facilities to Enhance
                                  Concurrency of Race Free Parallel
                                  Algorithms . . . . . . . . . . . . . . . 955
           T. W. J. Peeters and   
              P. P. J. Stroomer   Parallel Simulation of a
                                  Bluff-Body-Stabilized Non-premixed
                                  Syngas Flame . . . . . . . . . . . . . . 958
                  C.-H. Chi and   
                      S. C. Lau   Extending Data Prefetching to
                                  Co-operative Caching . . . . . . . . . . 961
                   R. Slota and   
                   J. Moscinski   Lattice Gas Automata Simulation on
                                  HP\slash Convex Exemplar SPP1600 . . . . 963
                Y.-S. Chang and   
                      B.-Y. Kim   The Improved RAID 5 with the Disk Cache
                                  Using the Load-Balanced Destage
                                  Algorithm  . . . . . . . . . . . . . . . 966
                   G. Gheri and   
                    J. R. Mosig   The Multilevel Interactive Objects
                                  Approach to Model and Mesh Large Planar
                                  Antennas and Arrays: A Full-JAVA Tool    969
                   H. Kosch and   
               L. Boeszoermenyi   High Performance Sets  . . . . . . . . . 972
                A. Laffitte and   
             R. Sakellariou and   
                     J. R. Gurd   Evaluation of Two Compiler-Based
                                  Approaches for the Parallelisation of an
                                  MPEG-2 Decoder . . . . . . . . . . . . . 975


Lecture Notes in Computer Science
Volume 1402, 1998

          Charu C. Aggarwal and   
               Joel L. Wolf and   
                   Philip S. Yu   A Framework for the Optimizing of WWW
                                  Advertising  . . . . . . . . . . . . . . 1
                Maria Barra and   
          Giuseppe Cattaneo and   
                 Mario Izzo and   
              Alberto Negro and   
               Vittorio Scarano   Symmetric Adaptive Customer Modeling for
                                  Electronic Commerce in a Distributed
                                  Environment  . . . . . . . . . . . . . . 11
           Bella Belegradek and   
      Konstantinos Kalpakis and   
                   Yelena Yesha   Maximizing Seller's Profit for
                                  Electronic Commerce  . . . . . . . . . . 26
            Thomas F. Rebel and   
                 Olaf Darge and   
                Wolfgang Koenig   Approaches of Digital Signature
                                  Legislation  . . . . . . . . . . . . . . 39
               A. Pfitzmann and   
                  A. Schill and   
                A. Westfeld and   
                   G. Wicke and   
                    G. Wolf and   
                J. Zöllner   A Java-Based Distributed Platform for
                                  Multilateral Security  . . . . . . . . . 52
                Gadi Shamir and   
             Michael Ben-Or and   
                    Danny Dolev   BARTER: A Backbone ARchitecture for
                                  Trade of ElectRonic Content  . . . . . . 65
         Artur Romão and   
           Miguel Mira da Silva   An Agent-Based Secure Internet Payment
                                  System for Mobile Computing  . . . . . . 80
                 Elke Franz and   
              Anja Jerichow and   
                  Guntram Wicke   A Payment Scheme for Mixes Providing
                                  Anonymity  . . . . . . . . . . . . . . . 94
             Jim Cunningham and   
       Shamimabi Paurobally and   
       Athanassios Diacakis and   
            Lorenz Lorenzen and   
              Gabriel Gross and   
              Stephen McConnell   Satisfying Requirements for Electronic
                                  Commerce . . . . . . . . . . . . . . . . 109
             Isabel Gallego and   
              Jaime Delgado and   
  José J. Acebrón   Distributed Models for Brokerage on
                                  Electronic Commerce  . . . . . . . . . . 129
         Jean-Marc Andreoli and   
         François Pacull   Distributed Print on Demand Systems in
                                  the Xpect Framework  . . . . . . . . . . 141
             Martin Bichler and   
                Carrie Beam and   
                     Arie Segev   OFFER: A Broker-Centered Object
                                  Framework for Electronic Requisitioning  154
                 Wolfgang Weitz   Workflow Modeling for Internet-Based
                                  Commerce: An Approach Based on
                                  High-Level Petri Nets  . . . . . . . . . 166
            Andreas Geppert and   
           Markus Kradolfer and   
              Dimitrios Tombros   Market-Based Workflow Management . . . . 179
         Mike P. Papazoglou and   
        Manfred A. Jeusfeld and   
               Hans Weigand and   
                 Matthias Jarke   Distributed, Interoperable Workflow
                                  Support for Electronic Commerce  . . . . 192
               Michael Zapf and   
          Helge Müller and   
                     Kurt Geihs   Security Requirements for Mobile Agents
                                  in Electronic Markets  . . . . . . . . . 205
                      X. Yi and   
                 X. F. Wang and   
                      K. Y. Lam   A Secure Intelligent Trade Agent System  218
                    Marko Boger   Migrating Objects in Electronic Commerce
                                  Applications . . . . . . . . . . . . . . 229
       Markus Straßer and   
             Kurt Rothermel and   
        Christian Maihöfer   Providing Reliable Agents for Electronic
                                  Commerce . . . . . . . . . . . . . . . . 241


Lecture Notes in Computer Science
Volume 1403, 1998

               Victor Shoup and   
                Rosario Gennaro   Securing threshold cryptosystems against
                                  chosen ciphertext attack . . . . . . . . 1
                 Adam Young and   
                      Moti Yung   Auto-Recoverable Auto-Certifiable
                                  Cryptosystems  . . . . . . . . . . . . . 17
          Eiichiro Fujisaki and   
               Tatsuaki Okamoto   A practical and provably secure scheme
                                  for publicly verifiable secret sharing
                                  and its applications . . . . . . . . . . 32
            Noboru Kunihiro and   
                   Kenji Koyama   Equivalence of counting the number of
                                  points on elliptic curve over the ring $
                                  {Z}_n $ and factoring $n$  . . . . . . . 47
                  Dan Boneh and   
         Ramarathnam Venkatesan   Breaking RSA May Not Be Equivalent to
                                  Factoring (Extended Abstract)  . . . . . 59--71
             Ueli M. Maurer and   
                    Stefan Wolf   Lower Bounds on Generic Algorithms in
                                  Groups . . . . . . . . . . . . . . . . . 72
              Alex Biryukov and   
               Eyal Kushilevitz   Improved Cryptanalysis of RC5  . . . . . 85
                  Eli Biham and   
                Lars R. Knudsen   Cryptanalysis of the ANSI X9.52 CBCM
                                  Mode . . . . . . . . . . . . . . . . . . 100
                  Philip Hawkes   Differential-Linear Weak Key Classes of
                                  IDEA . . . . . . . . . . . . . . . . . . 112
                 Matt Blaze and   
             Gerrit Bleumer and   
                 Martin Strauss   Divertible Protocols and Atomic Proxy
                                  Cryptography . . . . . . . . . . . . . . 127
             Kaoru Kurosawa and   
                    Yvo Desmedt   Optimum Traitor Tracing and Asymmetric
                                  Schemes  . . . . . . . . . . . . . . . . 145
             Charanjit S. Jutla   On finding small solutions of modular
                                  multivariate polynomial equations  . . . 158
                   Damian Weber   Computing discrete logarithms with
                                  quadratic number rings . . . . . . . . . 171
            Jacques Patarin and   
               Louis Goubin and   
               Nicolas Courtois   Improved Algorithms for Isomorphisms of
                                  Polynomials  . . . . . . . . . . . . . . 184
                     Adi Shamir   Visual Cryptanalysis . . . . . . . . . . 201
     Gérard D. Cohen and   
           Antoine Lobstein and   
             David Naccache and   
            Gilles Zémor   How to Improve an Exponentiation
                                  Black-Box  . . . . . . . . . . . . . . . 211
               Victor Boyko and   
             Marcus Peinado and   
         Ramarathnam Venkatesan   Speeding up discrete log and factoring
                                  based schemes via precomputations  . . . 221
              Mihir Bellare and   
              Juan A. Garay and   
                      Tal Rabin   Fast batch verification for modular
                                  exponentiation and digital signatures    236
                 Matt Blaze and   
            Joan Feigenbaum and   
                      Moni Naor   A Formal Treatment of Remotely Keyed
                                  Encryption (Extended Abstract) . . . . . 251--265
              Mihir Bellare and   
                Ted Krovetz and   
                Phillip Rogaway   Luby-Rackoff backwards: Increasing
                                  security by making block ciphers
                                  non-invertible . . . . . . . . . . . . . 266
      Mariusz H. Jakubowski and   
         Ramarathnam Venkatesan   The Chain & Sum Primitive and Its
                                  Applications to MACs and Stream Ciphers  281
               D. Huehnlein and   
             M. J. Jacobson and   
                  S. Paulus and   
                      T. Takagi   A cryptosystem based on non-maximal
                                  imaginary quadratic orders with fast
                                  decryption . . . . . . . . . . . . . . . 294
       Detlef Hühnlein and   
   Michael J. Jacobson, Jr. and   
              Sachar Paulus and   
                Tsuyoshi Takagi   A Cryptosystem Based on Non-maximal
                                  Imaginary Quadratic Orders with Fast
                                  Decryption . . . . . . . . . . . . . . . 294
           Tatsuaki Okamoto and   
             Shigenori Uchiyama   A New Public-Key Cryptosystem as Secure
                                  as Factoring . . . . . . . . . . . . . . 308
               Alain P. Hiltgen   Towards a better understanding of
                                  one-wayness: Facing linear permutations  319
                Daniel R. Simon   Finding collisions on a one-way street:
                                  Can secure hash functions be based on
                                  general assumptions? . . . . . . . . . . 334
           Matthew Franklin and   
              Rebecca N. Wright   Secure Communication in Minimal
                                  Connectivity Models  . . . . . . . . . . 346
               Christian Cachin   On the Foundations of Oblivious Transfer 361
              Donald Beaver and   
                   Avishai Wool   Quorum-Based Secure Multi-party
                                  Computation  . . . . . . . . . . . . . . 375
              David Pointcheval   Strengthened Security for Blind
                                  Signatures . . . . . . . . . . . . . . . 391
             Markus Michels and   
                 Markus Stadler   Generic Constructions for Secure and
                                  Efficient Confirmer Signature Schemes
                                  (Extended Abstract)  . . . . . . . . . . 406
          Guillaume Poupard and   
                  Jacques Stern   Security analysis of a practical ``on
                                  the fly'' authentication and signature
                                  generation . . . . . . . . . . . . . . . 422
                   Masayuki Abe   Universally verifiable mix-net with
                                  verification work independent of the
                                  number of mix-servers  . . . . . . . . . 437
               Markus Jakobsson   A Practical Mix  . . . . . . . . . . . . 448
                  Claude Carlet   On the Propagation Criterion of Degree
                                  $l$ and Order $k$  . . . . . . . . . . . 462
                Eric Filiol and   
              Caroline Fontaine   Highly nonlinear balanced Boolean
                                  functions with a good
                                  correlation-immunity . . . . . . . . . . 475
             William Millan and   
               Andrew Clark and   
                      Ed Dawson   Heuristic design of cryptographically
                                  strong balanced Boolean functions  . . . 489
        Carles Padró and   
      Germán Sáez   Secret sharing schemes with bipartite
                                  access structure . . . . . . . . . . . . 500
               Michael Luby and   
                Jessica Staddon   Combinatorial Bounds for Broadcast
                                  Encryption . . . . . . . . . . . . . . . 512
      Reihaneh Safavi-Naini and   
                  Huaxiong Wang   New Results on Multi-Receiver
                                  Authentication Codes . . . . . . . . . . 527
                Don Coppersmith   Specialized Integer Factorization  . . . 542
           Tatsuaki Okamoto and   
             Shigenori Uchiyama   Security of an identity-based
                                  cryptosystem and the related reductions  546
                 Agnes Chan and   
               Yair Frankel and   
               Yiannis Tsiounis   Easy Come --- Easy Go Divisible Cash . . 561
                  Moni Naor and   
                   Benny Pinkas   Secure and Efficient Metering  . . . . . 576
                  N. Asokan and   
               Victor Shoup and   
                Michael Waidner   Optimistic Fair Exchange of Digital
                                  Signatures (Extended Abstract) . . . . . 591
                      Anonymous   Author Index . . . . . . . . . . . . . . 607


Lecture Notes in Computer Science
Volume 1404, 1998

             Roberta L. Klatzky   Allocentric and Egocentric Spatial
                                  Representations: Definitions,
                                  Distinctions, and Interconnections . . . 1
            Karin Schweizer and   
              Theo Herrmann and   
            Gabriele Janzen and   
                    Steffi Katz   The Route Direction Effect and its
                                  Constraints  . . . . . . . . . . . . . . 19
          S. Mecklenboeuker and   
                 W. Wippich and   
                 M. Wageher and   
                 J. E. Saathoff   Spatial information and actions  . . . . 39
 Silvia Mecklenbräuker and   
             Werner Wippich and   
             Monika Wagener and   
          Jörg E. Saathoff   Spatial Information and Actions  . . . . 39
           Jörg Gehrke and   
                Bernhard Hommel   The Impact of Exogenous Factors on
                                  Spatial Coding in Perception and Memory  63
           Rainer Rothkegel and   
             Karl F. Wender and   
              Sabine Schumacher   Judging Spatial Relations from Memory    79
             Steffen Werner and   
            Christina Saade and   
                 Gerd Lüer   Relations Between the Mental
                                  Representation of Extrapersonal Space
                                  and Spatial Behavior . . . . . . . . . . 107
               A. Eisenkolb and   
                   A. Musto and   
                  K. Schill and   
        D. Hernández and   
                      W. Brauer   Representational Levels for the
                                  Perception of the Courses of Motion  . . 129
            Barbara Tversky and   
                    Paul U. Lee   How Space Structures Language  . . . . . 157
          Carola Eschenbach and   
          Christopher Habel and   
                 Lars Kulik and   
 Annette Leßmöllmann   Shape Nouns and Shape Concepts: A
                                  Geometry for `Corner'  . . . . . . . . . 177
          Constanze Vorwerg and   
                  Gert Rickheit   Typicality Effects in the Categorization
                                  of Spatial Relations . . . . . . . . . . 203
           Hubert D. Zimmer and   
           Harry R. Speiser and   
             Jörg Baus and   
             Anselm Blocher and   
                      Eva Stopp   The Use of Locative Expressions in
                                  Dependence of the Spatial Relation
                                  Between Target and Reference Object in
                                  Two-Dimensional Layouts  . . . . . . . . 223
                Berry Claus and   
              Klaus Eyferth and   
               Carsten Gips and   
          Robin Hörnig and   
                 Ute Schmid and   
            Sylvia Wiebrock and   
                 Fritz Wysotzki   Reference Frames for Spatial Inference
                                  in Text Understanding  . . . . . . . . . 241
              Markus Knauff and   
              Reinhold Rauh and   
        Christoph Schlieder and   
                 Gerhard Strube   Mental Models in Spatial Reasoning . . . 267
                Andrew U. Frank   Formal Models for Cognition --- Taxonomy
                                  of Spatial Location Description and
                                  Frames of Reference  . . . . . . . . . . 293
            Bettina Berendt and   
           Thomas Barkowsky and   
           Christian Freksa and   
               Stephanie Kelter   Spatial Representation with Aspect Maps  313
               Benjamin Kuipers   A Hierarchy of Qualitative
                                  Representations for Space  . . . . . . . 337
                Jochen Renz and   
                 Bernhard Nebel   Spatial Reasoning with Topological
                                  Information  . . . . . . . . . . . . . . 351
         B. Krieg-Broeckner and   
                  T. Roefer and   
             H.-O. Carmesin and   
                     R. Mueller   A taxonomy of spatial knowledge for
                                  navigation and its application to the
                                  Bremen autonomous wheelchair . . . . . . 373
  Bernd Krieg-Brückner and   
          Thomas Röfer and   
         Hans-Otto Carmesin and   
               Rolf Müller   A Taxonomy of Spatial Knowledge for
                                  Navigation and its Application to the
                                  Bremen Autonomous Wheelchair . . . . . . 373
                   L. Nadel and   
            K. G. F. Thomas and   
             H. E. Laurance and   
                 R. Skelton and   
                     T. Tal and   
                   W. J. Jacobs   Human Place Learning in a Computer
                                  Generated Arena  . . . . . . . . . . . . 399
             Thomas Bräunl   CIIPS Glory Soccer Robots with Local
                                  Intelligence . . . . . . . . . . . . . . 416
               Bernd Leplow and   
            Doris Höll and   
                Lingju Zeng and   
             Maximilian Mehdorn   Spatial Orientation and Spatial Memory
                                  Within a `Locomotor Maze' for Humans . . 429
        Hanspeter A. Mallot and   
             Sabine Gillner and   
  Hendrik A. H. C. van Veen and   
      Heinrich H. Bülthoff   Behavioral Experiments in Spatial
                                  Cognition Using Virtual Reality  . . . . 447
         Fredrik Wartenberg and   
                   Mark May and   
          Patrick Péruch   Spatial Orientation in Virtual
                                  Environments: Background Considerations
                                  and Experiments  . . . . . . . . . . . . 469


Lecture Notes in Computer Science
Volume 1405, 1998

         Hans-Peter Steiert and   
         Jürgen Zimmermann   JPMQ --- An Advanced Persistent Message
                                  Queuing Service  . . . . . . . . . . . . 1
             Gerrit Griebel and   
                Brian Lings and   
             Björn Lundell   A Repository to Support Transparency in
                                  Database Design  . . . . . . . . . . . . 19
        Günter Preuner and   
                Michael Schrefl   Observation Consistent Integration of
                                  Views of Object Life-Cycles  . . . . . . 32
          Edward Omiecinski and   
                 Ashok Savasere   Efficient Mining of Association Rules in
                                  Large Dynamic Databases  . . . . . . . . 49
            Ruth Kurniawati and   
               Jesse S. Jin and   
               John A. Shepherd   Efficient Nearest-Neighbour Searches
                                  Using Weighted Euclidean Metrics . . . . 64
                  Niels Nes and   
                 Martin Kersten   The Acoi Algebra: A Query Algebra for
                                  Image Retrieval Systems  . . . . . . . . 77
               Greg Speegle and   
               Xiaojun Wang and   
                   Le Gruenwald   A Meta-Structure for Supporting
                                  Multimedia Editing in Object-Oriented
                                  Databases  . . . . . . . . . . . . . . . 89
          D. D. Karunaratna and   
                 W. A. Gray and   
                  N. J. Fiddian   Establishing a Knowledge Base to Assist
                                  Integration of Heterogeneous Databases   103
              Stefan Conrad and   
               Ingo Schmitt and   
                Can Türker   Considering Integrity Constraints During
                                  Federated Database Design  . . . . . . . 119
             P. F. Meredith and   
                  P. J. H. King   Scoped Referential Transparency in a
                                  Functional Database Language with
                                  Updates  . . . . . . . . . . . . . . . . 134
            Norman W. Paton and   
       Pedro R. Falcone Sampaio   Extending the ODMG Architecture with a
                                  Deductive Object Query Language  . . . . 149
         Nieves R. Brisaboa and   
    Agustin González and   
Héctor J. Hernández and   
   José R. Paramá   The Chase of Datalog Programs  . . . . . 165
           Natasha Alechina and   
               Maarten de Rijke   Describing and Querying Semistructured
                                  Data: Some Expressiveness Results  . . . 167
                  Marc Welz and   
                     Peter Wood   The TENTACLE Database System as a Web
                                  Server . . . . . . . . . . . . . . . . . 169
                L. E. Hodge and   
                 W. A. Gray and   
                  N. J. Fiddian   A Toolkit to Facilitate the Querying and
                                  Integration of Tabular Data from
                                  Semistructured Documents . . . . . . . . 171
               David Taniar and   
                J. Wenny Rahayu   Parallel Sub-collection Join Algorithm
                                  for High Performance Object-Oriented
                                  Databases  . . . . . . . . . . . . . . . 173
               J. A. McCann and   
                    J. S. Crane   Component DBMS Architecture for Nomadic
                                  Computing  . . . . . . . . . . . . . . . 175
                W. Behrendt and   
              N. J. Fiddian and   
                 W. A. Gray and   
            A. P. Madurapperuma   ITSE Database Interoperation Toolkit . . 177
             A.-R. H. Tawil and   
                 W. A. Gray and   
                  N. J. Fiddian   Ontological Commitments for Multiple
                                  View Cooperation in a Distributed
                                  Heterogeneous Environment  . . . . . . . 179
               Kit-ying Hui and   
               Peter M. D. Gray   Constraint and Data Fusion in a
                                  Distributed Information System . . . . . 181
                      Anonymous   Author Index . . . . . . . . . . . . . . 183


Lecture Notes in Computer Science
Volume 1406, 1998

                  Anders Heyden   A Common Framework for Multiple View
                                  Tensors  . . . . . . . . . . . . . . . . 3
             Richard I. Hartley   Computation of the Quadrifocal Tensor    20
           Olivier Faugeras and   
                  Long Quan and   
                    Peter Sturm   Self-calibration of a $1$D projective
                                  camera and its application to the
                                  self-calibration of a $2$D projective
                                  camera . . . . . . . . . . . . . . . . . 36
              Reinhard Koch and   
             Marc Pollefeys and   
                   Luc Van Gool   Multi viewpoint stereo from uncalibrated
                                  video sequences  . . . . . . . . . . . . 55
         Rikard Berthilsson and   
                  Anders Heyden   Recognition of planar point
                                  configurations using the density of
                                  affine shape . . . . . . . . . . . . . . 72
                    Bill Triggs   Autocalibration from Planar Scenes . . . 89
     Th\`eodore Papadopoulo and   
               Olivier Faugeras   A New Characterization of the Trifocal
                                  Tensor . . . . . . . . . . . . . . . . . 109
                Shai Avidan and   
                  Amnon Shashua   Threading Fundamental Matrices . . . . . 124
              Lars Bretzner and   
                 Tony Lindeberg   Use your hand as a $3$D mouse, or,
                                  Relative orientation from extended
                                  sequences of sparse point and line
                                  correspondences using the affine
                                  trifocal tensor  . . . . . . . . . . . . 141
           Jean-Marc Lavest and   
                 Marc Viala and   
                       M. Dhome   Do we really need an accurate
                                  calibration pattern to achieve a
                                  reliable camera calibration? . . . . . . 158
                 Naoya Ohta and   
               Kenichi Kanatani   Optimal estimation of three-dimensional
                                  rotation and reliability evaluation  . . 175
                     P. Fua and   
                      C. Miccio   From regular images to animated heads: A
                                  least squares approach . . . . . . . . . 188
                 Oliver Schreer   Stereo vision-based navigation in
                                  unknown indoor environment . . . . . . . 203
       Tomás Svoboda and   
        Tomás Pajdla and   
    Václav Hlavác   Epipolar Geometry for Panoramic Cameras  218
           Hiroshi Ishikawa and   
                    Davi Geiger   Occlusions, discontinuities, and
                                  epipolar lines in stereo . . . . . . . . 232
                Stefan Carlsson   Symmetry in Perspective  . . . . . . . . 249
           Sergei Startchik and   
           Ruggero Milanese and   
                    Thierry Pun   Projective and illumination invariant
                                  representation of disjoint shapes  . . . 264
          Michael J. Brooks and   
         Wojciech Chojnacki and   
       Anton van den Hengel and   
                   Luis Baumela   Robust techniques for the estimation of
                                  structure from motion in the
                                  uncalibrated case  . . . . . . . . . . . 281
             Toshio Ueshiba and   
                 Fumiaki Tomita   A factorization method for projective
                                  and Euclidean reconstruction from
                                  multiple perspective views via iterative
                                  depth estimation . . . . . . . . . . . . 296
       Andrew W. Fitzgibbon and   
               Andrew Zisserman   Automatic camera recovery for closed or
                                  open image sequences . . . . . . . . . . 311
               Fredrik Kahl and   
                  Anders Heyden   Structure and motion from points, lines
                                  and conics with affine cameras . . . . . 327
Tomás Brodský and   
    Cornelia Fermüller and   
              Yiannis Aloimonos   Simultaneous estimation of viewing
                                  geometry and structure . . . . . . . . . 342
              C. Fermueller and   
                   Y. Aloimonos   What is computed by structure from
                                  motion algorithms? . . . . . . . . . . . 359
    Cornelia Fermüller and   
              Yiannis Aloimonos   What Is Computed by Structure from
                                  Motion Algorithms? . . . . . . . . . . . 359
           Olivier Faugeras and   
                 Renaud Keriven   Complete Dense Stereovision Using Level
                                  Set Methods  . . . . . . . . . . . . . . 379
            Cordelia Schmid and   
               Andrew Zisserman   The geometry and matching of curves in
                                  multiple views . . . . . . . . . . . . . 394
                 Theo Moons and   
              David Fr\`ere and   
         Jan Vandekerckhove and   
                   Luc Van Gool   Automatic modelling and $3$D
                                  reconstruction of urban house roofs from
                                  high resolution aerial imagery . . . . . 410
                  G. Csurka and   
              D. Demirdjian and   
                     A. Ruf and   
                      R. Horaud   Closed-form solutions for the Euclidean
                                  calibration of a stereo rig  . . . . . . 426
                 Brian Funt and   
              Kobus Barnard and   
                 Lindsay Martin   Is Machine Colour Constancy Good Enough? 445
                Yogesh Raja and   
         Stephen J. McKenna and   
                  Shaogang Gong   Colour model selection and adaptation in
                                  dynamic scenes . . . . . . . . . . . . . 460
        Graham D. Finlayson and   
              Bernt Schiele and   
               James L. Crowley   Comprehensive Colour Image Normalization 475
              Michael Kliot and   
                    Ehud Rivlin   Invariant-based shape retrieval in
                                  pictorial databases  . . . . . . . . . . 491
              P. H. S. Torr and   
                   A. Zisserman   Concerning Bayesian motion segmentation,
                                  model averaging, matching and the
                                  trifocal tensor  . . . . . . . . . . . . 511
                 Jianbo Shi and   
                 Jitendra Malik   Self inducing relational distance and
                                  its application to image segmentation    528
               Thomas Leung and   
                 Jitendra Malik   Contour continuity in region based image
                                  segmentation . . . . . . . . . . . . . . 544
              Jens Ketterer and   
                Jan Puzicha and   
                Marcus Held and   
             Martin Fischer and   
         Joachim M. Buhmann and   
                 Dieter Fellner   On Spatial Quantization of Color Images  563
    Jean Michel Marie-Julie and   
                 Hassane Essafi   Using ifs and moments to build a quasi
                                  invariant image index  . . . . . . . . . 578
                Marc Gelgon and   
               Patrick Bouthemy   Determining a structured spatio-temporal
                                  representation of video content for
                                  efficient visualization and indexing . . 595
                     Ron Kimmel   Demosaicing: Image reconstruction from
                                  color CCD samples  . . . . . . . . . . . 610
                  M. Petrou and   
                M. Mirmehdi and   
                       M. Coors   Perceptual smoothing and segmentation of
                                  colour textures  . . . . . . . . . . . . 623
Vincent Colin de Verdi\`ere and   
               James L. Crowley   Visual Recognition Using Local
                                  Appearance . . . . . . . . . . . . . . . 640
          V. C. De Verdiere and   
                  J. L. Crowley   Visual recognition using local
                                  appearance . . . . . . . . . . . . . . . 640
Vincent Colin de Verdi\`ere and   
               James L. Crowley   Visual Recognition Using Local
                                  Appearance . . . . . . . . . . . . . . . 640
                  P. Perona and   
                     W. Freeman   A Factorization Approach to Grouping . . 655
        Gabor Lukács and   
               Ralph Martin and   
                  Dave Marshall   Faithful least-squares fitting of
                                  spheres, cylinders, cones and tori for
                                  reliable segmentation  . . . . . . . . . 671
          Sönke Frantz and   
                  Karl Rohr and   
            H. Siegfried Stiehl   Multi-step procedures for the
                                  localization of $2$D and $3$D point
                                  landmarks and automatic ROI size
                                  selection  . . . . . . . . . . . . . . . 687
                Volker Rehrmann   Object oriented motion estimation in
                                  color image sequences  . . . . . . . . . 704
               Helmut Mayer and   
                Ivan Laptev and   
             Albert Baumgartner   Multi-scale and Snakes for Automatic
                                  Road Extraction  . . . . . . . . . . . . 720
           C. G. Braeutigam and   
              J.-O. Eklundh and   
              H. I. Christensen   A model-free voting approach for
                                  integrating multiple cues  . . . . . . . 734
  Carsten G. Bräutigam and   
           Jan-Olof Eklundh and   
          Henrik I. Christensen   A Model-Free Voting Approach for
                                  Integrating Multiple Cues  . . . . . . . 734
             Serge Belongie and   
                 Jitendra Malik   Finding boundaries in natural images: A
                                  new method using point descriptors and
                                  area completion  . . . . . . . . . . . . 751
              Michael Isard and   
                   Andrew Blake   A Smoothing Filter for CONDENSATION  . . 767
            Mario E. Munich and   
                  Pietro Perona   Camera-Based ID Verification by
                                  Signature Tracking . . . . . . . . . . . 782
                B. Southall and   
             J. A. Marchant and   
                   T. Hague and   
                   B. F. Buxton   Model Based Tracking for Navigation and
                                  Segmentation . . . . . . . . . . . . . . 797
               Michael Haag and   
             Hans-Hellmut Nagel   Beginning a transition from a local to a
                                  more global point of view in model-based
                                  vehicle tracking . . . . . . . . . . . . 812
       Fernando de la Torre and   
              Shaogang Gong and   
                Stephen McKenna   View-Based Adaptive Affine Tracking  . . 828
       Fernando de la Torre and   
              Shaogang Gong and   
                Stephen McKenna   View-Based Adaptive Affine Tracking  . . 828
                 J. Denzler and   
                   B. Heigl and   
                     H. Niemann   An efficient combination of $2$D and
                                  $3$D shape descriptions for contour
                                  based tracking of moving objects . . . . 843
                   S. Huwer and   
                     H. Niemann   $2$D-Object Tracking Based on
                                  Projection-Histograms  . . . . . . . . . 861
          Ismail Haritaoglu and   
              David Harwood and   
                 Larry S. Davis   $ W^4 S $: A Real-Time System for
                                  Detecting and Tracking People in $ 2 1 /
                                  2 $D . . . . . . . . . . . . . . . . . . 877--892
              Michael Isard and   
                   Andrew Blake   ICONDENSATION: Unifying low-level and
                                  high-level tracking in a stochastic
                                  framework  . . . . . . . . . . . . . . . 893
           Michael J. Black and   
                Allan D. Jepson   A probabilistic framework for matching
                                  temporal trajectories:
                                  CONDENSATION-based recognition of
                                  gestures and expressions . . . . . . . . 909
                      Anonymous   Author Index . . . . . . . . . . . . . . 925


Lecture Notes in Computer Science
Volume 1407, 1998

           Marcello Pelillo and   
             Kaleem Siddiqi and   
               Steven W. Zucker   Matching hierarchical structures using
                                  association graphs . . . . . . . . . . . 3
                Ralph Trapp and   
         Siegbert Drüe and   
                 Georg Hartmann   Stereo matching with Implicit detection
                                  of occlusions  . . . . . . . . . . . . . 17
             Raouf Benjemaa and   
                Francis Schmitt   A solution for the registration of
                                  multiple $3$D point sets using unit
                                  quaternions  . . . . . . . . . . . . . . 34
        Christophoros Nikou and   
              Fabrice Heitz and   
             Jean-Paul Armspach   Robust registration of dissimilar single
                                  and multimodal images  . . . . . . . . . 51
                   David Vernon   Decoupling Fourier components of dynamic
                                  image sequences: A theory of signal
                                  separation, image segmentation, and
                                  optical flow estimation  . . . . . . . . 69
                H.-H. Nagel and   
                      A. Gehrke   Spatiotemporally adaptive estimation and
                                  segmentation of OF-fields  . . . . . . . 86
        Harpreet S. Sawhney and   
                  Steve Hsu and   
                       R. Kumar   Robust video mosaicing through topology
                                  inference and local to global alignment  103
             Yoram Gdalyahu and   
               Daphna Weinshall   Flexible Syntactic Matching of Curves    123
         Andrew D. J. Cross and   
               Edwin R. Hancock   Holistic Matching  . . . . . . . . . . . 140
    Antonio M. López and   
           Felipe Lumbreras and   
                    Joan Serrat   Creaseness from Level Set Extrinsic
                                  Curvature  . . . . . . . . . . . . . . . 156
    Günther Balschbach and   
              Jochen Klinke and   
               Bernd Jähne   Multichannel shape from shading
                                  techniques for moving specular surfaces  170
             Naoufel Werghi and   
              Robert Fisher and   
            Craig Robertson and   
               Anthony Ashbrook   Modelling objects having quadric
                                  surfaces incorporating geometric
                                  constraints  . . . . . . . . . . . . . . 185
                  N. F. Law and   
                       R. Chung   Surface reconstruction with
                                  multiresolution discontinuity analysis   202
             Jan Koenderink and   
               Andrea van Doorn   Shape from Chebyshev Nets  . . . . . . . 215
           Gregory Baratoff and   
              Yiannis Aloimonos   Changes in surface convexity and
                                  topology caused by distortions of
                                  stereoscopic visual space  . . . . . . . 226
             A. J. Stoddart and   
                       M. Baker   Reconstruction of smooth surfaces with
                                  arbitrary topology adaptive splines  . . 241
                Ralf Gerber and   
             Hans-Hellmut Nagel   (Mis?-) Using DRT for generation of
                                  natural language text from image
                                  sequences  . . . . . . . . . . . . . . . 255
               Mads Nielsen and   
                 Ole Fogh Olsen   The Structure of the Optic Flow Field    271
         Sridhar Srinivasan and   
                 Rama Chellappa   Optical flow using overlapped basis
                                  functions for solving global motion
                                  problems . . . . . . . . . . . . . . . . 288
                M. Muehlich and   
                      R. Mester   The role of total least squares in
                                  motion analysis  . . . . . . . . . . . . 305
      Matthias Mühlich and   
                  Rudolf Mester   The Role of Total Least Squares in
                                  Motion Analysis  . . . . . . . . . . . . 305
                  B. Jaehne and   
              H. Haussecker and   
                  H. Scharr and   
                       H. Spies   Study of dynamical processes with
                                  tensor-based spatiotemporal image
                                  processing techniques  . . . . . . . . . 322
              B. Jähne and   
         H. Haußecker and   
                  H. Scharr and   
                   H. Spies and   
                D. Schmundt and   
                      U. Schurr   Study of Dynamical Processes with
                                  Tensor-Based Spatiotemporal Image
                                  Processing Techniques  . . . . . . . . . 322
                      Yi Ma and   
        Jana Kosecká and   
                 Shankar Sastry   Motion recovery from image sequences:
                                  Discrete viewpoint vs. differential
                                  viewpoint  . . . . . . . . . . . . . . . 337
          Christophe P. Bernard   Discrete wavelet analysis: A new
                                  framework for fast optic flow
                                  computation  . . . . . . . . . . . . . . 354
           Gabriele Lohmann and   
             D. Yves von Cramon   Automatic detection and labelling of the
                                  human cortical folds in magnetic
                                  resonance data sets  . . . . . . . . . . 369
        Tomás Werner and   
        Tomás Pajdla and   
    Václav Hlavác   Efficient $3$-D scene visualization by
                                  image extrapolation  . . . . . . . . . . 382
          David J. Kriegman and   
             Peter N. Belhumeur   What Shadows Reveal about Object
                                  Structure  . . . . . . . . . . . . . . . 399
                John Haddon and   
                  David Forsyth   Shape Representations from Shading
                                  Primitives . . . . . . . . . . . . . . . 415
          Lance R. Williams and   
             Karvel K. Thornber   A comparison of measures for detecting
                                  natural shapes in cluttered backgrounds  432
          Richard C. Wilson and   
               Edwin R. Hancock   Bias-Variance Tradeoff for Adaptive
                                  Surface Meshes . . . . . . . . . . . . . 449
        Massimiliano Pontil and   
              Stefano Rogai and   
               Alessandro Verri   Recognizing $3$-D objects with linear
                                  support vector machines  . . . . . . . . 469
               T. F. Cootes and   
              G. J. Edwards and   
                   C. J. Taylor   Active Appearance Models . . . . . . . . 484
              Thomas Vetter and   
                   Volker Blanz   Estimating coloured $3$D face models
                                  from single images: An example based
                                  approach . . . . . . . . . . . . . . . . 499
              Iain Matthews and   
          J. Andrew Bangham and   
             Richard Harvey and   
                    Stephen Cox   A comparison of active shape model and
                                  scale decomposition based features for
                                  visual speech recognition  . . . . . . . 514
              Lothar Bergen and   
                  Fernand Meyer   Motion segmentation and depth ordering
                                  based on morphological segmentation  . . 531
          Pierre Kornprobst and   
             Rachid Deriche and   
                  Gilles Aubert   Image sequence restoration: A PDE based
                                  coupled method for image restoration and
                                  motion segmentation  . . . . . . . . . . 548
Étienne Mémin and   
           Patrick Pérez   Joint Estimation-Segmentation of Optic
                                  Flow . . . . . . . . . . . . . . . . . . 563
              G. J. Edwards and   
               T. F. Cootes and   
                   C. J. Taylor   Face Recognition Using Active Appearance
                                  Models . . . . . . . . . . . . . . . . . 581
               Chengjun Liu and   
                 Harry Wechsler   Face Recognition Using Evolutionary
                                  Pursuit  . . . . . . . . . . . . . . . . 596
                Kenji Nagao and   
                   Masaki Sohma   Recognizing faces by weakly
                                  orthogonalizing against perturbations    613
            Michael C. Burl and   
               Markus Weber and   
                  Pietro Perona   A probabilistic approach to object
                                  recognition using local photometry and
                                  global geometry  . . . . . . . . . . . . 628
   Frédéric Jurie   Hypothesis verification in model-based
                                  object recognition with a Gaussian error
                                  model  . . . . . . . . . . . . . . . . . 642
            Juergen Luettin and   
         Stéphane Dupont   Continuous Audio-Visual Speech
                                  Recognition  . . . . . . . . . . . . . . 657
             A. P. Ashbrook and   
               R. B. Fisher and   
               C. Robertson and   
                      N. Werghi   Finding surface correspondence for
                                  object recognition and registration
                                  using pairwise geometric histograms  . . 674
               R. B. Fisher and   
                    A. MacKirdy   Integrating Iconic and Structured
                                  Matching . . . . . . . . . . . . . . . . 687
                Amin Massad and   
     Bärbel Mertsching and   
                Steffen Schmalz   Combining multiple views and temporal
                                  associations for $3$-D object
                                  recognition  . . . . . . . . . . . . . . 699
                Isaac Weiss and   
                     Manjit Ray   Model-based recognition of $3$D objects
                                  from one view  . . . . . . . . . . . . . 716
                 Stan Z. Li and   
              Joachim Hornegger   A two-stage probabilistic approach for
                                  object recognition . . . . . . . . . . . 733
         Stéphane Herbin   Combining geometric and probabilistic
                                  structure for active recognition of $3$D
                                  objects  . . . . . . . . . . . . . . . . 748
            John MacCormick and   
                   Andrew Blake   Spatial dependence in the observation of
                                  visual contours  . . . . . . . . . . . . 765
                   B. Krebs and   
               M. Burkhardt and   
                        B. Korn   Handling uncertainty in $3$D object
                                  recognition using Bayesian networks  . . 782
           Kenichi Kanatani and   
                     Naoya Ohta   Optimal robot self-localization and
                                  reliability evaluation . . . . . . . . . 796
          Andrew J. Davison and   
                David W. Murray   Mobile Robot Localisation Using Active
                                  Vision . . . . . . . . . . . . . . . . . 809
                   M. Irani and   
                 P. Anandan and   
                   D. Weinshall   From reference frames to reference
                                  planes: Multi-view parallax geometry and
                                  applications . . . . . . . . . . . . . . 829
               A. Criminisi and   
                    I. Reid and   
                   A. Zisserman   Duality, Rigidity and Planar Parallax    846
            Gideon P. Stein and   
                  Amnon Shashua   On degeneracy of linear reconstruction
                                  from three views: Linear line complex
                                  and applications . . . . . . . . . . . . 862
                      Anonymous   Author Index . . . . . . . . . . . . . . 879


Lecture Notes in Computer Science
Volume 1408, 1998

          Michael W. Carter and   
                Gilbert Laporte   Recent Developments in Practical Course
                                  Timetabling  . . . . . . . . . . . . . . 3--19
                E. K. Burke and   
                   D. B. Varley   Space Allocation: An Analysis of Higher
                                  Education Requirements . . . . . . . . . 20--36
            Kathryn A. Dowsland   Off-the-Peg or Made-to-Measure?
                                  Timetabling and Scheduling with SA and
                                  TS . . . . . . . . . . . . . . . . . . . 37--52
             Jacques A. Ferland   Generalized Assignment-Type Problems: A
                                  Powerful Modeling Scheme . . . . . . . . 53--77
              Bernd Bullnheimer   An Examination Scheduling Model to
                                  Maximize Students' Study Time  . . . . . 78--91
      M. A. Saleh Elmohamed and   
            Paul Coddington and   
                   Geoffrey Fox   A Comparison of Annealing Techniques for
                                  Academic Course Scheduling . . . . . . . 92--114
                 Peter Ross and   
                  Emma Hart and   
                     Dave Corne   Some Observations about GA-Based Exam
                                  Timetabling  . . . . . . . . . . . . . . 115--129
              Amnon Meisels and   
              Natalia Lusternik   Experiments on Networks of Employee
                                  Timetabling Problems . . . . . . . . . . 130--141
                David Corne and   
                     John Ogden   Evolutionary Optimisation of Methodist
                                  Preaching Timetables . . . . . . . . . . 142--155
               Ben Paechter and   
               R. C. Rankin and   
                 Andrew Cumming   Improving a Lecture Timetabling System
                                  for University-Wide Use  . . . . . . . . 156--168
                 Philippe David   A Constraint-Based Approach for
                                  Examination Timetabling Using Local
                                  Repair Techniques  . . . . . . . . . . . 169--186
            George M. White and   
                   Junhan Zhang   Generating Complete University
                                  Timetables by Combining Tabu Search with
                                  Constraint Logic . . . . . . . . . . . . 187--200
               A. Van Weert and   
             J. A. M. Schreuder   Construction of Basic Match Schedules
                                  (BMS) for Sports Competitions by Using
                                  Graph Theory . . . . . . . . . . . . . . 201--212
            Arjen van Weert and   
            Jan A. M. Schreuder   Construction of Basic Match Schedules
                                  for Sports Competitions by Using Graph
                                  Theory . . . . . . . . . . . . . . . . . 201
            Edmund K. Burke and   
        Jeffrey H. Kingston and   
                 Paul A. Pepper   A Standard Data Format for Timetabling
                                  Instances  . . . . . . . . . . . . . . . 213--222
         James F. Blakesley and   
            Keith S. Murray and   
          Frederick H. Wolf and   
                  Dagmar Murray   Academic Scheduling  . . . . . . . . . . 223--236
                 Barry McCollum   The Implementation of a Central
                                  Timetabling System in a Large British
                                  Civic University . . . . . . . . . . . . 237--253
                   T. Nepal and   
             S. W. Melville and   
                     M. I. Ally   A Brute Forte and Heuristics Approach to
                                  Tertiary Timetabling . . . . . . . . . . 254--265
                      Anonymous   A List of Other Conference Presentations 269


Lecture Notes in Computer Science
Volume 1411, 1998

               Franco Gasperoni   Embedded Opportunities . . . . . . . . . 1
                    P. Chapfont   Ada + B: The Formula for Safety Critical
                                  Software Development . . . . . . . . . . 14
                Pierre Chapront   Ada+B The Formula for Safety Critical
                                  Software Development . . . . . . . . . . 14
             Laurent Millet and   
                      Ted Baker   Porting the GNAT Tasking Runtime System
                                  to the Java Virtual Machine  . . . . . . 19
             David E. Emery and   
           Robert F. Mathis and   
                 Karl A. Nyberg   Automating the Ada Binding Process for
                                  Java --- How Far Can We Go?  . . . . . . 29
              Mordechai Ben-Ari   Synchronizing Multiple Clients and
                                  Servers  . . . . . . . . . . . . . . . . 41
           Guido Schumacher and   
                 Wolfgang Nebel   How to Avoid the Inheritance Anomaly in
                                  Ada  . . . . . . . . . . . . . . . . . . 53
             Laurent Pautet and   
                 Samuel Tardieu   Inside the Distributed Systems Annex . . 65
Marta Patiño-Martínez and   
Ricardo Jiménez-Peris and   
          Sergio Arévalo   Integrating Groups and Transactions: A
                                  Fault-Tolerant Extension of Ada  . . . . 78
        M. Gonzales Harbour and   
                M. A. Rivas and   
     J. J. Gutierrez Garcia and   
             J. C. P. Gutierrez   Implementing and Using Execution Time
                                  Clocks in Ada Hard Real-Time
                                  Applications . . . . . . . . . . . . . . 90
 M. González Harbour and   
             M. Aldea Rivas and   
J. J. Gutiérrez García and   
J. C. Palencia Gutiérrez   Implementing and Using Execution Time
                                  Clocks in Ada Hard Real-Time
                                  Applications . . . . . . . . . . . . . . 90
    Agustín Espinosa and   
      Vicente Julián and   
          Carlos Carrascosa and   
      Andrés Terrasa and   
       Ana García-Fornes   Programming Hard Real-Time Systems with
                                  Optional Components in Ada . . . . . . . 102
             Scott Arthur Moody   Object Oriented Abstractions for
                                  Real-Time Distributed Systems  . . . . . 112
                    M. J. Stiff   (Astro)Physical Supercomputing: Ada95 as
                                  a Safe, Object Oriented Alternative  . . 128
                Martin J. Stift   (Astro)Physical Supercomputing: Ada95 as
                                  a Safe, Object Oriented Alternative  . . 128
            Helge Hagenauer and   
                Werner Pohlmann   Ada 95 for a Distributed Simulation
                                  System . . . . . . . . . . . . . . . . . 140
 M. González Harbour and   
  R. Gómez Somarriba and   
              A. Strohmeier and   
                       J. Jacot   PINROB: A Portable API for Industrial
                                  Robots . . . . . . . . . . . . . . . . . 151
          Alfred Strohmeier and   
            Vasiliy Fofanov and   
               Sergey Rybin and   
         Stéphane Barbey   Quality-for-ASIS: A Portable Testing
                                  Facility for ASIS  . . . . . . . . . . . 163
               Michael Tonndorf   Ten Years of Tool Based Ada Compiler
                                  Validations. An Experience Report  . . . 176
                  S. Araban and   
                A. S. M. Sajeev   A Two-Level Matching Mechanism for
                                  Object-Oriented Class Libraries  . . . . 188
                Bruce Lewis and   
               Steve Vestal and   
                David McConnell   Modern Avionics Requirements for the
                                  Distributed Systems Annex  . . . . . . . 201
José L. Fernández and   
Bárbara Álvarez and   
    Francisco García and   
  Ángel Pérez and   
           Juan A. de la Puente   A Case Study in Quantitative Evaluation
                                  of Real-Time Software Architectures  . . 213
Jesús M. González-Barahona and   
Pedro de-las-Heras-Quirós and   
José Centeno-González and   
          Francisco Ballesteros   Building Modular Communication Systems
                                  in Ada: The Simple\_Com Approach . . . . 225--237
              J. Biieberger and   
                 B. Burgstaller   Symbolic Reaching Definitions Analysis
                                  of Ada Programs  . . . . . . . . . . . . 238
          Johann Blieberger and   
              Bernd Burgstaller   Symbolic Reaching Definitions Analysis
                                  of Ada Programs  . . . . . . . . . . . . 238
                       Ken Wong   Looking at Code With Your Safety Goggles
                                  On . . . . . . . . . . . . . . . . . . . 251
                   A. Burns and   
                 B. Dobbing and   
                    G. Romanski   The Ravenscar Tasking Profile for High
                                  Integrity Real-Time Programs . . . . . . 263
              Steve Michell and   
                  Mark Saaltink   Guidance on the Use of Ada95 in High
                                  Integrity Systems  . . . . . . . . . . . 276
                    Bo Frisberg   Ada in the JAS 39 Gripen Flight Control
                                  System . . . . . . . . . . . . . . . . . 288


Lecture Notes in Computer Science
Volume 1412, 1998

Gérard Cornuéjols and   
            Bertrand Guenin and   
         François Margot   The Packing Property . . . . . . . . . . 1
                Bertrand Guenin   A Characterization of Weakly Bipartite
                                  Graphs . . . . . . . . . . . . . . . . . 9
               Grigor Gasparyan   Bipartite Designs  . . . . . . . . . . . 23
             András Sebo   Characterizing Noninteger Polyhedra with
                                  $0$-$1$ Constraints  . . . . . . . . . . 37
           Michele Conforti and   
                    Ajai Kapoor   A Theorem of Truemper  . . . . . . . . . 53
           Daishin Nakamura and   
                 Akihisa Tamura   The Generalized Stable Set Problem for
                                  Claw-Free Bidirected Graphs  . . . . . . 69
          Zoltán Szigeti   On a Min-max Theorem of Cacti  . . . . . 84
          Hiroshi Nagamochi and   
                    Peter Eades   Edge-Splitting and Edge-Connectivity
                                  Augmentation in Planar Graphs  . . . . . 96
                Robert Carr and   
                        R. Ravi   A New Bound for the $2$-Edge Connected
                                  Subgraph Problem . . . . . . . . . . . . 112
            Joseph Cheriyan and   
         András Sebo and   
          Zoltán Szigeti   An Improved Approximation Algorithm for
                                  Minimum Size $2$-Edge Connected Spanning
                                  Subgraphs  . . . . . . . . . . . . . . . 126
            Gruia Calinescu and   
      Cristina G. Fernandes and   
                     Bruce Reed   Multicuts in Unweighted Graphs with
                                  Bounded Degree and Bounded Tree-Width    137
    Stavros G. Kolliopoulos and   
                 Clifford Stein   Approximating Disjoint-Path Problems
                                  Using Greedy Algorithms and Packing
                                  Integer Programs . . . . . . . . . . . . 153
        Balaji Raghavachari and   
          Jeyakesavan Veerasamy   Approximation Algorithms for the Mixed
                                  Postman Problem  . . . . . . . . . . . . 169
        Fabián A. Chudak   Improved Approximation Algorithms for
                                  Uncapacitated Facility Location  . . . . 180
         Alexander Barvinok and   
           David S. Johnson and   
       Gerhard J. Woeginger and   
              Russell Woodroofe   The Maximum Traveling Salesman Problem
                                  Under Polyhedral Norms . . . . . . . . . 195
      Hernán Abeledo and   
                  Gary Atkinson   Polyhedral Combinatorics of Benzenoid
                                  Problems . . . . . . . . . . . . . . . . 202
            Thomas Christof and   
              Marcus Oswald and   
                Gerhard Reinelt   Consecutive Ones and a Betweenness
                                  Problem in Computational Biology . . . . 213
               Karen Aardal and   
                Cor Hurkens and   
               Arjen K. Lenstra   Solving a Linear Diophantine Equation
                                  with Lower and Upper Bounds on the
                                  Variables  . . . . . . . . . . . . . . . 229
           Alexander Martin and   
              Robert Weismantel   The Intersection of Knapsack Polyhedra
                                  and Extensions . . . . . . . . . . . . . 243
    Sándor P. Fekete and   
             Jörg Schepers   New Classes of Lower Bounds for Bin
                                  Packing Problems . . . . . . . . . . . . 257
     Sebastián Ceria and   
            Gábor Pataki   Solving Integer and Disjunctive Programs
                                  by Lift and Project  . . . . . . . . . . 271
Gérard Cornuéjols and   
                 Milind Dawande   A Class of Hard Small $0$-$1$ Programs   284
                 Lisa Fleischer   Building Chain and Cactus
                                  Representations of All Minimum Cuts from
                                  Hao-Orlin in the Same Asymptotic Run
                                  Time . . . . . . . . . . . . . . . . . . 294
          Éva Tardos and   
                 Kevin D. Wayne   Simple Generalized Maximum Flow
                                  Algorithms . . . . . . . . . . . . . . . 310
              Dorit S. Hochbaum   The Pseudoflow Algorithm and the
                                  Pseudoflow-Based Simplex for the Maximum
                                  Flow Problem . . . . . . . . . . . . . . 325
         Andrew V. Goldberg and   
          Jeffrey D. Oldham and   
              Serge Plotkin and   
                    Cliff Stein   An Implementation of a Combinatorial
                                  Approximation Algorithm for Minimum-Cost
                                  Multicommodity Flow  . . . . . . . . . . 338
              Han Hoogeveen and   
            Petra Schuurman and   
           Gerhard J. Woeginger   Non-approximability Results for
                                  Scheduling Problems with Minsum Criteria 353
                Alix Munier and   
          Maurice Queyranne and   
              Andreas S. Schulz   Approximation Bounds for a General Class
                                  of Precedence Constrained Parallel
                                  Machine Scheduling Problems  . . . . . . 367
            Chandra Chekuri and   
                 Michael Bender   An Efficient Approximation Algorithm for
                                  Minimizing Makespan on Uniformly Related
                                  Machines . . . . . . . . . . . . . . . . 383
                  R. N. Uma and   
                      Joel Wein   On the Relationship Between
                                  Combinatorial and LP-Based Approaches to
                                  NP-Hard Scheduling Problems  . . . . . . 394
                  Volker Kaibel   Polyhedral Combinatorics of Quadratic
                                  Assignment Problems with Less Objects
                                  than Locations . . . . . . . . . . . . . 409
         Christoph Helmberg and   
        Krzysztof C. Kiwiel and   
                    Franz Rendl   Incorporating Inequality Constraints in
                                  the Spectral Bundle Method . . . . . . . 423


Lecture Notes in Computer Science
Volume 1413, 1998

                Colette Rolland   A Comprehensive View of Process
                                  Engineering  . . . . . . . . . . . . . . 1
             Panos Kardasis and   
               Peri Loucopoulos   Aligning Legacy Information Systems to
                                  Business Processes . . . . . . . . . . . 25
           John V. Harrison and   
                   Wie Ming Lim   Automated Reverse Engineering of Legacy
                                  $4$GL Information System Applications
                                  Using the ITOC Workbench . . . . . . . . 41
                G. Antoniol and   
               F. Calzolari and   
           L. Cristoforetti and   
                  R. Fiutem and   
                    G. Caldiera   Adapting Function Points to Object
                                  Oriented Information Systems . . . . . . 59
                Shudong Jin and   
                    Xiaowei Sun   Global Cache Management for Multi-class
                                  Workloads in Data Warehouses . . . . . . 77
             Matthias Jarke and   
        Manfred A. Jeusfeld and   
             Christoph Quix and   
              Panos Vassiliadis   Architecture and Quality in Data
                                  Warehouses . . . . . . . . . . . . . . . 93
            Andreas Steiner and   
              Adrian Kobler and   
                Moira C. Norrie   OMS/Java : Model Extensibility of OODBMS
                                  for Advanced Application Domains . . . . 115
                  F. Casati and   
               M. G. Fugini and   
                      I. Mirbel   An Environment for Designing Exceptions
                                  in Workflows . . . . . . . . . . . . . . 139
               Chengfei Liu and   
          Maria E. Orlowska and   
                         Hui Li   Automating Handover in Dynamic Workflow
                                  Environments . . . . . . . . . . . . . . 159
           Daniel A. Tietze and   
                 Ajit Bapat and   
                   Rolf Reinema   Document-Centric Groupware for
                                  Distributed Governmental Agencies  . . . 173
            Colette Rolland and   
    Véronique Plihon and   
           Jolita Ralyté   Specifying the Reuse Context of Scenario
                                  Method Chunks  . . . . . . . . . . . . . 191
                       Wing Lam   Change Analysis and Management in a
                                  Reuse-Oriented Software Development
                                  Setting  . . . . . . . . . . . . . . . . 219
                 R. Doemges and   
                    K. Pohl and   
                     K. Schreck   A filter-mechanism for method-driven
                                  trace capture  . . . . . . . . . . . . . 237
           Ralf Dömges and   
                 Klaus Pohl and   
                  Klaus Schreck   A Filter-Mechanism for Method-Driven
                                  Trace Capture  . . . . . . . . . . . . . 237
      Michael P. Papazoglou and   
                Steven Milliner   Subject-Based Organization of the
                                  Information Space in Multi-database
                                  Networks . . . . . . . . . . . . . . . . 251
   Luciano Paschoal Gaspary and   
       Maria Janilce B. Almeida   MUSE --- An Interactive Networked
                                  Multimedia Applications Specification
                                  Environment with E-LOTOS Translator  . . 273
         Zoé Lacroix and   
            Arnaud Sahuguet and   
             Raman Chandrasekar   Information Extraction and Database
                                  Techniques: A User-Oriented Approach to
                                  Querying the Web . . . . . . . . . . . . 289
                 V. Kavakli and   
                 P. Loucopoulos   Goal-driven business process analysis
                                  --- Application in electricity
                                  deregulation . . . . . . . . . . . . . . 305
               Tullio Tanzi and   
            Sylvie Servigne and   
             Régis Guiol   Real-Time Information System for Risk
                                  Management on Motorways  . . . . . . . . 325
              Selmin Nurcan and   
              Georges Grosz and   
                Carine Souveyet   Describing Business Processes with a
                                  Guided Use Case Approach . . . . . . . . 339
              Igor Jurisica and   
                 Brian A. Nixon   Building Quality into Case-Based
                                  Reasoning Systems  . . . . . . . . . . . 363
          Sjaak Brinkkemper and   
              Motoshi Saeki and   
                  Frank Harmsen   Assembly Techniques for Method
                                  Engineering  . . . . . . . . . . . . . . 381
               Mohamed Dahchour   Formalizing Materialization Using a
                                  Metaclass Approach . . . . . . . . . . . 401


Lecture Notes in Computer Science
Volume 1414, 1998

                S. Abramsky and   
                    G. McCusker   Call-by-Value Games  . . . . . . . . . . 1
                   A. Ayari and   
                   D. Basin and   
                    A. Podelski   LISA: A Specification Language Based on
                                  WS2S . . . . . . . . . . . . . . . . . . 18
                R. Backofen and   
                       P. Clote   Evolution as a Computational Engine  . . 35
                 P. Baillot and   
                   V. Danos and   
                  T. Erhard and   
                     L. Regnier   Timeless Games . . . . . . . . . . . . . 56
                  A. Barber and   
                 P. Gardner and   
                M. Hasegawa and   
                     G. Plotkin   From Action Calculi to Linear Logic  . . 78
                M. L. Bonet and   
                      N. Galesi   Linear Lower Bounds and Simulations in
                                  Frege Systems with Substitutions . . . . 115
                T. Brauener and   
                    V. De Paiva   A Formulation of Linear Logic Based on
                                  Dependency-Relations . . . . . . . . . . 129
                    S. Buss and   
                     T. Pitassi   Resolution and the Weak Pigeonhole
                                  Principle  . . . . . . . . . . . . . . . 149
                   H. Comon and   
                      Y. Jurski   Higher-Order Matching and Tree Automata  157
                 T. Coquand and   
                     H. Persson   A Proof-Theoretical Investigation of
                                  Zantema's Problem  . . . . . . . . . . . 177
                  A. Durand and   
                   R. Fagin and   
                    B. Loescher   Spectra with Only Unary Function Symbols 189
                     C. Faggian   Classical Proofs via Basic Logic . . . . 203
                       M. Grohe   Canonization for L0kappa-Equivalence is
                                  Hard . . . . . . . . . . . . . . . . . . 220
                C. Hartonas and   
                    M. Hennessy   Full Abstractness for a
                                  Functional/Concurrent Language with
                                  Higher-Order Value-Passing . . . . . . . 239
                R. Heckmann and   
                        M. Huth   A Duality Theory for Quantitative
                                  Semantics  . . . . . . . . . . . . . . . 255
                     M. Hofmann   A Mixed Modal/Linear Lambda Calculus
                                  with Applications to Bellantoni-Cook
                                  Safe Recursion . . . . . . . . . . . . . 275
                  M. Hollenberg   Equational Axioms of Test Algebra  . . . 295
                    N. Klarlund   Mona and Fido: The Logic-Automaton
                                  Connection in Practice . . . . . . . . . 311
               O. Kupferman and   
              R. P. Kurshan and   
                  M. Yannakakis   Existence of Reduction Hierarchies . . . 327
              Y. N. Moschovakis   A Game-Theoretic, Concurrent and Fair
                                  Model of the Typed lambda-Calculus, with
                                  Full Recursion . . . . . . . . . . . . . 341
                       F. Olive   A Conjunctive Logical Characterization
                                  of Nondeterministic Linear Time  . . . . 360
                     E. Pezzoli   On the Computational Complexity of Type
                                  2 Functionals  . . . . . . . . . . . . . 373
                       J. Power   Categories with Algebraic Structure  . . 389
                    P. Ruet and   
                       F. Fages   Concurrent Constraint Programming and
                                  Non-commutative Logic  . . . . . . . . . 406
                   I. Schiering   A Hierarchical Approach to Monadic
                                  Second-Order Logic over Graphs . . . . . 424
                 N. Schweikardt   The Monadic Quantifier Alternation
                                  Hierarchy over Grids and Pictures  . . . 441
                  T. Schwentick   Padding and the Expressive Power of
                                  Existential Second-Order Logics  . . . . 461
                     L. Staiger   Rich co-words and Monadic Second-Order
                                  Arithmetic . . . . . . . . . . . . . . . 478
                     P. J. Voda   A Simple Ordinal Recursive Normalization
                                  of Goedel's $T$  . . . . . . . . . . . . 491


Lecture Notes in Computer Science
Volume 1415, 1998

             B. J. Wielinga and   
                A. T. Schreiber   Knowledge Technology: Moving Into the
                                  Next Millenium . . . . . . . . . . . . . 1--20
              J. C. Herrero and   
                        J. Mira   In Search of a Common Structure
                                  Underlying a Representative Set of
                                  Generic Tasks and Methods: The
                                  Hierarchical Classification and Therapy
                                  Planning Cases Study . . . . . . . . . . 21--36
                 M. Franova and   
                       M. Kooli   Theory of Constructible Domains for
                                  Robotics: Why? . . . . . . . . . . . . . 37--46
                    T. Aida and   
                      S. Ohsuga   Intelligent Systems Must Be Able to Make
                                  Programs Automatically for Assuring the
                                  Practicality . . . . . . . . . . . . . . 47--56
                  R. Barker and   
                  A. Meehan and   
                     I. Tranter   Towards a Knowledge-Level Model for
                                  Concurrent Design  . . . . . . . . . . . 57--67
                  C. F. Nourani   Multiagent AI Implementation Techniques:
                                  A New Software Engineering Trend . . . . 68--78
                  N. Haddar and   
                F. Gargouri and   
              A. B. Hamadou and   
                 C. F. Ducateau   Information Systems Integration: Some
                                  Principles and Ideas . . . . . . . . . . 79--88
                   S. Kutti and   
                      B. Garner   An Emergent Paradigm for Expert Resource
                                  Management Systems . . . . . . . . . . . 89--101
                   W. Ikeda and   
                      S. Ohsuga   New Modeling Method for Using Large
                                  Knowledge Bases  . . . . . . . . . . . . 102--111
        B. Fernandez-Manjon and   
                 A. Navarro and   
             J. M. Cigarran and   
          A. Fernandez-Valmayor   Integration of Formal Concept Analysis
                                  in a Knowledge-Based Assistant . . . . . 112--123
                  M. Marcos and   
                  S. Moisan and   
                A. P. Del Pobil   Knowledge Modeling of Program
                                  Supervision Task . . . . . . . . . . . . 124--133
                   I. I. Mirita   Quadri-Dimensional Interpretation of
                                  Syllogistic Inferential Processes in
                                  Polyvalent Logic, with a View to
                                  Structuring Concepts and Assertions for
                                  Realizing the Universal Knowledge Basis  134--148
                   J. Rocha and   
                   C. Ramos and   
                        Z. Vale   Complexity of Precedence Graphs for
                                  Assembly and Task Planning . . . . . . . 149--158
                       H. Drias   A Monte Carlo Algorithm for the
                                  Satisfiability Problem . . . . . . . . . 159--168
        M. L. Lopez-Vallejo and   
             C. A. Iglesias and   
                    J. C. Lopez   Applying the Propose and Revise Strategy
                                  to the Hardware-Software Partitioning
                                  Problem  . . . . . . . . . . . . . . . . 169--179
                 M. Delgado and   
       A. F. Gomez-Skarmeta and   
    J. Gomez Marin-Blazquez and   
            H. Martinez Barbera   Fuzzy Hybrid Techniques in Modeling  . . 180--189
       I. Burak Özyurt and   
                A. K. Sunol and   
                     L. O. Hall   Chemical Process Fault Diagnosis Using
                                  Kernel Retrofitted Fuzzy Genetic
                                  Algorithm Based Learner (FGAL) with a
                                  Hidden Markov Model  . . . . . . . . . . 190--199
                   R. Kowalczyk   On Linguistic Approximation with Genetic
                                  Programming  . . . . . . . . . . . . . . 200--224
            S. G. Tzafestas and   
                   G. B. Stamou   A New Solution Methodology for Fuzzy
                                  Relation Equations . . . . . . . . . . . 210--224
                      M. Li and   
                    Y. Wang and   
                       X. Zhang   An Approach to Generate Membership
                                  Function by Using Kohonen's SOFM Nets    220--224
              A. R. Calisti and   
    F. D. Trujillo Aguilera and   
           A. Diaz-Estrella and   
          F. Sandoval Hernandez   Intelligent Policing Function for ATM
                                  Networks . . . . . . . . . . . . . . . . 225--233
                      F. Botana   Deriving Fuzzy Subsethood Measures From
                                  Violations of The Implication Between
                                  Elements . . . . . . . . . . . . . . . . 234--243
                M. A. Piera and   
               A. J. Gambin and   
                    R. Vilanova   Object Oriented Stochastic Petri New
                                  Simulator: A Generic Kernel for
                                  Heuristic Planning Tools . . . . . . . . 244--253
               C. W. Dawson and   
               P. D. Wilson and   
                    A. N. Beard   An Artificial Neural Network for
                                  Flashover Prediction. A Preliminary
                                  Study  . . . . . . . . . . . . . . . . . 254--262
                C. Kahraman and   
                       E. Tolga   Fuzzy Decision Making Under Uncertainty  263--271
                     B. Stewart   Improving Performance of Naive Bayes
                                  Classifier by Including Hidden Variables 272--280
                 B. Bennett and   
                    A. Isli and   
                     A. G. Cohn   A System Handling RCC-8 Queries on $2$D
                                  Regions Representable in the Closure
                                  Algebra of Half-planes . . . . . . . . . 281--290
               M. T. Escrig and   
                      F. Toledo   Cardinal Directions on Extended Objects
                                  for Qualitative Navigation . . . . . . . 291--301
                   N. Agell and   
                  F. Febles and   
                       N. Piera   Definition and Study of Lineal Equations
                                  on Order of Magnitude Models . . . . . . 302--311
               E. H. Turner and   
                   R. M. Turner   A Constraint-Based Approach to Assigning
                                  System Components to Tasks . . . . . . . 312--320
          R. Martinez Gasca and   
               J. A. Ortega and   
                        M. Toro   Automatic Semiqualitative Analysis:
                                  Application to a Biometallurgical System 321--328
               J. A. Ortega and   
          R. Martinez Gasca and   
                        M. Toro   Including Qualitative Knowledge in
                                  Semiqualitative Dynamical Systems  . . . 329--335
                 J. Aguilar and   
                J. Riquelme and   
                        M. Toro   A Tool to Obtain a Hierarchical
                                  Qualitative Rules from Quantitative Data 336--346
            C. S. Ampratwum and   
               P. D. Picton and   
              A. A. Hopgood and   
                      A. Browne   Hybridization Techniques in Optical
                                  Emission Spectral Analysis . . . . . . . 347--356
                  J. Ruiz Gomez   KADS Qualitative Model Based Motor Speed
                                  Control  . . . . . . . . . . . . . . . . 357--366
                 M. Sanchez and   
                   F. Prats and   
                       N. Piera   Negligibility Relations Between Real
                                  Numbers and Qualitative Labels . . . . . 367--376
                M. Chachoua and   
                  D. Pacholczyk   Qualitative Reasoning Under Uncertain
                                  Knowledge  . . . . . . . . . . . . . . . 377--386
                J. L. Marzo and   
                   A. Bueno and   
                R. Fabregat and   
                        T. Jove   Qualitative Reasoning for Admission
                                  Control in ATM Networks  . . . . . . . . 387--398
               R. Dollinger and   
                    I. A. Letia   Using Tolerance Calculus for Reasoning
                                  in Relative Order of Magnitude Models    399--407
           L. Mattos Brasil and   
       F. Mendes De Azevedo and   
                   ?. Muniz and   
                 J. Barreto and   
          M. Noirhomme-Fraiture   Complexity and Cognitive Computing . . . 408--417
                   C. Cotta and   
                    J. M. Troya   On Decision-Making in Strong Hybrid
                                  Evolutionary Algorithms  . . . . . . . . 418--427
                  X. Blasco and   
                M. Martinez and   
                  J. Senent and   
                     J. Sanchis   Generalized Predictive Control Using
                                  Genetic Algorithms (GAGPC). An
                                  Application to Control of a Non-Linear
                                  Process with Model Uncertainty . . . . . 428--437
                         T. Ito   Piping Layout Wizard: Basic Concepts and
                                  Its Potential for Pipe Route Planning    438--447
             A. Ruiz-Andino and   
                      J. J. Ruz   Integration of Constraint Programming
                                  and Evolution Programs: Application to
                                  Channel Routing  . . . . . . . . . . . . 448--459
            C. E. Henderson and   
               W. D. Potter and   
            R. W. McClendon and   
                  G. Hoogenboom   Using a Genetic Algorithm to Select
                                  Parameters for a Neural Network That
                                  Predicts Aflatoxin Contamination in
                                  Peanuts  . . . . . . . . . . . . . . . . 460--469
                    H. Luga and   
                   O. Balet and   
                  Y. Duthen and   
                      R. Caubet   Interacting with Articulated Figures
                                  Within the Provis Project  . . . . . . . 470--477
                  O. Cordon and   
                 F. Herrera and   
                     L. Sanchez   Computing the Spanish Medium Electrical
                                  Line Maintenance Cost by Means of
                                  Evolution-Based Learning Processes . . . 478--486
         G. Raghavendra Rao and   
            K. Chidananda Gowda   A New Dissimilarity Measure to Improve
                                  the Ga Performance . . . . . . . . . . . 487--492
            R. Berlanga Llavori   STRPLAN: A Distributed Planner for
                                  Object-Centred Application Domains . . . 493--502
                  C.-C. Hsu and   
                       C.-S. Ho   An Intelligent Hybrid System for
                                  Knowledge Acquisition  . . . . . . . . . 503--510
                   P. Berka and   
                       M. Slama   Using Neural Nets to Learn Weights of
                                  Rules for Compositional Expert Systems   511--519
                  V. I. Donskoy   Case-, Knowledge-, and
                                  Optimization-based Hybrid Approach in AI 520--527
                   P. E. Bonzon   A Contextual Model of Beliefs for
                                  Communicating Agents . . . . . . . . . . 528--537
                   R. M. Turner   Context-Mediated Behavior for AI
                                  Applications . . . . . . . . . . . . . . 538--546
            P. Öztürk   A Context-Sensitive, Iterative Approach
                                  to Diagnostic Problem Solving  . . . . . 546--557
               E. El-Sheikh and   
                    J. Sticklen   A Framework for Developing Intelligent
                                  Tutoring Systems Incorporating
                                  Reusability  . . . . . . . . . . . . . . 558--567
                    A. Goel and   
                   K. S. Barber   The Classification and Specification of
                                  a Domain Independent Agent Architecture  568--576
                   J. Coble and   
                    K. Harbison   Mave: a Multi-Agent Architecture for
                                  Virtual Environments . . . . . . . . . . 577--583
               C. M. Jonker and   
                       J. Treur   Agent-Based Simulation of Reactive,
                                  Pro-Active and Social Animal Behaviour   584--595
             C. A. Iglesias and   
             J. C. Gonzalez and   
                  J. R. Velasco   A Fuzzy-Neural Multiagent System for
                                  Optimisation of a Roll-Mill Application  596--605
          W. Lejouad-Chaari and   
                 F. Mouria-Beji   High-level Communication Protocol in a
                                  Distributed Multiagent System  . . . . . 606--616
                  J. R. Podlena   Evolving the Scale of Genetic Search . . 617--624
                 D. Philpot and   
                   T. Hendtlass   Ensembles of Neural Networks for
                                  Analogue Problems  . . . . . . . . . . . 625--631
                 H. Copland and   
                   T. Hendtlass   An Evolutionary Algorithm with a Genetic
                                  Encoding Scheme  . . . . . . . . . . . . 632--639
                   T. Hendtlass   Generating Lookup Tables Using
                                  Evolutionary Algorithms  . . . . . . . . 640--646
           S. M. Bhandarkar and   
                  J. Zeppen and   
                   W. D. Potter   A Genetic Algorithm for Linear Feature
                                  Extraction . . . . . . . . . . . . . . . 647--656
                 S. M. C. Peers   Knowledge Representation in a Blackboard
                                  System for Sensor Data Interpretation    657--666
                    S. W. Utete   Local Information Processing for
                                  Decision Making in Decentralised Sensing
                                  Networks . . . . . . . . . . . . . . . . 667--676
                   P. Felix and   
                   S. Fraga and   
                   R. Marin and   
                       S. Barro   A Fuzzy Linear Approach to Recognizing
                                  Signal Profiles  . . . . . . . . . . . . 677--686
                 E. Marilly and   
                 C. Coroyer and   
                 O. Cachard and   
                       A. Faure   Performance of a Smart Velocity Sensor:
                                  The Impulse Retina . . . . . . . . . . . 687--695
                   A. Borgi and   
                J.-M. Bazin and   
                       H. Akdag   Two Methods of Linear Correlation Search
                                  for a Knowledge Based Supervised
                                  Classification . . . . . . . . . . . . . 696--707
                   J. Turmo and   
                  N. Catala and   
                   H. Rodriguez   Turbio: A System for Extracting
                                  Information from Restricted-Domain Texts 708--721
                  K. Haddar and   
                  A. B. Hamadou   An Approach to Ellipsis Detection and
                                  Classification for the Arabic Language   722--738
                 V. J. Diaz and   
                V. Carrillo and   
                        M. Toro   A Review of Early-Based Parser for TIG   732--738
                      T. Tanaka   Generating Explanations from Electronic
                                  Circuits . . . . . . . . . . . . . . . . 739--748
             Majeed Soufian and   
           Mustapha Soufian and   
                  M. J. Dempsey   The Effect of a Dynamical Layer in
                                  Neural Network Prediction Of Biomass in
                                  a Fermentation Process . . . . . . . . . 749--757
                 S. Garrido and   
                  L. Moreno and   
                    C. Balaguer   State Estimation for Nonlinear Systems
                                  Using Restricted Genetic Optimization    758--767
                 B. Moshiri and   
                   S. C. Maleki   Identification of a Nonlinear Industrial
                                  Process Via Fuzzy Clustering . . . . . . 768--775
                 J. Badenas and   
                         F. Pla   Applying Computer Vision Techniques to
                                  Traffic Monitoring Tasks . . . . . . . . 776--785
              A. F. Dragoni and   
                P. Giorgini and   
                       M. Panti   A Self-Diagnosing Distributed Monitoring
                                  System for Nuclear Plants  . . . . . . . 786--795
             J. M. Riquelme and   
                   A. Gomez and   
             J. L. Martinez and   
              J. A. Pecas Lopez   Overload Screening of Transmission
                                  Systems Using Neural Networks  . . . . . 796--803
             C. A. Gonzalez and   
         B. Pulido Junquera and   
                      G. Acosta   On Line Industrial Diagnosis: An Attempt
                                  to Apply Artificial Intelligence
                                  Techniques to Process Control  . . . . . 804--813
            M. A. Rodrigues and   
                     L. Bottaci   An AI Modelling Approach to
                                  Understanding a Complex Manufacturing
                                  Process  . . . . . . . . . . . . . . . . 814--821
                  A. Lazaro and   
                 I. Serrano and   
                 J. P. Oria and   
                   C. De Miguel   Identification and Defect Inspection
                                  with Ultrasonic Techniques in Foundry
                                  Pieces . . . . . . . . . . . . . . . . . 822--830
                    Y. Xiao and   
                      C. Y. Han   An OOM-KBES Approach for Fault Detection
                                  and Diagnosis  . . . . . . . . . . . . . 831--839
             A. Heinzelmann and   
                     P. Chammas   Model-Based Fault Simulation: A
                                  Reduction Method for the Diagnosis of
                                  Electrical Components  . . . . . . . . . 840--847
                         A. Lin   A Model-Based Automated Diagnosis
                                  Algorithm  . . . . . . . . . . . . . . . 848--856
                       S.-I. Wu   Cyclic Forecasting with Recurrent Neural
                                  Network  . . . . . . . . . . . . . . . . 857--863
                     M. Elloumi   New Algorithms to Predict Secondary
                                  Structures of RNA Macromolecules . . . . 864--875
          A. H. Abdel-Wahab and   
           M. E. El-Telbany and   
                  S. I. Shaheen   A Hybrid Ga Statistical Method for the
                                  Forecasting Problem: The Prediction of
                                  the River Nile Inflows . . . . . . . . . 876--882


Lecture Notes in Computer Science
Volume 1416, 1998

                 R. Moreno Diaz   Neurocybernetics, Codes and Computation  1--14
                A. P. Del Pobil   The Grand Challenge Is Called: Robotic
                                  Intelligence . . . . . . . . . . . . . . 15--24
                E. Onaindia and   
                  F. Barber and   
                   V. Botti and   
                  C. Carrascosa   A Progressive Heuristic Search Algorithm
                                  for the Cutting Stock Problem  . . . . . 25--35
        R. Berlanga Llavori and   
             M. J. Aramburu and   
                      F. Barber   Discovering Temporal Relationships in
                                  Databases of Newspapers  . . . . . . . . 36--45
                 J. Larrosa and   
                    P. Meseguer   Generic CSP Techniques for the Job-Shop
                                  Problem  . . . . . . . . . . . . . . . . 46--55
               B. J. Oommen and   
                T. Dale Roberts   A Fast and Efficient Solution to the
                                  Capacity Assignment Problem Using
                                  Discretized Learning Automata  . . . . . 56--65
                     S. Cameron   Using OXSIM for Path Planning  . . . . . 66--74
                 D. Henrich and   
                   C. Wurll and   
                       H. Woern   Multi-Directional Search With Goal
                                  Switching for Robot Path Planning  . . . 75--84
                  S.-W. Kim and   
                       D. Boley   Analytical Potential Fields and Control
                                  Strategies for Motion Planning . . . . . 85--94
                  C. Mirolo and   
                     E. Pagello   Exact Geometry and Robot Motion
                                  Planning: Speculations on a Few
                                  Numerical Experiments  . . . . . . . . . 95--104
                M. A. Ridao and   
                J. Riquelme and   
              E. F. Camacho and   
                        M. Toro   An Evolutionary and Local Search
                                  Algorithm for Planning Two Manipulators
                                  Motion . . . . . . . . . . . . . . . . . 105--114
                D. Gallardo and   
                O. Colomina and   
                  F. Florez and   
                        R. Rizo   A Genetic Algorithm for Robust Motion
                                  Planning . . . . . . . . . . . . . . . . 115--121
         M. Perez-Francisco and   
            A. P. Del Pobil and   
           B. Martinez-Salvador   Coordinated Motion of Two Robot Arms for
                                  Real Applications  . . . . . . . . . . . 122--131
                M. Kruusmaa and   
                    B. Svensson   A Low-Risk Approach to Mobile Robot Path
                                  Planning . . . . . . . . . . . . . . . . 132--141
                       B. Stein   Generating Heuristics to Control
                                  Configuration Processes  . . . . . . . . 142--152
               M. Feurstein and   
                      M. Natter   Valuing the Flexibility of Flexible
                                  Manufacturing Systems With Fast Decision
                                  Rules  . . . . . . . . . . . . . . . . . 153--162
                     V. Nikulin   Optimal Periodic Control With
                                  Environmental Application  . . . . . . . 163--172
               L. A. Garcia and   
                      F. Toledo   A Centralised Hierarchical Task
                                  Scheduler for an Urban Traffic Control
                                  System Based on a Multiagent
                                  Architecture . . . . . . . . . . . . . . 173--182
                    W. Chen and   
                      Z. Wu and   
                   Q. Zhang and   
                          J. Li   A Direct Iteration Method for Global
                                  Dynamic Control of Redundant
                                  Manipulators . . . . . . . . . . . . . . 183--191
              Y. I. Nechaev and   
                     Y. L. Siek   Design of Ship-Board Control System
                                  Based on the Soft Computing Conception   192--199
        J. Melendez-Frigola and   
          J. Colomer-Llinas and   
 J. Lluis De La Rosa-Esteva and   
                   O. Contreras   Expert Diagnostic Using Qualitative Data
                                  and Rule-Based inferential Reasoning . . 200--209
            F. Neves Junior and   
              J. Aguilar-Martin   Qualitative Event-Based Expert
                                  Supervision. Part 1: Methodology . . . . 210--219
            F. Neves Junior and   
              J. Aguilar-Martin   Qualitative Event-Based Expert
                                  Supervision. Part 2: Distillation
                                  Start-Up Condition Monitoring  . . . . . 220--229
              M.-O. Cordier and   
              J.-P. Krivine and   
                 P. Laborie and   
                    S. Thiebaux   Alarm Processing and Reconfiguration in
                                  Power Distribution Systems . . . . . . . 230--241
                 F. Zouaoui and   
                 R. Thetiot and   
                       M. Dumas   Behavioral Interpretation According to
                                  Multimodeling Representation . . . . . . 242--151
               J. H. Hamlin and   
                   W. D. Potter   An Intelligent Agent To Aid in Unix
                                  System Administration  . . . . . . . . . 252--260
              H. Villanueva and   
                       H. Lamba   Process Optimisation in an Industrial
                                  Supervision Support System . . . . . . . 261--270
               J. S. Senent and   
             M. A. Martinez and   
                  X. Blasco and   
                     J. Sanchis   Mimo Predictive Control of Temperature
                                  and Humidity Inside a Greenhouse Using
                                  Simulated Annealing (SA) As Optimizer of
                                  a Multicriteria Index  . . . . . . . . . 271--279
              J. M. Sanchiz and   
                  A. Broggi and   
                         F. Pla   Stereo Vision-Based Obstacle and Free
                                  Space Detection in Mobile Robotics . . . 280--289
                 J. De Lope and   
                D. Maravall and   
                     J. G. Zato   Topological Modeling With Fuzzy Petri
                                  Nets for Autonomous Mobile Robots  . . . 290--299
                R. Iglesias and   
             C. V. Regueiro and   
                  J. Correa and   
                       S. Barro   Supervised Reinforcement Learning:
                                  Application to a Wall Following
                                  Behaviour in a Mobile Robot  . . . . . . 300--309
           M. Sanchez Lopez and   
                     P. Manzoni   A Communication Protocol for Clouds of
                                  Mobile Robots  . . . . . . . . . . . . . 310--318
                  J. Santos and   
                     R. J. Duro   Evolving Neural Controllers for
                                  Temporally Dependent Behaviors in
                                  Autonomous Robots  . . . . . . . . . . . 319--328
                    K. Sugihara   GA-Based On-Line Path Planning for
                                  Sauvim . . . . . . . . . . . . . . . . . 329--338
                    J. Romo and   
               F. De La Paz and   
                        J. Mira   Incremental Building of a Model of
                                  Environment in the Context of the
                                  McCulloch-Craik's Functional
                                  Architecture for Mobile Robots . . . . . 339--352
                   R. Marin and   
                G. Recatala and   
                 P. J. Sanz and   
            J. M. Iñesta   Telerobotic System Based on Natural
                                  Language and Computer Vision . . . . . . 353--364
           M. Angeles Lopez and   
                         F. Pla   Robust Region-Based Stereo Vision to
                                  Build Environment Maps For Robotics
                                  Applications . . . . . . . . . . . . . . 365--374
            S. G. Tzafestas and   
                  K. C. Zikidis   A New On-Line Structure and Parameter
                                  Learning Architecture for Fuzzy
                                  Modeling, Based on Neural and Fuzzy
                                  Techniques . . . . . . . . . . . . . . . 375--382
              A. Zilouchian and   
               D. W. Howard and   
                  T. Jordanides   An Adaptive Neuro-Fuzzy Inference
                                  System(ANFIS) Approach to Control of
                                  Robotic Manipulators . . . . . . . . . . 383--392
      P. A. Gonzalez-Calero and   
          M. Gomez-Albarran and   
           C. Fernandez-Chamizo   Managing the Usage Experience in a
                                  Library of Software Components . . . . . 393--402
                 M. Thonnat and   
                      S. Moisan   What Can Program Supervision Do for
                                  Program Re-Use?  . . . . . . . . . . . . 403--414
                   S. Chien and   
                  F. Fisher and   
               H. Mortensen and   
                          E. Lo   Using Artificial Intelligence Planning
                                  Techniques to Automatically Reconfigure
                                  Software Modules . . . . . . . . . . . . 415--426
                 C. Shekhar and   
                  S. Moisan and   
                 R. Vincent and   
                     P. Burlina   Use of Knowledge-Based Control for
                                  Vision Systems . . . . . . . . . . . . . 427--436
              C.-E. Liedtke and   
                 H. Muenkel and   
                        U. Rost   Solution for a Learning Configuration
                                  System for Image Processing  . . . . . . 437--447
                  O. Luaces and   
                  J. Alonso and   
            E. A. De La Cal and   
                     J. Ranilla   Machine Learning Usefulness Relies on
                                  Accuracy and Self-Maintenance  . . . . . 448--457
       J. P. Caraca-Valente and   
                      C. Montes   Improving Inductive Learning in
                                  Real-World Domains Through the
                                  Identification of Dependencies: The Tim
                                  Framework  . . . . . . . . . . . . . . . 458--468
              J. S. Sanchez and   
                     F. Pla and   
                    F. J. Ferri   From the Nearest Neighbour Rule to
                                  Decision Trees . . . . . . . . . . . . . 469--478
             L. Satoru Ochi and   
                 N. Maculan and   
       R. M. Videira Figueiredo   A New Self-Organizing Strategy Based on
                                  Elastic Networks for Solving the
                                  Euclidean Traveling Salesman Problem . . 479--487
                  M. R. Zargham   An Inductive Learning System for Rating
                                  Securities . . . . . . . . . . . . . . . 488--496
                   W. Wilke and   
                    R. Bergmann   Techniques and Knowledge Used for
                                  Adaptation During Case-Based Problem
                                  Solving  . . . . . . . . . . . . . . . . 497--506
                       B. Smyth   Case-Base Maintenance  . . . . . . . . . 507--516
                  P. Cunningham   CBR: Strengths and Weaknesses  . . . . . 517--524
                      I. Watson   Is CBR a Technology or a Methodology?    525--534
                I. Jurisica and   
                     J. Glasgow   An Efficient Approach to Iterative
                                  Browsing and Retrieval for Case-Based
                                  Reasoning  . . . . . . . . . . . . . . . 535--546
                  K. Tanaka and   
                  T. Ohkawa and   
                      N. Komoda   Case Based Approach to the Construction
                                  of a Coal Molecular Structure Model  . . 547--556
            N. K. Treadgold and   
                   T. D. Gedeon   Constructing Higher Order Neurons of
                                  Increasing Complexity in Cascade
                                  Networks . . . . . . . . . . . . . . . . 557--563
                T. Weijters and   
               A. Van Den Bosch   Interpretable Neural Networks with
                                  BP-SOM . . . . . . . . . . . . . . . . . 564--573
                 M. Lehtokangas   Reference Pattern Weight Initialization
                                  for Equalization . . . . . . . . . . . . 574--581
              L. J. Barrios and   
                       L. Lemus   Autoassociative Neural Networks for
                                  Fault Diagnosis in Semiconductor
                                  Manufacturing  . . . . . . . . . . . . . 582--592
                     M. Aladjem   Supervised Training of a Neural Network
                                  for Classification Via Successive
                                  Modification of the Training Data --- An
                                  Experimental Study . . . . . . . . . . . 593--602
                  L. Kocsis and   
                  N. B. Szirbik   An Unsupervised Training Connectionist
                                  Network With Lateral Inhibition  . . . . 603--611
                T. B. Trinh and   
                A. S. Bashi and   
                   N. Dashpande   Temporal Difference Learning in Chinese
                                  Chess  . . . . . . . . . . . . . . . . . 612--618
                 O. Coltell and   
                  J. M. Ordovas   Applying Object Logic Programming to
                                  Design Computer Strategies in Gene
                                  Scanning . . . . . . . . . . . . . . . . 619--627
                   A. Poggi and   
                   G. Golinelli   Automatic Storing and Retrieval of Large
                                  Collections of Images  . . . . . . . . . 628--637
                 O. Coltell and   
                   J. Llach and   
                    P. Sanz and   
                        C. Ruiz   Alternative Communication Interface for
                                  Severely Handicapped People Based on a
                                  Multimedia Human-Computer Interaction
                                  System . . . . . . . . . . . . . . . . . 638--647
             R. Kadobayashi and   
               K. Nishimoto and   
                    Y. Sumi and   
                        K. Mase   Personalizing Museum Exhibition by
                                  Mediating Agents . . . . . . . . . . . . 648--667
           F. Escolano Ruiz and   
                 M. Cazorla and   
                D. Gallardo and   
                     F. Llorens   A Combined Probabilistic Framework for
                                  Learning Gestures and Actions  . . . . . 668--667
                  B. Barros and   
                     F. Verdejo   Designing Workspaces to Support
                                  Collaborative Learning . . . . . . . . . 668--677
                      Z. Xu and   
                     K. Ito and   
                   K. Jinno and   
                      T. Kojiri   Development of Decision Support System
                                  for Integrated Water Management in River
                                  Basins . . . . . . . . . . . . . . . . . 678--686
           E. Roanes-Lozano and   
                L. M. Laita and   
               E. Roanes-Macias   An Application of an AI Methodology to
                                  Railway Interlocking Systems Using
                                  Computer Algebra . . . . . . . . . . . . 687--696
              F. Alonso Amo and   
             J. M. Barreiro and   
       J. P. Caraca-Valente and   
                      C. Montes   Intelligent Interpretation of Strength
                                  Data . . . . . . . . . . . . . . . . . . 697--706
                    J. Biermann   Hades --- A Knowledge-Based System for
                                  Message Interpretation and Situation
                                  Determination  . . . . . . . . . . . . . 707--716
               T. Gavrilova and   
                      A. Voinov   Work In Progress: Visual Specification
                                  of Knowledge Bases . . . . . . . . . . . 717--726
                S. Coronado and   
          A. Garcia-Beltran and   
                 J. A. Jaen and   
                    R. Martinez   Webtutor, A Knowledge Based System for
                                  Evaluation and Tutorship . . . . . . . . 727--734
                 L. Jerinic and   
                V. Devedzic and   
                     D. Radovic   Control Knowledge and Pedagogical
                                  Aspects of the Get-Bits Model  . . . . . 735--744
        Mohamed Salah Hamdi and   
                      K. Kaiser   Improving Behavior Arbitration Using
                                  Exploration and Dynamic Programming  . . 745--754
               L. Monostori and   
                       B. Kadar   Agent Based Architectures for Mastering
                                  Changes and Disturbances in
                                  Manufacturing  . . . . . . . . . . . . . 755--764
               L. Monostori and   
                 J. Hornyak and   
                C. Egresits and   
                  Z. J. Viharos   Soft Computing and Hybrid AI Approaches
                                  to Intelligent Manufacturing . . . . . . 765--774
              E. Koskimaeki and   
                  J. Goeoes and   
               P. Kontkanen and   
                  P. Myllymaeki   Comparing Soft Computing Methods in
                                  Prediction of Manufacturing Data . . . . 775--784
                P. Marcenac and   
                R. Courdier and   
               S. Calderoni and   
                   J. C. Soulie   Towards an Emergence Machine for Complex
                                  Systems Simulations  . . . . . . . . . . 785--794
                   J.-P. Treuil   Space Models and Agent-Based Universe
                                  Architectures  . . . . . . . . . . . . . 795--804
                   V. Ginot and   
                     C. Le Page   Mobidyc, a Generic Multi-Agents
                                  Simulator for Modeling Populations
                                  Dynamics . . . . . . . . . . . . . . . . 805--814
            F. Van Beusekom and   
                 F. Brazier and   
                P. Schipper and   
                       J. Treur   Development of an Ecological Decision
                                  Support System . . . . . . . . . . . . . 815--825
                F. Bousquet and   
                   I. Bakam and   
                  H. Proton and   
                     C. Le Page   Cormas: Common-Pool Resources and
                                  Multi-Agents Systems . . . . . . . . . . 826--837
                A. Grohmann and   
                    R. Kopetzky   Dynamic Process Modelling and
                                  Communication in Environment Information
                                  Systems of the Third Generation  . . . . 838--848
          R. Martinez-Bejar and   
                F. Martin-Rubio   Landcape: A Knowledge-Based System for
                                  Visual Landscape Assessment  . . . . . . 849--856
                B. Lassoued and   
                    R. M'Hallah   Daily Parking of Sub Way Vehicles  . . . 857--866
                       T. Wibig   The Artificial Neural Networks in Cosmic
                                  Ray Physics Experiment; I.Total Muon
                                  Number Estimation  . . . . . . . . . . . 867--876
               E. Del Acebo and   
                   A. Oller and   
        J. Lluis De La Rosa and   
                      A. Ligeza   Static Criteria for Fuzzy Systems
                                  Quality Evaluation . . . . . . . . . . . 877--887
             I. G. N. Smith and   
                  A. Oliver and   
                    J. Oliphant   Wallaid: A Knowledge-Based System for
                                  the Selection of Earth Retaining Walls   888--895
                   A. Parra and   
                  M. Rincon and   
              J. R. Alvarez and   
                        J. Mira   A Modular and Parametric Structure for
                                  the Substitution Redesign of Power
                                  Plants Control Systems . . . . . . . . . 896--906
             R. N. Miftakov and   
                 J. Christensen   A Polysynaptic Planar Neural Network as
                                  a Model of the Myenteric Nervous Plexus  907--917
                   B. Stein and   
                    D. Curatolo   Selection of Numerical Methods in
                                  Specific Simulation Applications . . . . 918--927
                 I. Skrjanc and   
                       D. Matko   Fuzzy Adaptative Control of the Highly
                                  Nonlinear Heat-Exchange Plant  . . . . . 928--937


Lecture Notes in Computer Science
Volume 1417, 1998

            Andrew A. Chien and   
                     Jae H. Kim   Approaches to Quality of Service in
                                  High-Performance Networks  . . . . . . . 1
         Melanie L. Fulgham and   
                Lawrence Snyder   Integrated Multi-class Routing . . . . . 21
                Craig Hyatt and   
              Dharma P. Agrawal   Congestion Control in the
                                  Wormhole-Routed Torus with Clustering
                                  and Delayed Deflection . . . . . . . . . 33
             Rajeev Sivaram and   
       Dhabaleswar K. Panda and   
               Craig B. Stunkel   Multicasting in Irregular Networks with
                                  Cut-Through Switches Using Tree-Based
                                  Multidestination Worms . . . . . . . . . 39
                 Vivek Garg and   
              David E. Schimmel   CCSIMD: A Concurrent Communication and
                                  Computation Framework for SIMD Machines  55
             G. Andrew Boughton   Arctic Switch Fabric . . . . . . . . . . 65
             Sung-Whan Moon and   
         Padmanabhan Pillai and   
                   Kang G. Shin   STREAMER: Hardware Support for Smoothed
                                  Transmission of Stored Video over ATM    75
              Dianne Miller and   
                Walid A. Najjar   Preliminary Evaluation of a Hybrid
                                  Deterministic/Adaptive Router  . . . . . 89
                   Phil May and   
                Sek M. Chai and   
                 D. Scott Wills   HiPER-P: An Efficient, High-Performance
                                  Router for Multicomputer Interconnection
                                  Networks . . . . . . . . . . . . . . . . 103
               David Garcia and   
                 William Watson   ServerNet\TM II  . . . . . . . . . . . . 119
                     Craig Lund   Embedded Systems Standards . . . . . . . 137
               Craig B. Stunkel   Challenges in the Design of Contemporary
                                  Routers  . . . . . . . . . . . . . . . . 139
                       D. Panda   Designing High-Performance Communication
                                  Subsystems: Top Five Problems to Solve
                                  and Five Problems Not to Solve During
                                  the Next Five Years  . . . . . . . . . . 153
            Gregory T. Byrd and   
               Michael J. Flynn   Evaluation of Communication Mechanisms
                                  in Invalidate-Based Shared Memory
                                  Multiprocessors  . . . . . . . . . . . . 159
                Donglai Dai and   
           Dhabaleswar K. Panda   How Can We Design Better Networks for
                                  DSM Systems? . . . . . . . . . . . . . . 171
            Thorsten von Eicken   Integration of U-Net into Windows/NT . . 185
                  T. Von Eicken   Integration of U-Net into Windows/NT
                                  (Invited Presentation) . . . . . . . . . 185
                 A.-H. Smai and   
                 L.-E. Thorelli   Distance-Based Flow Control in Wormhole
                                  Networks . . . . . . . . . . . . . . . . 189
                   F. Silla and   
                       J. Duato   On the Use of Virtual Channels in
                                  Networks of Workstations with Irregular
                                  Topology . . . . . . . . . . . . . . . . 203
                Ram Kesavan and   
           Dhabaleswar K. Panda   Multicasting on Switch-Based Irregular
                                  Networks Using Multi-drop Path-Based
                                  Multidestination Worms . . . . . . . . . 217
            Chirag S. Patel and   
                Sek M. Chai and   
      Sudhakar Yalamanchili and   
              David E. Schimmel   Power/Performance Trade-offs for Direct
                                  Networks . . . . . . . . . . . . . . . . 231
           Neil R. McKenzie and   
              Kevin Bolding and   
               Carl Ebeling and   
                Lawrence Snyder   ChaosLAN: Design and Implementation of a
                                  Gigabit LAN Using Chaotic Routing  . . . 247
                    X. Yuan and   
                   R. Gupta and   
                      R. Melhem   Does Time-Division Multiplexing Close
                                  the Gap Between Memory and Optical
                                  Communication Speeds?  . . . . . . . . . 261
     Sugath Warnakulasuriya and   
          Timothy Mark Pinkston   Modeling Message Blocking and Deadlock
                                  in Interconnection Networks  . . . . . . 275
            P. López and   
      J. M. Martínez and   
                   J. Duato and   
                     F. Petrini   On the Reduction of Deadlock Frequency
                                  by Limiting Message Injection in
                                  Wormhole Networks  . . . . . . . . . . . 295


Lecture Notes in Computer Science
Volume 1418, 1998

               A. Junghanns and   
                   J. Schaeffer   Sokoban: Evaluating Standard
                                  Single-Agent Search Techniques in the
                                  Presence of Deadlock . . . . . . . . . . 1
                   D. Banks and   
                P. Van Beek and   
                     A. Meisels   A Heuristic Incremental Modeling
                                  Approach to Course Timetabling . . . . . 16
                      J. Baltes   Planning Strategy Representation in
                                  DoLittle . . . . . . . . . . . . . . . . 30
                 D.-G. Shin and   
                      L.-Y. Chu   Establishing Logical Connectivity
                                  between Query Keywords and Database
                                  Contents . . . . . . . . . . . . . . . . 45
                  K. Barker and   
                 S. Delisle and   
                  S. Szpakowicz   Test-Driving TANKA: Evaluating a
                                  Semi-automatic System of Text Analysis
                                  for Knowledge Acquisition  . . . . . . . 60
               G. W. Mineau and   
                 M. Lahboub and   
                 J.-M. Beaulieu   An Object Indexing Methodology as
                                  Support to Object Recognition  . . . . . 72
                    R. Nock and   
                  B. Esfandiari   Oracles and Assistants: Machine Learning
                                  Applied to Network Supervision . . . . . 86
              S. Abu-Hakima and   
                 R. Liseano and   
                       R. Impey   A Common Multi-agent Testbed for Diverse
                                  Seamless Personal Information Networking
                                  Applications . . . . . . . . . . . . . . 99
                  J. Berger and   
                  M. Salois and   
                       R. Begin   A Hybrid Genetic Algorithm for the
                                  Vehicle Routing Problem with Time
                                  Windows  . . . . . . . . . . . . . . . . 114
                J. Morrison and   
                    F. Oppacher   Maintaining Genetic Diversity in Genetic
                                  Algorithms through Co-evolution  . . . . 128
                   K. Wiese and   
                  S. D. Goodwin   The Effect of Genetic Operator
                                  Probabilities and Selection Strategies
                                  on the Performance of a Genetic
                                  Algorithm  . . . . . . . . . . . . . . . 139
                 U.-M. O'Reilly   The Impact of External Dependency in
                                  Genetic Programming Primitives . . . . . 154
                    U. Hahn and   
                K. Schnattinger   Quality Control in the Concept Learning
                                  Process  . . . . . . . . . . . . . . . . 169
                 C. X. Ling and   
                       B. Zhang   Grapheme Generation in Learning to Read
                                  English Words  . . . . . . . . . . . . . 184
                      K. Barker   A Trainable Bracketer for Noun Modifiers 196
                  B. Hodges and   
                     L. Hodgson   Lessons Learned in the Development and
                                  Implementation of a Bilingual Nationally
                                  Accessible Knowledge-Based System  . . . 211
               T. Donaldson and   
                       R. Cohen   Selecting the Next Action with
                                  Constraints  . . . . . . . . . . . . . . 220
                D. Billings and   
                    D. Papp and   
               J. Schaeffer and   
                     D. Szafron   Poker as a Testbed for AI Research . . . 228
                  B. R. Knudsen   Fault Prediction in the Telephone Access
                                  Loop Using a Neural Network  . . . . . . 239
                   J. Zhang and   
                 H. J. Hamilton   Learning English Syllabification Rules   246
                    W. Pang and   
                  S. D. Goodwin   Characterizing Tractable CSPs  . . . . . 259
               T. Goncalves and   
                 F. Moura-Pires   An Attribute Redundancy Measure for
                                  Clustering . . . . . . . . . . . . . . . 273
                    S. Draghici   On the Complexity of VLSI-Friendly
                                  Neural Networks for Classification
                                  Problems . . . . . . . . . . . . . . . . 285
                  M. Sebban and   
          A. M. Landraud-Lamole   Strings Clustering and Statistical
                                  Validation of Clusters . . . . . . . . . 298
                    M. McGarity   Finding Partitions for Learning Control
                                  of Dynamic Systems . . . . . . . . . . . 310
                  B. Chaib-Draa   A Relational Modeling of Cognitive Maps  322
                   S. Staab and   
                        U. Hahn   Distance Constraint Arrays: A Model for
                                  Reasoning on Intervals with Qualitative
                                  and Quantitative Distances . . . . . . . 334
            J. P. Delgrande and   
                       A. Gupta   Revising TimeGraph-II  . . . . . . . . . 349
                       Y. Xiang   Temporally Invariant Junction Tree for
                                  Inference in Dynamic Bayesian Network    363
                S. M. Brown and   
                  E. Santos and   
                    S. B. Banks   Utility Theory-Based User Models for
                                  Intelligent Interface Agents . . . . . . 378
                     J. Liu and   
                K.-C. Chang and   
                        J. Zhou   A Hybrid Convergent Method for Learning
                                  Probabilistic Networks . . . . . . . . . 393
                   E. Perez and   
                     L. Rendell   Relational Concepts and the Fourier
                                  Transform: An Empirical Study  . . . . . 411
                      A. An and   
                     N. Cercone   ELEM2: A Learning System for More
                                  Accurate Classifications . . . . . . . . 426
              S. L. Epstein and   
                        J. Shih   Sequential Instance-Based Learning . . . 442
                    R. Rios and   
                      S. Matwin   Predicate Invention from a Few Examples  455


Lecture Notes in Computer Science
Volume 1419, 1998

                 David M. Chess   Security Issues in Mobile Code Systems   1
              James Riordan and   
                 Bruce Schneier   Environmental Key Generation Towards
                                  Clueless Agents  . . . . . . . . . . . . 15--24
             Dennis Volpano and   
                 Geoffrey Smith   Language Issues in Mobile Program
                                  Security . . . . . . . . . . . . . . . . 25
               Tomas Sander and   
          Christian F. Tschudin   Protecting Mobile Agents Against
                                  Malicious Hosts  . . . . . . . . . . . . 44
           George C. Necula and   
                      Peter Lee   Safe, Untrusted Agents Using
                                  Proof-Carrying Code  . . . . . . . . . . 61
                     Fritz Hohl   Time Limited Blackbox Security:
                                  Protecting Mobile Agents From Malicious
                                  Hosts  . . . . . . . . . . . . . . . . . 92
         Shimshon Berkovits and   
          Joshua D. Guttman and   
                   Vipin Swarup   Authentication for Mobile Agents . . . . 114
                 Giovanni Vigna   Cryptographic Traces for Mobile Agents   137
             Robert S. Gray and   
                 David Kotz and   
             George Cybenko and   
                    Daniela Rus   D'Agents: Security in a
                                  Multiple-Language, Mobile-Agent System   154
        Günter Karjoth and   
             Danny B. Lange and   
                 Mitsuru Oshima   A Security Model for Aglets  . . . . . . 188
                    Li Gong and   
                Roland Schemers   Signing, Sealing, and Guarding Java\TM
                                  Objects  . . . . . . . . . . . . . . . . 206--216
         John K. Ousterhout and   
              Jacob Y. Levy and   
                 Brent B. Welch   The Safe-Tcl Security Model  . . . . . . 217
                F. De Paoli and   
           A. L. Dos Santos and   
                 R. A. Kemmerer   Web Browsers and Security  . . . . . . . 235
            Flavio De Paoli and   
        Andre L. Dos Santos and   
            Richard A. Kemmerer   Web Browsers and Security  . . . . . . . 235


Lecture Notes in Computer Science
Volume 1420, 1998

              Rüdiger Valk   Petri Nets as Token Objects --- An
                                  Introduction to Elementary Object Nets   1
            André Arnold   Synchronized Products of Transition
                                  Systems and Their Analysis . . . . . . . 26
                Giovanni Chiola   Manual and Automatic Exploitation of
                                  Symmetries in SPN Models . . . . . . . . 28
        Marco Ajmone Marsan and   
  Carla-Fabiana Chiasserini and   
               Andrea Fumagalli   Dimensioning Handover Buffers in
                                  Wireless ATM Networks with GSPN Models   44
                J. Ezpeleta and   
    F. Garcia-Vallés and   
                    J. M. Colom   A Class of Well Structured Petri Nets
                                  for Flexible Manufacturing Systems . . . 64
               Kathi Fisler and   
                 Claude Girault   Modelling and Model Checking a
                                  Distributed Shared Memory Consistency
                                  Protocol . . . . . . . . . . . . . . . . 84
    Lars Michael Kristensen and   
                  Antti Valmari   Finding Stubborn Sets of Coloured Petri
                                  Nets Without Unfolding . . . . . . . . . 104
              Kimmo Varpaaniemi   On Stubborn Sets in the Verification of
                                  Linear Time Temporal Properties  . . . . 124
           Hans Fleischhack and   
                Bernd Grahlmann   A Compositional Petri Net Semantics for
                                  SDL  . . . . . . . . . . . . . . . . . . 144
             Martin Hesketh and   
                  Maciej Koutny   An Axiomatisation of Duplication
                                  Equivalence in the Petri Box Calculus    165
               Elmar Bihler and   
                  Walter Vogler   Efficiency of Token-Passing
                                  MUTEX-Solutions --- Some Experiments . . 185
              Mark-Oliver Stehr   Thinking in Cycles . . . . . . . . . . . 205
                 Peter Buchholz   Iterative Decomposition and Aggregation
                                  of Labeled GSPNs . . . . . . . . . . . . 226
             Marco Gribaudo and   
                  Matteo Sereno   On the Use of Structural Petri Net
                                  Analysis for Studying Product Form
                                  Equilibrium Distributions of Queueing
                                  Networks with Blocking . . . . . . . . . 246
                 E. Bertino and   
                  G. Chiola and   
                  L. V. Mancini   Deadlock Detection in the Face of
                                  Transaction and Data Dependencies  . . . 266
              Peter Langner and   
        Christoph Schneider and   
                 Joachim Wehler   Petri Net Based Certification of
                                  Event-Driven Process Chains  . . . . . . 286
  Véronique Benzaken and   
              Nicolas Hugon and   
              Hanna Klaudel and   
             Elisabeth Pelz and   
              Robert-C. Riemann   M-Net Calculus Based Semantics for
                                  Triggers . . . . . . . . . . . . . . . . 306
              Rossano Gaeta and   
            Marco Ajmone Marsan   SWN Analysis and Simulation of Large
                                  Knockout ATM Switches  . . . . . . . . . 326
             Ekkart Kindler and   
              Hagen Völzer   Flexibility in Algebraic Nets  . . . . . 345
             Ekkart Kindler and   
                  Tobias Vesper   ESTL: A Temporal Logic for Events and
                                  States . . . . . . . . . . . . . . . . . 365
                      Anonymous   Author Index . . . . . . . . . . . . . . 385
                      Anonymous   Preface  . . . . . . . . . . . . . . . . V
                      Anonymous   Table of Contents  . . . . . . . . . . . VII


Lecture Notes in Computer Science
Volume 1421, 1998

                 Frank Pfenning   Invited Talk --- Reasoning About
                                  Deductions in Linear Logic . . . . . . . 1
        Jacques D. Fleuriot and   
            Lawrence C. Paulson   A Combination of Nonstandard Analysis
                                  and Geometry Theorem Proving, with
                                  Application to Newton's Principia  . . . 3
    Stéphane F\`evre and   
                  Dongming Wang   Proving Geometric Theorems Using
                                  Clifford Algebra and Rewrite Rules . . . 17
                     Marc Fuchs   System Description: Similarity-Based
                                  Lemma Generation for Model Elimination   33
                Thomas Arts and   
                   Mads Dam and   
    Lars-åke Fredlund and   
                   Dilian Gurov   System Description: Verification of
                                  Distributed Erlang Programs  . . . . . . 38
                 Marc Fuchs and   
                   Andreas Wolf   System Description: Cooperation in Model
                                  Elimination: CPTHEO  . . . . . . . . . . 42
         Rajeev Goré and   
            Joachim Posegga and   
              Andrew Slater and   
                    Harald Vogt   System Description: card $ T^A P $:
                                  The First Theorem Prover on a Smart Card 47
           Bernhard Beckert and   
             Rajeev Goré   System Description: \sf leanK 2.0  . . . 51--55
             C. Benzmueller and   
                    M. Kohlhase   Extensional Higher-Order Resolution  . . 56
  Christoph Benzmüller and   
               Michael Kohlhase   Extensional Higher-Order Resolution  . . 56
                   Bruno Pagano   X.R.S.: Explicit Reduction Systems --- A
                                  First-Order Calculus for Higher-Order
                                  Calculi  . . . . . . . . . . . . . . . . 72
           Alexandre Boudet and   
              Evelyne Contejean   About the Confluence of Equational
                                  Pattern Rewrite Systems  . . . . . . . . 88
                 Michael Beeson   Unification in Lambda-Calculi with
                                  if-then-else . . . . . . . . . . . . . . 103
                Nicolas Peltier   System Description: An Equational
                                  Constraints Solver . . . . . . . . . . . 119
            Bertrand Mazure and   
            Lakhdar Sa\"\is and   
    Éric Grégoire   System Description: CRIL Platform for
                                  SAT  . . . . . . . . . . . . . . . . . . 124
          Julian Richardson and   
                Alan Smaill and   
                      Ian Green   System Description: Proof Planning in
                                  Higher-Order Logic with $ \lambda $\em
                                  Clam . . . . . . . . . . . . . . . . . . 129
               Konrad Slind and   
                Mike Gordon and   
            Richard Boulton and   
                     Alan Bundy   System Description: An Interface Between
                                  CL$^A$M and HOL  . . . . . . . . . . . . 134
             C. Benzmueller and   
                    M. Kohlhase   System Description: LEO --- A
                                  Higher-Order Theorem Prover  . . . . . . 139
  Christoph Benzmüller and   
               Michael Kohlhase   System Description: \sc Leo --- A
                                  Higher-Order Theorem Prover  . . . . . . 139
                   Uwe Waldmann   Superposition for Divisible Torsion-Free
                                  Abelian Groups . . . . . . . . . . . . . 144
                   U. Waldrnann   Superposition for Divisible Torsion-Free
                                  Abelian Groups . . . . . . . . . . . . . 144
               Leo Bachmair and   
               Harald Ganzinger   Strict Basic Superposition . . . . . . . 160
               Leo Bachmair and   
           Harald Ganzinger and   
                Andrei Voronkov   Elimination of Equality via
                                  Transformation with Ordering Constraints 175
               L. Bachrnair and   
               H. Ganzinger and   
                    A. Voronkov   Elimination of Equality via
                                  Transformation with Ordering Constraints 175
                  H. De Nivelle   A Resolution Decision Procedure for the
                                  Guarded Fragment . . . . . . . . . . . . 191
                Hans de Nivelle   A Resolution Decision Procedure for the
                                  Guarded Fragment . . . . . . . . . . . . 191
       Hans Jürgen Ohlbach   Combining Hilbert Style and Semantic
                                  Reasoning in a Resolution Framework  . . 205
                  Matt Kaufmann   Invited Talk --- ACL2 Support for
                                  Verification Projects  . . . . . . . . . 220
             Alberto Oliart and   
                   Wayne Snyder   A Fast Algorithm for Uniform
                                  Semi-Unification . . . . . . . . . . . . 239
     Jürgen Brauburger and   
              Jürgen Giesl   Termination Analysis by Inductive
                                  Evaluation . . . . . . . . . . . . . . . 254
                     Karl Crary   Admissibility of Fixpoint Induction over
                                  Partial Types  . . . . . . . . . . . . . 270
              C. Schuermann and   
                    F. Pfenning   Automated Theorem Proving in a Simple
                                  Meta-Logic for LF  . . . . . . . . . . . 286
     Carsten Schürmann and   
                 Frank Pfenning   Automated Theorem Proving in a Simple
                                  Meta-Logic for LF  . . . . . . . . . . . 286
                    Amir Pnueli   Invited Talk --- Deductive vs.
                                  Model-Theoretic Approaches to Formal
                                  Verification . . . . . . . . . . . . . . 301
                     Robi Malik   Automated Deduction of Finite-State
                                  Control Programs for Reactive Systems    302
           Christoph Kreitz and   
                Mark Hayden and   
                   Jason Hickey   A Proof Environment for the Development
                                  of Group Communication Systems . . . . . 317
             Yoshihiko Ohta and   
              Katsumi Inoue and   
                 Ryuzo Hasegawa   On the Relationship Between Non-Horn
                                  Magic Sets and Relevancy Testing . . . . 333
           Laurent Théry   A Certified Version of Buchberger's
                                  Algorithm  . . . . . . . . . . . . . . . 349
             Matthew Bishop and   
               Peter B. Andrews   Selectively Instantiating Definitions    365
                  Reinhold Letz   Using Matings for Pruning Connection
                                  Tableaux . . . . . . . . . . . . . . . . 381
         Andreas Nonnengart and   
                 Georg Rock and   
           Christoph Weidenbach   On Generating Small Clause Normal Forms  397
               J. D. Horton and   
                  Bruce Spencer   Rank/Activity: A Canonical Form for
                                  Binary Resolution  . . . . . . . . . . . 412
                   Tanel Tammet   Towards Efficient Subsumption  . . . . . 427


Lecture Notes in Computer Science
Volume 1422, 1998

                    David Harel   On the Aesthetics of Diagrams  . . . . . 1
                    John Hughes   Generalising Monads  . . . . . . . . . . 6
            Burghard von Karger   A Proof Rule for Control Loops . . . . . 7
                  B. Von Karger   A proof rule for control loops . . . . . 7
          Rudolf Berghammer and   
        Burghard von Karger and   
                   Andreas Wolf   Relation-Algebraic Derivation of
                                  Spanning Tree Algorithms . . . . . . . . 23
                     A. Bijlsma   An application of program derivation
                                  techniques to 18th-century mathematics   44
               Richard Bird and   
               Lambert Meertens   Nested Datatypes . . . . . . . . . . . . 52
      Marcello M. Bonsangue and   
               Joost N. Kok and   
                     Kaisa Sere   An Approach to Object-Orientation in
                                  Action Systems . . . . . . . . . . . . . 68
             M. M. Bosangue and   
                  J. N. Kok and   
                        K. Sere   An approach to object-orientation in
                                  action systems . . . . . . . . . . . . . 68
               Thomas Brunn and   
       Bernhard Möller and   
                Martin Russling   Layered graph traversals and Hamiltonian
                                  path problems --- An algebraic approach  96
             Henning Dierks and   
                Michael Schenke   A unifying framework for correct program
                                  construction . . . . . . . . . . . . . . 122
             Rutger M. Dijkstra   Computation calculus --- Bridging a
                                  formalization gap  . . . . . . . . . . . 151
            W. H. J. Feijen and   
      A. J. M. Van Gasteren and   
                    B. Schieder   An elementary derivation of the
                                  alternating bit protocol . . . . . . . . 175
                C. J. Fidge and   
                I. J. Hayes and   
               A. P. Martin and   
               A. K. Wabenhorst   A set-theoretic model for real-time
                                  specification and reasoning  . . . . . . 188
                 Jeremy Gibbons   Polytypic Downwards Accumulations  . . . 207
                Mark B. Josephs   Formal Derivation of a Loadable
                                  Asynchronous Counter . . . . . . . . . . 234
         K. Rustan M. Leino and   
                   Rajeev Joshi   A Semantic Approach to Secure
                                  Information Flow . . . . . . . . . . . . 254
                  K. Rustan and   
                   M. Leino and   
                       R. Joshi   A semantic approach to secure
                                  information flow . . . . . . . . . . . . 254
              Rajit Manohar and   
                Alain J. Martin   Slack Elasticity in Concurrent Computing 272
               David A. Naumann   Beyond Fun: Order and membership in
                                  polytypic imperative programming . . . . 286
             M. H. B. Soerensen   Convergence of program transformers in
                                  the metric space of trees  . . . . . . . 315
Morten Heine B. Sòrensen   Convergence of Program Transformers in
                                  the Metric Space of Trees  . . . . . . . 315
                 Makoto Tatsuta   Realizability of monotone coinductive
                                  definitions and its application to
                                  program synthesis  . . . . . . . . . . . 338
             Matteo Vaccari and   
               Roland Backhouse   Calculating a Round-Robin Scheduler  . . 365
                      Anonymous   Author Index . . . . . . . . . . . . . . 383


Lecture Notes in Computer Science
Volume 1423, 1998

                 Noam D. Elkies   Shimura Curve Computations . . . . . . . 1
                      Dan Boneh   The Decision Diffie--Hellman Problem . . 48--63
                Giovanni Cesari   Parallel Implementation of Schönhage's
                                  Integer GCD Algorithm  . . . . . . . . . 64
         Brigitte Vallée   The Complete Analysis of the Binary
                                  Euclidean Algorithm  . . . . . . . . . . 77
               Preda Mihailescu   Cyclotomy Primality Proving --- Recent
                                  Developments . . . . . . . . . . . . . . 95
                      F. Morain   Primality Proving Using Elliptic Curves:
                                  An Update  . . . . . . . . . . . . . . . 111
            Daniel J. Bernstein   Bounding Smooth Integers (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 128
                  Zhang Mingzhi   Factorization of the Numbers of the Form
                                  $ m^3 $ + $ c_2 $ $ m^2 $ + $ c_1 $ $m$
                                  + $ c_0 $  . . . . . . . . . . . . . . . 131
                   Brian Murphy   Modelling the Yield of Number Field
                                  Sieve Polynomials  . . . . . . . . . . . 137
                   Phong Nguyen   A Montgomery-Like Square Root for the
                                  Number Field Sieve . . . . . . . . . . . 151
              William F. Galway   Robert Bennion's ``Hopping Sieve'' . . . 169--178
           Jonathan P. Sorenson   Trading Time for Space in Prime Number
                                  Sieves . . . . . . . . . . . . . . . . . 179
     Jean-Marc Deshouillers and   
  François Hennecart and   
               Bernard Landreau   Do Sums of $4$ Biquadrates Have a
                                  Positive Density?  . . . . . . . . . . . 196
         J.-M. Deshouillers and   
          H. J. J. Te Riele and   
                     Y. Saouter   New Experimental Results Concerning the
                                  Goldbach Conjecture  . . . . . . . . . . 204
           Daniel M. Gordon and   
                  Gene Rodemich   Dense Admissible Sets  . . . . . . . . . 216
             Daniel Panario and   
             Xavier Gourdon and   
              Philippe Flajolet   An Analytic Approach to Smooth
                                  Polynomials over Finite Fields . . . . . 226
                  Dan Boneh and   
                 Jeremy Horwitz   Generating a Product of Three Primes
                                  with an Unknown Factorization  . . . . . 237
                  E. De Win and   
                  S. Mister and   
                 B. Preneel and   
                      M. Wiener   On the Performance of Signature Schemes
                                  Based on Elliptic Curves . . . . . . . . 252
                Erik De Win and   
               Serge Mister and   
               Bart Preneel and   
                 Michael Wiener   On the Performance of Signature Schemes
                                  Based on Elliptic Curves . . . . . . . . 252
          Jeffrey Hoffstein and   
                Jill Pipher and   
            Joseph H. Silverman   NTRU: A Ring-Based Public Key
                                  Cryptosystem . . . . . . . . . . . . . . 267
                 Adam Young and   
                      Moti Yung   Finding Length-$3$ Positive Cunningham
                                  Chains and their Cryptographic
                                  Significance . . . . . . . . . . . . . . 289
                    Stefan Neis   Reducing Ideal Arithmetic to Linear
                                  Algebra Problems . . . . . . . . . . . . 299
                   I. A. Semaev   Evaluation of Linear Relations between
                                  Vectors of a Lattice in Euclidean Space  311
                 Susanne Wetzel   An Efficient Parallel Block-Reduction
                                  Algorithm  . . . . . . . . . . . . . . . 323
               Bruno Haible and   
            Thomas Papanikolaou   Fast Multiprecision Evaluation of Series
                                  of Rational Numbers  . . . . . . . . . . 338
                   E. Teske and   
                 H. C. Williams   A Problem Concerning a Character Sum ---
                                  Extended Abstract  . . . . . . . . . . . 351
            Alf van der Poorten   Formal Power Series and Their Continued
                                  Fraction Expansion . . . . . . . . . . . 358
            Alf van der Poorten   Formal Power Series and Their Continued
                                  Fraction Expansion . . . . . . . . . . . 358
                Henri Cohen and   
      Francisco Diaz y Diaz and   
                 Michel Olivier   Imprimitive Octic Fields with Small
                                  Discriminants  . . . . . . . . . . . . . 372
                Henri Cohen and   
      Francisco Diaz y Diaz and   
                 Michel Olivier   A Table of Totally Complex Number Fields
                                  of Small Discriminants . . . . . . . . . 381
                   Bart de Smit   Generating Arithmetically Equivalent
                                  Number Fields with Elliptic Curves . . . 392
                   Bart de Smit   Generating Arithmetically Equivalent
                                  Number Fields with Elliptic Curves . . . 392
            David S. Dummit and   
              Brett A. Tangedal   Computing the Lead Term of an Abelian
                                  $L$-function . . . . . . . . . . . . . . 400
              John W. Jones and   
               David P. Roberts   Timing Analysis of Targeted Hunter
                                  Searches . . . . . . . . . . . . . . . . 412
               Jacques Martinet   On Successive Minima of Rings of
                                  Algebraic Integers . . . . . . . . . . . 424
                Henri Cohen and   
      Francisco Diaz y Diaz and   
                 Michel Olivier   Computation of Relative Quadratic Class
                                  Groups . . . . . . . . . . . . . . . . . 433
                  Alice Gee and   
              Peter Stevenhagen   Generating Class Fields Using Shimura
                                  Reciprocity  . . . . . . . . . . . . . . 441
                  Joshua Holden   Irregularity of Prime Numbers over Real
                                  Quadratic Fields . . . . . . . . . . . . 454
       Michael J. Jacobson, Jr.   Experimental Results on Class Groups of
                                  Real Quadratic Fields (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 463
      Stéphane Louboutin   Computation of Relative Class Numbers of
                                  Imaginary Cyclic Fields of $2$-power
                                  Degrees  . . . . . . . . . . . . . . . . 475
              Antonia W. Bluher   Formal Groups, Elliptic Curves, and Some
                                  Theorems of Couveignes . . . . . . . . . 482
                  Z. Djabri and   
                    N. P. Smart   A Comparison of Direct and Indirect
                                  Methods for Computing Selmer Groups of
                                  an Elliptic Curve  . . . . . . . . . . . 502
             Ming-Deh Huang and   
                 Yiu-Chung Wong   An Algorithm for Approximate Counting of
                                  Points on Algebraic Sets over Finite
                                  Fields . . . . . . . . . . . . . . . . . 514
          Attila Pethö and   
           Emanuel Herrmann and   
                Horst G. Zimmer   $S$-integral Points on Elliptic Curves
                                  and Fermat's Triple Equations  . . . . . 528
                    Edlyn Teske   Speeding Up Pollard's Rho Method for
                                  Computing Discrete Logarithms  . . . . . 541--554
        Harald Niederreiter and   
                  Chaoping Xing   A General Method of Constructing Global
                                  Function Fields with Many Rational
                                  Places . . . . . . . . . . . . . . . . . 555
                  Sachar Paulus   Lattice Basis Reduction in Function
                                  Fields . . . . . . . . . . . . . . . . . 567
              Sachar Paulus and   
                  Andreas Stein   Comparing Real and Imaginary Arithmetics
                                  for Divisor Class Groups of
                                  Hyperelliptic Curves . . . . . . . . . . 576
           Renate Scheidler and   
                  Andreas Stein   Unit Computation in Purely Cubic
                                  Function Fields of Unit Rank 1 . . . . . 592
              Andreas Stein and   
               Hugh C. Williams   An Improved Method of Computing the
                                  Regulator of a Real Quadratic Function
                                  Field  . . . . . . . . . . . . . . . . . 607
           Robert J. Zuccherato   The Equivalence Between Elliptic Curve
                                  and Quadratic Function Field Discrete
                                  Logarithms in Characteristic 2 . . . . . 621
                      Anonymous   Author Index . . . . . . . . . . . . . . 639


Lecture Notes in Computer Science
Volume 1424, 1998

                    W. Kloesgen   Deviation and association patterns for
                                  subgroup mining in temporal, spatial,
                                  and textual data bases . . . . . . . . . 1
             Willi Klösgen   Deviation and Association Patterns for
                                  Subgroup Mining in Temporal, Spatial,
                                  and Textual Data Bases . . . . . . . . . 1
                 Solomon Marcus   The paradox of the heap of grains in
                                  respect to roughness, fuzziness, and
                                  negligibility  . . . . . . . . . . . . . 19
            V. Wiktor Marek and   
         Miros\law Truszczynski   Rough Sets --- What Are They About?  . . 24
               Zdzis\law Pawlak   Reasoning about Data --- A Rough Set
                                  Perspective  . . . . . . . . . . . . . . 25
                 Lotfi A. Zadeh   Information Granulation and Its
                                  Centrality in Human and Machine
                                  Intelligence . . . . . . . . . . . . . . 35
    Jerzy W. Grzymala-Busse and   
                     Xihong Zou   Classification Strategies Using Certain
                                  and Possible Rules . . . . . . . . . . . 37
            Jose Miro-Julia and   
        José Miró   Well-Behaviored Operations for
                                  Approximate Sets . . . . . . . . . . . . 45
                 Dominik Slezak   Searching for Frequential Reducts in
                                  Decision Tables with Uncertain Objects   52
            Salvatore Greco and   
        Benedetto Matarazzo and   
                Roman Slowinski   A New Rough Set Approach to
                                  Multicriteria and Multiattribute
                                  Classification . . . . . . . . . . . . . 60
                    J. Cwik and   
                   J. Koronacki   A Heuristic Method of Model Choice for
                                  Nonlinear Regression . . . . . . . . . . 68
                    A. Ciok and   
               T. Kowalczyk and   
                E. Pleszczynska   How a New Statistical Infrastructure
                                  Induced a New Computing Trend in Data
                                  Analysis . . . . . . . . . . . . . . . . 75
             Jürgen Dassow   Some Remarks on Networks of Parallel
                                  Language Processors  . . . . . . . . . . 83
             J. Castellanos and   
                   S. Leiva and   
                 J. Rodrigo and   
A. Rodríguez-Patón   Molecular Computation for Genetic
                                  Algorithms . . . . . . . . . . . . . . . 91
                Rodica Ceterchi   Marcus Contextual Languages and their
                                  Cut-and-Paste Properties . . . . . . . . 99
               Radu Gramatovici   Contextual Multilanguages: A Learning
                                  Method . . . . . . . . . . . . . . . . . 107
              Alexander Knyazev   On Recognition of Words from Languages
                                  Generated by Linear Grammars with One
                                  Nonterminal Symbol . . . . . . . . . . . 111
            Wojciech Buszkowski   Approximation Spaces and Definability
                                  for Incomplete Information Systems . . . 115
                 Piero Pagliani   Intrinsic Co-Heyting Boundaries and
                                  Information Incompleteness in Rough Set
                                  Analysis . . . . . . . . . . . . . . . . 123
                      P. Maritz   Multifunctions as Approximation
                                  Operations in Generalized Approximation
                                  Spaces . . . . . . . . . . . . . . . . . 131
                   J. Jaervinen   Preimage relations and their matrices    139
               J. Järvinen   Preimage Relations and Their Matrices    139
      Barbara Siemiatkowska and   
                Artur Dubrawski   Cellular Neural Networks for Navigation
                                  of a Mobile Robot  . . . . . . . . . . . 147
                 Xie Keming and   
                  T. Y. Lin and   
                  Zhang Jianwei   The Takagi-Sugeno fuzzy model
                                  identification method of parameter
                                  varying systems  . . . . . . . . . . . . 155
            Kazuhiko Eguchi and   
             Satoshi Yamane and   
                 Hideo Sugi and   
                   Kenji Oshima   Sensing of Arc Length and Wire Extension
                                  Using Neural Network in Robotic Welding  163
             Satoshi Yamane and   
             Kazuhiro Okada and   
              Kenji Shinoda and   
                   Kenji Oshima   Traffic Signal Control Using
                                  Multi-layered Fuzzy Control  . . . . . . 171
                Wojciech Ziarko   Approximation Region-Based Decision
                                  Tables . . . . . . . . . . . . . . . . . 178
María C. Fernández-Baizán and   
  Ernestina Menasalvas Ruiz and   
               Anita Wasilewska   A Model of RSDM Implementation . . . . . 186
         Zbigniew W. Rás   Handling Queries in Incomplete CKBS
                                  through Knowledge Discovery  . . . . . . 194
       Emmanuelle Martienne and   
               Mohamed Quafafou   Learning Logical Descriptions for
                                  Document Understanding: A Rough
                                  Sets-Based Approach  . . . . . . . . . . 202
María C. Fernández-Baizán and   
  Ernestina Menasalvas Ruiz and   
José M. Peña Sánchez and   
           Borja Pardo Pastrana   Integrating KDD Algorithms and RDBMS
                                  Code . . . . . . . . . . . . . . . . . . 210
           Marzena Kryszkiewicz   Fast Discovery of Representative
                                  Association Rules  . . . . . . . . . . . 214
           Andrzej Lenarcik and   
               Zdzis\law Piasta   Rough Classifiers Sensitive to Costs
                                  Varying from Object to Object  . . . . . 222
                 Ning Zhong and   
                Juzhen Dong and   
                  Setsuo Ohsuga   Soft Techniques to Data Mining . . . . . 231
              Jan M. Zytkow and   
                Arun P. Sanjeev   Business Process Understanding: Mining
                                  Many Datasets  . . . . . . . . . . . . . 239
           Akinori Kanasugi and   
          Takashi Shimayama and   
              Naoshi Nakaya and   
                 Takeshi Iizuka   A Genetic Algorithm for Switchbox
                                  Routing Problem  . . . . . . . . . . . . 247
         Hans-Michael Voigt and   
                Jan Matti Lange   On the Benefits of Random Memorizing in
                                  Local Evolutionary Search  . . . . . . . 255
            Kazuhiko Eguchi and   
               Junya Suzuki and   
             Satoshi Yamane and   
                   Kenji Oshima   An Application of Genetic Algorithms to
                                  Floorplanning of VLSI  . . . . . . . . . 263
               Urszula Boryczka   Learning with Delayed Rewards in Ant
                                  Systems for the Job-Shop Scheduling
                                  Problem  . . . . . . . . . . . . . . . . 271
                    G. Cattaneo   Fuzzy Extension of Rough Sets Theory . . 275
            Salvatore Greco and   
        Benedetto Matarazzo and   
                Roman Slowinski   Fuzzy Similarity Relation as a Basis for
                                  Rough Approximations . . . . . . . . . . 283
            Jaros\law Stepaniuk   Approximation Spaces in Extensions of
                                  Rough Set Theory . . . . . . . . . . . . 290
                      Y. Y. Yao   On Generalizing Pawlak Approximation
                                  Operators  . . . . . . . . . . . . . . . 298
            Jan Matti Lange and   
         Hans-Michael Voigt and   
          Steffen Burkhardt and   
               Ralph Göbel   Real-Time Real-World Visual
                                  Classification --- Making Computational
                                  Intelligence Fly . . . . . . . . . . . . 308
             Wladys\law Skarbek   Fractal Operator Convergence by Analysis
                                  of Influence Graph . . . . . . . . . . . 316
          Krystian Ignasiak and   
             Wladys\law Skarbek   Pattern Recognition by Invariant
                                  Reference Points . . . . . . . . . . . . 322
          J. M. Del Rosario and   
                   C. Jedrzejek   An analysis of context selection in
                                  embedded wavelet coders  . . . . . . . . 330
    Juan Miguel del Rosario and   
             Czes\law Jedrzejek   An Analysis of Context Selection in
                                  Embedded Wavelet Coders  . . . . . . . . 330
              S. K. M. Wong and   
                     C. J. Butz   Equivalent Characterization of a Class
                                  of Conditional Probabilistic
                                  Independencies . . . . . . . . . . . . . 338
    Mieczys\law A. Klopotek and   
          Slawomir T. Wierzchon   A New Qualitative Rough-Set Approach to
                                  Modeling Belief Functions  . . . . . . . 346
           Rados\law Sikora and   
             Wladys\law Skarbek   On Stability of Oja Algorithm  . . . . . 354
               Remigiusz J. Rak   Transform Vector Quantization of Images
                                  in One Dimension . . . . . . . . . . . . 361
          Waldemar Rakowski and   
          Zbigniew Bartosiewicz   Daubechies Filters for $2$D Wavelet
                                  Transforms . . . . . . . . . . . . . . . 369
       Tor-Kristian Jenssen and   
             Jan Komorowski and   
                Aleksander Ohrn   Some Heuristics for Default Knowledge
                                  Discovery  . . . . . . . . . . . . . . . 373
                      T. Y. Lin   Fuzzy partitions II: belief functions. A
                                  probabilistic view . . . . . . . . . . . 381
                  T. Y. Lin and   
                   N. Zhong and   
                 J. J. Dong and   
                      S. Ohsuga   Frameworks for Mining Binary Relations
                                  in Data  . . . . . . . . . . . . . . . . 387
              Jerzy Stefanowski   Handling Continuous Attributes in
                                  Discovery of Strong Decision Rules . . . 394
        Jakub Wróblewski   Covering with Reducts --- A Fast
                                  Algorithm for Rule Generation  . . . . . 402
              Wiktor Bartol and   
             Xavier Caicedo and   
       Francesc Rosselló   Syntactical Content of Finite
                                  Approximations of Partial Algebras . . . 408
              Daniel Pacholczyk   A New Approach to Linguistic Negation
                                  Based upon Compatibility Level and
                                  Tolerance Threshold  . . . . . . . . . . 416
                  Hiroshi Sakai   Some Issues on Nondeterministic
                                  Knowledge Bases with Incomplete and
                                  Selective Information  . . . . . . . . . 424
                       Qing Liu   The OI-Resolution of Operator Rough
                                  Logic  . . . . . . . . . . . . . . . . . 432
          Krzysztof Krawiec and   
            Roman Slowinski and   
              Irmina Szczesniak   Pedagogical Method for Extraction of
                                  Symbolic Knowledge from Neural Networks  436
                 Piotr Wojdyllo   Wavelets, Rough Sets and Artificial
                                  Neural Networks in EEG Analysis  . . . . 444
                    P. Wojdytto   Wavelets, rough sets and artificial
                                  neural networks in EEG analysis  . . . . 444
                 Robert Susmaga   Parallel Computation of Reducts  . . . . 450
         Adam Mrózek and   
               Krzysztof Skabek   Rough Rules in Prolog  . . . . . . . . . 458
          Andrzej Czyzewski and   
                  Bozena Kostek   Tuning the Perceptual Noise Reduction
                                  Algorithm Using Rough Sets . . . . . . . 467
                Shusaku Tsumoto   Modelling Medical Diagnostic Rules Based
                                  on Rough Sets  . . . . . . . . . . . . . 475
       Alicja Wakulicz-Deja and   
           Mariusz Boryczka and   
                   Piotr Paszek   Discretization of Continuous Attributes
                                  on Decision System in Mitochondrial
                                  Encephalomyopathies  . . . . . . . . . . 483
               J. F. Peters and   
                   K. Ziaei and   
                     S. Ramanna   Approximate Time Rough Control: Concepts
                                  and Application to Satellite Attitude
                                  Control  . . . . . . . . . . . . . . . . 491
                Mikhail Moshkov   Some Relationships between Decision
                                  Trees and Decision Rule Systems  . . . . 499
                  Igor Chikalov   On Decision Trees with Minimal Average
                                  Depth  . . . . . . . . . . . . . . . . . 506
                Albina Moshkova   On Diagnosis of Retaining Faults in
                                  Circuits . . . . . . . . . . . . . . . . 513
           Vladimir Shevtchenko   On the Depth of Decision Trees for
                                  Diagnosing of Nonelementary Faults in
                                  Circuits . . . . . . . . . . . . . . . . 517
                   Jan G. Bazan   Discovery of Decision Rules by Matching
                                  New Objects Against Data Tables  . . . . 521
                Yujian Zhou and   
                       Jue Wang   Rule $+$ Exception Modeling Based on
                                  Rough Set Theory . . . . . . . . . . . . 529
          Bogdan S. Chlebus and   
                Sinh Hoa Nguyen   On Finding Optimal Discretizations for
                                  Two Attributes . . . . . . . . . . . . . 537
                Hung Son Nguyen   Discretization Problem for Rough Sets
                                  Methods  . . . . . . . . . . . . . . . . 545--552
                  Julia Johnson   Rough Mereology for Industrial Design    553
          Mariusz Flasinski and   
            Robert Schaefer and   
          Wojciech Toporkiewicz   Optimal stochastic scaling of CAE
                                  parallel computations  . . . . . . . . . 557--564
                 Jan Wierzbicki   CBR for Complex Objects Represented in
                                  Hierarchical Information Systems . . . . 565
                  M. Rawski and   
          L. Józwiak and   
                   A. Chojnacki   Application of the Information Measures
                                  to Input Support Selection in Functional
                                  Decomposition  . . . . . . . . . . . . . 573
               Tom R. Burns and   
                Anna Gomolinska   Modelling Social Game Systems by Rule
                                  Complexes  . . . . . . . . . . . . . . . 581
            Lech Józwiak   Analysis and Synthesis of Information
                                  Systems with Information Relationships
                                  and Measures . . . . . . . . . . . . . . 585
               Wies\law Traczyk   Approximations in Data Mining  . . . . . 589
          Dirk Van den Poel and   
               Zdzis\law Piasta   Purchase Prediction in Database
                                  Marketing with the ProbRough System  . . 593
               Witold Czajewski   Rough Sets in Optical Character
                                  Recognition  . . . . . . . . . . . . . . 601
          Bartlomiej Predki and   
            Roman Slowinski and   
          Jerzy Stefanowski and   
             Robert Susmaga and   
                    Szymon Wilk   ROSE --- Software Implementation of the
                                  Rough Set Theory . . . . . . . . . . . . 605
            Roman W. Swiniarski   Rough Sets and Bayesian Methods Applied
                                  to Cancer Detection  . . . . . . . . . . 609
            Roman W. Swiniarski   Rough Sets and Neural Networks
                                  Application to Handwritten Character
                                  Recognition by Complex Zernike Moments   617
                      Anonymous   Session AR1 Approximate Reasoning  . . . ??
                      Anonymous   Session AP1 Applications of Rough Sets   ??
                      Anonymous   Session C1 Complexity  . . . . . . . . . ??
                      Anonymous   Session DM1 Data Mining  . . . . . . . . ??
                      Anonymous   Session EV1 Evolutionary Computations    ??
                      Anonymous   Session GS1 Grammar Systems and
                                  Molecular Computations . . . . . . . . . ??
                      Anonymous   Session GA1 General Approximations . . . ??
                      Anonymous   Session GH1 General Hybrid Methods . . . ??
                      Anonymous   Session HRS1 Hybrid Methods in Rough
                                  Sets . . . . . . . . . . . . . . . . . . ??
                      Anonymous   Session IC1 Intelligent Control  . . . . ??
                      Anonymous   Session IP1 Image Processing . . . . . . ??
                      Anonymous   Session IP2 Image Processing . . . . . . ??
                      Anonymous   Session LRS1 Logic in Rough Sets . . . . ??
                      Anonymous   Session LFSC1 Logical Foundations of
                                  Soft Computing . . . . . . . . . . . . . ??
                      Anonymous   Session RSM1 Rough Set Methods . . . . . ??
                      Anonymous   Session RSKDD1 Rough Sets in KDD . . . . ??
                      Anonymous   Session RSM2 Rough Set Methods . . . . . ??
                      Anonymous   Session RSMA1 Rough Set Methods and
                                  Applications . . . . . . . . . . . . . . ??
                      Anonymous   Session RSMA2 Rough Set Methods and
                                  Applications . . . . . . . . . . . . . . ??
                      Anonymous   Session ST1 Statistical Inference  . . . ??


Lecture Notes in Computer Science
Volume 1425, 1998

            I. Kompatsiaris and   
                M. G. Strintzis   $3$D Representation of Videoconference
                                  Image Sequences Using VRML 2.0 . . . . . 1
                 D. Leevers and   
                     P. Gil and   
                F. M. Lopes and   
                     J. Pereira   An Autonomous Sensor for $3$D
                                  Reconstruction . . . . . . . . . . . . . 13
                  J.-R. Ohm and   
                     K. Mueller   Incomplete $3$D for Multiview
                                  Representation and Synthesis of Video
                                  Objects  . . . . . . . . . . . . . . . . 26
                F. Rousseau and   
                        A. Duda   An Execution Architecture for
                                  Synchronized Multimedia Presentations    42
                W. Ten Kate and   
              P. Deunhouwer and   
               D. Bulterman and   
                     L. Hardman   Presenting Multimedia on the Web and in
                                  TV Broadcast . . . . . . . . . . . . . . 56
                   R. Stolp and   
                A. Scheller and   
                       A. Kraft   MHEG-5 Application Development . . . . . 70
               G. Kyriakaki and   
            Y. Maragoudakis and   
              Y. Mavraganis and   
                      N. Pappas   The SICMA Multimedia Server and Virtual
                                  Museum Application . . . . . . . . . . . 83
                  F. Cortes and   
                     R. Lueling   A Parallel Continuous Media Server
                                  Complying to the RTSP Protocol . . . . . 97
                 S. Bessler and   
                       M. Hager   Media Streaming in a Multimedia
                                  Annotation Application . . . . . . . . . 111
                  T. Saydam and   
                   S. Yucel and   
                      T. Kusano   A Multimedia Service and Management
                                  Architecture Using APIs over CORBA
                                  Platform . . . . . . . . . . . . . . . . 121
                 C. Edwards and   
               D. Hutchison and   
                  D. Waddington   Open Interface Support for Heterogeneous
                                  Network Services . . . . . . . . . . . . 135
              J. R. Fallows and   
                 I. W. Marshall   A CORBA-Assisted Multimedia Proxy Server 149
          J. M. Marie-Julie and   
                      H. Essafi   Image Indexing by Using a Rotation and
                                  Scale Invariant Partition  . . . . . . . 163
                  Y. Yusoff and   
               W. Christmas and   
                     J. Kittler   A Study on Automatic Shot Change
                                  Detection  . . . . . . . . . . . . . . . 177
            V. Darmstaedter and   
             J.-F. Delaigle and   
               D. Nicholson and   
                        B. Macq   A Block Based Watermarking Technique for
                                  MPEG2 Signals: Optimization and
                                  Validation on Real Digital TV
                                  Distribution Links . . . . . . . . . . . 190
              T. Kunkelmann and   
                  H. Vogler and   
            M.-L. Moschgath and   
                        L. Wolf   Scalable Security Mechanisms in
                                  Transport Systems for Enhanced
                                  Multimedia Services  . . . . . . . . . . 207
               G. Losquadro and   
                M. Barbieri and   
                  M. Luglio and   
                    F. Vatalaro   The SECOMS Broadband Satellite Network
                                  in the Multimedia Services and
                                  Multi-environment Coverage Scenario  . . 221
                  A. Molina and   
               J. Seseña   DIGISAT-S3M: The Interactivity for SMATV
                                  Users  . . . . . . . . . . . . . . . . . 233
              M. Leisenberg and   
                    T. Lindgren   MOMENTS --- Multimedia Services in a
                                  Narrow-Bandwidth Cellular Environment    246
              S. Antoniazzi and   
                H. Marmolin and   
               G. Schapeler and   
                    B. Weickert   MUSIST Browser and Navigation Concept    260
               P. A. Sellek and   
                 D. O. Beaumont   SimDS --- An Approach to Service
                                  Modelling  . . . . . . . . . . . . . . . 274
                 Y. M. Shin and   
                         S. Cho   Controlling Multimedia Streams across
                                  Internet and ATM Network . . . . . . . . 288
              T. Zahariadis and   
            C. Georgopoulos and   
                  V. Nellas and   
                   T. Arvanitis   Native ATM Protocol Stack for Internet
                                  Applications in Residential Broadband
                                  Networks . . . . . . . . . . . . . . . . 300
               S. P. Romano and   
                 C. Deleuze and   
                 J. Rezende and   
                       S. Fdida   Integrated QoS Architecture for IP
                                  Switching  . . . . . . . . . . . . . . . 312
                  Y. Orlary and   
                O. Carbonel and   
                   S. Gibbs and   
                  D. Konstantas   Design and Implementation of an ATM
                                  Based Distributed Musical Rehearsal
                                  Studio . . . . . . . . . . . . . . . . . 326
                  P. Foster and   
               S. Banthorpe and   
                        R. Gepp   Automating the Multimedia Content
                                  Production Lifecycle . . . . . . . . . . 340
                       G. Caire   ATMAN: Trading of Digital Audio Visual
                                  Contents . . . . . . . . . . . . . . . . 352
                   R. Bolla and   
                   A. Iscra and   
                M. Marchese and   
                   S. Zappatore   A Perceived Quality of Service
                                  Optimization for Video Communication in
                                  `Best-Effort' Networks . . . . . . . . . 366
                  G. J. Lampard   Performance of TCP Over Cable Modems and
                                  ADSL . . . . . . . . . . . . . . . . . . 380
               M. Reisslein and   
                 K. W. Ross and   
                  V. Verillotte   A Decentralized Prefetching Protocol for
                                  VBR Video on Demand  . . . . . . . . . . 388
             F. H. P. Spaan and   
            R. L. Lagendijk and   
                     J. Biemond   Error-Robustness of Polar Contour-Coding 402
              M. Bartkowiak and   
                    M. Domanski   Efficient Representation of Chrominance
                                  for Very Low Bitrate Coding  . . . . . . 415
              M. Mattavelli and   
                   S. Brunetton   Real-Time Constraints and Prediction of
                                  Video Decoding Time for Multimedia
                                  Systems  . . . . . . . . . . . . . . . . 425
                 M. Gunetti and   
                   P. Sunna and   
                       M. Visca   Video Quality and Bit Rates in Thematic
                                  Television Channels  . . . . . . . . . . 439
               P. Robertson and   
                 H.-P. Huth and   
                   K. Fazel and   
                       O. Klank   A System Design for a Wireless Home
                                  Multi-Media LAN  . . . . . . . . . . . . 453


Lecture Notes in Computer Science
Volume 1427, 1998

                   N. Halbwachs   Synchronous Programming of Reactive
                                  Systems  . . . . . . . . . . . . . . . . 1
                       D. Peled   Ten Years of Partial Order Reduction . . 17
                    J. S. Moore   An ACL2 Proof of Write Invalidate Cache
                                  Coherence  . . . . . . . . . . . . . . . 29
                  D. Hardin and   
                 M. Wilding and   
                       D. Greve   Transforming the Theorem Prover into a
                                  Digital Design Tool: From Concept Car to
                                  Off-Road Vehicle . . . . . . . . . . . . 39
                A. J. Camilleri   A Role for Theorem Proving in
                                  Multi-Processor Design . . . . . . . . . 45
                 J. Hoffman and   
                       C. Payne   A Formal Method Experience at Secure
                                  Computing Corporation  . . . . . . . . . 49
                  J. R. Cuellar   Formal Methods in an Industrial
                                  Environment  . . . . . . . . . . . . . . 57
                 G. J. Holzmann   On Checking Model Checkers . . . . . . . 61
                 J. C. Mitchell   Finite-State Analysis of Security
                                  Protocols  . . . . . . . . . . . . . . . 71
                   D. Bolignano   Integrating Proof-Based and
                                  Model-Checking Techniques for the Formal
                                  Verification of Cryptographic Protocols  77
                  P. Wolper and   
                    B. Boigelot   Verifying Systems with Infinite but
                                  Regular State Spaces . . . . . . . . . . 88
           J. U. Skakkebaek and   
                R. B. Jones and   
                     D. L. Dill   Formal Verification of Out-of-Order
                                  Execution Using Incremental Flushing . . 98
                 K. L. McMillan   Verification of an Implementation of
                                  Tomasulo's Algorithm by Compositional
                                  Model Checking . . . . . . . . . . . . . 110
               R. Hosabettu and   
                  M. Srivas and   
              G. Gopalakrishnan   Decomposing the Proof of Correctness of
                                  Pipelined Microprocessors  . . . . . . . 122
                  J. Sawada and   
                     W. A. Hunt   Processor Verification with Precise
                                  Exceptions and Speculative Execution . . 135
               E. M. Clarke and   
              E. A. Emerson and   
                     S. Jha and   
                   A. P. Sistla   Symmetry Reductions in Model Checking    147
                G. S. Manku and   
                  R. Hojati and   
                     R. Brayton   Structural Symmetry and Model Checking   159
                   U. Stern and   
                     D. L. Dill   Using Magnetic Disk Instead of Main
                                  Memory in the Murcursive phi Verifier    172
                    I. Beer and   
               S. Ben-David and   
                     A. Landver   On-the-Fly Model Checking of RCTL
                                  Formulas . . . . . . . . . . . . . . . . 184
            T. A. Henzinger and   
               O. Kupferman and   
                      S. Qadeer   From Pre-historic to Post-modern
                                  Symbolic Model Checking  . . . . . . . . 195
                     F. Wallner   Model Checking LTL Using Net Unfoldings  207
                      Y. Xu and   
                   E. Cerny and   
                    X. Song and   
                     F. Cotella   Model Checking for a First-Order
                                  Temporal Logic Using Multiway Decision
                                  Graphs . . . . . . . . . . . . . . . . . 219
               J. S. Thathachar   On the Limitations of Ordered
                                  Representations of Functions . . . . . . 232
                    A. Goel and   
                   K. Sajid and   
                    H. Zhou and   
                        A. Aziz   BDD Based Procedures for a Theory of
                                  Equality with Uninterpreted Functions    244
                A. J. Isles and   
                  R. Hojati and   
                  R. K. Brayton   Computing Reachable Control States of
                                  Systems Modeled with Uninterpreted
                                  Functions and Infinite Memory  . . . . . 256
                   H. Comon and   
                      Y. Jurski   Multiple Counters Automata, Safety
                                  Analysis, and Presburger Arithmetic  . . 268
               T. R. Shiple and   
               J. H. Kukula and   
                   R. K. Ranjan   A Comparison of Presburger Engines for
                                  EFSM Reachability  . . . . . . . . . . . 280
                M. A. Colon and   
                    T. E. Uribe   Generating Finite-State Abstractions of
                                  Reactive Systems Using Decision
                                  Procedures . . . . . . . . . . . . . . . 293
              P. A. Abdulla and   
               A. Bouajjani and   
                     B. Jonsson   On-the-Fly Analysis of Systems with
                                  Unbounded, Lossy FIFO Channels . . . . . 305
                S. Bensalem and   
                Y. Lakhnech and   
                        S. Owre   Computing Abstractions of Infinite State
                                  Systems Compositionally and
                                  Automatically  . . . . . . . . . . . . . 319
               D. Griffioen and   
                  F. Vaandrager   Norreed Simulations  . . . . . . . . . . 332
               R. Couturier and   
                        D. Mery   An Experiment in Parallelizing an
                                  Application Using Formal Methods . . . . 345
              S. D. Stoller and   
                      Y. A. Liu   Efficient Symbolic Detection of Global
                                  Properties in Distributed Systems  . . . 357
                     M. Wilding   A Machine-Checked Proof of the
                                  Optimality of a Real-Time Scheduling
                                  Policy . . . . . . . . . . . . . . . . . 369
              P. A. Abdulla and   
                 B. Jonsson and   
                 M. Kindahl and   
                       D. Peled   A General Approach to Partial Order
                                  Reductions in Symbolic Verification  . . 379
                     F. Balarin   Correctness of the Concurrent Approach
                                  to Symbolic Verification of Interleaved
                                  Models . . . . . . . . . . . . . . . . . 391
              W. Belluomini and   
                    C. J. Myers   Verification of Timed Systems Using
                                  POSETs . . . . . . . . . . . . . . . . . 403
                   G. Bella and   
                  L. C. Paulson   Mechanising BAN Kerberos by the
                                  Inductive Method . . . . . . . . . . . . 416
                A. P. Felty and   
                 D. J. Howe and   
                    F. A. Stomp   Protocol Verification in Nuprl . . . . . 428
            T. A. Henzinger and   
                  S. Qadeer and   
                 S. K. Rajamani   You Assume, We Guarantee: Methodology
                                  and Case Studies . . . . . . . . . . . . 440
              E. A. Emerson and   
                 K. S. Namjoshi   Verification of a Parameterized Bus
                                  Arbitration Protocol . . . . . . . . . . 452
                R. Nalumasu and   
                 R. Ghughal and   
                A. Mokkedem and   
              G. Gopalakrishnan   The `Test Model-Checking' Approach to
                                  the Verification of Formal Memory Models
                                  of Multiprocessors . . . . . . . . . . . 464
                M. Kaufmann and   
                  A. Martin and   
                      C. Pixley   Design Constraints in Symbolic Model
                                  Checking . . . . . . . . . . . . . . . . 477
                 Y.-A. Chen and   
                   R. E. Bryant   Verification of Floating-Point Adders    488
                      A. Bouali   Xeve: An Esterel Verification
                                  Environment  . . . . . . . . . . . . . . 500
                S. Bensalem and   
                Y. Lakhnech and   
                        S. Owre   InVeSt: A Tool for the Verification of
                                  Invariants . . . . . . . . . . . . . . . 505
                 G. Ferrari and   
                   S. Gnesi and   
               U. Montanari and   
                     M. Pistore   Verifying Mobile Processes in the HAL
                                  Environment  . . . . . . . . . . . . . . 511
                 J. Elgaard and   
                N. Klarlund and   
                     A. Moeller   Mona 1.x: New Techniques for WS1S and
                                  WS2S . . . . . . . . . . . . . . . . . . 516
                    R. Alur and   
            T. A. Henzinger and   
              F. Y. C. Mang and   
                      S. Qadeer   MOCHA: Modularity in Model Checking  . . 521
               C. Heitmeyer and   
                   J. Kirby and   
                   B. Labaw and   
                   R. Bharadwaj   SCR0*: A Toolset for Specifying and
                                  Analyzing Software Requirements  . . . . 526
                    D. A. Peled   A Toolset for Message Sequence Charts    532
              U. Brockmeyer and   
                     G. Wittich   Real-Time Verification of Statemate
                                  Designs  . . . . . . . . . . . . . . . . 537
                        C. Daws   Optikron: A Tool Suite for Enhancing
                                  Model-Checking of Real-Time Systems  . . 542
                   M. Bozga and   
                    C. Daws and   
                   O. Maler and   
                     A. Olivero   Kronos: A Model-Checking Tool for
                                  Real-Time Systems  . . . . . . . . . . . 546


Lecture Notes in Computer Science
Volume 1429, 1998

                Henk Obbink and   
           Paul C. Clements and   
           Frank van der Linden   Introduction . . . . . . . . . . . . . . 1
           William Scherlis and   
                   Juha Kuusela   Session 1: Example Architectures . . . . 4
                G. Cysewski and   
               T. Gromadzki and   
                 H. Lyskawa and   
               M. Piechowka and   
                  S. Szejko and   
            W. E. Kozlowski and   
                    O. Vahamaki   Reusable Framework for Telecontrol
                                  Protocols  . . . . . . . . . . . . . . . 6
          Eila Niemelä and   
              Harri Perunka and   
        Tomi Korpipää   A Software Bus as a Platform for a
                                  Family of Distributed Embedded System
                                  Products . . . . . . . . . . . . . . . . 14
                E. Niemelae and   
                 H. Perunka and   
                  T. Korpipaeae   A Software Bus as a Platform for a
                                  Family of Distributed Embedded System
                                  Products . . . . . . . . . . . . . . . . 14
                 Peter Kolb and   
                     Beat Huber   A Three-Tier Design Approach for a
                                  Family of Large AC Drive Control Systems 24
           Christopher Ganz and   
                  Michael Layes   Modular Turbine Control Software: A
                                  Control Software Architecture for the
                                  ABB Gas Turbine Family . . . . . . . . . 32--38
                      A. Roesel   Experiences with the Evolution of an
                                  Application Family Architecture  . . . . 39
             Andreas Rösel   Experiences with the Evolution of an
                                  Application Family Architecture  . . . . 39
           Dewayne E. Perry and   
                    Jeff Kramer   Session 2: Architectural Description . . 49
               Dewayne E. Perry   Generic Architecture Descriptions for
                                  Product Lines  . . . . . . . . . . . . . 51
                  Nat Pryce and   
                    Steve Crane   A Model of Interaction in Concurrent and
                                  Distributed Systems  . . . . . . . . . . 57
        Peter van den Hamer and   
       Frank van der Linden and   
            Alison Saunders and   
                 Henk te Sligte   An Integral Hierarchy and Diversity
                                  Model for Describing Product Family
                                  Architectures  . . . . . . . . . . . . . 66
            P. Van De Hamer and   
       F. J. Van Der Linden and   
                A. Saunders and   
                   H. Te Sligte   An Integral Hierarchy and Diversity
                                  Model for Describing Product Family
                                  Architecture . . . . . . . . . . . . . . 66
        Peter van den Hamer and   
       Frank van der Linden and   
            Alison Saunders and   
                 Henk te Sligte   An Integral Hierarchy and Diversity
                                  Model for Describing Product Family
                                  Architectures  . . . . . . . . . . . . . 66
               Rob van Ommering   Koala, a Component Model for Consumer
                                  Electronics Product Software . . . . . . 76
               Rob van Ommering   Koala, a Component Model for Consumer
                                  Electronics Product Software . . . . . . 76
           Jean-Marc DeBaud and   
                 Mehdi Jazayeri   Session 3: Architecture Recovery . . . . 87
      Wolfgang Eixelsberger and   
              Manfred Kalan and   
             Michaela Ogris and   
        Håkon Beckman and   
              Berndt Bellay and   
                    Harald Gall   Recovery of Architectural Structure: A
                                  Case Study . . . . . . . . . . . . . . . 89
                Roland Knor and   
            Georg Trausmuth and   
                 Johannes Weidl   Reengineering C/C++ Source Code by
                                  Transforming State Machines  . . . . . . 97
   Nabor C. Mendonça and   
                    Jeff Kramer   An Experiment in Distributed Software
                                  Architecture Recovery  . . . . . . . . . 106
              Berndt Bellay and   
                    Harald Gall   Reverse Engineering to Recover and
                                  Describe a System's Architecture . . . . 115
           Nelson Weiderman and   
                John Bergey and   
               Dennis Smith and   
                   Scott Tilley   Can Legacy Systems Beget Product Lines?  123--131
           Jean-Marc DeBaud and   
    Jean-François Girard   The Relation Between the Product Line
                                  Development Entry Points and
                                  Reengineering  . . . . . . . . . . . . . 132
           Paul C. Clements and   
      Juan Antonio de la Puente   Session 4: Analysis of Software
                                  Architectures  . . . . . . . . . . . . . 140
            Richard T. Bechtold   Diagnostic Software Architectures  . . . 143
      Juan C. Dueñas and   
     William L. de Oliveira and   
           Juan A. de la Puente   A Software Architecture Evaluation Model 148
                  Robert Balzer   An Architectural Infrastructure for
                                  Product Families . . . . . . . . . . . . 158
           Alejandro Alonso and   
Marisol García-Valls and   
           Juan A. de la Puente   Assessment of Timing Properties of
                                  Family Products  . . . . . . . . . . . . 161
             David M. Weiss and   
        Frank J. van der Linden   Session 5: Development Process . . . . . 170
                  Tom Dolan and   
             Ruud Weterings and   
                 J. C. Wortmann   Stakeholders in Software-System Family
                                  Architectures  . . . . . . . . . . . . . 172
             Chye Cheong Yu and   
       Ananda L. Akkihebbal and   
                  Stan Jarzabek   Handling Variant Requirements in
                                  Software Architectures for Product
                                  Families . . . . . . . . . . . . . . . . 188
                Lothar Baum and   
                 Lars Geyer and   
               Georg Molter and   
          Steffen Rothkugel and   
                    Peter Sturm   Architecture-Centric Software
                                  Development Based on Extended Design
                                  Spaces . . . . . . . . . . . . . . . . . 197
             Jacques Meekel and   
           Thomas B. Horton and   
                Charlie Mellone   Architecting for Domain Variability  . . 205
                 David M. Weiss   Commonality Analysis: A Systematic
                                  Process for Defining Families  . . . . . 214
             Anssi Karhinen and   
                   Juha Kuusela   Structuring Design Decisions for
                                  Evolution  . . . . . . . . . . . . . . . 223
            William L. Scherlis   Structural Views, Structural Evolution,
                                  and Product Families . . . . . . . . . . 235
             Jeroen Brouwer and   
                Ad Jurriens and   
            Henk van Kessel and   
                 Alef Schippers   Product Family and Reuse in Separate
                                  Market Driven Profit Centers . . . . . . 241
              Sergio Bandinelli   ERW'97 Session Report: Reuse Adoption
                                  Experiences Across a Large Corporation   249
                      Anonymous   Author Index . . . . . . . . . . . . . . 257


Lecture Notes in Computer Science
Volume 1430, 1998

                  D. Karali and   
              F. Karayannis and   
                K. Berdekas and   
                      J. Reilly   QoS Based Multi-domain Routing in Public
                                  Broadband Networks . . . . . . . . . . . 3
               M. E. Anagnostou   Optimal Distribution of Service
                                  Components . . . . . . . . . . . . . . . 17
                  G. De Zen and   
            M. A. Marsiglia and   
                 G. Ricagni and   
                     L. Vezzoli   Accountable and Guaranteed Services in
                                  Internet . . . . . . . . . . . . . . . . 31
                   F. Lodge and   
                 D. Botvich and   
                      T. Curran   A Fair Intelligent Network Congestion
                                  Control Strategy Based on Revenue
                                  Optimisation . . . . . . . . . . . . . . 43
                C. M. Acuna and   
                   J. Sassi and   
                R. Salminen and   
                      A. Casaca   ATM Services Usage Metering for
                                  Accounting and Charging  . . . . . . . . 61
                 F. Nesbitt and   
                T. Counihan and   
                      J. Hickie   The EURESCOM P610 Project: Providing a
                                  Framework, Architecture and Methodology
                                  for Multimedia Service Management  . . . 73
                   T. Tiropanis   Offering Role Mobility in a TINA
                                  Environment  . . . . . . . . . . . . . . 89
                   N. Lynch and   
                      K. Hyland   Web Enabled TMN Manager for an
                                  International Trouble Ticketing Service  101
                    D. Kerr and   
              D. O'Sullivan and   
                   R. Evans and   
                  R. Richardson   Experiences Using Intelligent Agent
                                  Technologies as a Unifying Approach to
                                  Network Management, Service Management
                                  and Service Delivery . . . . . . . . . . 115
                  S. Corley and   
               M. Tesselaar and   
                  J. Cooley and   
                   J. Meinkoehn   The Application of Intelligent and
                                  Mobile Agents to Network and Service
                                  Management . . . . . . . . . . . . . . . 127
              B. W. Bjanger and   
                     A. Solhaug   ATM Network Management with Distributed
                                  Transactional Agents . . . . . . . . . . 139
             C. Stephanidis and   
              A. Paramythis and   
                M. Sfyrakis and   
                    A. Stergiou   Adaptable and Adaptive User Interfaces
                                  for Disabled Users in the AVANTI Project 153
               T. C. Jepsen and   
                       Z. Zhang   An ATM API for Java  . . . . . . . . . . 167
                   D. Lewis and   
                   T. Tiropanis   Integrating TINA into an Internet-Based
                                  Services Market  . . . . . . . . . . . . 183
                    J. Hall and   
                    M. Best and   
                   R. Ferry and   
                     S. Fratini   Protocol Independent Information
                                  Modelling for a Peer-to-Peer
                                  Configuration Interface  . . . . . . . . 193
               P. Hellemans and   
                 M. Mampaey and   
          H. Vanderstraeten and   
                    H. Zandbelt   Development and Deployment of a
                                  Heterogeneous Set of Services
                                  Challenging a TINA-Based
                                  Telecommunication Architecture . . . . . 205
               J. C. Garcia and   
                   P. F. Hansen   Federation in TINA . . . . . . . . . . . 219
                    B. Wind and   
               M. Samarotto and   
                 P. Nicosia and   
                     M. Lambrou   Enhancing the TINA Architectural
                                  Framework for Personal Mobility Support  233
                 W. T. Gray and   
                      J. Nelson   The Role of Paging in Providing Location
                                  Transparency within Cellular Systems . . 249
             K. Raatikainen and   
                    A. Dede and   
                   O. Koskimies   Internet Browsing on OSAM Platform . . . 261
                 M. Breugst and   
                    T. Magedanz   On the Usage of Standard Mobile Agent
                                  Platforms in Telecommunication
                                  Environments . . . . . . . . . . . . . . 275
              J.-B. Stefani and   
                  B. Dumant and   
               F. Dang Tran and   
                        F. Horn   The RETINA DPE Kernel: A Flexible,
                                  Real-Time ORB Framework  . . . . . . . . 287
                    D. Ranc and   
         I. P. Van der Bijl and   
                    S. Sedillot   Use of Transactions in Network
                                  Management Applications  . . . . . . . . 297
                  R. Strens and   
                  M. Martin and   
                  J. Dobson and   
                   S. Plagemann   Business and Market Models of Brokerage
                                  in Network-Based Commerce  . . . . . . . 315
              A. Healstroem and   
                 J. Sallros and   
                  S. Martin and   
                       R. Smith   Dynamic Market Driven Provisioning of
                                  Services and Resources Using Software
                                  Agents and Electronic Chambers of
                                  Commerce . . . . . . . . . . . . . . . . 327
              J. I. Asensio and   
             V. A. Villagra and   
               J. I. Moreno and   
                    J. Berrocal   An Approach to Electronic Brokerage in
                                  TINA Environments  . . . . . . . . . . . 339
                   R. Marti and   
                     J. Delgado   Definition of Service Levels for
                                  Electronic Brokerage Applications  . . . 351
                   G. Carls and   
                   B. Frohnhoff   Introducing SDL '92 in the Development
                                  of TMN Applications  . . . . . . . . . . 365
                  F. Lucidi and   
                 H. Idzenga and   
                  S. Batistatos   Development of TINA-like Systems: The
                                  DOLMEN Methodology . . . . . . . . . . . 379
          L. Schieferdecker and   
                      M. Li and   
                    A. Hoffmann   Conformance Testing of TINA Service
                                  Components --- The TTCN/CORBA Gateway    393
               S. Efremidis and   
             D. Prevedourou and   
                L. Demounem and   
                     K. Milsted   TINA-oriented Service Engineering
                                  Support to Service Composition and
                                  Federation . . . . . . . . . . . . . . . 409
                  J. Reilly and   
                       M. Abate   Scheduled Connections: Managing Temporal
                                  Constraints on Broadband Network
                                  Resources  . . . . . . . . . . . . . . . 425
                       T. Lindh   Performance Management in Switched ATM
                                  Networks . . . . . . . . . . . . . . . . 439
                  T. Tanaka and   
                   S. Chida and   
                Y. Tsuchiya and   
                     T. Ikegawa   An SNMP-based CNM Agent for ATM
                                  Networks: System Architecture and
                                  Implementation . . . . . . . . . . . . . 451
                 H. A. Berg and   
                     S. Brennan   CORBA and Intelligent Network (IN)
                                  Interworking . . . . . . . . . . . . . . 463
               S. Rasmussen and   
                     C. Baeumer   A CORBA to CMIP Gateway: A Marriage of
                                  Management Technologies  . . . . . . . . 477
             J.-M. Reynders and   
                  G. Bilsen and   
            F. Vandermeulen and   
                        T. Mota   TINA-TMN Interworking: Case Study of an
                                  Integration between the VITAL TINA
                                  Platform and an Existing TMN Platform    493
                       A. Weber   See What You Sign: Secure
                                  Implementations of Digital Signatures    509
                  J. Oelnes and   
                 M. Verdier and   
                 N. Ganivet and   
                     D. Maillot   Public Key Infrastructure and
                                  Certification Policy for Inter-domain
                                  Management . . . . . . . . . . . . . . . 521
               K. M. Martin and   
                 B. Preneel and   
             C. J. Mitchell and   
                     H. J. Hitz   Secure Billing for Mobile Information
                                  Services in UMTS . . . . . . . . . . . . 535


Lecture Notes in Computer Science
Volume 1431, 1998

               Yair Frankel and   
                      Moti Yung   Distributed Public Key Cryptosystems . . 1
  Jean-François Misarsky   How (Not) to Design RSA Signature
                                  Schemes  . . . . . . . . . . . . . . . . 14
            Kiyomichi Araki and   
             Takakazu Satoh and   
                   Shinji Miura   Overview of Elliptic Curve Cryptography  29
                  Jacques Stern   Lattices and Cryptography: An Overview   50
                   Feng Bao and   
                 Robert H. Deng   A signcryption scheme with signature
                                  directly verifiable by public key  . . . 55
                      Wenbo Mao   Guaranteed correct sharing of integer
                                  factorization with off-line shareholders 60
           Tatsuaki Okamoto and   
                      Moti Yung   Lower Bounds on Term-Based Divisible
                                  Cash Systems . . . . . . . . . . . . . . 72
                Ilari Lehti and   
                 Pekka Nikander   Certifying Trust . . . . . . . . . . . . 83
            Johannes Merkle and   
                 Ralph Werchner   On the Security of Server-Aided RSA
                                  Protocols  . . . . . . . . . . . . . . . 99
           Yiannis Tsiounis and   
                      Moti Yung   On the security of ElGamal-based
                                  encryption . . . . . . . . . . . . . . . 117
            Shouichi Hirose and   
                 Susumu Yoshida   An authenticated Diffie--Hellman key
                                  agreement protocol secure against active
                                  attacks  . . . . . . . . . . . . . . . . 135
          Shahrokh Saeednia and   
               Rei Safavi-Naini   On the security of Girault's
                                  identification scheme  . . . . . . . . . 149
            Chin-Chen Chang and   
               Jyh-Jong Leu and   
            Pai-Cheng Huang and   
                    Wei-Bin Lee   A scheme for obtaining a message from
                                  the digital multisignature . . . . . . . 154
             Yasuyuki Sakai and   
            Kouichi Sakurai and   
              Hirokazu Ishizuka   Secure hyperelliptic cryptosystems and
                                  their performance  . . . . . . . . . . . 164
            Toshio Hasegawa and   
             Junko Nakajima and   
                 Mitsuru Matsui   A practical implementation of elliptic
                                  curve cryptosystems over $ {\rm GF}(p) $
                                  on a 16-bit microcomputer  . . . . . . . 182
             Jung Hee Cheon and   
                Sungmo Park and   
               Sangwoo Park and   
                      Daeho Kim   Two efficient algorithms for arithmetic
                                  of elliptic curves using Frobenius map   195
               Akihiro Yamamura   Public-Key Cryptosystems Using the
                                  Modular Group  . . . . . . . . . . . . . 203
         Miodrag Mihaljevic and   
              Yuliang Zheng and   
                    Hideki Imai   A cellular automaton based fast one-way
                                  hash function suitable for hardware
                                  implementation . . . . . . . . . . . . . 217
               Sang Uk Shin and   
           Kyung Hyune Rhee and   
               Dae Hyun Ryu and   
                   Sang Jin Lee   A new hash function based on MDx-family
                                  and its application to MAC . . . . . . . 234
           Michael W. David and   
                Kouichi Sakurai   Security Issues for Contactless Smart
                                  Cards  . . . . . . . . . . . . . . . . . 247
                Tetsuya Izu and   
                 Jun Kogure and   
              Masayuki Noro and   
              Kazuhiro Yokoyama   Parameters for secure elliptic curve
                                  cryptosystem --- improvements on
                                  Schoof's algorithm . . . . . . . . . . . 253
             Masahiro Mambo and   
                 Hiroki Shizuya   A note on the complexity of breaking
                                  Okamoto-Tanaka ID-based key exchange
                                  scheme . . . . . . . . . . . . . . . . . 258
                      Anonymous   Author Index . . . . . . . . . . . . . . 263


Lecture Notes in Computer Science
Volume 1432, 1998

                 A. V. Goldberg   Recent Developments in Maximum Flow
                                  Algorithms (Invited Lecture) . . . . . . 1
             L. Aleksandrov and   
                M. Lanthier and   
              A. Maheshwari and   
                     J.-R. Sack   An --- Approximation Algorithm for
                                  Weighted Shortest Paths on Polyhedral
                                  Surfaces . . . . . . . . . . . . . . . . 11
                  R. Bhatia and   
                    S. Guha and   
                 S. Khuller and   
                 Y. J. Sussmann   Facility Location with Dynamic Distance
                                  Functions  . . . . . . . . . . . . . . . 23
                      K. Jansen   An Approximation Scheme for Bin Packing
                                  with Conflicts . . . . . . . . . . . . . 35
                 B. Aspvall and   
          M. M. Halldorsson and   
                       F. Manne   Approximations for the General Block
                                  Distribution of a Matrix . . . . . . . . 47
                    T. Graf and   
                K. Veezhinathan   An Optimal Algorithm for Computing
                                  Visible Nearest Foreign Neighbors Among
                                  Colored Line Segments  . . . . . . . . . 59
                F. Hoffmann and   
                  C. Icking and   
                   R. Klein and   
                     K. Kriegel   Moving an Angle Around a Region  . . . . 71
                 M. De Berg and   
                 M. J. Katz and   
                M. Overmars and   
          A. F. Van Der Stappen   Models and Motion Planning . . . . . . . 83
                 M. J. Katz and   
                   K. Kedem and   
                       M. Segal   Constrained Square-Center Problems . . . 95
               G. S. Brodal and   
                  J. Katajainen   Worst-Case Efficient External-Memory
                                  Priority Queues  . . . . . . . . . . . . 107
                  H. Kaplan and   
                 C. Okasaki and   
                   R. E. Tarjan   Simple Confluently Persistent Catenable
                                  Lists  . . . . . . . . . . . . . . . . . 119
                   V. Raman and   
                     S. RamNath   Improved Upper Bounds for Time-Space
                                  Tradeoffs for Selection with Limited
                                  Storage  . . . . . . . . . . . . . . . . 131
                 R. Sridhar and   
               K. Rajasekar and   
                   C. P. Rangan   Probabilistic Data Structures for
                                  Priority Queues  . . . . . . . . . . . . 143
                   D. Zuckerman   Extractors for Weak Random Sources and
                                  Their Applications (Invited Lecture) . . 155
               G. S. Brodal and   
                  M. C. Pinotti   Comparator Networks for Binary Heap
                                  Construction . . . . . . . . . . . . . . 158
                 D. Z. Chen and   
                          J. Xu   Two-Variable Linear Programming in
                                  Parallel . . . . . . . . . . . . . . . . 169
                  R. Grossi and   
           A. Pietracaprina and   
                       G. Pucci   Optimal Deterministic Protocols for
                                  Mobile Robots on a Grid  . . . . . . . . 181
                G. De Marco and   
                 L. Gargano and   
                     U. Vaccaro   Concurrent Multicast in Weighted
                                  Networks . . . . . . . . . . . . . . . . 193
                     J. Haastad   Some Recent Strong Inapproximability
                                  Results (Invited Lecture)  . . . . . . . 205
                    E. Dahlhaus   Minimal Elimination of Planar Graphs . . 210
                 B. Aspvall and   
    A. J. A. Proskurowski Telle   Memory Requirements for Table
                                  Computations in Partial $k$-tree
                                  Algorithms . . . . . . . . . . . . . . . 222
                 C. Barrett and   
                   R. Jacob and   
                     M. Marathe   Formal Language Constrained Path
                                  Problems . . . . . . . . . . . . . . . . 234
                   E. A. Hirsch   Local Search Algorithms for SAT:
                                  Worst-Case Analysis  . . . . . . . . . . 246
                  P. Berman and   
                    C. Coulston   Speed Is More Powerful than Clairvoyance 255
                   S. S. Seiden   Randomized Online Multi-threaded Paging  264
                 M. Mahajan and   
                       V. Vinay   Determinant: Old Algorithms, New
                                  Insights . . . . . . . . . . . . . . . . 276
                   J. F. Sibeyn   Solving Fundamental Problems on
                                  Sparse-Meshes  . . . . . . . . . . . . . 288
                     N. Sleumer   Output-Sensitive Cell Enumeration in
                                  Hyperplane Arrangements  . . . . . . . . 300
                      H.-M Will   Fast and Efficient Computation of
                                  Additively Weighted Voronoi Cells for
                                  Applications in Molecular Biology  . . . 310
                  B. Aronov and   
                  A. Eftrat and   
                D. Halperin and   
                      M. Sharir   On the Number of Regular Vertices of the
                                  Union of Jordan Regions  . . . . . . . . 322
                     S. Sen and   
                       N. Gupta   Distribution-Sensitive Algorithms  . . . 335


Lecture Notes in Computer Science
Volume 1433, 1998

              Kevin J. Lang and   
       Barak A. Pearlmutter and   
                Rodney A. Price   Results of the Abbadingo One DFA
                                  Learning Competition and a New
                                  Evidence-Driven State Merging Algorithm  1
           Peter Rossmanith and   
                Thomas Zeugmann   Learning $k$-Variable Pattern Languages
                                  Efficiently Stochastically Finite on
                                  Average from Positive Data . . . . . . . 13
               Isabelle Tellier   Meaning Helps Learning Syntax  . . . . . 25
              Rajesh Parekh and   
            Codrin Nichitiu and   
                 Vasant Honavar   A Polynomial Time Incremental Algorithm
                                  for Learning DFA . . . . . . . . . . . . 37
             José Oncina   The Data Driven Approach Applied to the
                                  OSTIA Algorithm  . . . . . . . . . . . . 50
                   Vlado Keselj   Grammar Model and Grammar Induction in
                                  the System NL PAGE . . . . . . . . . . . 57
            Antonio Castellanos   Approximate Learning of Random
                                  Subsequential Transducers  . . . . . . . 67
            Colin de la Higuera   Learning Stochastic Finite Automata from
                                  Experts  . . . . . . . . . . . . . . . . 79
            Colin de la Higuera   Learning Stochastic Finite Automata from
                                  Experts  . . . . . . . . . . . . . . . . 79
               Laura Firoiu and   
                  Tim Oates and   
                  Paul R. Cohen   Learning a Deterministic Finite
                                  Automaton with a Recurrent Neural
                                  Network  . . . . . . . . . . . . . . . . 90--101
        Jacques Chodorowski and   
                 Laurent Miclet   Applying Grammatical Inference in
                                  Learning a Language Model for Oral
                                  Dialogue . . . . . . . . . . . . . . . . 102
              Jerome A. Feldman   Real Language Learning . . . . . . . . . 114
       Hugues Juillé and   
              Jordan B. Pollack   A Stochastic Search Approach to Grammar
                                  Induction  . . . . . . . . . . . . . . . 126
          David Picó and   
                  Enrique Vidal   Transducer-Learning Experiments on
                                  Language Understanding . . . . . . . . . 138
           José Ruiz and   
     Salvador España and   
            Pedro García   Locally Threshold Testable Languages in
                                  Strict Sense: Application to the
                                  Inference Problem  . . . . . . . . . . . 150
     José M. Sempere and   
                    G. Nagaraja   Learning a Subclass of Linear Languages
                                  from Positive Structural Information . . 162
         Alexander S. Saidi and   
                Souad Tayeb-bey   Grammatical Inference in Document
                                  Recognition  . . . . . . . . . . . . . . 175
         Rafael C. Carrasco and   
                Jose Oncina and   
                   Jorge Calera   Stochastic Inference of Regular Tree
                                  Languages  . . . . . . . . . . . . . . . 187
      François Coste and   
                Jacques Nicolas   How Considering Incompatible State
                                  Mergings May Reduce the DFA Induction
                                  Search Tree  . . . . . . . . . . . . . . 199
Pedro P. Cruz-Alcázar and   
             Enrique Vidal-Ruiz   Learning Regular Grammars to Model
                                  Musical Style: Comparing Different
                                  Coding Schemes . . . . . . . . . . . . . 211
              J. D. Emerald and   
          K. G. Subramanian and   
                   D. G. Thomas   Learning a Subclass of Context-Free
                                  Languages  . . . . . . . . . . . . . . . 223
              Pierre Dupont and   
                      Lin Chase   Using Symbol Clustering to Improve
                                  Probabilistic Automaton Inference  . . . 232
               Peter Viechnicki   A Performance Evaluation of Automatic
                                  Survey Classifiers . . . . . . . . . . . 244
             Alvis Br\=azma and   
              Inge Jonassen and   
                  Jaak Vilo and   
                   Esko Ukkonen   Pattern Discovery in Biosequences  . . . 257--270
                  A. Brazma and   
                I. Jonassen and   
                    J. Vilo and   
                     E. Ukkonen   Pattern Discovery in Biosequences  . . . 257
                      Anonymous   Author Index . . . . . . . . . . . . . . 271


Lecture Notes in Computer Science
Volume 1434, 1998

               Won-Sook Lee and   
                  Elwin Lee and   
        Nadia Magnenat Thalmann   Real Face Communication in a Virtual
                                  World  . . . . . . . . . . . . . . . . . 1
               Amaury Aubel and   
               Ronan Boulic and   
                Daniel Thalmann   Animated Impostors for Real-Time Display
                                  of Numerous Virtual Humans . . . . . . . 14
               Didier Verna and   
                 Alain Grumbach   Can We Define Virtual Reality? The M$_R$
                                  IC Model . . . . . . . . . . . . . . . . 29
            Matthew D. Ryan and   
                Paul M. Sharkey   Distortion in Distributed Virtual
                                  Environments . . . . . . . . . . . . . . 42
             John F. Richardson   VRML Based Behaviour Database Editor . . 49
     Sudhanshu Kumar Semwal and   
                       Jun Ohya   The Scan&Track Virtual Environment  . . . 63
                Chisato Numaoka   CyberGlass: Vision-Based VRML2 Navigator 81
                   Thomas Flaig   Work Task Analysis and Selection of
                                  Interaction Devices in Virtual
                                  Environments . . . . . . . . . . . . . . 88
               Paul Richard and   
            Philippe Hareux and   
           Philippe Coiffet and   
                 Grigore Burdea   Effect of Stereoscopic Viewing on Human
                                  Tracking Performance in Dynamic Virtual
                                  Environments . . . . . . . . . . . . . . 97
             Ryohei Nakatsu and   
                 Naoko Tosa and   
                   Takeshi Ochi   Interactive Movie: A Virtual World with
                                  Narratives . . . . . . . . . . . . . . . 107
            Jong-Il I. Park and   
                    Seiki Inoue   Real-Image-Based Virtual Studio  . . . . 117
       Gianpaolo U. Carraro and   
             John T. Edmark and   
                J. Robert Ensor   Pop-Out Videos . . . . . . . . . . . . . 123
     Philippe Gérard and   
           Clifton Phillips and   
                    Ramesh Jain   Color Segmentation and Color Correction
                                  Using Lighting and White Balance Shifts  129
              Jeffrey Ventrella   Designing Emergence in Animated
                                  Artificial Life Worlds . . . . . . . . . 143
           Luigi Pagliarini and   
                Ariel Dolan and   
            Filippo Menczer and   
             Henrik Hautop Lund   ALife Meets Web: Lessons Learned . . . . 156--167
              Glenn Proctor and   
                   Chris Winter   Information Flocking: Data Visualisation
                                  in Virtual Worlds Using Emergent
                                  Behaviours . . . . . . . . . . . . . . . 168
                Bruce Damer and   
              Karen Marcelo and   
                     Frank Revi   Nerve Garden: A Public Terrarium in
                                  Cyberspace . . . . . . . . . . . . . . . 177
              Jean-Luc L. Tyran   A Two-Dimensional Virtual World to
                                  Explain the Genetic Code Structure ? . . 186
              Antony Robert and   
       Fabrice Chantemargue and   
              Mich\`ele Courant   Grounding Agents in EMud Artificial
                                  Worlds . . . . . . . . . . . . . . . . . 193
               David Servat and   
              Edith Perrier and   
         Jean-Pierre Treuil and   
                 Alexis Drogoul   Towards Virtual Experiment Laboratories:
                                  How Multi-Agent Simulations Can Cope
                                  with Multiple Scales of Analysis and
                                  Viewpoints . . . . . . . . . . . . . . . 205
             Claude Lattaud and   
                Cristina Cuenca   A Model for the Evolution of
                                  Environments . . . . . . . . . . . . . . 218
                 P. Reigner and   
                F. Harrouet and   
                  S. Morvan and   
                     J. Tisseau   AReVi: A Virtual Reality Multi-Agent
                                  Platform . . . . . . . . . . . . . . . . 229
                P. Reignier and   
                F. Harrouet and   
                  S. Morvan and   
                 J. Tisseau and   
                       T. Duval   ARéVi: A Virtual Reality Multiagent
                                  Platform . . . . . . . . . . . . . . . . 229
                Itsuki Noda and   
                      Ian Frank   Investigating the Complex with Virtual
                                  Soccer . . . . . . . . . . . . . . . . . 241
                 Olivier Michel   Webots: Symbiosis Between Virtual and
                                  Real Mobile Robots . . . . . . . . . . . 254
           Y. L. De Meneses and   
                      O. Michel   Vision Sensors on the Webots Simulator   264
Yuri López de Meneses and   
                 Olivier Michel   Vision Sensors on the Webots Simulator   264
          Guillaume Hutzler and   
            Bernard Gortais and   
                 Alexis Drogoul   Grounding Virtual Worlds in Reality  . . 274
Frédéric Kaplan and   
             Angus McIntyre and   
            Chisato Numaoka and   
                Silv\`ere Tajan   Growing Virtual Communities in $3$D
                                  Meeting Spaces . . . . . . . . . . . . . 286
     François Pachet and   
                Olivier Delerue   A Mixed $2$D/$3$D Interface for Music
                                  Spatialization . . . . . . . . . . . . . 298
           Claudia Cavallar and   
               Daniel Dögl   Organizing Information in $3$D . . . . . 308
                   D. Doegl and   
                    C. Cavallar   Organizing Information in $3$D . . . . . 308
                   Haruo Kimoto   Human Centered Virtual Interactive Image
                                  World for Image Retrieval  . . . . . . . 315
       Scot Thrane Refsland and   
                Takeo Ojika and   
                Tom Defanti and   
               Andy Johnson and   
                Jason Leigh and   
              Carl Loeffler and   
                    Xiaoyuan Tu   Virtual Great Barrier Reef: A
                                  Theoretical Approach Towards an
                                  Evolving, Interactive VR Environment
                                  Using a Distributed DOME and CAVE System 323
           Matthew Williams and   
           Damian Schofield and   
                    Bryan Denby   The Development of an Intelligent
                                  Haulage Truck Simulator for Improving
                                  the Safety of Operation in Surface Mines 337
             Vassilis Bourdakis   Navigation in Large VR Urban Models  . . 345
                 Olga Kisseleva   Art and Virtual Worlds . . . . . . . . . 357
               Hisham Bizri and   
             Andrew Johnson and   
            Christina Vasilakis   Las Meninas in VR: Storytelling and the
                                  Illusion in Art  . . . . . . . . . . . . 360
              Maria Roussos and   
                   Hisham Bizri   Mitologies: Medieval Labyrinth
                                  Narratives in Virtual Reality  . . . . . 373--383
              Vladimir Muzhesky   Aggregate Worlds: Virtual Architecture
                                  Aftermath  . . . . . . . . . . . . . . . 384
                   Lev Manovich   Zeuxis vs. Reality Engine: Digital
                                  Realism and Virtual Worlds . . . . . . . 394
              Raphael Hayem and   
     Tancrede Fourmaintraux and   
                Keran Petit and   
             Nicolas Rauber and   
                 Olga Kisseleva   Avatars: New Fields of Implication . . . 406


Lecture Notes in Computer Science
Volume 1435, 1998

            H. Van Dyke Parunak   What can Agents do in Industry, and Why?
                                  An Overview of Industrially-Oriented R&D
                                  at CEC . . . . . . . . . . . . . . . . . 1
                  Marian Nodine   The InfoSleuth Agent System  . . . . . . 19
        Vasilios S. Lazarou and   
                 Keith L. Clark   Agents for Hypermedia Information
                                  Discovery  . . . . . . . . . . . . . . . 21
          Alexandros Moukas and   
    Konstantinos Chandrinos and   
                    Pattie Maes   Trafficopter: A Distributed Collection
                                  System for Traffic Information . . . . . 33
           Dominik Deschner and   
             Oliver Hofmann and   
          Stefan Reinheimer and   
              Freimut Bodendorf   Agent-Supported Information Retrieval
                                  for Tracking and Tracing . . . . . . . . 44
           Edmund H. Durfee and   
               Tracy Mullen and   
                 Sunju Park and   
       José M. Vidal and   
                Peter Weinstein   The Dynamics of the UMDL Service Market
                                  Society  . . . . . . . . . . . . . . . . 55
           Michael N. Huhns and   
              Munindar P. Singh   Multiagent Systems in Information-Rich
                                  Environments . . . . . . . . . . . . . . 79
           Prasad Chalasani and   
                 Somesh Jha and   
                Onn Shehory and   
                Katia P. Sycara   Strategies for Querying Information
                                  Agents . . . . . . . . . . . . . . . . . 94
                   Takashi Kido   Grand Challenge Problems on Cross
                                  Cultural Communication --- Toward
                                  Socially Intelligent Agents  . . . . . . 108
                Tuomas Sandholm   Agents in Electronic Commerce: Component
                                  Technologies for Automated Negotiation
                                  and Coalition Formation  . . . . . . . . 113
          Robert H. Guttman and   
                    Pattie Maes   Cooperative vs. Competitive Multi-Agent
                                  Negotiations in Retail Electronic
                                  Commerce . . . . . . . . . . . . . . . . 135
             Hartmut Vogler and   
      Marie-Luise Moschgath and   
              Thomas Kunkelmann   Enhancing Mobile Agents with Electronic
                                  Commerce Capabilities  . . . . . . . . . 148
         Jeffrey O. Kephart and   
            James E. Hanson and   
            David W. Levine and   
         Benjamin N. Grosof and   
            Jakka Sairamesh and   
           Richard B. Segal and   
                 Steve R. White   Dynamics of an Information-Filtering
                                  Economy  . . . . . . . . . . . . . . . . 160
                Katia P. Sycara   Levels of Adaptivity in Systems of
                                  Coordinating Information Agents  . . . . 172
                     Sandip Sen   Adaptive Choice of Information Sources
                                  (Extended Abstract)  . . . . . . . . . . 190
                 Shaw Green and   
  Pádraig Cunningham and   
                  Fergal Somers   Agent Mediated Collaborative Web Page
                                  Filtering  . . . . . . . . . . . . . . . 195
            Joaquin Delgado and   
              Naohiro Ishii and   
                     Tomoki Ura   Content-Based Collaborative Information
                                  Filtering: Actively Learning to Classify
                                  and Recommend Documents  . . . . . . . . 206
         Wolfgang Theilmann and   
                 Kurt Rothermel   Domain Experts for Information Retrieval
                                  in the World Wide Web  . . . . . . . . . 216
              Wolfgang Benn and   
             Otmar Görlitz   Semantic Navigation Maps for Information
                                  Agents . . . . . . . . . . . . . . . . . 228
               Robert Tolksdorf   Coordination Patterns of Mobile
                                  Information Agents . . . . . . . . . . . 246
            Andreas Gehmeyr and   
    Jürgen Müller and   
               Albert Schappert   Mobile Information Agents on the Web . . 262
            Antonio Corradi and   
            Marco Cremonini and   
              Cesare Stefanelli   Melding Abstractions with Mobile Agents  278
           Piero A. Bonatti and   
                Sarit Kraus and   
               Jose Salinas and   
             V. S. Subrahmanian   Data-Security in Heterogeneous Agent
                                  Systems  . . . . . . . . . . . . . . . . 290


Lecture Notes in Computer Science
Volume 1436, 1998

                        D. Wood   WIA and Theory and Practice  . . . . . . 1
               M. A. Alonso and   
                 D. Cabrero and   
                     M. Vilares   Construction of Efficient Generalized LR
                                  Parsers  . . . . . . . . . . . . . . . . 7
                F. Bertault and   
                    G. Kucherov   Visualization of Dynamic Automata Using
                                  Padnon . . . . . . . . . . . . . . . . . 25
           J. A. Brzozowski and   
                   R. Negulescu   Automata of Asynchronous Behaviors . . . 29
                       P. Caron   LANGAGE: A Maple Package for Automaton
                                  Characterization of Regular Languages    46
                  M. Garzon and   
                     Y. Gao and   
                 J. A. Rose and   
                   R. C. Murphy   In Vitro Implementation of Finite-State
                                  Machines . . . . . . . . . . . . . . . . 56
                G. A. Kiraz and   
               E. Grimley-Evans   Multi-tape Automata for Speech and
                                  Language Systems: A Prolog
                                  Implementation . . . . . . . . . . . . . 87
                    V. Le Maout   Tools to Implement Automata, a First
                                  Step: ASTL . . . . . . . . . . . . . . . 104
                  H. Lescow and   
                       J. Voege   Minimal Separating Sets for Muller
                                  Automata . . . . . . . . . . . . . . . . 109
                  D. Maurel and   
                    L. Chauvier   Pseudo-minimal Transducers: A Transducer
                                  with Proper Elements . . . . . . . . . . 122
                   C. L. Miller   Towards a Meta-Normal Form Algorithm for
                                  Context-Free Grammars  . . . . . . . . . 133
                   M. Mohri and   
                 F. Pereira and   
                       M. Riley   A Rational Design for a Weighted
                                  Finite-State Transducer Library  . . . . 144
                    J.-L. Ponty   An Efficient Null-Free Procedure for
                                  Deciding Regular Language Membership . . 159
                       D. Revuz   Operations on Extended Automata  . . . . 171
                 K. Salomaa and   
                      X. Wu and   
                          S. Yu   Efficient Implementation of Regular
                                  Languages Using R-AFA  . . . . . . . . . 176
                 M. Silberztein   INTEX: An Integrated FST Toolbox . . . . 185
                 A. N. Trahtman   A Precise Estimation of the Order of
                                  Local Testability of a Deterministic
                                  Finite Automaton . . . . . . . . . . . . 198
                     Y. Velinov   Teaching Theory of Computation with Tape
                                  Machines . . . . . . . . . . . . . . . . 213
                   J. Voege and   
                 S. Ulbrand and   
                    O. Matz and   
                      N. Buhrke   The Automata Theory Package omega  . . . 228
                   B. W. Watson   Practical Optimizations for Automata . . 232
                       D. Ziadi   Sorting and Doubling Techniques for Set
                                  Partitioning and Automata Minimization
                                  Problems . . . . . . . . . . . . . . . . 241


Lecture Notes in Computer Science
Volume 1437, 1998

             Christian Frei and   
                   Boi Faltings   A Dynamic Hierarchy of Intelligent
                                  Agents for Network Management  . . . . . 1
               T. Lissajoux and   
                 V. Hilaire and   
                  A. Koukam and   
                    A. Caminada   Genetic Algorithms as Prototyping Tools
                                  for Multi-Agent Systems: Application to
                                  the Antenna Parameter Setting Problem    17
              Luis Bernardo and   
                    Paulo Pinto   Scalable Service Deployment on Highly
                                  Populated Networks . . . . . . . . . . . 29
         A. L. G. Hayzelden and   
                      J. Bigham   Heterogeneous Multi-Agent Architecture
                                  for ATM Virtual Path Network Resource
                                  Configuration  . . . . . . . . . . . . . 45
              Eric Bonabeau and   
             Florian Henaux and   
      Sylvain Guérin and   
           Dominique Snyers and   
              Pascale Kuntz and   
                  Guy Theraulaz   Routing in Telecommunications Networks
                                  with Ant-Like Agents . . . . . . . . . . 60
            Bernard Pagurek and   
                 Yanrong Li and   
          Andrzej Bieszczad and   
                   Gatot Susilo   Network Configuration Management in
                                  Heterogeneous ATM Environments . . . . . 72
          Andrzej Bieszczad and   
           Syed Kamran Raza and   
            Bernard Pagurek and   
                     Tony White   Agent-Based Schemes for Plug-And-Play
                                  Network Components . . . . . . . . . . . 89
               M. A. Gibney and   
                 N. R. Jennings   Dynamic Resource Allocation by
                                  Market-Based Routing in
                                  Telecommunications Networks  . . . . . . 102
             Stephen Corley and   
                Diego Magro and   
          Fabio Malabocchia and   
         Jens Meinköhn and   
             Luisella Sisto and   
             Sahin Albayrak and   
               Alexander Grosse   The Application of Intelligent and
                                  Mobile Agents to the Management of
                                  Software Problems in Telecommunications  118
                 Tony White and   
          Andrzej Bieszczad and   
                Bernard Pagurek   Distributed Fault Location in Networks
                                  Using Mobile Agents  . . . . . . . . . . 130
              Jan Nicklisch and   
        Jürgen Quittek and   
               Andreas Kind and   
                    Shinya Arao   INCA: An Agent-Based Network Control
                                  Architecture . . . . . . . . . . . . . . 142
                 Guy Davies and   
                  Love Ekenberg   Agent Metaphors for Analysing Telematic
                                  Services . . . . . . . . . . . . . . . . 156
         Suhayya Abu-Hakima and   
                Roger Impey and   
             Ramiro Liscano and   
                      Amir Zeid   A Multi-Agent Testbed and an Agent
                                  Launch Tool for Diverse Seamless
                                  Personal Information Networking
                                  Applications . . . . . . . . . . . . . . 171
                   A. Hooda and   
                A. Karmouch and   
                  S. Abu-Hakima   Agent Negotiation for Supporting
                                  Personal Mobility  . . . . . . . . . . . 190
           Francisco Garijo and   
                  Juan Tous and   
      José M. Matias and   
             Stephen Corley and   
               Marius Tesselaar   Development of a Multi-Agent System for
                                  Cooperative Work with Network
                                  Negotiation Capabilities . . . . . . . . 204
              Bruno Dillenseger   From Interoperability to Cooperation:
                                  Building Intelligent Agents on
                                  Middleware . . . . . . . . . . . . . . . 220
             Dirk Wieczorek and   
                 Sahin Albayrak   Open Scalable Agent Architecture for
                                  Telecommunication Applications . . . . . 233


Lecture Notes in Computer Science
Volume 1438, 1998

                    Per Kaijser   A Review of the SESAME Development . . . 1
                 S. Mueller and   
                  W. B. Mueller   The Security of Public Key Cryptosystems
                                  Based on Integer Factorization . . . . . 9
         Siguna Müller and   
        Winfried B. Müller   The Security of Public Key Cryptosystems
                                  Based on Integer Factorization . . . . . 9
                Paul Ashley and   
          Mark Vandenwauver and   
                  Bradley Broom   A Uniform Approach to Securing Unix
                                  Applications Using SESAME  . . . . . . . 24
                Rainer Falk and   
                 Markus Trommer   Integrated Management of Network and
                                  Host Based Security Mechanisms . . . . . 36
             Jeffrey Horton and   
               Jennifer Seberry   Covert Distributed Computing Using Java
                                  Through Web Spoofing . . . . . . . . . . 48
                     Xun Yi and   
               Kwok Yan Lam and   
                    Yongfei Han   Differential Cryptanalysis of a Block
                                  Cipher . . . . . . . . . . . . . . . . . 58
               Hung-Min Sun and   
               Shiuh-Pyng Shieh   On Private-Key Cryptosystems Based on
                                  Product Codes  . . . . . . . . . . . . . 68
                  G. Carter and   
                  E. Dawson and   
                     L. Nielsen   Key Schedules of Iterative Block Ciphers 80
             Uri Blumenthal and   
                 N. C. Hien and   
                   J. H. Rooney   Low-Cost Secure Server Connection with
                                  Limited-Privilege Clients  . . . . . . . 90
                      Qi He and   
               Katia Sycara and   
                    Zhongmin Su   A Solution to Open Standard of PKI . . . 99
                   E. Franz and   
                A. Graubner and   
                A. Jerichow and   
                   A. Pfitzmann   Comparison of Commitment Schemes Used in
                                  Mix-Mediated Anonymous Communication for
                                  Preventing Pool-Mode Attacks . . . . . . 111
            Jovan Dj. Golic and   
               Renato Menicocci   Correlation Attacks on Up/Down Cascades  123
                      Greg Rose   A Stream Cipher Based on Linear Feedback
                                  over \em GF$ (2^8) $ . . . . . . . . . . 135
                 L. Simpson and   
               J. Dj. Golic and   
                      E. Dawson   A Probabilistic Correlation Attack on
                                  the Shrinking Generator  . . . . . . . . 147
           Rei Safavi-Naini and   
                    Yejing Wang   Bounds and Constructions for A$^3$-code
                                  with Multi-senders . . . . . . . . . . . 159
             Josef Pieprzyk and   
                   Cheng Xin Qu   Rotation-Symmetric Functions and Fast
                                  Hashing  . . . . . . . . . . . . . . . . 169
                 William Millan   How to Improve the Nonlinearity of
                                  Bijective S-Boxes  . . . . . . . . . . . 181
             Rauli Kaksonen and   
        Petri Mähönen   Object Modeling of Cryptographic
                                  Algorithms with UML  . . . . . . . . . . 193
           Martin Manninger and   
               Robert Schischka   Adapting an Electronic Purse for
                                  Internet Payments  . . . . . . . . . . . 205
           Goichiro Hanaoka and   
              Yuliang Zheng and   
                    Hideki Imai   LITESET: A Light-Weight Secure
                                  Electronic Transaction Protocol  . . . . 215
                Marie Henderson   Applications of Linearised and
                                  Sub-linearised Polynomials to
                                  Information Security . . . . . . . . . . 227
                  Mark Chen and   
                    Eric Hughes   Protocol Failures Related to Order of
                                  Encryption and Signature: Computation of
                                  Discrete Logarithms in RSA Groups  . . . 238
                 W. W. Fung and   
                J. W. Gray, III   Protection Against EEPROM Modification
                                  Attacks  . . . . . . . . . . . . . . . . 250
                 Jaroslav Hruby   Trends in Quantum Cryptography in Czech
                                  Republic . . . . . . . . . . . . . . . . 261
                    Yun Bai and   
             Vijay Varadharajan   A High Level Language for Conventional
                                  Access Control Models  . . . . . . . . . 273
                    Tuomas Aura   Fast Access Control Decisions from
                                  Delegation Certificate Databases . . . . 284
           Thomas Riechmann and   
     Jürgen Kleinöder   Meta Objects for Access Control:
                                  Role-Based Principals  . . . . . . . . . 296
       Jonathon E. Tidswell and   
                 John M. Potter   A Dynamically Typed Access Control Model 308
          Shahrokh Saeednia and   
               Rei Safavi-Naini   Efficient Identity-Based Conference Key
                                  Distribution Protocols . . . . . . . . . 320
                Carsten Rudolph   A Formal Model for Systematic Design of
                                  Key Establishment Protocols  . . . . . . 332
                 Colin Boyd and   
                 Anish Mathuria   Key Establishment Protocols for Secure
                                  Mobile Communications: A Selective
                                  Survey . . . . . . . . . . . . . . . . . 344
   Tage Stabell-Kulò and   
                 Arne Helme and   
                  Gianluca Dini   Detecting Key-Dependencies . . . . . . . 356
           T. Stabell-Kuloe and   
                   A. Helme and   
                        G. Dini   Detecting Key-Dependencies . . . . . . . 356
            Hossein Ghodosi and   
             Josef Pieprzyk and   
               Rei Safavi-Naini   Secret Sharing in Multilevel and
                                  Compartmented Groups . . . . . . . . . . 367
            Hossein Ghodosi and   
             Josef Pieprzyk and   
           Rei Safavi-Naini and   
                  Huaxiong Wang   On Construction of Cumulative Secret
                                  Sharing Schemes  . . . . . . . . . . . . 379
                Yvo Desmedt and   
                 Brian King and   
           Wataru Kishimoto and   
                 Kaoru Kurosawa   A Comment on the Efficiency of Secret
                                  Sharing Scheme over any Finite Abelian
                                  Group  . . . . . . . . . . . . . . . . . 391
          Agus Fanar Syukri and   
               Eiji Okamoto and   
                 Masahiro Mambo   A User Identification System Using
                                  Signature Written with Mouse . . . . . . 403
               Narn-Yih Lee and   
             Tzonelih Hwang and   
                 Chih-Hung Wang   On Zhang's Nonrepudiable Proxy Signature
                                  Schemes  . . . . . . . . . . . . . . . . 415


Lecture Notes in Computer Science
Volume 1439, 1998

           Jens-Otto Larsen and   
                 Helge M. Roald   Introducing ClearCase as a Process
                                  Improvement Experiment . . . . . . . . . 1
              Tua Rahikkala and   
              Jorma Taramaa and   
       Antti Välimäki   Industrial Experiences from SCM Current
                                  State Analysis . . . . . . . . . . . . . 13
             Ivica Crnkovic and   
               Per Willför   Change Measurements in an SCM Process    26
             Josh MacDonald and   
          Paul N. Hilfinger and   
                Luigi Semenzato   PRCS: The Project Revision Control
                                  System . . . . . . . . . . . . . . . . . 33
          Makram Abu-Shakra and   
                 Gene L. Fisher   Multi-Grain Version Control in the
                                  Historian System . . . . . . . . . . . . 46
              Laura Wingerd and   
            Christopher Seiwald   High-Level Best Practices in Software
                                  Configuration Management . . . . . . . . 57
Henrik Bærbak Christensen   Experiences with Architectural Software
                                  Configuration Management in Ragnarok . . 67
            Jacky Estublier and   
           Jean-Marie Favre and   
                 Philippe Morat   Toward SCM / PDM Integration?  . . . . . 75
       Bernhard Westfechtel and   
                 Reidar Conradi   Software Configuration Management and
                                  Engineering Data Management: Differences
                                  and Similarities . . . . . . . . . . . . 95
           Görel Hedin and   
            Lennart Ohlsson and   
                   John McKenna   Product Configuration Using Object
                                  Oriented Grammars  . . . . . . . . . . . 107
                 Andreas Zeller   Versioning System Models Through
                                  Description Logic  . . . . . . . . . . . 127
              Peter Lindsay and   
                   Owen Traynor   Supporting Fine-Grained Traceability in
                                  Software Development Environments  . . . 133
  André van der Hoek and   
          Dennis Heimbigner and   
              Alexander L. Wolf   System Modeling Resurrected  . . . . . . 140
            A. Van der Hoek and   
              D. Heimbigner and   
                     A. L. Wolf   System Modeling Resurrected  . . . . . . 140
                David L. Atkins   Version Sensitive Editing: Change
                                  History as a Programming Tool  . . . . . 146
       Michael L. Van De Vanter   Coordinated Editing of Versioned
                                  Packages in the JP Programming
                                  Environment  . . . . . . . . . . . . . . 158
                Lars Bendix and   
         Per Nygaard Larsen and   
    Anders Ingemann Nielsen and   
Jesper Lai Sòndergaard Petersen   CoEd --- A Tool for Versioning of
                                  Hierarchical Documents . . . . . . . . . 174
Mária Bieliková and   
            Pavol Návrat   Modelling Versioned Hypertext Documents  188
            Richard S. Hall and   
          Dennis Heimbigner and   
              Alexander L. Wolf   Requirements for Software Deployment
                                  Languages and Schema . . . . . . . . . . 198
                     Susan Dart   The Agony and Ecstasy of Configuration
                                  Management . . . . . . . . . . . . . . . 204


Lecture Notes in Computer Science
Volume 1440, 1998

                      A. Gersho   Crypto '81 . . . . . . . . . . . . . . . 3--8
                        T. Beth   Eurocrypt '82  . . . . . . . . . . . . . 9--12
                   D. Chaum and   
               R. L. Rivest and   
                  A. T. Sherman   Crypto '82 . . . . . . . . . . . . . . . 13--20
                      Anonymous   Eurocrypt '83  . . . . . . . . . . . . . 21--21
                       D. Chaum   Crypto '83 . . . . . . . . . . . . . . . 23--28
                    T. Beth and   
                     N. Cot and   
                 I. Ingemarsson   Eurocrypt '84  . . . . . . . . . . . . . 29--34
              G. R. Blakley and   
                       D. Chaum   Crypto '84 . . . . . . . . . . . . . . . 35--40
                     F. Pichler   EUROCRYPT '85  . . . . . . . . . . . . . 41--48
                 H. C. Williams   Crypto '85 . . . . . . . . . . . . . . . 49--54
                 I. Ingemarsson   Eurocrypt '86  . . . . . . . . . . . . . 55--60
                  A. M. Odlyzko   Crypto '86 . . . . . . . . . . . . . . . 61--68
                   D. Chaum and   
                    W. L. Price   Eurocrypt '87  . . . . . . . . . . . . . 69--74
                   C. Pomerance   Crypto '87 . . . . . . . . . . . . . . . 75--80
                 C. G. Guenther   Eurocrypt '88  . . . . . . . . . . . . . 81--86
                  S. Goldwasser   Crypto '88 . . . . . . . . . . . . . . . 87--92
           J.-J. Quisquater and   
                  J. Vandewalle   Eurocrypt '89  . . . . . . . . . . . . . 93--100
                    G. Brassard   Crypto '89 . . . . . . . . . . . . . . . 101--110
                  I. B. Damgard   Eurocrypt '90  . . . . . . . . . . . . . 111--118
              A. J. Menezes and   
                 S. A. Vanstone   Crypto '90 . . . . . . . . . . . . . . . 119--126
                   D. W. Davies   Eurocrypt '91  . . . . . . . . . . . . . 127--134
                  J. Feigenbaum   Crypto '91 . . . . . . . . . . . . . . . 135--140
                  R. A. Rueppel   Eurocrypt '92  . . . . . . . . . . . . . 141--146
                 E. F. Brickell   Crypto '92 . . . . . . . . . . . . . . . 147--152
                   T. Helleseth   Eurocrypt '93  . . . . . . . . . . . . . 153--158
                  D. R. Stinson   Crypto '93 . . . . . . . . . . . . . . . 159--164
                   A. De Santis   Eurocrypt '94  . . . . . . . . . . . . . 165--172
                     Y. Desmedt   Crypto '94 . . . . . . . . . . . . . . . 173--180
              L. C. Guillou and   
               J.-J. Quisquater   Eurocrypt '95  . . . . . . . . . . . . . 181--190
                 D. Coppersmith   Crypto '95 . . . . . . . . . . . . . . . 191--198
                      U. Maurer   Eurocrypt '96  . . . . . . . . . . . . . 199--206
                     N. Koblitz   Crypto '96 . . . . . . . . . . . . . . . 207--214
                        W. Fumy   Eurocrypt '97  . . . . . . . . . . . . . 215--222
                     B. Kaliski   Crypto '97 . . . . . . . . . . . . . . . 223--232
                      Anonymous   List of Program Committees of the CRYPTO
                                  and EUROCRYPT Conferences 1981--1997 . . 233
                      Anonymous   Author Index of the CRYPTO and EUROCRYPT
                                  Conferences 1981--1997 . . . . . . . . . 238
                      Anonymous   Keyword Index of the CRYPTO and
                                  EUROCRYPT Conferences 1981--1997 . . . . 447
                      Anonymous   BiB\TeX File of the CRYPTO and EUROCRYPT
                                  Conferences 1981--1997 . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 1441, 1998

             Steven Shapiro and   
     Yves Lespérance and   
             Hector J. Levesque   Specifying Communicative Multi-Agent
                                  Systems (Invited Paper)  . . . . . . . . 1
         Michael Wooldridge and   
                Afsaneh Haddadi   Making It up as They Go along: A Theory
                                  of Reactive Cooperation (Invited Paper)  15
                   Wayne Wobcke   Agency and the Logic of Ability  . . . . 31
           Alessio Lomuscio and   
                      Mark Ryan   On the Relation between Interpreted
                                  Systems and Kripke Models  . . . . . . . 46
                Li-Yan Yuan and   
               Jia-Huai You and   
                   Randy Goebel   Disjunctive Logic Programming and
                                  Possible Model Semantics (Invited Paper) 60
           Kazumi Nakamatsu and   
                Atsuyuki Suzuki   A Non-monotonic ATMS Based on Annotated
                                  Logic Programs with Strong Negation  . . 79
                Greg Gibbon and   
                  Janet Aisbett   Switching between Reasoning and Search   94
                 Bernard Moulin   The Social Dimension of Interactions in
                                  Multiagent Systems . . . . . . . . . . . 109
          Timothy J. Norman and   
           Nicholas R. Jennings   Generating States of Joint Commitment
                                  between Autonomous Agents  . . . . . . . 123
            Sascha Ossowski and   
      Ana García-Serrano   Social Co-ordination among Autonomous
                                  Problem-Solving Agents . . . . . . . . . 134
              Chengqi Zhang and   
                     Yuefeng Li   An Algorithm for Plan Verification in
                                  Multiple Agent Systems . . . . . . . . . 149
               Hung Hai Bui and   
           Svetha Venkatesh and   
               Dorota Kieronska   A Framework for Coordination and
                                  Learning among Teams of Agents . . . . . 164
             Bengt Carlsson and   
               Stefan Johansson   An Iterated Hawk-and-Dove Game . . . . . 179
             Satoru Yoshida and   
           Nobuhiro Inuzuka and   
              Tin Tin Naing and   
              Hirohisa Seki and   
                  Hidenori Itoh   A Game-Theoretic Solution of Conflicts
                                  among Competitive Agents . . . . . . . . 193
              Chengqi Zhang and   
                     Xudong Luo   Transformation between the EMYCIN Model
                                  and the Bayesian Network . . . . . . . . 205
             Dong Mei Zhang and   
                 Leila Alem and   
                   Kalina Yacef   Using Multi-agent Approach for the
                                  Design of an Intelligent Learning
                                  Environment  . . . . . . . . . . . . . . 220
                   Minjie Zhang   A Case-Based Strategy for Solution
                                  Synthesis among Cooperative Expert
                                  Systems  . . . . . . . . . . . . . . . . 231


Lecture Notes in Computer Science
Volume 1442, 1998

                    A. Fiat and   
                G. J. Woeginger   Competitive Analysis of Algorithms . . . 1
                  S. Albers and   
                   J. Westbrook   Self-Organizing Data Structures  . . . . 13
                       S. Irani   Competitive Analysis of Paging . . . . . 52
                 M. Chrobak and   
                  L. L. Larmore   Metrical Task Systems, the Server
                                  Problem and the Work Function Algorithm  74
                      Y. Bartal   Distributed Paging . . . . . . . . . . . 97
                      J. Aspnes   Competitive Analysis of Distributed
                                  Algorithms . . . . . . . . . . . . . . . 118
                  J. Csirik and   
                G. J. Woeginger   On-line Packing and Covering Problems    147
                        Y. Azar   On-line Load Balancing . . . . . . . . . 178
                       J. Sgall   On-Line Scheduling . . . . . . . . . . . 196
                      P. Berman   On-line Searching and Navigation . . . . 232
                    S. Leonardi   On-line Network Routing  . . . . . . . . 242
         B. Kalyanasundaram and   
                       K. Pruhs   On-line Network Optimization Problems    268
                H. A. Kierstead   Coloring Graphs On-Line  . . . . . . . . 281
                        A. Blum   On-Line Algorithms in Machine Learning   306
                    R. El-Yaniv   Competitive Solutions for On-line
                                  Financial Problems . . . . . . . . . . . 326
                   A. R. Karlin   On the Performance of Competitive
                                  Algorithms in Practice . . . . . . . . . 373
                    A. Fiat and   
                G. J. Woeginger   Competitive Odds and Ends  . . . . . . . 385


Lecture Notes in Computer Science
Volume 1443, 1998

               Yonit Kesten and   
                Amir Pnueli and   
                    Li-on Raviv   Algorithmic Verification of Linear
                                  Temporal Logic Specifications  . . . . . 1
             Bernd Borchert and   
             Dietrich Kuske and   
                  Frank Stephan   On Existentially First-Order Definable
                                  Languages and Their Relation to NP . . . 17
Jean-François Raymond and   
              Pascal Tesson and   
           Denis Thérien   An Algebraic Approach to Communication
                                  Complexity . . . . . . . . . . . . . . . 29
                Rajeev Alur and   
               Ken McMillan and   
                    Doron Peled   Deciding Global Partial-Order Properties 41
                 Xinxin Liu and   
                Scott A. Smolka   Simple Linear-Time Algorithms for
                                  Minimal Fixed Points . . . . . . . . . . 53
             Thore Husfeldt and   
                    Theis Rauhe   Hardness Results for Dynamic Problems by
                                  Extensions of Fredman and Saks'
                                  Chronogram Method  . . . . . . . . . . . 67
                 Torben Hagerup   Simpler and Faster Dictionaries on the
                                  AC$^0$ RAM . . . . . . . . . . . . . . . 79
                      S. Lasota   Partial-Congruence Factorization of
                                  Bisimilarity Induced by Open Maps  . . . 91
                 C. Dufourd and   
                  A. Finkel and   
                Ph. Schnoebelen   Reset Nets Between Decidability and
                                  Undecidability . . . . . . . . . . . . . 103
               Mark H. Overmars   Geometric Algorithms for Robotic
                                  Manipulation . . . . . . . . . . . . . . 116
     Richie Chih-Nan Chuang and   
                 Ashim Garg and   
                     Xin He and   
              Ming-Yang Kao and   
                     Hsueh-I Lu   Compact Encodings of Planar Graphs via
                                  Canonical Orderings and Multiple
                                  Parentheses  . . . . . . . . . . . . . . 118
              Thorsten Graf and   
          Kamakoti Veezhinathan   Reducing Simple Polygons to Triangles
                                  --- A Proof for an Improved Conjecture   130
               Igor Walukiewicz   Difficult configurations --- on the
                                  complexity of LTrL . . . . . . . . . . . 140
           Bernard Boigelot and   
    Stéphane Rassart and   
                  Pierre Wolper   On the Expressiveness of Real and
                                  Integer Arithmetic Automata  . . . . . . 152
                    David Peleg   Distributed Matroid Basis Completion via
                                  Elimination Upcast and Distributed
                                  Correction of Minimum-Weight Spanning
                                  Trees  . . . . . . . . . . . . . . . . . 164
Magnús M. Halldórsson and   
      Jan Kratochvíl and   
                 Jan Arne Telle   Independent Sets with Domination
                                  Constraints  . . . . . . . . . . . . . . 176
            Madhavan Mukund and   
           K. Narayan Kumar and   
     Jaikumar Radhakrishnan and   
                  Milind Sohoni   Robust Asynchronous Protocols Are
                                  Finite-State . . . . . . . . . . . . . . 188
                Petr Jancar and   
      Antonín Kucera and   
                   Richard Mayr   Deciding Bisimulation-Like Equivalences
                                  with Finite-State Processes  . . . . . . 200
                  Avi Wigderson   Do Probabilistic Algorithms Outperform
                                  Deterministic Ones?  . . . . . . . . . . 212
                 Vince Grolmusz   A Degree-Decreasing Lemma for (MOD $q$,
                                  MOD $p$ ) Circuits . . . . . . . . . . . 215--222
                     Chi-Jen Lu   Improved Pseudorandom Generators for
                                  Combinatorial Rectangles . . . . . . . . 223
                  A. Pnueli and   
              O. Shtrichman and   
                      M. Siegel   Translation Validation for Synchronous
                                  Languages  . . . . . . . . . . . . . . . 235
           Vladimir A. Zakharov   An Efficient and Unified Approach to the
                                  Decidability of Equivalence of
                                  Propositional Programs . . . . . . . . . 247
               Stasys Jukna and   
           Stanislav Zák   On Branching Programs With Bounded
                                  Uncertainty  . . . . . . . . . . . . . . 259
          Amir M. Ben-Amram and   
                Holger Petersen   CONS-Free Programs with Tree Input . . . 271
               Paolo Baldan and   
           Andrea Corradini and   
                  Ugo Montanari   Concatenable Graph Processes: Relating
                                  Processes and Derivation Traces  . . . . 283
                F. Gadducci and   
                   U. Montanari   Axioms for Contextual Net Processes  . . 296
                Andrew M. Pitts   Existential Types: Logical Relations and
                                  Operational Equivalence  . . . . . . . . 309
    Conrado Martínez and   
                 Salvador Roura   Optimal Sampling Strategies in Quicksort 327
                Martin Dyer and   
            Catherine Greenhill   A Genuinely Polynomial-Time Algorithm
                                  for Sampling Two-Rowed Contingency
                                  Tables . . . . . . . . . . . . . . . . . 339
                 John Power and   
              Giuseppe Rosolini   A Modular Approach to Denotational
                                  Semantics  . . . . . . . . . . . . . . . 351
         Pasquale Malacaria and   
                   Chris Hankin   Generalised Flowcharts and Games . . . . 363
              Ming-Yang Kao and   
                       Jie Wang   Efficient Minimization of Numerical
                                  Summation Errors . . . . . . . . . . . . 375
            Cristina Bazgan and   
              Miklos Santha and   
                     Zsolt Tuza   Efficient Approximation Algorithms for
                                  the \sc Subset-\sc Sums Equality Problem 387--396
         Eduardo Giménez   Structural Recursive Definitions in Type
                                  Theory . . . . . . . . . . . . . . . . . 397
                      D. Lugiez   A Good Class of Tree Automata.
                                  Application to Inductive Theorem Proving 409
              J. Karhumaeki and   
                A. Lepistoe and   
                  W. Plandowski   Locally Periodic Infinite Words and a
                                  Chaotic Behaviour  . . . . . . . . . . . 421
      Juhani Karhumäki and   
          Arto Lepistö and   
            Wojciech Plandowski   Locally Periodic Infinite Words and a
                                  Chaotic Behaviour  . . . . . . . . . . . 421
           Jean-Éric Pin   Bridges for Concatenation Hierarchies    431
                         H. Lin   Complete Proof Systems for Observation
                                  Congruences in Finite-Control $ \pi
                                  $-Calculus . . . . . . . . . . . . . . . 443
          Björn Victor and   
                 Joachim Parrow   Concurrent Constraints in the Fusion
                                  Calculus . . . . . . . . . . . . . . . . 455
            Michele D'amico and   
           Giovanni Manzini and   
                Luciano Margara   On Computing the Entropy of Cellular
                                  Automata . . . . . . . . . . . . . . . . 470
          Adam L. Buchsbaum and   
         Raffaele Giancarlo and   
           Jeffery R. Westbrook   On the Determinization of Weighted
                                  Finite Automata  . . . . . . . . . . . . 482
                      A. Tiskin   Bulk-Synchronous Parallel Multiplication
                                  of Boolean Matrices  . . . . . . . . . . 494
         Hél\`ene Touzet   A Complex Example of a Simplifying
                                  Rewrite System . . . . . . . . . . . . . 507
    Paul-André Melli\`es   On a Duality Between Kruskal and
                                  Dershowitz Theorems  . . . . . . . . . . 518
              Daria Walukiewicz   A Total AC-Compatible Reduction Ordering
                                  on Higher-Order Terms  . . . . . . . . . 530
            Thomas A. Henzinger   Model Checking Game Properties of
                                  Multi-agent Systems  . . . . . . . . . . 543
                  Luisa Gargano   Limited Wavelength Conversion in
                                  All-Optical Tree Networks  . . . . . . . 544
            Shiva Chaudhuri and   
         K. V. Subrahmanyam and   
               Frank Wagner and   
         Christos D. Zaroliagis   Computing Mimicking Networks . . . . . . 556
             Christel Baier and   
        Joost-Pieter Katoen and   
                  Diego Latella   Metric Semantics for True Concurrent
                                  Real Time  . . . . . . . . . . . . . . . 568
            T. A. Henzinger and   
               J.-F. Raskin and   
                P.-Y. Schobbens   The Regular Real-Time Languages  . . . . 580
          Serafino Cicerone and   
        Gabriele Di Stefano and   
               Michele Flammini   Static and Dynamic Low-Congested
                                  Interval Routing Schemes . . . . . . . . 592
                  Doug Cook and   
                Vance Faber and   
             Madhav Marathe and   
         Aravind Srinivasan and   
              Yoram J. Sussmann   Low-Bandwidth Routing and Electrical
                                  Power Networks . . . . . . . . . . . . . 604
             Fritz Henglein and   
                    Jakob Rehof   Constraint Automata and the Complexity
                                  of Recursive Subtype Entailment  . . . . 616
                 Moshe Y. Vardi   Reasoning about the Past with Two-Way
                                  Automata . . . . . . . . . . . . . . . . 628
              Leslie G. Valiant   A Neuroidal Architecture for Cognitive
                                  Computation  . . . . . . . . . . . . . . 642
                David Peleg and   
                   Eilon Reshef   Deterministic Polylog Approximation for
                                  Minimum Communication Spanning Trees . . 670
               Artur Czumaj and   
                 Andrzej Lingas   A Polynomial Time Approximation Scheme
                                  for Euclidean Minimum Cost
                                  $k$-Connectivity . . . . . . . . . . . . 682
                   Peter Sewell   Global/Local Subtyping and Capability
                                  Inference for a Distributed $ \pi
                                  $-calculus . . . . . . . . . . . . . . . 695
                 Zhoujun Li and   
                   Huowang Chen   Checking Strong/Weak Bisimulation
                                  Equivalences and Observation Congruence
                                  for the $ \pi $-calculus . . . . . . . . 707
                 Dario Bini and   
        Gianna M. Del Corso and   
           Giovanni Manzini and   
                Luciano Margara   Inversion of Circulant Matrices over $
                                  {\bf Z}_m $  . . . . . . . . . . . . . . 719
        Wojciech Plandowski and   
                Wojciech Rytter   Application of Lempel--Ziv Encodings to
                                  the Solution of Word Equations . . . . . 731
                 Neil Ghani and   
           Valeria de Paiva and   
                    Eike Ritter   Explicit Substitutions for Constructive
                                  Necessity  . . . . . . . . . . . . . . . 743
                  Gilles Barthe   The Relevance of Proof-Irrelevance . . . 755
                Gilles Brassard   New Horizons in Quantum Information
                                  Processing . . . . . . . . . . . . . . . 769
         Ivan Damgård and   
               Birgit Pfitzmann   Sequential Iteration of Interactive
                                  Arguments and an Efficient
                                  Zero-Knowledge Argument for NP . . . . . 772
               A. De Santis and   
            G. Di Crescenzo and   
                G. Persiano and   
                        M. Yung   Image Density is Complete for
                                  Non-Interactive-SZK  . . . . . . . . . . 784
               A. De Santis and   
            G. Di Crescenzo and   
                G. Persiano and   
                        M. Yung   Image Density Is Complete for
                                  Non-interactive-SZK  . . . . . . . . . . 784
             Peter Hertling and   
                Klaus Weihrauch   Randomness Spaces  . . . . . . . . . . . 796
        Antonio Bucciarelli and   
                    Ivano Salvo   Totality, Definability and Boolean
                                  Circuits . . . . . . . . . . . . . . . . 808
            Gilles Brassard and   
         Peter Hòyer and   
                     Alain Tapp   Quantum Counting . . . . . . . . . . . . 820
             Tatsuya Akutsu and   
              Mutsunori Yagiura   On the Complexity of Deriving Score
                                  Functions from Examples for Problems in
                                  Molecular Biology  . . . . . . . . . . . 832
      Cédric Fournet and   
               Georges Gonthier   A Hierarchy of Equivalences for
                                  Asynchronous Calculi . . . . . . . . . . 844
              Massimo Merro and   
               Davide Sangiorgi   On Asynchrony in Name-Passing Calculi    856
                   Martin Abadi   Protection in Programming-Language
                                  Translations . . . . . . . . . . . . . . 868
            Holger Petersen and   
            John Michael Robson   Efficient Simulations by Queue Machines  884
                Pavol Duris and   
          Tomasz Jurdzinski and   
      Miros\law Kuty\lowski and   
                Krzysztof Lorys   Power of Cooperation and Multihead
                                  Finite Systems . . . . . . . . . . . . . 896
                  Olivier Danvy   A Simple Solution to Type Specialization 908
                 Walid Taha and   
   Zine-El-Abidine Benaissa and   
                     Tim Sheard   Multi-Stage Programming: Axiomatization
                                  and Type Safety  . . . . . . . . . . . . 918


Lecture Notes in Computer Science
Volume 1444, 1998

Magnús M. Halldórsson   Approximations of Independent Sets in
                                  Graphs . . . . . . . . . . . . . . . . . 1
                David B. Shmoys   Using linear programming in the design
                                  and analysis of approximation
                                  algorithms: Two illustrative problems    15
              Vijay V. Vazirani   The Steiner Tree Problem and Its
                                  Generalizations  . . . . . . . . . . . . 33
                 Yossi Azar and   
                   Leah Epstein   Approximation schemes for covering and
                                  scheduling on related machines . . . . . 39
              Reuven Bar-Yehuda   One for the price of two: A unified
                                  approach for approximating covering
                                  problems . . . . . . . . . . . . . . . . 49
             Christoph Baur and   
        Sándor P. Fekete   Approximation of Geometric Dispersion
                                  Problems (Extended Abstract) . . . . . . 63
            Joseph Cheriyan and   
        Tibor Jordán and   
                     Zeev Nutov   Approximating $k$-outconnected Subgraph
                                  Problems . . . . . . . . . . . . . . . . 77
                   Leah Epstein   Lower bounds for on-line scheduling with
                                  precedence constraints on identical
                                  machines . . . . . . . . . . . . . . . . 89
              Dorit S. Hochbaum   Instant recognition of half integrality
                                  and $2$-approximations . . . . . . . . . 99
              Dorit S. Hochbaum   The $t$-vertex cover problem: Extending
                                  the half integrality framework with
                                  budget constraints . . . . . . . . . . . 111
              Hans Kellerer and   
                Ulrich Pferschy   A new fully polynomial approximation
                                  scheme for the knapsack problem  . . . . 123
                   Guy Kortsarz   On the Hardness of Approximating
                                  Spanners . . . . . . . . . . . . . . . . 135
                    Vijay Kumar   Approximating circular arc colouring and
                                  bandwidth allocation in all-optical ring
                                  networks . . . . . . . . . . . . . . . . 147
               Ingo Schiermeyer   Approximating maximum independent set in
                                  $k$-clique-free graphs . . . . . . . . . 159
           Frits C. R. Spieksma   Approximating an Interval Scheduling
                                  Problem  . . . . . . . . . . . . . . . . 169
            Anand Srivastav and   
                     Katja Wolf   Finding dense subgraphs with
                                  semidefinite programming . . . . . . . . 181
            Maxim I. Sviridenko   Best possible approximation algorithm
                                  for MAX SAT with cardinality constraint  193
                      Anonymous   Author Index . . . . . . . . . . . . . . 201


Lecture Notes in Computer Science
Volume 1445, 1998

                 Danny B. Lange   Mobile Objects and Mobile Agents: The
                                  Future of Distributed Computing? . . . . 1
        Michael Christensen and   
              Andy Crabtree and   
       Christian Heide Damm and   
        Klaus Marius Hansen and   
        Ole Lehrmann Madsen and   
       Pernille Marqvardsen and   
            Preben Mogensen and   
              Elmer Sandvad and   
              Lennert Sloth and   
                Michael Thomsen   The M.A.D. Experience: Multiperspective
                                  Application Development in Evolutionary
                                  Prototyping  . . . . . . . . . . . . . . 13
              Elisa Bertino and   
              Elena Ferrari and   
          Giovanna Guerrini and   
                 Isabella Merlo   Extending the ODMG Object Model with
                                  Time . . . . . . . . . . . . . . . . . . 41
             Peter Fritzson and   
                 Vadim Engelson   Modelica --- A Unified Object-Oriented
                                  Language for System Modeling and
                                  Simulation . . . . . . . . . . . . . . . 67
      Shriram Krishnamurthi and   
         Matthias Felleisen and   
             Daniel P. Friedman   Synthesizing Object-Oriented and
                                  Functional Design to Promote Re-use  . . 91
             Anthony Lauder and   
                    Stuart Kent   Precise Visual Specification of Design
                                  Patterns . . . . . . . . . . . . . . . . 114
                 Aamod Sane and   
             Ashish Singhai and   
                Roy H. Campbell   Framework Design for End-to-End
                                  Optimization . . . . . . . . . . . . . . 135
                James Noble and   
                  Jan Vitek and   
                    John Potter   Flexible Alias Protection  . . . . . . . 158
              Michael Ernst and   
               Craig Kaplan and   
                 Craig Chambers   Predicate Dispatching: A Unified Theory
                                  of Dispatch  . . . . . . . . . . . . . . 186
                Suad Alagic and   
             Jose Solorzano and   
                 David Gitchell   Orthogonal to the Java Imperative  . . . 212
             Paulo Ferreira and   
                   Marc Shapiro   Modelling a Distributed Cached Store for
                                  Garbage Collection: The Algorithm and
                                  Its Correctness Proof  . . . . . . . . . 234
           Helena Rodrigues and   
                  Richard Jones   Cyclic Distributed Garbage Collection
                                  with Group Merger  . . . . . . . . . . . 260
                 J. Cordsen and   
                   J. Nolte and   
    W. Schröder-Preikschat   Experiences Developing a Virtual Shared
                                  Memory System Using High-Level Object
                                  Paradigms  . . . . . . . . . . . . . . . 285
               Ralph Keller and   
                Urs Hölzle   Binary Component Adaptation  . . . . . . 307
           N. Vijaykrishnan and   
             N. Ranganathan and   
                   R. Gadekarla   Object-Oriented Architectural Support
                                  for a Java Processor . . . . . . . . . . 330
           Leonid Mikhajlov and   
                Emil Sekerinski   A Study of the Fragile Base Class
                                  Problem  . . . . . . . . . . . . . . . . 355
           Malcolm Atkinson and   
                    Mick Jordan   Providing Orthogonal Persistence for
                                  Java . . . . . . . . . . . . . . . . . . 383
                 John Brant and   
                Brian Foote and   
           Ralph E. Johnson and   
                 Donald Roberts   Wrappers to the Rescue . . . . . . . . . 396
          Hidehiko Masuhara and   
               Akinori Yonezawa   Design and Partial Evaluation of
                                  Meta-objects for a Concurrent Reflective
                                  Language . . . . . . . . . . . . . . . . 418
       J. De Oliveira Guimaraes   Reflection for Statically Typed
                                  Languages  . . . . . . . . . . . . . . . 440
José de Oliveira Guimarães   Reflection for Statically Typed
                                  Languages  . . . . . . . . . . . . . . . 440
               Viviana Bono and   
                Kathleen Fisher   An Imperative, First-Order Calculus with
                                  Object Extension . . . . . . . . . . . . 462
                  Luigi Liquori   On Object Extension  . . . . . . . . . . 498
               Kim B. Bruce and   
             Martin Odersky and   
                  Philip Wadler   A Statically Safe Alternative to Virtual
                                  Types  . . . . . . . . . . . . . . . . . 523
         Yannis Smaragdakis and   
                     Don Batory   Implementing Layered Designs with Mixin
                                  Layers . . . . . . . . . . . . . . . . . 550
            Lobel Crnogorac and   
               Anand S. Rao and   
         Kotagiri Ramamohanarao   Classifying Inheritance Mechanisms in
                                  Concurrent Object Oriented Programming   571
         Joseph (Yossi) Gil and   
                      Alon Itai   The Complexity of Type Analysis of
                                  Object Oriented Programs . . . . . . . . 601
                      Anonymous   Author Index . . . . . . . . . . . . . . 635


Lecture Notes in Computer Science
Volume 1446, 1998

                    L. De Raedt   Attribute-Value Learning versus
                                  Inductive Logic Programming: The Missing
                                  Links  . . . . . . . . . . . . . . . . . 1
                   S. Muggleton   Advances in ILP Theory and
                                  Implementations  . . . . . . . . . . . . 9
                  A. Srinivasan   Application of ILP to Problems in
                                  Chemistry and Biology  . . . . . . . . . 10
                S. Dzeroski and   
                L. De Raedt and   
                    H. Blockeel   Relational Reinforcement Learning  . . . 11
                   C. Reddy and   
                   P. Tadepalli   Learning First-Order Acyclic Horn
                                  Programs from Entailment . . . . . . . . 23
                S. Slattery and   
                      M. Craven   Combining Statistical and Relational
                                  Methods for Learning in Hypertext
                                  Domains  . . . . . . . . . . . . . . . . 38
                M. Turcotte and   
            S. H. Muggleton and   
             M. J. E. Sternberg   Application of Inductive Logic
                                  Programming to Discover Rules Governing
                                  the Three-Dimensional Topology of
                                  Protein Structure  . . . . . . . . . . . 53
               U. Bohnebeck and   
                 T. Horvath and   
                      S. Wrobel   Term Comparisons in First-Order
                                  Similarity Measures  . . . . . . . . . . 65
                  S. Kramer and   
              B. Pfahringer and   
                       C. Helma   Stochastic Propositionalization of
                                  Non-determinate Background Knowledge . . 80
                       M. Sebag   A Stochastic Simple Similarity . . . . . 95
                     J. Cussens   Using Prior Probabilities and Density
                                  Estimation for Relational Classification 106
                M. Eineborg and   
                    N. Lindberg   Induction of Constraint Grammar-Rules
                                  Using Progol . . . . . . . . . . . . . . 116
                 D. Kazakov and   
                   S. Manandhar   A Hybrid Approach to Word Segmentation   125
               S. Manandhar and   
                S. Dzeroski and   
                     T. Erjavec   Learning Multilingual Morphology with
                                  CLOG . . . . . . . . . . . . . . . . . . 135
                  N. Jacobs and   
               K. Driessens and   
                    L. De Raedt   Using ILP Systems for Verification and
                                  Validation of Multi-Agent Systems  . . . 145
                  T. Nakano and   
                 N. Inuzuka and   
                    H. Seki and   
                        H. Itoh   Inducing Shogi Heuristics Using
                                  Inductive Logic Programming  . . . . . . 155
                    K. Khan and   
               S. Muggleton and   
                      R. Parson   Repeat Learning Using Predicate
                                  Invention  . . . . . . . . . . . . . . . 165
                   L. Fogel and   
                   G. Zaverucha   Normal Programs and Multiple Predicate
                                  Learning . . . . . . . . . . . . . . . . 175
                P. A. Flach and   
          C. Giraud-Carrier and   
                    J. W. Lloyd   Strongly Typed Inductive Concept
                                  Learning . . . . . . . . . . . . . . . . 185
                    R. Nock and   
                       P. Jappy   Function-Free Horn Clauses are Hard to
                                  Approximate  . . . . . . . . . . . . . . 195
                    J. Hekanaho   DOGMA: A GA-Based Relational Learner . . 205
                      Z. Markov   Generalization under Implication by
                                  lambda-Subsumption . . . . . . . . . . . 215
                      C. Sammut   Prolog, Refinements and RLGG's . . . . . 225
               J.-D. Zucker and   
                  J.-G Ganascia   Learning Structurally Indeterminate
                                  Clauses  . . . . . . . . . . . . . . . . 235
                   S. Muggleton   Completing Inverse Entailment  . . . . . 245
            S.-H Nienhuys-Cheng   Distances and Limits on Herbrand
                                  Interpretations  . . . . . . . . . . . . 250
                 M. Kirsten and   
                      S. Wrobel   Relational Distance-Based Clustering . . 261
                   J. Ramon and   
                  M. Bruynooghe   A Framework for Defining Distances
                                  Between First-Order Logic Objects  . . . 271
                S. Dzeroski and   
                  N. Jacobs and   
                  M. Molina and   
                       C. Moure   Detecting Traffic Problems with ILP  . . 281
                 S. Roberts and   
                W. Van Laer and   
                  N. Jacobs and   
                   S. Muggleton   A Comparison of ILP and Propositional
                                  Systems on Propositional Traffic Data    291


Lecture Notes in Computer Science
Volume 1447, 1998

                 D. W. Dearholt   The Cumulative Consensus of Cognitive
                                  Agents in Scenarios: A Framework for
                                  Evolutionary Processes in Semantic
                                  Memory . . . . . . . . . . . . . . . . . 3
                  L. Tesfatsion   Preferential Partner Selection in
                                  Evolutionary Labor Markets: A Study in
                                  Agent-Based Computational Economics  . . 15
                      S. Bankes   Subspace Pursuit for Exploratory
                                  Modeling . . . . . . . . . . . . . . . . 25
                B. Beaufils and   
             J.-P. Delahaye and   
                     P. Mathieu   Complete Classes of Strategies for the
                                  Classical Iterated Prisoner's Dilemma    33
                        L. Bull   Evolutionary Computing in Multi-agent
                                  Environments: Operators  . . . . . . . . 43
                      B. Olsson   Evalution of a Simple Host-Parasite
                                  Genetic Algorithm  . . . . . . . . . . . 53
                   J. F. Walker   Testing Three Paradigms for Evolving
                                  Groups of Cooperative, Simple Agents . . 63
                 D. Ashlock and   
                 J. E. Mayfield   Acquisition of General Adaptive Features
                                  by Evolution . . . . . . . . . . . . . . 75
                   H. Myung and   
                      J.-H. Kim   Hybrid Interior-Lagrangian Penalty Based
                                  Evolutionary Optimization  . . . . . . . 85
                  J. L. Breeden   GA-Optimal Fitness Functions . . . . . . 95
                     X. Yao and   
                         Y. Liu   Scaling Up Evolutionary Programming
                                  Algorithms . . . . . . . . . . . . . . . 103
                     R. Salomon   Short Notes on the Schema Theorem and
                                  the Building Block Hypothesis in Genetic
                                  Algorithms . . . . . . . . . . . . . . . 113
                   T. Baeck and   
                A. E. Eiben and   
                     M. E. Vink   A Superior Evolutionary Algorithm for
                                  3-SAT  . . . . . . . . . . . . . . . . . 125
                 P. M. Chau and   
                   G. Clark and   
                   A. V. Sebald   Evolvable Hardware Control for Dynamic
                                  Reconfigurable and Adaptive Computing    137
                J. E. Hirsh and   
                    D. K. Young   Evolutionary Programming Strategies with
                                  Self-Adaptation Applied to the Design of
                                  Rotorcraft Using Parallel Processing . . 147
             K. Chellapilla and   
           R. Sathyanarayan and   
                     A. Hoorfar   Optimization of Thinned Phased Arrays
                                  Using Evolutionary Programming . . . . . 157
                W. Kosinski and   
                   M. Weigl and   
                 Z. Michalewicz   Evolutionary Domain Covering of an
                                  Inference System for Function
                                  Approximation  . . . . . . . . . . . . . 167
              N. Rychtyckyj and   
                 R. G. Reynolds   Learning to Re-engineer Semantic
                                  Networks Using Cultural Algorithms . . . 181
               D. Ostrowski and   
                 R. G. Reynolds   Integration of Slicing Methods into a
                                  Cultural Algorithm in Order to Assist in
                                  Large-Scale Engineering Systems Design   191
                S. J. Louis and   
                   G. Bebis and   
                 S. Uthiram and   
                       Y. Varol   Genetic Search for Object Identification 199
                     S. Zhu and   
                 R. G. Reynolds   Fuzzy Cultural Algorithms with
                                  Evolutionary Programming . . . . . . . . 209
                C.-J. Chung and   
                 R. G. Reynolds   Culturing Evolution Strategies to
                                  Support the Exploration of Novel
                                  Environments by an Intelligent Robotic
                                  Agent  . . . . . . . . . . . . . . . . . 219
                     N. Gessler   Skeuomorphs and Cultural Algorithms  . . 229
              M. Schoenauer and   
                 Z. Michalewicz   Sphere Operators and Their Applicability
                                  for Constrained Parameter Optimization
                                  Problems . . . . . . . . . . . . . . . . 241
               T. Fernandez and   
                       M. Evett   Numeric Mutation as an Improvement to
                                  Symbolic Regression in Genetic
                                  Programming  . . . . . . . . . . . . . . 251
                  J. Sprave and   
                        S. Rolf   Variable-Dimensional Optimization with
                                  Evolutionary Algorithms Using
                                  Fixed-Length Representations . . . . . . 261
               A. V. Sebald and   
                 K. Chellapilla   On Making Problems Evolutionarily
                                  Friendly. Part 1: Evolving the Most
                                  Convenient Representations . . . . . . . 271
               A. V. Sebald and   
                 K. Chellapilla   On Making Problems Evolutionarily
                                  Friendly. Part 2: Evolving the Most
                                  Convenient Coordinate Systems Within
                                  Which to Pose (and Solve) the Given
                                  Problem  . . . . . . . . . . . . . . . . 281
                K.-H. Liang and   
                     X. Yao and   
                     Y. Liu and   
                      C. Newton   An Experimental Investigation of
                                  Self-Adaptation in Evolutionary
                                  Programming  . . . . . . . . . . . . . . 291
                     W. E. Hart   On the Application of Evolutionary
                                  Pattern Search Algorithms  . . . . . . . 303
                D. B. Fogel and   
                     A. Ghozeil   The Schema Theorem and the Misallocation
                                  of Trials in the Presence of Stochastic
                                  Effects  . . . . . . . . . . . . . . . . 313
                     H.-G Beyer   On the ``Explorative Power'' of
                                  ES/EP-like Algorithms  . . . . . . . . . 323
                     R. Salomon   Resampling and its Avoidance in Genetic
                                  Algorithms . . . . . . . . . . . . . . . 335
                     G. Rudolph   Evolutionary Search for Minimal Elements
                                  in Partially Ordered Finite Sets . . . . 345
                 W. G. Macready   Tailoring Mutation to Landscape
                                  Properties . . . . . . . . . . . . . . . 355
                F. W. Moore and   
                   O. N. Garcia   A Genetic Programming Methodology for
                                  Missile Countermeasures Optimization
                                  Under Uncertainty  . . . . . . . . . . . 367
                    I. K. Evans   Evolutionary Algorithms for Vertex Cover 377
                     S. Thacore   An Evolutionary Self-Learning
                                  Methodology: Some Preliminary Results
                                  from a Case Study  . . . . . . . . . . . 387
           S. Sundaralingam and   
                     K. Sharman   Evolving IIR Filters in Multipath
                                  Environments . . . . . . . . . . . . . . 397
                  T. Murata and   
               H. Ishibuchi and   
               T. Nakashima and   
                         M. Gen   Fuzzy Partition and Input Selection by
                                  Genetic Algorithms for Designing Fuzzy
                                  Rule-Based Classification Systems  . . . 407
                 K. Chellapilla   Evolving Nonlinear Controllers for
                                  Backing up a Truck-and-Trailer Using
                                  Evolutionary Programming . . . . . . . . 417
                G. B. Fogel and   
             K. Chellapilla and   
                    D. B. Fogel   Reconstruction of DNA Sequence
                                  Information from a Simulated DNA Chip
                                  Using Evolutionary Programming . . . . . 429
                 J. R. Koza and   
              F. H. Bennett and   
                       D. Andre   Using Programmatic Motifs and Genetic
                                  Programming to Classify Protein
                                  Sequences as to Cellular Location  . . . 437
             D. K. Gehlhaar and   
                 D. Bouzida and   
                    P. A. Rejto   Fully Automated and Rapid Flexible
                                  Docking of Inhibitors Covalently Bound
                                  to Serine Proteases  . . . . . . . . . . 449
            J. O. Pfaffmann and   
                      M. Conrad   Microtubule Networks as a Medium for
                                  Adaptive Information Processing  . . . . 463
                J. Brewster and   
                      M. Conrad   Evolve IV: A Metabolically-Based
                                  Artificial Ecosystem Model . . . . . . . 473
                       K. Jaffe   Sex, Mate Selection, and Evolution . . . 483
            G. W. Greenwood and   
                      Y.-P. Liu   Finding Low Energy Conformations of
                                  Atomic Clusters Using Evolution
                                  Strategies . . . . . . . . . . . . . . . 493
             R. W. Anderson and   
               J. B. Badler and   
                   E. L. Keller   Estimating the Distribution of Neural
                                  Connections in the Saccadic System Using
                                  a Biologically Plausible Learning rule
                                  --- Preliminary Results  . . . . . . . . 503
               G. B. Lamont and   
                S. M. Brown and   
                    G. H. Gates   Evolutionary Algorithms Combined with
                                  Deterministic Search . . . . . . . . . . 517
                   E. Ozcan and   
                    C. K. Mohan   Steady State Memetic Algorithm for
                                  Partial Shape Matching . . . . . . . . . 527
                 D. Ashlock and   
                  J. I. Lathrop   A Fully Characterized Test Suite for
                                  Genetic Programming  . . . . . . . . . . 537
            O. J. Mengshoel and   
                  D. C. Wilkins   Genetic Algorithms for Belief Network
                                  Inference: The Role of Scaling and
                                  Niching  . . . . . . . . . . . . . . . . 547
                    M. A. Smith   Building Software Frameworks for
                                  Evolutionary Computation . . . . . . . . 557
                     T. Dunning   Recorded Step Directional Mutation for
                                  Faster Convergence . . . . . . . . . . . 569
                     J. Kennedy   The Behavior of Particles  . . . . . . . 581
                     Y. Shi and   
                 R. C. Eberhart   Parameter Selection in Particle Swarm
                                  Optimization . . . . . . . . . . . . . . 591
                 P. J. Angeline   Evolutionary Optimization Versus
                                  Particle Swarm Optimization: Philosophy
                                  and Performance Differences  . . . . . . 601
             R. C. Eberhart and   
                         Y. Shi   Comparison between Genetic Algorithms
                                  and Particle Swarm Optimization  . . . . 611
                  D. Wicker and   
                M. M. Rizki and   
                L. A. Tamburino   A Hybrid Evolutionary Learning System
                                  for Synthesizing Neural Network Pattern
                                  Recognition Systems  . . . . . . . . . . 619
              A. N. Skourikhine   An Evolutionary Algorithm for Designing
                                  Feedforward Neural Networks  . . . . . . 629
       J. C. Figueira Pujol and   
                        R. Poli   Dual Network Representation Applied to
                                  the Evolution of Neural Controllers  . . 637
                   A. Imada and   
                       K. Araki   What does the Landscape of a Hopfield
                                  Associative Memory Look Like?  . . . . . 647
          A. Chorazyczewski and   
                       R. Galar   Visualization of Evolutionary Adaptation
                                  in R0n . . . . . . . . . . . . . . . . . 659
               A. L. Patton and   
                  T. Dexter and   
              E. D. Goodman and   
                    W. F. Punch   On the Application of Cohort-Driven
                                  Operators to Continuous Optimization
                                  Problems Using Evolutionary Computation  671
             S. A. Stanhope and   
                    J. M. Daida   Optimal Mutation and Crossover Rates for
                                  a Genetic Algorithm Operating in a
                                  Dynamic Environment  . . . . . . . . . . 693
                 F. Menczer and   
                    R. K. Belew   Local Selection  . . . . . . . . . . . . 703
                J. R. McDonnell   Asymmetric Mutations for Stochastic
                                  Search . . . . . . . . . . . . . . . . . 713
           T. W. Brotherton and   
                  G. Chadderdon   Automated Rule Extraction for Engine
                                  Health Monitoring  . . . . . . . . . . . 725
             S. A. Stanhope and   
                    J. M. Daida   Genetic Programming for Automatic Target
                                  Classification and Recognition in
                                  Synthetic Aperture Radar Imagery . . . . 735
                    R. Aler and   
                 D. Borrajo and   
                       P. Isasi   Evolving Heuristics for Planning . . . . 745
                K.-H. Liang and   
                     X. Yao and   
                  C. Newton and   
                     D. Hoffman   Solving Cutting Stock Problems by
                                  Evolutionary Programming . . . . . . . . 755
             T. E. Kammeyer and   
                    R. K. Belew   An Empirical Investigation of an
                                  Evolutionary Algorithm's Ability to
                                  Maintain a Known Good Solution . . . . . 767
                    V. W. Porto   Evolving Integrated Low-Level Behaviors
                                  into Intelligently Interactive Simulated
                                  Forces . . . . . . . . . . . . . . . . . 777
                   C. Davis and   
                     C. F. Eick   Using Offset Invariant Crossover as a
                                  Tool for Discovering Cycle Lengths of a
                                  Periodic Function  . . . . . . . . . . . 789
                       I. Kuscu   Evolving a Generalized Behaviour:
                                  Artificial Ant Problem Revisited . . . . 799
               M. Ahluwalia and   
                        L. Bull   Co-evolving Functions in Genetic
                                  Programming: Dynamic ADF Creation Using
                                  GLiB . . . . . . . . . . . . . . . . . . 809
                  D. Waagen and   
                  J. Pecina and   
                     R. Pickens   Evolving Spatially-Localized Projection
                                  Filters for SAR Automatic Target
                                  Recognition  . . . . . . . . . . . . . . 819
                 S.-H. Chen and   
                       C.-H Yeh   Genetic Programming in the Overlapping
                                  Generations Model: An Illustration with
                                  the Dynamics of the Inflation Rate . . . 829


Lecture Notes in Computer Science
Volume 1448, 1998

                       G. Myers   A Fast Bit-Vector Algorithm for
                                  Approximate String Matching Based on
                                  Dynamic Programming  . . . . . . . . . . 1
                 G. Navarro and   
                    M. Raffinot   A Bit-Parallel Approach to Suffix
                                  Automata: Fast Extended String Matching  14
             M. Ziv-Ukelson and   
                 A. Kershenbaum   A Dictionary Matching Algorithm Fast on
                                  the Avenge for Terms of Varying Lengths  34
                 C. Charras and   
                  T. Lecroq and   
                J. D. Pehoushek   A Very Fast String Matching Algorithm
                                  for Small Alphabets and Long Patterns    55
                   K. M. Risvik   Approximate Word Sequence Matching over
                                  Spase Suffix Trees . . . . . . . . . . . 65
                       K. Zhang   Efficient Parallel Algorithm for the
                                  Editing Distance Between Ordered Trees   80
                E. G. Myers and   
                   P. Oliva and   
                   K. Guimaraes   Reporting Exit and Approximate Regular
                                  Expression Matches . . . . . . . . . . . 91
                    Y. Yang and   
                   K. Zhang and   
                    X. Wang and   
                  J. T. L. Wang   An Approximate Oracle for Distance in
                                  Metric Spaces  . . . . . . . . . . . . . 104
             K. Fredriksson and   
                     E. Ukkonen   A Rotation Invariant Filter for
                                  Two-Dimensional String Matching  . . . . 118
                  D. K. Kim and   
                  Y. A. Kim and   
                        K. Park   Constructing Suffix Arrays for
                                  Multi-Dimensional Matrices . . . . . . . 126
                   J. Stoye and   
                    D. Gusfield   Simple and Flexible Detection of
                                  Contiguous Repates Using a Suffix Tree   140
          C. N. S. Pedersen and   
                   R. Lyngs and   
                        J. Hein   Comparison and Coding DNA  . . . . . . . 153
                      B. Ma and   
                    L. Wang and   
                          M. Li   Fixed Topology Alignment with
                                  Recombination  . . . . . . . . . . . . . 174
         J. D. Kececio\uglu and   
                       W. Zhang   Aligning Alignments  . . . . . . . . . . 189
                    A. Amir and   
               G. M. Landau and   
              M. Lewenstein and   
                  N. Lewenstein   Efficient Special Cases of Pattern
                                  Matching with Swaps  . . . . . . . . . . 209
                     Y. Hua and   
                   T. Jiang and   
                          B. Wu   Aligning DNA Sequences to Minimize He
                                  Changes in Protein . . . . . . . . . . . 221
              N. El-Mabrouk and   
               J. H. Nadeau and   
                     D. Sankoff   Genome Halving . . . . . . . . . . . . . 235


Lecture Notes in Computer Science
Volume 1449, 1998

            C. H. Papadimitriou   Algorithmic Approaches to Information
                                  Retrieval and Data Mining  . . . . . . . 1
               Fan Chung Graham   Combinatorial Problems Arising in
                                  Massive Data Sets  . . . . . . . . . . . 2
                  M. J. Fischer   Estimating Parameters of Monotone
                                  Boolean Functions  . . . . . . . . . . . 3
            S. Rao Kosaraju and   
                         M. Pop   De-amortization of Algorithms  . . . . . 4
                     Y. Dai and   
                       N. Katoh   On Computing New Classes of Optimal
                                  Triangulations with Angular Constraints  15
                Cao An Wang and   
                 F. Y. Chin and   
                   Bo Ting Yang   Maximum Weight Triangulation and Its
                                  Application on Graph Drawing . . . . . . 25
                    T. Graf and   
                V. Kamakoti and   
         N. S. Janaki Latha and   
                C. Pandu Rangan   The Colored Sector Search Tree: A
                                  Dynamic Data Structure for Efficient
                                  High Dimensional
                                  Nearest-Foreign-Neighbor Queries . . . . 35
                 D. Z. Chen and   
                      O. Daescu   Space-Efficient Algorithms for
                                  Approximating Polygonal Curves in Two
                                  Dimensional Space  . . . . . . . . . . . 45
              M. J. Atallah and   
                     D. Z. Chen   Parallel Geometric Algorithms in
                                  Coarse-Grain Network Models  . . . . . . 55
                   R. Fleischer   On the Bahncard Problem  . . . . . . . . 65
             A. Lopez-Ortiz and   
                   S. Schuierer   The Ultimate Strategy to Search on m
                                  Rays?  . . . . . . . . . . . . . . . . . 75
                      M. Li and   
                       L. Zhang   Better Approximation of Diagonal-Flip
                                  Transformation and Rotation
                                  Transformation . . . . . . . . . . . . . 85
                         G. Xue   A Cost Optimal Parallel Algorithm for
                                  Computing Force Field in $N$-Body
                                  Simulations  . . . . . . . . . . . . . . 95
                 M. Yagiura and   
                     T. Ibaraki   Efficient 2 and 3-Flip Neighborhood
                                  Search Algorithms for the MAX SAT  . . . 105
             O. Egecio\uglu and   
                     M. Peinado   Algorithms for Almost-uniform Generation
                                  with an Unbiased Binary Source . . . . . 117
                A. De Bonis and   
                 L. Gargano and   
                     U. Vaccaro   Improved Algorithms for Chemical
                                  Threshold Testing Problems . . . . . . . 127
                    M. Kiwi and   
             D. A. Spielman and   
                      S.-H Teng   Min-Max-Boundary Domain Decomposition    137
                   S. Reith and   
                   K. W. Wagner   On Boolean Lowness and Boolean Highness  147
                   U. Hertrampf   The Inherent Dimension of Bounded
                                  Counting Classes . . . . . . . . . . . . 157
                       C.-J. Lu   An Exact Characterization of Symmetric
                                  Functions in $ q A C00 [2] $ . . . . . . 167
                  J.-Y. Cai and   
         L. A. Hemaspaandra and   
                    G. Wechsung   Robust Reductions  . . . . . . . . . . . 174
                 V. Brattka and   
               K. Weihrauch and   
                       X. Zheng   Approaches to Effective Semi-continuity
                                  of Real Functions  . . . . . . . . . . . 184
                   V. Grebinski   On the Power of Additive Combinatorial
                                  Search Model . . . . . . . . . . . . . . 194
                F. K. Hwang and   
                      W.-D. Lin   The Number of Rearrangements in a
                                  3-stage Clos Network Using an Auxiliary
                                  Switch . . . . . . . . . . . . . . . . . 204
                 K.-H. Tsai and   
                      D.-W Wang   Lower Bounds for Wide-Sense Non-blocking
                                  Clos Network . . . . . . . . . . . . . . 213
                  D. S. Kim and   
                        D.-Z Du   Multirate Multicast Switching Networks   219
                   K. Iwama and   
                  E. Miyano and   
                  S. Tajima and   
                      H. Tamaki   Efficient Randomized Routing Algorithms
                                  on the Two-Dimensional Mesh of Buses . . 229
                  T.-S. Hsu and   
                    D. R. Lopez   Executing Divisible Jobs on a Network
                                  with a Fixed Number of Processors  . . . 241
                    B. Mans and   
              F. Pappalardi and   
                 I. Shparlinski   On the Adam Conjecture on Circulant
                                  Graphs . . . . . . . . . . . . . . . . . 251
                        W. Zang   Proof of Toft's Conjecture: Every Graph
                                  Containing No Fully Odd K4 Is
                                  $3$-Colorable  . . . . . . . . . . . . . 261
                 J.-J. Wang and   
                 T.-Y. Sung and   
                  L.-H. Hsu and   
                      M.-Y. Lin   A New Family of Optimal 1-Hamiltonian
                                  Graphs with Small Diameter . . . . . . . 269
                 S.-L. Peng and   
                   C.-W. Ho and   
                  T.-S. Hsu and   
                       M.-T. Ko   A Linear-Time Algorithm for Constructing
                                  an Optimal Node-Search Strategy of a
                                  Tree . . . . . . . . . . . . . . . . . . 279
                    J. Wang and   
                          Y. Ge   A Graph Optimization Problem in Virtual
                                  Colonoscopy  . . . . . . . . . . . . . . 289
                 Bang Ye Wu and   
                 K.-M. Chao and   
                  Chuan Yi Tang   Approximation and Exact Algorithms for
                                  Constructing Minimum Ultrametric Trees
                                  from Distance Matrices . . . . . . . . . 299
                 H. S. Chao and   
                  F. R. Hsu and   
                   R. C. T. Lee   An Optimal Algorithm for Finding the
                                  Minimum Cardinality Dominating Set on
                                  Permutation Graphs . . . . . . . . . . . 309
              R. A. Baeza-Yates   Similarity in Two-Dimensional Strings    319
                   J. Alber and   
                 R. Niedermeier   On Multi-dimensional Hilbert Indexings   329
                  A. Bernasconi   Combinatorial Properties of Classes of
                                  Functions Hard to Compute in Constant
                                  Depth  . . . . . . . . . . . . . . . . . 339
                  T. Mizuki and   
                 H. Shizuya and   
                   T. Nishizeki   Eulerian Secret Key Exchange . . . . . . 349
                      D. Beaver   One-Time Tables for Two-Party
                                  Computation  . . . . . . . . . . . . . . 361


Lecture Notes in Computer Science
Volume 1450, 1998

           Giorgio Ausiello and   
       Giuseppe F. Italiano and   
                  Umberto Nanni   Hypergraph Traversal Revisited: Cost
                                  Measures and Dynamic Algorithms  . . . . 1
           Egon Börger and   
                Wolfram Schulte   Defining the Java Virtual Machine as
                                  Platform for Provably Correct Java
                                  Compilation  . . . . . . . . . . . . . . 17
                    David Harel   Towards a Theory of Recursive Structures 36
               Yonit Kesten and   
                    Amir Pnueli   Modularization and Abstraction: The Keys
                                  to Practical Formal Verification . . . . 54
                 Wolfgang Maass   On the Role of Time and Space in Neural
                                  Computation  . . . . . . . . . . . . . . 72
              Kurt Mehlhorn and   
              Stefan Näher   From Algorithms to Working Programs: On
                                  the Use of Program Checking in LEDA  . . 84
                  Silvio Micali   Computationally-Sound Checkers . . . . . 94
                 Mogens Nielsen   Reasoning About the Past . . . . . . . . 117
            Pavel Pudlák   Satisfiability --- Algorithms and Logic  129
                 Colin Stirling   The Joys of Bisimulation . . . . . . . . 142
         Jirí Wiedermann   Towards Algorithmic Explanation of Mind
                                  Evolution and Functioning  . . . . . . . 152
                Mikel Aldaz and   
                Joos Heintz and   
           Guillermo Matera and   
José L. Montaña and   
                  Luis M. Pardo   Combinatorial Hardness Proofs for
                                  Polynomial Evaluation  . . . . . . . . . 167
        Michael Alekhnovich and   
                   Sam Buss and   
               Shlomo Moran and   
                Toniann Pitassi   Minimum Propositional Proof Length is
                                  NP-Hard to Linearly Approximate  . . . . 176
              Marek Chrobak and   
            Christoph Dürr   Reconstructing Polyatomic Structures
                                  from Discrete X-Rays: NP-Completeness
                                  Proof for Three Atoms  . . . . . . . . . 185
            Nikolai N. Kuzjurin   Locally Explicit Construction of Rödl's
                                  Asymptotically Good Packings . . . . . . 194
              Matthias Baaz and   
           Agata Ciabattoni and   
   Christian Fermüller and   
                   Helmut Veith   Proof Theory of Fuzzy Logics: Urquhart's
                                  C and Related Logics . . . . . . . . . . 203
             Richard Bonner and   
           Rusins Freivalds and   
               Janis Lapins and   
                Antra Lukjanska   Nonstochastic Languages as Projections
                                  of 2-Tape Quasideterministic Languages   213
           Flemming Nielson and   
             Hanne Riis Nielson   Flow Logic for Imperative Objects  . . . 220
           Alexander Rabinovich   Expressive Completeness of Temporal
                                  Logic of Action  . . . . . . . . . . . . 229
       Maria C. F. Ferreira and   
               Delia Kesner and   
                  Laurence Puel   Reducing AC-Termination to Termination   239
                 Z. Fueloep and   
                E. Jurvanen and   
                 M. Steinby and   
                  S. Vagvoelgyi   On One-Pass Term Rewriting . . . . . . . 248
Zoltán Fülöp and   
              Eija Jurvanen and   
             Magnus Steinby and   
Sándor Vágvölgyi   On One-Pass Term Rewriting . . . . . . . 248
               Miki Hermann and   
                  Gernot Salzer   On the Word, Subsumption, and Complement
                                  Problem for Recurrent Term
                                  Schematizations  . . . . . . . . . . . . 257
         Hél\`ene Touzet   Encoding the Hydra Battle as a Rewrite
                                  System . . . . . . . . . . . . . . . . . 267
          Christian Hagenah and   
                  Anca Muscholl   Computing $ \epsilon $-Free NFA from
                                  Regular Expressions in $ {O}(n \log^2
                                  (n)) $ Time  . . . . . . . . . . . . . . 277
             Michel Latteux and   
              David Simplot and   
                 Alain Terlutte   Iterated Length-Preserving Rational
                                  Transductions  . . . . . . . . . . . . . 286
                Holger Petersen   The Head Hierarchy for Oblivious Finite
                                  Automata with Polynomial Advice
                                  Collapses  . . . . . . . . . . . . . . . 296
Géraud Sénizergues   The Equivalence Problem for
                                  Deterministic Pushdown Transducers into
                                  Abelian Groups . . . . . . . . . . . . . 305
                  Gilles Barthe   The Semi-Full Closure of Pure Type
                                  Systems  . . . . . . . . . . . . . . . . 316
                   Marcin Benke   Predicative Polymorphic Subtyping  . . . 326
                  G. M. Bierman   A Computational Interpretation of the $
                                  \lambda \mu $-Calculus . . . . . . . . . 336
                Jacek Chrzaszcz   Polymorphic Subtyping Without
                                  Distributivity . . . . . . . . . . . . . 346
                Paul Gastin and   
         Raphaël Meyer and   
                  Antoine Petit   A (Non-elementary) Modular Decision
                                  Procedure for LTrL . . . . . . . . . . . 356
         Roberto Giacobazzi and   
          Francesco Ranzato and   
             Francesca Scozzari   Complete Abstract Interpretations Made
                                  Constructive . . . . . . . . . . . . . . 366
                Thomas Hune and   
                 Mogens Nielsen   Timed Bisimulation and Open Maps . . . . 378
               Jirí Srba   Deadlocking States in Context-Free
                                  Process Algebra  . . . . . . . . . . . . 388
             Kazuyuki Amano and   
                  Akira Maruoka   A Superpolynomial Lower Bound for a
                                  Circuit Computing the Clique Function
                                  with At Most $ (1 / 6) \log \log n $
                                  Negation Gates . . . . . . . . . . . . . 399
            Andris Ambainis and   
       David Mix Barrington and   
            Huong LêThanh   On Counting AC$^0$ Circuits with
                                  Negative Constants . . . . . . . . . . . 409
       Lane A. Hemaspaandra and   
                Jörg Rothe   A Second Step Towards Circuit
                                  Complexity-Theoretic Analogs of Rice's
                                  Theorem  . . . . . . . . . . . . . . . . 418
           E. Allen Emerson and   
             Richard J. Trefler   Model Checking Real-Time Properties of
                                  Symmetric Systems  . . . . . . . . . . . 427
               Martin Grohe and   
              Thomas Schwentick   Locality of Order-Invariant First-Order
                                  Formulas . . . . . . . . . . . . . . . . 437
               A. Di Pierro and   
                    H. Wiklicky   Probabilistic Concurrent Constraint
                                  Programming: Towards a Fully Abstract
                                  Model  . . . . . . . . . . . . . . . . . 446
       Alessandra Di Pierro and   
               Herbert Wiklicky   Probabilistic Concurrent Constraint
                                  Programming: Towards a Fully Abstract
                                  Model  . . . . . . . . . . . . . . . . . 446
                Alex K. Simpson   Lazy Functional Algorithms for Exact
                                  Real Functionals . . . . . . . . . . . . 456
          Klaus Ambos-Spies and   
              Steffen Lempp and   
              Gunther Mainhardt   Randomness vs. Completeness: On the
                                  Diagonalization Strength of
                                  Resource-Bounded Random Sets . . . . . . 465
                 Levke Bentzien   Positive Turing and Truth-Table
                                  Completeness for NEXP Are Incomparable   474
             Judy Goldsmith and   
          Mitsunori Ogihara and   
                Jörg Rothe   Tally NP Sets and Easy Census Functions  483
       Johannes Köbler and   
                 Rainer Schuler   Average-Case Intractability vs.
                                  Worst-Case Intractability  . . . . . . . 493
                 J. Koebler and   
                     R. Schuler   Average-Case Intractability vs.
                                  Worst-Case Intractability  . . . . . . . 493
                 Tero Harju and   
         Alexandru Mateescu and   
                   Arto Salomaa   Shuffle on Trajectories: The
                                  Schützenberger Product and Related
                                  Operations . . . . . . . . . . . . . . . 503
                   Werner Kuich   Gaussian Elimination and a
                                  Characterization of Algebraic Power
                                  Series . . . . . . . . . . . . . . . . . 512
          Luis-Miguel Lopez and   
                Philippe Narbel   D0L-Systems and Surface Automorphisms    522
               Isabelle Ryl and   
                  Yves Roos and   
              Mireille Clerbout   About Synchronization Languages  . . . . 533
              Klaus Barthelmann   When Can an Equational Simple Graph Be
                                  Generated by Hyperedge Replacement?  . . 543
   Martin Große-Rhode and   
  Francesco Parisi-Presicce and   
                  Marta Simeoni   Spatial and Temporal Refinement of Typed
                                  Graph Transformation Systems . . . . . . 553
          Thomas Hofmeister and   
                  Hanno Lefmann   Approximating Maximum Independent Sets
                                  in Uniform Hypergraphs . . . . . . . . . 562
                S. La Torre and   
                      M. Napoli   Representing Hyper-Graphs by Regular
                                  Languages  . . . . . . . . . . . . . . . 571
         Salvatore La Torre and   
              Margherita Napoli   Representing Hyper-Graphs by Regular
                                  Languages  . . . . . . . . . . . . . . . 571
                Kazuo Iwama and   
                  Chuzo Iwamoto   Improved Time and Space Hierarchies of
                                  One-Tape Off-Line TMs  . . . . . . . . . 580
           Pawel Mielniczuk and   
               Leszek Pacholski   Tarskian Set Constraints Are in NEXPTIME 589
                Sergei Vorobyov   $ \forall \exists^\ast $-Equational
                                  Theory of Context Unification is $ {\Pi
                                  }_1^0 $-Hard . . . . . . . . . . . . . . 597
         Jirí Wiedermann   Speeding-Up Nondeterministic Single-Tape
                                  Off-Line Computations by One Alternation 607
            Bruno Courcelle and   
                  Denis Lapoire   Facial Circuits of Planar Graphs and
                                  Context-Free Languages . . . . . . . . . 616
                Kazuo Iwama and   
             Mitsushi Nozoe and   
                   Shuzo Yajima   Optimizing OBDDs Is Still Intractable
                                  for Monotone Functions . . . . . . . . . 625
          Harry Preuß and   
                Anand Srivastav   Blockwise Variable Orderings for Shared
                                  BDDs . . . . . . . . . . . . . . . . . . 636
          Anna Slobodová   On the Composition Problem for OBDDs
                                  with Multiple Variable Orders  . . . . . 645
         Christian Choffrut and   
                 Sandor Horvath   Equations in Transfinite Strings . . . . 656
              M. Crochemore and   
                 F. Mignosi and   
                     A. Restivo   Minimal Forbidden Words and Factor
                                  Automata . . . . . . . . . . . . . . . . 665
              J. Karhumaeki and   
                  J. Manuch and   
                  W. Plandowski   On Defect Effect of Bi-Infinite Words    674
      Juhani Karhumäki and   
          Ján Manuch and   
            Wojciech Plandowski   On Defect Effect of Bi-Infinite Words    674
             Roman Kolpakov and   
           Gregory Kucherov and   
                Yuri Tarannikov   On Repetition-Free Binary Words of
                                  Minimal Density  . . . . . . . . . . . . 683
             S. L. Bezrukov and   
               J. D. Chavez and   
               L. H. Harper and   
            M. Röttger and   
                U.-P. Schroeder   Embedding of Hypercubes into Grids . . . 693
         Hans L. Bodlaender and   
                 Torben Hagerup   Tree Decompositions of Small Diameter    702
              Hajo Broersma and   
               Andreas Huck and   
                  Ton Kloks and   
               Otto Koppius and   
             Dieter Kratsch and   
          Haiko Müller and   
                 Hilde Tuinstra   Degree-Preserving Forests  . . . . . . . 713
                 A. Crauser and   
                K. Mehlhorn and   
                   U. Meyer and   
                     P. Sanders   A Parallelization of Dijkstra's Shortest
                                  Path Algorithm . . . . . . . . . . . . . 722
               Bruno Durand and   
                 Sylvain Porrot   Comparison Between the Complexity of a
                                  Function and the Complexity of Its Graph 732
             Henning Fernau and   
                 Ludwig Staiger   IFS and Control Languages  . . . . . . . 740
                    Oliver Matz   One Quantifier Will Do in Existential
                                  Monadic Second-Order Logic over Pictures 751
                Klaus Reinhardt   On Some Recognizable Picture-Languages   760
           Vincenzo Auletta and   
        Ioannis Caragiannis and   
        Christos Kaklamanis and   
                  Pino Persiano   On the Complexity of Wavelength
                                  Converters . . . . . . . . . . . . . . . 771
                   Carsten Damm   On Boolean vs. Modular Arithmetic for
                                  Circuits and Communication Protocols . . 780
                Juraj Hromkovic   Communication Complexity and Lower
                                  Bounds on Multilective Computations  . . 789
            Klaus Weihrauch and   
                  Xizhong Zheng   A Finite Hierarchy of the Recursively
                                  Enumerable Real Numbers  . . . . . . . . 798
            Thomas Buchholz and   
              Andreas Klein and   
                  Martin Kutrib   One Guess One-Way Cellular Arrays  . . . 807
         Gianpiero Cattaneo and   
                Luciano Margara   Topological Definitions of Chaos Applied
                                  to Cellular Automata Dynamics  . . . . . 816
               Giovanni Manzini   Characterization of Sensitive Linear
                                  Cellular Automata with Respect to the
                                  Counting Distance  . . . . . . . . . . . 825
            Jacques Mazoyer and   
                  Ivan Rapaport   Additive Cellular Automata over $
                                  {\mathbb {Z}_p} $ and the Bottom of
                                  (CA,$ \leq $ ) . . . . . . . . . . . . . 834


Lecture Notes in Computer Science
Volume 1644, 1999

                      A. Tiskin   Erratum: Bulk-Synchronous Parallel
                                  Multiplication of Boolean Matrices . . . 717