Table of contents for issues of Lecture Notes in Computer Science

Last update: Mon Sep 4 17:24:25 MDT 2023                Valid HTML 3.2!

Volume 1808, 2001
Volume 1828, 2001
Volume 1871, 2001
Volume 1876, 2001
Volume 1887, 2001
Volume 1900, 2001
Volume 1930, 2001
Volume 1936, 2001
Volume 1944, 2001
Volume 1946, 2001
Volume 1947, 2001
Volume 1951, 2001
Volume 1958, 2001
Volume 1959, 2001
Volume 1962, 2001
Volume 1964, 2001
Volume 1965, 2001
Volume 1972, 2001
Volume 1973, 2001
Volume 1978, 2001
Volume 1980, 2001
Volume 1981, 2001
Volume 1982, 2001
Volume 1985, 2001
Volume 1986, 2001
Volume 1987, 2001
Volume 1989, 2001
Volume 1990, 2001
Volume 1991, 2001
Volume 1992, 2001
Volume 1993, 2001
Volume 1994, 2001
Volume 1995, 2001
Volume 1996, 2001
Volume 1997, 2001
Volume 1998, 2001
Volume 1999, 2001
Volume 2000, 2001
Volume 2001, 2001
Volume 2002, 2001
Volume 2003, 2001
Volume 2004, 2001
Volume 2005, 2001
Volume 2006, 2001
Volume 2007, 2001
Volume 2008, 2001
Volume 2009, 2001
Volume 2010, 2001
Volume 2011, 2001
Volume 2012, 2001
Volume 2013, 2001
Volume 2014, 2001
Volume 2015, 2001
Volume 2016, 2001
Volume 2017, 2001
Volume 2018, 2001
Volume 2019, 2001
Volume 2020, 2001
Volume 2021, 2001
Volume 2022, 2001
Volume 2024, 2001
Volume 2025, 2001
Volume 2026, 2001
Volume 2027, 2001
Volume 2028, 2001
Volume 2029, 2001
Volume 2030, 2001
Volume 2031, 2001
Volume 2032, 2001
Volume 2033, 2001
Volume 2034, 2001
Volume 2035, 2001
Volume 2036, 2001
Volume 2037, 2001
Volume 2038, 2001
Volume 2039, 2001
Volume 2040, 2001
Volume 2041, 2001
Volume 2042, 2001
Volume 2043, 2001
Volume 2044, 2001
Volume 2045, 2001
Volume 2046, 2001
Volume 2047, 2001
Volume 2048, 2001
Volume 2049, 2001
Volume 2050, 2001
Volume 2051, 2001
Volume 2052, 2001


Lecture Notes in Computer Science
Volume 1808, 2001

                Ken Kennedy and   
                Charles Koelbel   Chapter 1. High Performance Fortran 2.0  3
           Jean-Luc Gaudiot and   
                 Tom DeBoni and   
                   John Feo and   
              Wim Böhm and   
               Walid Najjar and   
                 Patrick Miller   Chapter 2. The Sisal Project: Real World
                                  Functional Programming . . . . . . . . . 45
              Dennis Gannon and   
              Peter Beckman and   
          Elizabeth Johnson and   
                 Todd Green and   
                    Mike Levine   Chapter 3. HPC++ and the HPC++Lib
                                  Toolkit  . . . . . . . . . . . . . . . . 73
              Sandeep Kumar and   
              Dharma P. Agrawal   Chapter 4. A Concurrency Abstraction
                                  Model for Avoiding Inheritance Anomaly
                                  in Object-Oriented Programs  . . . . . . 109
                Alain Darte and   
                Yves Robert and   
  Frédéric Vivien   Chapter 5. Loop Parallelization
                                  Algorithms . . . . . . . . . . . . . . . 141
                 Paul Feautrier   Chapter 6. Array Dataflow Analysis . . . 173
                 Zhiyuan Li and   
                  Junjie Gu and   
                    Gyungho Lee   Chapter 7. Interprocedural Analysis
                                  Based on Guarded Array Regions . . . . . 221
                    Peng Tu and   
                    David Padua   Chapter 8. Automatic Array Privatization 247
              Anant Agarwal and   
                David Kranz and   
               Rajeev Barua and   
               Venkat Natarajan   Chapter 9. Optimal Tiling for Minimizing
                                  Communication in Distributed
                                  Shared-Memory Multiprocessors  . . . . . 285
             Kuei-Ping Shih and   
           Chua-Huang Huang and   
                 Jang-Ping Sheu   Chapter 10. Communication-Free
                                  Partitioning of Nested Loops . . . . . . 339
           Vladimir Kotlyar and   
                  David Bau and   
        Induprakas Kodukula and   
             Keshav Pingali and   
                 Paul Stodghill   Chapter 11. Solving Alignment Using
                                  Elementary Linear Algebra  . . . . . . . 385
              Santosh Pande and   
                     Tareq Bali   Chapter 12. A Compilation Method for
                                  Communication-Efficient Partitioning of
                                  DOALL Loops  . . . . . . . . . . . . . . 413
          Daniel J. Palermo and   
        Eugene W. Hodges IV and   
            Prithviraj Banerjee   Chapter 13. Compiler Optimization of
                                  Dynamic Data Distributions for
                                  Distributed-Memory Multicomputers  . . . 445
                   Manish Gupta   Chapter 14. A Framework for Global
                                  Communication Analysis and Optimizations 485
                Andrew Sohn and   
              Yuetsu Kodama and   
                Jui-Yuan Ku and   
             Mitsuhisa Sato and   
            Yoshinori Yamaguchi   Chapter 15. Tolerating Communication
                                  Latency through Dynamic Thread
                                  Invocation in a Multithreaded
                                  Architecture . . . . . . . . . . . . . . 525
                Vikram Adve and   
            John Mellor-Crummey   Chapter 16. Advanced Code Generation for
                                  High Performance Fortran . . . . . . . . 553
                   J. Ramanujam   Chapter 17. Integer Lattice Based
                                  Methods for Local Address Generation for
                                  Block-Cyclic Distributions . . . . . . . 597
              Sekhar Darbha and   
              Dharma P. Agrawal   Chapter 18. A Duplication Based Compile
                                  Time Scheduling Method for Task
                                  Parallelism  . . . . . . . . . . . . . . 649
                    Rajiv Gupta   Chapter 19. SPMD Execution in the
                                  Presence of Dynamic Data Structures  . . 683
         Martin C. Carlisle and   
                    Anne Rogers   Chapter 20. Supporting Dynamic Data
                                  Structures with Olden  . . . . . . . . . 709
                   Raja Das and   
            Yuan-Shin Hwang and   
                 Joel Saltz and   
                   Alan Sussman   Chapter 21. Runtime and Compiler Support
                                  for Irregular Computations . . . . . . . 751
                      Anonymous   Author Index . . . . . . . . . . . . . . 779


Lecture Notes in Computer Science
Volume 1828, 2001

                        Ron Sun   Introduction to Sequence Learning  . . . 1
           Paola Sebastiani and   
               Marco Ramoni and   
                     Paul Cohen   Sequence Learning via Bayesian
                                  Clustering by Dynamics . . . . . . . . . 11
                  Tim Oates and   
               Laura Firoiu and   
                  Paul R. Cohen   Using Dynamic Time Warping to Bootstrap
                                  HMM-Based Clustering of Time Series  . . 35
                   DeLiang Wang   Anticipation Model for Sequential
                                  Learning of Complex Sequences  . . . . . 53
               Pierre Baldi and   
        Sòren Brunak and   
             Paolo Frasconi and   
         Gianluca Pollastri and   
                  Giovanni Soda   Bidirectional Dynamics for Protein
                                  Secondary Structure Prediction . . . . . 80
Jean-Cédric Chappelier and   
                 Marco Gori and   
                 Alain Grumbach   Time in Connectionist Models . . . . . . 105
                 Diego Sona and   
            Alessandro Sperduti   On the Need for a Neural Abstract
                                  Machine  . . . . . . . . . . . . . . . . 135
               Mohammed J. Zaki   Sequence Mining in Categorical Domains:
                                  Algorithms and Applications  . . . . . . 162
          Christian Lebiere and   
                 Dieter Wallach   Sequence Learning in the ACT--R
                                  Cognitive Architecture: Empirical
                                  Analysis of a Hybrid Model . . . . . . . 188
        Jürgen Schmidhuber   Sequential Decision Making Based on
                                  Direct Search  . . . . . . . . . . . . . 213
                    Ron Sun and   
                  Chad Sessions   Automatic Segmentation of Sequences
                                  through Hierarchical Reinforcement
                                  Learning . . . . . . . . . . . . . . . . 241
          Samuel P. M. Choi and   
              Dit-Yan Yeung and   
                 Nevin L. Zhang   Hidden-Mode Markov Decision Processes
                                  for Nonstationary Sequential Decision
                                  Making . . . . . . . . . . . . . . . . . 264
                 Gerald Tesauro   Pricing in Agent Economies Using Neural
                                  Networks and Multi-agent $Q$-Learning    288
               Raju S. Bapi and   
                     Kenji Doya   Multiple Forward Model Architecture for
                                  Sequence Processing  . . . . . . . . . . 308
   Hervé Frezza-Buet and   
            Nicolas Rougier and   
Frédéric Alexandre   Integration of Biologically Inspired
                                  Temporal Mechanisms into a Cortical
                                  Framework for Sequence Processing  . . . 321
          Stephen Grossberg and   
                Rainer W. Paine   Attentive Learning of Sequential
                                  Handwriting Movements: a Neural Network
                                  Model  . . . . . . . . . . . . . . . . . 349
                      Anonymous   About Editors  . . . . . . . . . . . . . 389
                      Anonymous   Author Index . . . . . . . . . . . . . . 391


Lecture Notes in Computer Science
Volume 1871, 2001

        Massimo Benerecetti and   
             Fausto Giunchiglia   Model Checking-Based Analysis of
                                  Multiagent Systems . . . . . . . . . . . 1
   Stanislaw Ambroszkiewicz and   
           Wojciech Penczek and   
                   Tomasz Nowak   Towards Formal Specification and
                                  Verification in Cyberspace . . . . . . . 16
            Ullrich Hustadt and   
                Clare Dixon and   
          Renate A. Schmidt and   
             Michael Fisher and   
           John-Jules Meyer and   
             Wiebe van der Hoek   Verification within the KARO Agent
                                  Theory . . . . . . . . . . . . . . . . . 33
            Tadashi Araragi and   
                 Paul Attie and   
                Idit Keidar and   
             Kiyoshi Kogure and   
           Victor Luchangco and   
                Nancy Lynch and   
                       Ken Mano   On Formal Modeling of Agent Computations 48
            Sheila A. McIlraith   Modeling and Programming Devices and Web
                                  Agents . . . . . . . . . . . . . . . . . 63
           Koen V. Hindriks and   
           Frank S. de Boer and   
         Wiebe van der Hoek and   
            John-Jules C. Meyer   A Programming Logic for Part of the
                                  Agent Language 3APL  . . . . . . . . . . 78
           Yoshinobu Kawabe and   
                   Ken Mano and   
                 Kiyoshi Kogure   The Nepi 2 Programming System: a $ \pi
                                  $-Calculus-Based Approach to Agent-Based
                                  Programming  . . . . . . . . . . . . . . 90
            Charles Pecheur and   
                   Reid Simmons   From Livingstone to SMV  . . . . . . . . 103
                Lina Khatib and   
          Nicola Muscettola and   
                 Klaus Havelund   Verification of Plan Models Using UPPAAL 114
             Innocent Bakam and   
             Fabrice Kordon and   
         Christophe Le Page and   
       François Bousquet   Formalization of a Spatialized
                                  Multiagent Model Using Coloured Petri
                                  Nets for the Study of an Hunting
                                  Management System  . . . . . . . . . . . 123
             Mark d'Inverno and   
                   Michael Luck   Formal Agent Development: Framework to
                                  System . . . . . . . . . . . . . . . . . 133
            Johann Schumann and   
                    Jon Whittle   Automatic Synthesis of Agent Designs in
                                  UML  . . . . . . . . . . . . . . . . . . 148
                 Michael Fisher   Direct Execution of Agent Specifications 163
        Albert C. Esterline and   
                 Toinette Rorie   Using the $ \pi $-Calculus to Model
                                  Multiagent Systems . . . . . . . . . . . 164
         Jeffrey Van Baalen and   
          James L. Caldwell and   
               Shivakant Mishra   Specifying and Checking Fault-Tolerant
                                  Agent-Based Protocols Using Maude  . . . 180
                Tim Menzies and   
                Bojan Cukic and   
               Harhsinder Singh   Agents Talking Faster  . . . . . . . . . 194
             Neelam Soundarajan   Refining Interactions in a Distributed
                                  System . . . . . . . . . . . . . . . . . 209
                Kristina Lerman   Design and Mathematical Analysis of
                                  Agent-Based Systems  . . . . . . . . . . 222
          Michel Rudnianski and   
     Hél\`ene Bestougeff   Modeling Task and Teams through Game
                                  Theoretical Agents . . . . . . . . . . . 235
              Richard Waldinger   Web Agents Cooperating Deductively . . . 250
                       Hong Zhu   Formal Specification of Agent Behaviour
                                  through Environment Scenarios  . . . . . 263
                Diana F. Gordon   APT Agents: Agents That Are Adaptive,
                                  Predictable, and Timely  . . . . . . . . 278
               Sidney C. Bailin   Ontology Negotiation in a Community of
                                  Agents . . . . . . . . . . . . . . . . . 294
               Ramesh Bharadwaj   Analysis of Agent-Based Systems Using
                                  Decision Procedures  . . . . . . . . . . 298
                  Walid Chainbi   A Formal Approach to Belief-Goal-Role
                                  Agents . . . . . . . . . . . . . . . . . 300
              Peter Engrand and   
                Charles Pecheur   Model Checking of Autonomy Models for an
                                  In-Situ Propellant Production System . . 302
        Kiriakos Kiriakidis and   
                Diana F. Gordon   Adaptive Supervisory Control of
                                  Multi-agent Systems  . . . . . . . . . . 304
             Eduardo Alonso and   
                 Daniel Kudenko   Machine Learning for Logic-Based
                                  Multi-agent Systems  . . . . . . . . . . 306
         Vincenza Carchiolo and   
            Michele Malgeri and   
              Giuseppe Mangioni   Using a Formal Framework for Agent
                                  System Design  . . . . . . . . . . . . . 308
               Sanda Mandutianu   Modeling Agent-Based Systems . . . . . . 318
                      Anonymous   Modeling Agent Systems by Bayesian
                                  Belief Networks  . . . . . . . . . . . . 321
                      Tom Riley   The Anthropomorphizing of Intelligent
                                  Agents . . . . . . . . . . . . . . . . . 323
             Derek M. Surka and   
           Mark E. Campbell and   
             Thomas P. Schetter   Controlling Multiple Satellite
                                  Constellations Using the TEAMAgent
                                  System . . . . . . . . . . . . . . . . . 335
                Susan E. Torney   Operations Assistants for Johnson Space
                                  Center's Mission Control Center  . . . . 337
              Leonard P. Wesley   A Real Time Object-Oriented Rational
                                  Agent Development System . . . . . . . . 339
                Diana F. Gordon   Panel Discussion: ``Empirical versus
                                  Formal Methods'' . . . . . . . . . . . . 345
                Michael Hinchey   Panel Discussion: ``Future Directions''  354
                      Anonymous   Author Index . . . . . . . . . . . . . . 369


Lecture Notes in Computer Science
Volume 1876, 2001

            James C. Bezdek and   
            Ludmila I. Kuncheva   Some Notes on Twenty One (21) Nearest
                                  Prototype Classifiers  . . . . . . . . . 1
            Giovanni Adorni and   
            Stefano Cagnoni and   
                     Marco Gori   Adaptive Graphical Pattern Recognition
                                  Beyond Connectionist-Based Approaches    17
            Colin De La Higuera   Current Trends in Grammatical Inference  28
             \vSar\=unas Raudys   Classifier's Complexity Control while
                                  Training Multilayer Perceptrons  . . . . 32--44
                  Josef Kittler   A Framework for Classifier Fusion: Is It
                                  Still Needed?  . . . . . . . . . . . . . 45
                  Jiang Gao and   
              Xiaoqing Ding and   
                     Jing Zheng   Image Pattern Recognition Based on
                                  Examples --- A Combined Statistical and
                                  Structural-Syntactic Approach  . . . . . 57--66
              Rudolf Freund and   
            Markus Neubauer and   
            Martin Summerer and   
              Stefan Gruber and   
       Jürgen Schaffer and   
                 Roland Swoboda   A Hybrid System for the Recognition of
                                  Hand-Written Characters  . . . . . . . . 67
            Helmut A. Mayer and   
                 Petr Somol and   
             Reinhold Huber and   
                    Pavel Pudil   Improving Statistical Measures of
                                  Feature Subsets by Conventional and
                                  Evolutionary Approaches  . . . . . . . . 77
           Giorgio Giacinto and   
                 Fabio Roli and   
                 Giorgio Fumera   Selection of Classifiers Based on
                                  Multiple Classifier Behaviour  . . . . . 87
             Dick de Ridder and   
               Olaf Lemmers and   
          Robert P. W. Duin and   
                  Josef Kittler   The Adaptive Subspace Map for Image
                                  Description and Image Database Retrieval 94
              Kieron Messer and   
              Josef Kittler and   
                John Haddon and   
              Graham Watson and   
                  Sharon Watson   Adaptive Automatic Target Recognition
                                  with SVM Boosting for Outlier Detection  104
              Michal Haindl and   
        Vojtech Havlícek   A Multiresolution Causal Colour Texture
                                  Model  . . . . . . . . . . . . . . . . . 114
              Sung-Hyuk Cha and   
              Sargur N. Srihari   Writer Identification: Statistical
                                  Analysis and Dichotomizer  . . . . . . . 123
 Damián López and   
          Ignacio Piñaga   Syntactic Pattern Recognition by Error
                                  Correcting Analysis on Tree Automata . . 133
         J. González and   
                I. Salvador and   
              A. H. Toselli and   
                    A. Juan and   
                   E. Vidal and   
                 F. Casacuberta   Offline Recognition of
                                  Syntax-Constrained Cursive Handwritten
                                  Text . . . . . . . . . . . . . . . . . . 143
       Pierre Héroux and   
         Éric Trupin and   
                 Yves Lecoutier   Structural Classification for
                                  Retrospective Conversion of Documents    154
                 Louisa Lam and   
                   Rong Fan and   
                   Qizhi Xu and   
                  Ching Y. Suen   Segmentation of Date Field on Bank
                                  Cheques  . . . . . . . . . . . . . . . . 163
        Christian Bauckhage and   
         Susanne Kronenberg and   
              Franz Kummert and   
                Gerhard Sagerer   Grammars and Discourse Theory to
                                  Describe and Recognize Mechanical
                                  Assemblies . . . . . . . . . . . . . . . 173
Víctor M. Jiménez and   
           Andrés Marzal   Computation of the $N$ Best Parse Trees
                                  for Weighted and Stochastic Context-Free
                                  Grammars . . . . . . . . . . . . . . . . 183
             Ana L. N. Fred and   
José M. N. Leitão   Partitional vs Hierarchical Clustering
                                  Using a Minimum Grammar Complexity
                                  Approach . . . . . . . . . . . . . . . . 193
           Mikel L. Forcada and   
             Rafael C. Carrasco   Encoding Nondeterministic Finite-State
                                  Tree Automata in Sigmoid Recursive
                                  Neural Networks  . . . . . . . . . . . . 203
               Hirobumi Nishida   Retrieval of Partially Visible Shapes
                                  through Structural Feature Indexing  . . 211
                   Laura Davlea   A Structural Matching Algorithm Using
                                  Generalized Deterministic Annealing  . . 221
                     B. Luo and   
                  E. R. Hancock   Alignment and Correspondence Using
                                  Singular Value Decomposition . . . . . . 226
               M. Lazarescu and   
                   H. Bunke and   
                   S. Venkatesh   Graph Matching: Fast Candidate
                                  Elimination Using Machine Learning
                                  Techniques . . . . . . . . . . . . . . . 236
            Paolo Bergamini and   
               Luigi Cinque and   
         Andrew D. J. Cross and   
           Edwin R. Hancock and   
           Stefano Levialdi and   
                  Richard Myers   Efficient Alignment and Correspondence
                                  Using Edit Distance  . . . . . . . . . . 246
                   Luc Brun and   
               Walter Kropatsch   Irregular Pyramids with Combinatorial
                                  Maps . . . . . . . . . . . . . . . . . . 256
          Yasser El-Sonbaty and   
                   M. A. Ismail   A New Error-Correcting Distance for
                                  Attributed Relational Graph Problems . . 266
René Alquézar and   
         Francesc Serratosa and   
               Alberto Sanfeliu   Distance between Attributed Graphs and
                                  Function-Described Graphs Relaxing 2 nd
                                  Order Restrictions . . . . . . . . . . . 277
         Jocelyn Marchadier and   
           Sylvain Michelin and   
                     Yves Egels   A Graph Labelling Approach for Connected
                                  Feature Selection  . . . . . . . . . . . 287
         Alireza Ahmadyfard and   
                  Josef Kittler   Region-Based Representation for Object
                                  Recognition by Relaxation Labelling  . . 297
                   Terry Caelli   Shape Boundary Tracking with Hidden
                                  Markov Models  . . . . . . . . . . . . . 308
          Walter F. Bischof and   
                   Terry Caelli   Parallel Techniques for Rule-Based Scene
                                  Interpretation . . . . . . . . . . . . . 318
             Eraldo Ribeiro and   
               Edwin R. Hancock   Curvature Estimation Using
                                  Shape-from-Texture . . . . . . . . . . . 327
            R. A. Mollineda and   
                   E. Vidal and   
                 F. Casacuberta   Efficient Techniques for a Very Accurate
                                  Measurement of Dissimilarities between
                                  Cyclic Patterns  . . . . . . . . . . . . 337
              Atsushi Imiya and   
                Tomoki Ueno and   
                    Iris Fermin   Planar Symmetry Detection by Random
                                  Sampling and Voting Process  . . . . . . 347
          Eckart Michaelsen and   
                     Uwe Stilla   Assessing the Computational Effort for
                                  Structural $3$D Vehicle Recognition  . . 357
                  R. Glantz and   
                W. G. Kropatsch   Guided Relinking of Graph Pyramids . . . 367
                D. Vitulano and   
                    S. Vitulano   Texture Indexing by a Hierarchical
                                  Representation . . . . . . . . . . . . . 377
  Gabriella Sanniti di Baja and   
                 Stina Svensson   Surface Skeletons Detected on the $ D^6
                                  $ Distance Transform . . . . . . . . . . 387--396
              Richard Myers and   
               Edwin R. Hancock   Selection Strategies for Ambiguous Graph
                                  Matching by Evolutionary Optimisation    397
                 Matthew Ma and   
                  Chi Zhang and   
                   Patrick Wang   Studies of Radical Model for Retrieval
                                  of Cursive Chinese Handwritten
                                  Annotations  . . . . . . . . . . . . . . 407
          David Picó and   
          Francisco Casacuberta   A Statistical-Estimation Method for
                                  Stochastic Finite-State Transducers
                                  Based on Entropy Measures  . . . . . . . 417
                Frank Fuchs and   
            Hervé Le-Men   Efficient Subgraph Isomorphism with `A
                                  Priori' Knowledge (Application to $3$D
                                  Reconstruction of Buildings for
                                  Cartography) . . . . . . . . . . . . . . 427--436
   Jean-Gérard Pailloncy   Pyramid and Interior . . . . . . . . . . 437
            Pasquale Foggia and   
              Roberto Genna and   
                    Mario Vento   Prototype Learning with Attributed
                                  Relational Graphs  . . . . . . . . . . . 447
Juan Ramón Rico-Juan and   
         Jorge Calera-Rubio and   
             Rafael C. Carrasco   Lossless Compression of Surfaces
                                  Described as Points  . . . . . . . . . . 457
                Boris Flach and   
         Michail I. Schlesinger   A Class of Solvable Consistent Labeling
                                  Problems . . . . . . . . . . . . . . . . 462
      Sébastien Adam and   
              Jean M. Ogier and   
              Claude Cariou and   
         Rémy Mullot and   
           Joël Gardes and   
                Jacques Labiche   Character Recognition, Orientation, and
                                  Scale Estimation Thanks to the Fourier
                                  Mellin Transform . . . . . . . . . . . . 472
       J. S. Sánchez and   
                     F. Pla and   
                  M. C. Herrero   Using the Dual of Proximity Graphs for
                                  Binary Decision Tree Design  . . . . . . 482
               Keith Copsey and   
                    Andrew Webb   Bayesian Approach to Mixture Models for
                                  Discrimination . . . . . . . . . . . . . 491
              Edgard Nyssen and   
             Luc Van Kempen and   
                   Hichem Sahli   Pattern Classification Based on a
                                  Piecewise Multi-linear Model for the
                                  Class Probability Densities  . . . . . . 501
            Hiroshi Tenmoto and   
              Mineichi Kudo and   
                  Masaru Shimbo   Selection of the Number of Components
                                  Using a Genetic Algorithm for Mixture
                                  Model Classifiers  . . . . . . . . . . . 511
               Asanobu Kitamoto   The Moments of the Mixel Distribution
                                  and Its Application to Statistical Image
                                  Classification . . . . . . . . . . . . . 521
        Stavros Paschalakis and   
                      Peter Lee   Statistical Pattern Recognition Using
                                  the Normalized Complex Moment Components
                                  Vector . . . . . . . . . . . . . . . . . 532
          Georgy Gimel'farb and   
                Jian Quan Zhang   Initial Matching of Multiple-View Images
                                  by Affine Approximation of Relative
                                  Distortions  . . . . . . . . . . . . . . 540
            David Guillamet and   
                 Jordi Vitri\`a   Local Discriminant Regions Using Support
                                  Vector Machines for Object Recognition   550
                  Bir Bhanu and   
                  Yingqiang Lin   Stochastic Models for Recognition of
                                  Occluded Objects . . . . . . . . . . . . 560
           Andrés Molina   A Vector Approach to the Analysis of
                                  (Patterns with) Spatial Dependence . . . 571
                 Luis Rueda and   
                 B. John Oommen   The Foundational Theory of Optimal
                                  Bayesian Pairwise Linear Classifiers . . 581
                Xuexian Han and   
       Tetsushi Wakabayashi and   
                Fumitaka Kimura   The Optimum Classifier and the
                                  Performance Evaluation by Bayesian
                                  Approach . . . . . . . . . . . . . . . . 591
         Shin'ichiro Omachi and   
                   Fang Sun and   
                   Hirotomo Aso   A New Approximation Method of the
                                  Quadratic Discriminant Function  . . . . 601
           Francesco Tortorella   An Optimal Reject Rule for Binary
                                  Classifiers  . . . . . . . . . . . . . . 611
          Ricardo Barandela and   
                  Eduardo Gasca   Decontamination of Training Samples for
                                  Supervised Pattern Recognition Methods   621
          Marina Skurichina and   
              Robert P. W. Duin   The Role of Combining Rules in Bagging
                                  and Boosting . . . . . . . . . . . . . . 631
                Yingquan Wu and   
                K. Ianakiev and   
                 V. Govindaraju   Confidence Combination Methods in
                                  Multi-expert Systems . . . . . . . . . . 641
                 Se-Ho Choi and   
                  Peter Rockett   Reducing the Training Times of Neural
                                  Classifiers with Dataset Condensing  . . 650
                    J. Malo and   
                 R. Navarro and   
                I. Epifanio and   
                   F. Ferri and   
                  J. M. Artigas   Non-linear Invertible Representation for
                                  Joint Statistical and Perceptual Feature
                                  Decorrelation  . . . . . . . . . . . . . 658
                  Naoto Abe and   
              Mineichi Kudo and   
                 Jun Toyama and   
                  Masaru Shimbo   A Divergence Criterion for
                                  Classifier-Independent Feature Selection 668
              Mineichi Kudo and   
                 Petr Somol and   
                Pavel Pudil and   
              Masaru Shimbo and   
                  Jack Sklansky   Comparison of Classifier-Specific
                                  Feature Selection Algorithms . . . . . . 677
            David Windridge and   
                  Josef Kittler   Combined Classifier Optimisation via
                                  Feature Selection  . . . . . . . . . . . 687
             Hilary J. Holz and   
                 Murray H. Loew   Design Choices and Theoretical Issues
                                  for Relative Feature Importance, a
                                  Metric for Nonparametric Discriminatory
                                  Power  . . . . . . . . . . . . . . . . . 696
            Dolores Barrios and   
            Daniel Manrique and   
               Jaime Porras and   
               Juan Ríos   Real-Coded Genetic Algorithms Based on
                                  Mathematical Morphology  . . . . . . . . 706
Ginés García-Mateos and   
       Cristina Vicente-Chicote   A New Model and Process Architecture for
                                  Facial Expression Recognition  . . . . . 716
         \vSar\=unas Raudys and   
      Minija Tamo\vsi\=unait\.e   Biologically Inspired Architecture of
                                  Feedforward Networks for Signal
                                  Classification . . . . . . . . . . . . . 727--736
              Uri Lipowezky and   
                 Victor Shenkar   Optimal Threshold Estimation Using
                                  Prototype Selection  . . . . . . . . . . 737
              Georgy Gimel'farb   Basic and Fine Structure of Pairwise
                                  Interactions in Gibbs Texture Models . . 747
             M. A. Patricio and   
                    D. Maravall   Segmentation of Text and Graphics/Images
                                  Using the Gray-Level Histogram Fourier
                                  Transform  . . . . . . . . . . . . . . . 757
Juan C. Pérez-Cortes and   
              Rafael Llobet and   
               Joaquim Arlandis   Fast and Accurate Handwritten Character
                                  Recognition Using Approximate Nearest
                                  Neighbours Search on Large Databases . . 767
  Juan M. León-Rojas and   
         José Moreno and   
              Antonio Silva and   
         Montaña Morales   A Family of Divergences between $ {\Phi
                                  } $-Probabilistic Sets with Application
                                  to Handshape Recognition . . . . . . . . 777
                    Yo Horikawa   Rotated, Scaled and Noisy $2$D and $3$D
                                  Texture Classification with the
                                  Bispectrum-Based Invariant Feature . . . 787
           Pedro L. Galindo and   
Joaquín Pizarro Junquera and   
                 Elisa Guerrero   Multiple Comparison Procedures for
                                  Determining the Optimal Complexity of a
                                  Model  . . . . . . . . . . . . . . . . . 796
               Yonggwan Won and   
                Jiseung Nam and   
                     Bae-Ho Lee   Image Pattern Recognition in Natural
                                  Environment Using Morphological Feature
                                  Extraction . . . . . . . . . . . . . . . 806
P. García-Martínez and   
            H. H. Arsenault and   
                    C. Ferreira   A Statistical Matrix Representation
                                  Using Sliced Orthogonal Nonlinear
                                  Correlations for Pattern Recognition . . 816
      Francisco Moreno-Seco and   
          Luisa Micó and   
             José Oncina   A Fast Approximately
                                  $k$-Nearest-Neighbour Search Algorithm
                                  for Classification Tasks . . . . . . . . 823
     Raül Marín and   
              Pedro J. Sanz and   
          Antonio J. Jimeno and   
          Jose M. Iñesta   Design of a Telerobotic Interface System
                                  by Using Object Recognition Techniques   832
                    A. Juan and   
                       E. Vidal   Comparison of Four Initialization
                                  Techniques for the $K$-Medians
                                  Clustering Algorithm . . . . . . . . . . 842
      Fredrik Linåker and   
                 Lars Niklasson   Sensory Flow Segmentation Using a
                                  Resource Allocating Vector Quantizer . . 853
             Giorgio Fumera and   
                 Fabio Roli and   
               Giorgio Giacinto   Multiple Reject Thresholds for Improving
                                  Classification Reliability . . . . . . . 863
              C. Saint-Jean and   
         C. Frélicot and   
                      B. Vachon   Clustering with EM: Complex Models vs.
                                  Robust Estimation  . . . . . . . . . . . 872
               Dechang Chen and   
                  Xiuzhen Cheng   A Simple Implementation of the
                                  Stochastic Discrimination for Pattern
                                  Recognition  . . . . . . . . . . . . . . 882
        Roman M. Palenichka and   
            Peter Zinterhof and   
              Iryna B. Ivasenko   Adaptive Image Filtering and
                                  Segmentation Using Robust Estimation of
                                  Intensity  . . . . . . . . . . . . . . . 888
                      Anonymous   Author Index . . . . . . . . . . . . . . 899


Lecture Notes in Computer Science
Volume 1887, 2001

                     Les Gasser   MAS Infrastructure: Definitions, Needs,
                                  and Prospects  . . . . . . . . . . . . . 1
             John R. Graham and   
              Daniel McHugh and   
             Michael Mersic and   
             Foster McGeary and   
        M. Victoria Windley and   
              David Cleaver and   
                Keith S. Decker   Tools for Developing and Monitoring
                                  Agents in Distributed Multi-agent
                                  Systems  . . . . . . . . . . . . . . . . 12
            Mihhail Matskin and   
Ole Jòrgen Kirkeluten and   
      Svenn Bjarte Krossnes and   
      Òystein Sæle   Agora: An Infrastructure for Cooperative
                                  Work Support in Multi-agent Systems  . . 28
               K. S. Barber and   
                  D. N. Lam and   
               C. E. Martin and   
                    R. M. McKay   Sensible Agent Testbed Infrastructure
                                  for Experimentation  . . . . . . . . . . 41
          Olivier Gutknecht and   
                 Jacques Ferber   The \sc MadKit Agent Platform
                                  Architecture . . . . . . . . . . . . . . 48--55
          Roberto A. Flores and   
              Rob C. Kremer and   
              Douglas H. Norrie   An Architecture for Modeling
                                  Internet-Based Collaborative Agent
                                  Systems  . . . . . . . . . . . . . . . . 56
          Leon J. Osterweil and   
                 Lori A. Clarke   Frameworks for Reasoning about Agent
                                  Based Systems  . . . . . . . . . . . . . 64
              XiaoQin Zhang and   
                 Anita Raja and   
             Barbara Lerner and   
              Victor Lesser and   
             Leon Osterweil and   
                  Thomas Wagner   Integrating High-Level and Detailed
                                  Agent Coordination into a Layered
                                  Architecture . . . . . . . . . . . . . . 72
          David V. Pynadath and   
               Milind Tambe and   
                 Gal A. Kaminka   Adaptive Infrastructures for Agent
                                  Integration  . . . . . . . . . . . . . . 80
                Itsuki Noda and   
                    Peter Stone   RoboCup Soccer Server and CMUnited:
                                  Implemented Infrastructure for MAS
                                  Research . . . . . . . . . . . . . . . . 94
              Regis Vincent and   
              Bryan Horling and   
                  Victor Lesser   An Agent Infrastructure to Build and
                                  Evaluate Multi-agent Systems: The Java
                                  Agent Framework and Multi-agent System
                                  Simulator  . . . . . . . . . . . . . . . 102
              Thomas Wagner and   
                  Victor Lesser   Design-to-Criteria Scheduling: Real-Time
                                  Agent Control  . . . . . . . . . . . . . 128
           Mihai Barbuceanu and   
                     Wai-Kau Lo   Integrating Conversational Interaction
                                  and Constraint Based Reasoning in an
                                  Agent Building Shell . . . . . . . . . . 144
                  Soe-Tsyr Yuan   An Enabling Environment for Engineering
                                  Cooperative Agents . . . . . . . . . . . 157
           Werner Van Belle and   
                   Theo D'Hondt   Agent Mobility and Reification of
                                  Computational State: An Experiment in
                                  Migration  . . . . . . . . . . . . . . . 166
                  Tim Walsh and   
                Paddy Nixon and   
                   Simon Dobson   As Strong as Possible Agent Mobility . . 174
               Giovanna Petrone   An Architecture for Adaptive Web Stores  177
        Marios D. Dikaiakos and   
                 George Samaras   A Performance Analysis Framework for
                                  Mobile Agent Systems . . . . . . . . . . 180
       Carmen M. Pancerella and   
                  Nina M. Berry   A Layered Agent Template for Enterprise
                                  Computing  . . . . . . . . . . . . . . . 188
              Line Pouchard and   
                David W. Walker   A Community of Agents for User Support
                                  in a Problem-Solving Environment . . . . 192
                 In-Gyu Kim and   
              Jang-Eui Hong and   
               Doo-Hwan Bae and   
                 Ik-Joo Han and   
                    Cheong Youn   Scalable Mobile Agents Supporting
                                  Dynamic Composition of Functionality . . 199
    Giovanna Di Marzo Serugendo   A Formal Development and Validation
                                  Methodology Applied to Agent-Based
                                  Systems  . . . . . . . . . . . . . . . . 214
       Juan A. Botía and   
Antonio F. Gómez-Skarmeta and   
            Juan R. Velasco and   
                Mercedes Garijo   A Proposal for Meta-learning through a
                                  MAS (Multi-agent System) . . . . . . . . 226
                Murray Woodside   Scalability Metrics and Analysis of
                                  Mobile Agent Systems . . . . . . . . . . 234
          Phillip J. Turner and   
           Nicholas R. Jennings   Improving the Scalability of Multi-agent
                                  Systems  . . . . . . . . . . . . . . . . 246
                  Penny Noy and   
              Michael Schroeder   Mobile Agents for Distributed Processing 263
                    Khaled Nagi   Scalability of a Transactional
                                  Infrastructure for Multi-agent Systems   266
                  Alex Gray and   
             Philippe Marti and   
                    Alun Preece   Towards a Scalable Architecture for
                                  Knowledge Fusion . . . . . . . . . . . . 279
          Ioan Alfred Letia and   
             Florin Craciun and   
               Zoltan Köpe   Towards Validation of Specifications by
                                  Simulation . . . . . . . . . . . . . . . 293
              Stefan Poslad and   
                Phil Buckle and   
                  Rob Hadingham   Open Source, Standards and Scaleable
                                  Agencies . . . . . . . . . . . . . . . . 296
               Omer F. Rana and   
                 Tom Wagner and   
       Michael S. Greenberg and   
               Martin K. Purvis   Infrastructure Issues and Themes for
                                  Scalable Multi-agent Systems . . . . . . 304
                      Anonymous   Author Index . . . . . . . . . . . . . . 309


Lecture Notes in Computer Science
Volume 1900, 2001

                 David E. Keyes   Four Horizons for Enhancing the
                                  Performance of Parallel Simulations
                                  Based on Partial Differential Equations  1
                  Boris Babayan   E2K Technology and Implementation  . . . 18
       Gregor von Laszewski and   
             Kazuyuki Shudo and   
                 Yoichi Muraoka   Grid-Based Asynchronous Migration of
                                  Execution Context in Java Virtual
                                  Machines . . . . . . . . . . . . . . . . 22
                  Michel Raynal   Logical Instantaneity and Causal Order:
                                  Two ``First Class'' Communication Modes
                                  for Parallel Computing . . . . . . . . . 35
              Hans Werner Meuer   The TOP500 Project of the Universities
                                  Mannheim and Tennessee . . . . . . . . . 43
           Barton P. Miller and   
                 Michael Gerndt   Topic 01 Support Tools and Environments  45
               Sabine Rathmayer   Visualization and Computational Steering
                                  in Heterogeneous Computing Environments  47
                Ching-Jung Liao   A Web-Based Finite Element Meshes
                                  Partitioner and Load Balancer  . . . . . 57
                Radu Prodan and   
                 John M. Kewley   A Framework for an Interoperable Tool
                                  Environment (Research Note)  . . . . . . 65
           Timothy Sherwood and   
                    Brad Calder   ToolBlocks: An Infrastructure for the
                                  Construction of Memory Hierarchy
                                  Analysis Tools (Research Note) . . . . . 70
          Nandini Mukherjee and   
            Graham D. Riley and   
                   John R. Gurd   A Preliminary Evaluation of \sc FINESSE,
                                  a Feedback-Guided Performance
                                  Enhancement System . . . . . . . . . . . 75
       Christian H. Bischof and   
      H. Martin Bücker and   
                Paul D. Hovland   On Combining Computational
                                  Differentiation and Toolkits for
                                  Parallel Scientific Computing  . . . . . 86
            Steve MacDonald and   
              Duane Szafron and   
         Jonathan Schaeffer and   
                Steven Bromling   Generating Parallel Program Frameworks
                                  from Parallel Design Patterns  . . . . . 95
           Thomas Fahringer and   
              Wolfgang E. Nagel   Topic 02 Performance Evaluation and
                                  Prediction . . . . . . . . . . . . . . . 105
             Harold W. Cain and   
           Barton P. Miller and   
              Brian J. N. Wylie   A Callgraph-Based Search Strategy for
                                  Automated Performance Diagnosis
                                  (Distinguished Paper)  . . . . . . . . . 108
                 Felix Wolf and   
                     Bernd Mohr   Automatic Performance Analysis of MPI
                                  Applications Based on Event Traces . . . 123
Jacques Chassin de Kergommeaux and   
       Benhur de Oliveira Stein   Pajé: An Extensible Environment for
                                  Visualizing Multi-threaded Programs
                                  Executions . . . . . . . . . . . . . . . 133
                Xian-He Sun and   
                Kirk W. Cameron   A Statistical-Empirical Hybrid Approach
                                  to Hierarchical Memory Analysis  . . . . 141
         Darren J. Kerbyson and   
             John S. Harper and   
  Efstathios Papaefstathiou and   
           Daniel V. Wilcox and   
                 Graham R. Nudd   Use of Performance Technology for the
                                  Management of Distributed Systems  . . . 149
       Marco Dimas Gubitoso and   
               Carlos Humes Jr.   Delay Behavior in Domain Decomposition
                                  Applications . . . . . . . . . . . . . . 160
               Omer F. Rana and   
                  Dave Jennings   Automating Performance Analysis from UML
                                  Design Patterns (Research Note)  . . . . 168
           Antonio Espinosa and   
             Tomas Margalef and   
                   Emilio Luque   Integrating Automatic Techniques in a
                                  Performance Analysis Session (Research
                                  Note)  . . . . . . . . . . . . . . . . . 173
             Thierry Lafage and   
            André Seznec   Combining Light Static Code Annotation
                                  and Instruction-Set Emulation for
                                  Flexible and Efficient On-the-Fly
                                  Simulation (Research Note) . . . . . . . 178
           Panagiotis Melas and   
                  Ed J. Zaluska   SCOPE --- The Specific Cluster Operation
                                  and Performance Evaluation Benchmark
                                  Suite (Research Note)  . . . . . . . . . 183
              Chu-Cheow Lim and   
              Yoke-Hean Low and   
              Boon-Ping Gan and   
                    Wentong Cai   Implementation Lessons of Performance
                                  Prediction Tool for Parallel
                                  Conservative Simulation (Research Note)  189
                Xavier Vera and   
                Josep Llosa and   
    Antonio González and   
                 Nerina Bermudo   A Fast and Accurate Approach to Analyze
                                  Cache Memory Behavior (Research Note)    194
              Eduardo Huedo and   
              Manuel Prieto and   
        Ignacio M. Llorente and   
               Francisco Tirado   Impact of PE Mapping on Cray T3E
                                  Message-Passing Performance  . . . . . . 199
           Julien Bourgeois and   
          François Spies   Performance Prediction of an NAS
                                  Benchmark Program with ChronosMix
                                  Environment  . . . . . . . . . . . . . . 208
                 Bettina Schnor   Topic 03 Scheduling and Load Balancing   217
           Fabrizio Baiardi and   
              Primo Becuzzi and   
                Sarah Chiti and   
                 Paolo Mori and   
                    Laura Ricci   A Hierarchical Approach to Irregular
                                  Problems (Research Note) . . . . . . . . 218
      Götz Lindenmaier and   
        Kathryn S. McKinley and   
                  Olivier Temam   Load Scheduling with Profile Information 223
         Attila Gürsoy and   
                     Murat Atun   Neighbourhood Preserving Load Balancing:
                                  a Self-Organizing Approach . . . . . . . 234
              Yanyong Zhang and   
            Hubertus Franke and   
            Jose E. Moreira and   
          Anand Sivasubramaniam   The Impact of Migration on Parallel Job
                                  Scheduling for Distributed Systems . . . 242
         William Leinberger and   
             George Karypis and   
                    Vipin Kumar   Memory Management Techniques for Gang
                                  Scheduling . . . . . . . . . . . . . . . 252
      Concepció Roig and   
                 Ana Ripoll and   
            Miquel A. Senar and   
           Fernando Guirado and   
                   Emilio Luque   Exploiting Knowledge of Temporal
                                  Behaviour in Parallel Programs for
                                  Improving Distributed Mapping  . . . . . 262
           Andrei Radulescu and   
         Arjan J. C. van Gemund   Preemptive Task Scheduling for
                                  Distributed Systems (Research Note)  . . 272
              Thomas Decker and   
            Burkhard Monien and   
                   Robert Preis   Towards Optimal Load Balancing
                                  Topologies . . . . . . . . . . . . . . . 277
                Foto Afrati and   
           Evripidis Bampis and   
               Lucian Finta and   
                  Ioannis Milis   Scheduling Trees with Large
                                  Communication Delays on Two Identical
                                  Processors . . . . . . . . . . . . . . . 288
             Kirk Schloegel and   
             George Karypis and   
                    Vipin Kumar   Parallel Multilevel Algorithms for
                                  Multi-constraint Graph Partitioning
                                  (Distinguished Paper)  . . . . . . . . . 296
          Maciej Drozdowski and   
              Pawe\l Wolniewicz   Experiments with Scheduling Divisible
                                  Tasks in Clusters of Workstations  . . . 311
     Daniel González and   
          Francisco Almeida and   
          Luz Marina Moreno and   
       Casiano Rodríguez   Optimal Mapping of Pipeline Algorithms
                                  (Research Note)  . . . . . . . . . . . . 320
                 Thomas Richert   Dynamic Load Balancing for Parallel
                                  Adaptive Multigrid Solvers with
                                  Algorithmic Skeletons (Research Note)    325
          Samuel P. Midkiff and   
            Barbara Chapman and   
Jean-François Collard and   
                     Jens Knoop   Topic 04 Compilers for High Performance  329
            Gerardo Bandera and   
               Emilio L. Zapata   Improving the Sparse Parallelization
                                  Using Semantical Information at
                                  Compile-Time . . . . . . . . . . . . . . 331
                Roxane Adle and   
               Marc Aiguier and   
               Franck Delaplace   Automatic Parallelization of Sparse
                                  Matrix Computations: a Static Analysis   340
       Rashindra Manniesing and   
         Ireneusz Karkowski and   
                 Henk Corporaal   Automatic SIMD Parallelization of
                                  Embedded Applications Based on Pattern
                                  Recognition  . . . . . . . . . . . . . . 349
                Alain Darte and   
    Georges-André Silber   Temporary Arrays for Distribution of
                                  Loops with Control Dependences . . . . . 357
               Nawaaz Ahmed and   
                 Keshav Pingali   Automatic Generation of Block-Recursive
                                  Codes  . . . . . . . . . . . . . . . . . 368
             Nikolay Mateev and   
                Vijay Menon and   
                 Keshav Pingali   Left-Looking to Right-Looking and Vice
                                  Versa: An Application of Fractal
                                  Symbolic Analysis to Linear Algebra Code
                                  Restructuring  . . . . . . . . . . . . . 379
              Diego Novillo and   
            Ronald C. Unrau and   
             Jonathan Schaeffer   Identifying and Validating Irregular
                                  Mutual Exclusion Synchronization in
                                  Explicitly Parallel Programs (Research
                                  Note)  . . . . . . . . . . . . . . . . . 389
             Rupert W. Ford and   
      Michael F. P. O'Boyle and   
            Elena A. Stöhr   Exact Distributed Invalidation . . . . . 395
                Alain Darte and   
            Claude Diderich and   
               Marc Gengler and   
  Frédéric Vivien   Scheduling the Computations of a Loop
                                  Nest with Respect to a Given Mapping . . 405
                Felix Heine and   
                  Adrian Slowik   Volume Driven Data Distribution for
                                  NUMA-Machines  . . . . . . . . . . . . . 415
             Bernhard Mitschang   Topic 05 Parallel and Distributed
                                  Databases and Applications . . . . . . . 425
            JoAnne Holliday and   
          Divyakant Agrawal and   
                  Amr El Abbadi   Database Replication Using Epidemic
                                  Communication  . . . . . . . . . . . . . 427
          Klemens Böhm and   
              Torsten Grabs and   
              Uwe Röhm and   
           Hans-Jörg Schek   Evaluating the Coordination Overhead of
                                  Replica Maintenance in a Cluster of
                                  Databases  . . . . . . . . . . . . . . . 435
           Michael Stillger and   
           Dieter Scheffner and   
       Johann-Christoph Freytag   A Communication Infrastructure for a
                                  Distributed RDBMS (Research Note)  . . . 445
                    Peter Peinl   Distribution, Replication, Parallelism,
                                  and Efficiency Issues in a Large-Scale
                                  Online/Real-Time Information System for
                                  Foreign Exchange Trading (Research Note) 451
Friedhelm Mayer auf der Heide and   
      Miros\law Kuty\lowski and   
                Prabhakar Ragde   Topic 06 Complexity Theory and
                                  Algorithms . . . . . . . . . . . . . . . 455
       Pavlos S. Efraimidis and   
               Paul G. Spirakis   Positive Linear Programming Extensions:
                                  Parallel Complexity and Applications
                                  (Research Note)  . . . . . . . . . . . . 456
               Ulrich Meyer and   
                  Peter Sanders   Parallel Shortest Path for Arbitrary
                                  Graphs . . . . . . . . . . . . . . . . . 461
                     Marcin Kik   Periodic Correction Networks . . . . . . 471
                  Michael Resch   Topic 07 Applications on
                                  High-Performance Computers . . . . . . . 479
            Robert E. Lynch and   
                   Hong Lin and   
               Dan C. Marinescu   An Efficient Algorithm for Parallel $3$D
                                  Reconstruction of Asymmetric Objects
                                  from Electron Micrographs  . . . . . . . 481
              Sergio Romero and   
             Luis F. Romero and   
               Emilio L. Zapata   Fast Cloth Simulation with Parallel
                                  Computers  . . . . . . . . . . . . . . . 491
          Gordon J. Darling and   
           Terence M. Sloan and   
              Connor Mulholland   The Input, Preparation, and Distribution
                                  of Data for Parallel GIS Operations
                                  (Research Note)  . . . . . . . . . . . . 500
          El Mostafa Daoudi and   
           Pierre Manneback and   
         Abdelouafi Meziane and   
     Yahya Ould Mohamed El Hadj   Study of the Load Balancing in the
                                  Parallel Training for Automatic Speech
                                  Recognition (Research Note)  . . . . . . 506--510
                Piotr Ba\la and   
                 Terry W. Clark   Pfortran and Co-Array Fortran as Tools
                                  for Parallelization of a Large-Scale
                                  Scientific Application . . . . . . . . . 511
                 Markus Ast and   
           Cristina Barrado and   
           José Cela and   
               Rolf Fischer and   
       Jesús Labarta and   
       Óscar Laborda and   
               Hartmut Manz and   
                     Uwe Schulz   Sparse Matrix Structure for Dynamic
                                  Parallelisation Efficiency . . . . . . . 519
                  Ken Naono and   
            Yusaku Yamamoto and   
            Mitsuyoshi Igai and   
          Hiroyuki Hirayama and   
                  Nobuhiro Ioki   A Multi-color Inverse Iteration for a
                                  High Performance Real Symmetric
                                  Eigensolver (Research Note)  . . . . . . 527
            Felicia Ionescu and   
               Andrei Jalba and   
                 Mihail Ionescu   Parallel Implementation of Fast Hartley
                                  Transform (FHT) in Multiprocessor
                                  Systems (Research Note)  . . . . . . . . 532
         Silvia Müller and   
         Per Stenström and   
               Mateo Valero and   
           Stamatis Vassiliadis   Topic 08 Parallel Computer Architecture  537
      Jean-Thomas Acquaviva and   
                  William Jalby   Coherency Behavior on DSM: a Case Study
                                  (Research Note)  . . . . . . . . . . . . 539
                  David May and   
                Henk Muller and   
                    Shondip Sen   Hardware Migratable Channels (Research
                                  Note)  . . . . . . . . . . . . . . . . . 545
   Diego R. Llanos Ferraris and   
Benjamín Sahelices Fernández and   
Agustín De Dios Hernández   Reducing the Replacement Overhead on
                                  COMA Protocols for Workstation-Based
                                  Architectures  . . . . . . . . . . . . . 550
      Aleksandar Milenkovic and   
             Veljko Milutinovic   Cache Injection: a Novel Technique for
                                  Tolerating Memory Latency in Bus-Based
                                  SMPs . . . . . . . . . . . . . . . . . . 558
         Sarah A. M. Talbot and   
               Paul H. J. Kelly   Adaptive Proxies: Handling Widely-Shared
                                  Data in Shared-Memory Multiprocessors
                                  (Research Note)  . . . . . . . . . . . . 567
                  Ernst W. Mayr   Topic 09 Distributed Systems and
                                  Algorithms . . . . . . . . . . . . . . . 573
               Costas Busch and   
        Neophytos Demetriou and   
            Maurice Herlihy and   
            Marios Mavronicolas   A Combinatorial Characterization of
                                  Properties Preserved by Antitokens . . . 575
            Nicolas Hanusse and   
         Evangelos Kranakis and   
                  Danny Krizanc   Searching with Mobile Agents in Networks
                                  with Liars . . . . . . . . . . . . . . . 583
  Luis Díaz de Cerio and   
Miguel Valero-García and   
        Antonio González   Complete Exchange Algorithms for Meshes
                                  and Tori Using a Systematic Approach
                                  (Research Note)  . . . . . . . . . . . . 591
                   Ling Qiu and   
                   Wen-Jing Hsu   Algorithms for Routing AGVs on a Mesh
                                  Topology (Research Note) . . . . . . . . 595
        Sandeep K. S. Gupta and   
    Abdelmadjid Bouabdallah and   
              Pradip K. Srimani   Self-Stabilizing Protocol for Shortest
                                  Path Tree for Multi-cast Routing in
                                  Mobile Networks (Research Note)  . . . . 600
      Luís Rodrigues and   
                  Michel Raynal   Quorum-Based Replication in Asynchronous
                                  Crash-Recovery Distributed Systems
                                  (Research Note)  . . . . . . . . . . . . 605
           Giovanna Melideo and   
             Marco Mechelli and   
            Roberto Baldoni and   
   Alberto Marchetti Spaccamela   Timestamping Algorithms: a
                                  Characterization and a Few Properties    609
           Paul H. J. Kelly and   
            Sergei Gorlatch and   
                Scott Baden and   
                 Vladimir Getov   Topic 10 Programming Languages, Models,
                                  and Methods  . . . . . . . . . . . . . . 617
             Clemens Grelck and   
               Sven-Bodo Scholz   HPF vs. SAC -- A Case Study (Research
                                  Note)  . . . . . . . . . . . . . . . . . 620
          Kevin B. Theobald and   
                Rishi Kumar and   
              Gagan Agrawal and   
                 Gerd Heber and   
        Ruppa K. Thulasiram and   
                   Guang R. Gao   Developing a Communication Intensive
                                  Application on the EARTH Multithreaded
                                  Architecture (Distinguished Paper) . . . 625
               Mauro Bianco and   
                  Geppino Pucci   On the Predictive Quality of BSP-like
                                  Cost Functions for NOWs  . . . . . . . . 638
          Siegfried Benkner and   
                 Thomas Brandes   Exploiting Data Locality on Scalable
                                  Shared Memory Machines with Data
                                  Parallel Programs  . . . . . . . . . . . 647
               Andrea Zavanella   The Skel-BSP Global Optimizer: Enhancing
                                  Performance Portability in Parallel
                                  Programming  . . . . . . . . . . . . . . 658
            Philippe Gerner and   
                   Eric Violard   A Theoretical Framework of Data
                                  Parallelism and Its Operational
                                  Semantics  . . . . . . . . . . . . . . . 668
        Berna L. Massingill and   
         Timothy G. Mattson and   
             Beverly A. Sanders   A Pattern Language for Parallel
                                  Application Programs (Research Note) . . 678
          Jesus A. Gonzalez and   
              Coromoto Leon and   
            Fabiana Piccoli and   
          Marcela Printista and   
        José L. Roda and   
          Casiano Rodriguez and   
             Francisco de Sande   Oblivious BSP (Research Note)  . . . . . 682
            Steven Newhouse and   
              Anthony Mayer and   
                John Darlington   A Software Architecture for HPC Grid
                                  Applications (Research Note) . . . . . . 686
      Rob V. van Nieuwpoort and   
             Thilo Kielmann and   
                   Henri E. Bal   Satin: Efficient Parallel
                                  Divide-and-Conquer in Java . . . . . . . 690
             Rafael Ramirez and   
          Andrew E. Santosa and   
                   Lee Wei Hong   Implementing Declarative Concurrency in
                                  Java . . . . . . . . . . . . . . . . . . 700
               Paul A. Gray and   
              Vaidy S. Sunderam   Building Distributed Applications Using
                                  Multiple, Heterogeneous Environments . . 709
            Jarek Nieplocha and   
                  Jialin Ju and   
             Tjerk P. Straatsma   A Multiprotocol Communication Support
                                  for the Global Address Space Programming
                                  Model on the IBM SP  . . . . . . . . . . 718
           Takashi Ishihara and   
                  Tiejun Li and   
            Eugene F. Fodor and   
               Ronald A. Olsson   A Comparison of Concurrent Programming
                                  and Cooperative Multithreading . . . . . 729
          Philip W. Trinder and   
        Hans-Wolfgang Loidl and   
              Ed. Barry Jr. and   
               M. Kei Davis and   
              Kevin Hammond and   
              Ulrike Klusik and   
      Simon L. Peyton Jones and   
Álvaro J. Rebón Portillo   The Multi-architecture Performance of
                                  the Parallel Functional Language \sc GpH
                                  (Research Note)  . . . . . . . . . . . . 739--743
  Vítor Santos Costa and   
              Ricardo Rocha and   
                 Fernando Silva   Novel Models for Or-Parallel Logic
                                  Programs: a Performance Analysis . . . . 744
     Alexander B. Godlevsky and   
         Ladislav Hluchý   Executable Specification Language for
                                  Parallel Symbolic Computation (Research
                                  Note)  . . . . . . . . . . . . . . . . . 754
                Magne Haveraaen   Efficient Parallelisation of Recursive
                                  Problems Using Constructive Recursion
                                  (Research Note)  . . . . . . . . . . . . 758
             Jonas Holmerin and   
              Björn Lisper   Development of Parallel Algorithms in
                                  Data Field Haskell (Research Note) . . . 762
              Paul-Jean Cagnard   The ParCel-2 Programming Language
                                  (Research Note)  . . . . . . . . . . . . 767
           Ulrich Rüde and   
          Hans-Joachim Bungartz   Topic 11 Numerical Algorithms for Linear
                                  and Nonlinear Algebra  . . . . . . . . . 771
                  David S. Wise   Ahnentafel Indexing into Morton-Ordered
                                  Arrays, or Matrix Locality for Free  . . 774
          Peter Gottschling and   
              Wolfgang E. Nagel   An Efficient Parallel Linear Solver with
                                  a Cascadic Conjugate Gradient Method:
                                  Experience with Reality  . . . . . . . . 784
              Michael Bader and   
               Christoph Zenger   A Fast Solver for Convection Diffusion
                                  Equations Based on Nested Dissection
                                  with Incomplete Elimination  . . . . . . 795
                    Marcus Mohr   Low Communication Parallel Multigrid . . 806
          Jörn Behrens and   
                Jens Zimmermann   Parallelizing an Unstructured Grid
                                  Generator with a Space-Filling Curve
                                  Approach . . . . . . . . . . . . . . . . 815
               Peter Benner and   
                Rafael Mayo and   
Enrique S. Quintana-Ortí and   
       Vicente Hernández   Solving Discrete-Time Periodic Riccati
                                  Equations on a Cluster (Research Note)   824
               Torsten Butz and   
            Oskar von Stryk and   
      Thieß-Magnus Wolter   A Parallel Optimization Scheme for
                                  Parameter Estimation in Motor Vehicle
                                  Dynamics (Research Note) . . . . . . . . 829
Charalampos Konstantopoulos and   
             Andreas Svolos and   
            Christos Kaklamanis   Sliding-Window Compression on the
                                  Hypercube (Research Note)  . . . . . . . 835
             Marco D'Apuzzo and   
              Marina Marino and   
          Panos M. Pardalos and   
                Gerardo Toraldo   A Parallel Implementation of a Potential
                                  Reduction Algorithm for Box-Constrained
                                  Quadratic Programming  . . . . . . . . . 839
      Roland Wismüller and   
                   Renato Campo   Topic 12 European Projects . . . . . . . 849
              Wolfgang Karl and   
              Martin Schulz and   
           Martin Völk and   
                Sibylle Ziegler   NEPHEW: Applying a Toolset for the
                                  Efficient Deployment of a Medical Image
                                  Application on SCI-Based Clusters  . . . 851
   Tomás Hrúz and   
               Martin Becka and   
          Antonello Pasquarelli   SEEDS: Airport Management Database
                                  System . . . . . . . . . . . . . . . . . 861
           Stephen E. Ijaha and   
          Stephen C. Winter and   
               Nasser Kalantery   HIPERTRANS: High Performance Transport
                                  Network Modelling and Simulation
                                  (Research Note)  . . . . . . . . . . . . 869
                     Jose Duato   Topic 13 Routing and Communication in
                                  Interconnection Networks . . . . . . . . 875
       Constantinos Bartzis and   
        Ioannis Caragiannis and   
        Christos Kaklamanis and   
               Ioannis Vergados   Experimental Evaluation of Hot-Potato
                                  Routing Algorithms on $2$-Dimensional
                                  Processor Arrays (Research Note) . . . . 877
  José Carlos Sancho and   
                 Antonio Robles   Improving the Up*/Down* Routing Scheme
                                  for Networks of Workstations . . . . . . 882--889
    Ingebjòrg Theiss and   
                     Olav Lysne   Deadlock Avoidance for Wormhole Based
                                  Switches . . . . . . . . . . . . . . . . 890
        Mohamed Ould-Khaoua and   
                 Ahmad Khonsari   An Analytical Model of Adaptive Wormhole
                                  Routing with Deadlock Recovery (Research
                                  Note)  . . . . . . . . . . . . . . . . . 900
                 Geyong Min and   
            Mohamed Ould-Khaoua   Analysis of Pipelined Circuit Switching
                                  in Cube Networks (Research Note) . . . . 904
         Vicente Chirivella and   
                   Rosa Alcover   A New Reliability Model for
                                  Interconnection Networks . . . . . . . . 909
              Peter Sanders and   
                  Jop F. Sibeyn   A Bandwidth Latency Tradeoff for
                                  Broadcast and Reduction  . . . . . . . . 918
              Stefan Dobrev and   
                   Imrich Vrt'o   Optimal Broadcasting in Even Tori with
                                  Dynamic Faults (Research Note) . . . . . 927
              Petr Salinger and   
            Pavel Tvrdík   Broadcasting in All-Port Wormhole $3$-D
                                  Meshes of Trees (Research Note)  . . . . 931
              Jehad Al-Sadi and   
                 Khaled Day and   
            Mohamed Ould-Khaoua   Probability-Based Fault-Tolerant Routing
                                  in Hypercubes (Research Note)  . . . . . 935
                 Kemal Ebcioglu   Topic 14 Instruction-Level Parallelism
                                  and Processor Architecture . . . . . . . 939
             Carlos Navarro and   
        Alex Ramírez and   
       Josep-L. Larriba-Pey and   
                   Mateo Valero   On the Performance of Fetch Engines
                                  Running DSS Workloads  . . . . . . . . . 940
               Jan Hoogerbrugge   Cost-Efficient Branch Target Buffers . . 950
             Enric Morancho and   
José María Llabería and   
           \`Angel Olivé   Two-Level Address Storage and Address
                                  Prediction (Research Note) . . . . . . . 960
              Marian Stanca and   
       Stamatis Vassiliadis and   
             Sorin Cotofana and   
                 Henk Corporaal   Hashed Addressed Caches for Embedded
                                  Pointer Based Codes (Research Note)  . . 965
                Mihai Budiu and   
                  Majd Sakr and   
                 Kip Walker and   
              Seth C. Goldstein   BitValue Inference: Detecting and
                                  Exploiting Narrow Bitwidth Computations  969
           Douglas Aberdeen and   
                Jonathan Baxter   General Matrix-Matrix Multiplication
                                  Using SIMD Features of the PIII
                                  (Research Note)  . . . . . . . . . . . . 980
              Thomas Y. Yeh and   
                      Hong Wang   Redundant Arithmetic Optimizations
                                  (Research Note)  . . . . . . . . . . . . 984
              Kevin D. Rich and   
             Matthew K. Farrens   The Decoupled-Style Prefetch
                                  Architecture (Research Note) . . . . . . 989
                Lee-Ren Ton and   
           Lung-Chung Chang and   
               Chung-Ping Chung   Exploiting Java Bytecode Parallelism by
                                  Enhanced POC Folding Model (Research
                                  Note)  . . . . . . . . . . . . . . . . . 994
           Kristof E. Beyls and   
            Erik H. D'Hollander   Cache Remapping to Improve the
                                  Performance of Tiled Algorithms  . . . . 998
              Kevin D. Rich and   
             Matthew K. Farrens   Code Partitioning in Decoupled Compilers 1008
           Darko Stefanovic and   
             Margaret Martonosi   Limits and Graph Structure of Available
                                  Instruction-Level Parallelism (Research
                                  Note)  . . . . . . . . . . . . . . . . . 1018
         Hiroyasu Nishiyama and   
             Keiko Motokawa and   
            Ichiro Kyushima and   
                  Sumio Kikuchi   Pseudo-vectorizing Compiler for the
                                  SR8000 (Research Note) . . . . . . . . . 1023
                    Gul A. Agha   Topic 15 Object Oriented Architectures,
                                  Tools, and Applications  . . . . . . . . 1029
                    Ton Ngo and   
                    John Barton   Debugging by Remote Reflection . . . . . 1031
            Gabriel Antoniu and   
           Luc Bougé and   
             Philip Hatcher and   
               Mark MacBeth and   
             Keith McGuigan and   
                 Raymond Namyst   Compiling Multithreaded Java Bytecode
                                  for Distributed Execution (Distinguished
                                  Paper) . . . . . . . . . . . . . . . . . 1039
              Hsin-Ta Chiao and   
               Chi-Houng Wu and   
                Shyan-Ming Yuan   A More Expressive Monitor for Concurrent
                                  Java Programming . . . . . . . . . . . . 1053
Frédéric Dang Tran and   
          Anne Gérodolle   An Object-Oriented Software Framework
                                  for Large-Scale Networked Virtual
                                  Environments . . . . . . . . . . . . . . 1061
            Jörg Nolte and   
             Mitsuhisa Sato and   
                Yutaka Ishikawa   TACO -- Dynamic Distributed Collections
                                  with Templates and Topologies  . . . . . 1071
           Tobias Grundmann and   
                Marcus Ritt and   
            Wolfgang Rosenstiel   Object-Oriented Message-Passing with
                                  TPO++ (Research Note)  . . . . . . . . . 1081
              Manfred Schimmler   Topic 17 Architectures and Algorithms
                                  for Multimedia Applications  . . . . . . 1085
              Shietung Peng and   
             Stanislav Sedukhin   Design of Multi-dimensional DCT Array
                                  Processors for Video Applications  . . . 1086
                 Bertil Schmidt   Design of a Parallel Accelerator for
                                  Volume Rendering . . . . . . . . . . . . 1095
                Henjo Schot and   
                 Henk Corporaal   Automated Design of an ASIP for Image
                                  Processing Applications (Research Note)  1105
             Alice Bonhomme and   
                 Lo\"\ic Prylli   A Distributed Storage System for a
                                  Video-on-Demand Server (Research Note)   1110
             Rajkumar Buyya and   
                 Mark Baker and   
             Daniel C. Hyde and   
           Djamshid Tavangarian   Topic 18 Cluster Computing . . . . . . . 1115
                Felix Rauch and   
          Christian Kurmann and   
             Thomas M. Stricker   Partition Cast -- Modelling and
                                  Optimizing the Distribution of Large
                                  Data Sets in PC Clusters (Distinguished
                                  Paper) . . . . . . . . . . . . . . . . . 1118
                   Weiwu Hu and   
                Fuxin Zhang and   
                    Haiming Liu   A New Home-Based Software DSM Protocol
                                  for SMP Clusters . . . . . . . . . . . . 1132
             Ronan Cunniffe and   
               Brian A. Coghlan   Encouraging the Unexpected: Cluster
                                  Management for OS and Systems Research
                                  (Research Note)  . . . . . . . . . . . . 1143
         Vladimir Shurbanov and   
            Dimiter Avresky and   
               Pankaj Mehra and   
                 William Watson   Flow Control in ServerNet R Clusters . . 1148
      Hernâni Pedroso and   
      João Gabriel Silva   The WMPI Library Evolution: Experience
                                  with MPI Development for Windows
                                  Environments . . . . . . . . . . . . . . 1157
           Francesc Solsona and   
       Francesc Giné and   
  Porfidio Hernández and   
                   Emilio Luque   Implementing Explicit and Implicit
                                  Coscheduling in a PVM Environment
                                  (Research Note)  . . . . . . . . . . . . 1165
              Zoltan Juhasz and   
                Laszlo Kesmarki   A Jini-Based Prototype Metacomputing
                                  Framework (Research Note)  . . . . . . . 1171
            Marco Danelutto and   
         Massimiliano Stigliani   SKElib: Parallel Programming with
                                  Skeletons in C . . . . . . . . . . . . . 1175
               Claus Wagner and   
                  Frank Mueller   Token-Based Read/Write-Locks for
                                  Distributed Mutual Exclusion . . . . . . 1185
         Wolfgang Schreiner and   
      Christian Mittermaier and   
                  Franz Winkler   On Solving a Problem in Algebraic
                                  Geometry by Cluster Computing (Research
                                  Note)  . . . . . . . . . . . . . . . . . 1196
               Eric Renault and   
               Pierre David and   
                 Paul Feautrier   PCI--DDC Application Programming
                                  Interface: Performance in User-Level
                                  Messaging (Research Note)  . . . . . . . 1201
              Vicente Arnau and   
      Juan M. Orduña and   
            Salvador Moreno and   
             Rodrigo Valero and   
                   Aurelio Ruiz   A Clustering Approach for Improving
                                  Network Performance in Heterogeneous
                                  Systems (Research Note)  . . . . . . . . 1206
        Alexander Reinefeld and   
               Geoffrey Fox and   
         Domenico Laforenza and   
                  Edward Seidel   Topic 19 Metacomputing . . . . . . . . . 1211
           Dorian C. Arnold and   
            Dieter Bachmann and   
                  Jack Dongarra   Request Sequencing: Optimizing
                                  Communication for the Grid . . . . . . . 1213
         Stephan Kindermann and   
                   Torsten Fink   An Architectural Meta-application Model
                                  for Coarse Grained Metacomputing . . . . 1223
           Michael O. Neary and   
                Alan Phipps and   
             Steven Richman and   
                 Peter Cappello   Javelin 2.0: Java-Based Parallel
                                  Computing on the Internet  . . . . . . . 1231
          Tsunehiko Kamachi and   
              Thierry Priol and   
         Christophe René   Data Distribution for Parallel CORBA
                                  Objects  . . . . . . . . . . . . . . . . 1239
              Rajeev Thakur and   
                Rolf Hempel and   
          Elizabeth Shriver and   
                  Peter Brezany   Topic 20 Parallel I/O and Storage
                                  Technology . . . . . . . . . . . . . . . 1251
          Jean-Pierre Prost and   
           Richard Treumann and   
             Richard Hedges and   
              Alice Koniges and   
                   Alison White   Towards a High-Performance
                                  Implementation of MPI--IO on Top of GPFS 1253
               Gokhan Memik and   
         Mahmut T. Kandemir and   
                 Alok Choudhary   Design and Evaluation of a
                                  Compiler-Directed Collective I/O
                                  Technique  . . . . . . . . . . . . . . . 1263
          Rolf Rabenseifner and   
               Alice E. Koniges   Effective File-I/O Bandwidth Benchmark   1273
               Prasenjit Sarkar   Instant Image: Transitive and Cyclical
                                  Snapshots in Distributed Storage Volumes 1284
                Sachin More and   
                 Alok Choudhary   Scheduling Queries for Tape-Resident
                                  Data . . . . . . . . . . . . . . . . . . 1292
                  Ying Chen and   
             Windsor W. Hsu and   
               Honesty C. Young   Logging RAID --- An Approach to Fast,
                                  Reliable, and Low-Cost Disk Arrays . . . 1302
       José C. Cunha and   
            David W. Walker and   
              Thierry Priol and   
              Wolfgang Gentzsch   Topic 21 Problem Solving Environments    1313
         Hans-Peter Kersken and   
          Andreas Schreiber and   
           Martin Strietzel and   
              Michael Faden and   
               Regine Ahrem and   
                 Peter Post and   
                 Klaus Wolf and   
              Armin Beckert and   
             Thomas Gerholt and   
              Ralf Heinrich and   
            Edmund Kügeler   AMANDA --- A Distributed System for
                                  Aircraft Design  . . . . . . . . . . . . 1315
               Helen Wright and   
                Ken Brodlie and   
                 Jason Wood and   
                    Jim Procter   Problem Solving Environments: Extending
                                  the Rôle of Visualization Systems . . . . 1323
          Rajeev Muralidhar and   
                Samian Kaur and   
                Manish Parashar   An Architecture for Web-Based
                                  Interaction and Steering of Adaptive
                                  Parallel/Distributed Applications  . . . 1332
            David Lancaster and   
                  Jeff S. Reeve   Computational Steering in Problem
                                  Solving Environments (Research Note) . . 1340
               Omer F. Rana and   
                 Maozhen Li and   
         Matthew S. Shields and   
            David W. Walker and   
                    David Golby   Implementing Problem Solving
                                  Environments for Computational Science
                                  (Research Note)  . . . . . . . . . . . . 1345
             Matthias Brehm and   
             Reinhold Bader and   
              Helmut Heller and   
                     Ralf Ebner   Pseudovectorization, SMP, and Message
                                  Passing on the Hitachi SR8000--F1  . . . 1351
                      Anonymous   Index of Authors . . . . . . . . . . . . 1363


Lecture Notes in Computer Science
Volume 1930, 2001

              Luis M. Laita and   
            Luis de Ledesma and   
      Eugenio Roanes-Lozano and   
                Alberto Brunori   George Boole, a Forerunner of Symbolic
                                  Computation  . . . . . . . . . . . . . . 1
                    Marc Knoppe   Artificial Intelligence as a Decision
                                  Tool for Efficient Strategic and
                                  Operational Management . . . . . . . . . 20
               Michael Kohlhase   OMDOC: Towards an Internet Standard for
                                  the Administration, Distribution, and
                                  Teaching of Mathematical Knowledge . . . 32
              Olga Caprotti and   
               Martijn Oostdijk   On Communicating Proofs in Interactive
                                  Mathematical Documents . . . . . . . . . 53
             Jacques Calmet and   
             Peter Kullmann and   
                   Morio Taneda   Composite Distributive Lattices as
                                  Annotation Domains for Mediators . . . . 65
      Guilherme Bittencourt and   
                   Isabel Tonin   A Proof Strategy Based on a Dual
                                  Representation . . . . . . . . . . . . . 78
José-Luis Ruiz-Reina and   
 José-Antonio Alonso and   
María-José Hidalgo and   
Francisco-Jesús Martín-Mateos   Formalizing Rewriting in the ACL2
                                  Theorem Prover . . . . . . . . . . . . . 92
     Angel Fernandez Pineda and   
              Enric Trillas and   
              Claudio Vaucheret   Additional Comments on Conjectures,
                                  Hypotheses, and Consequences in
                                  Orthocomplemented Lattices . . . . . . . 107
          Robert M. Corless and   
         James H. Davenport and   
           David J. Jeffrey and   
               Gurjeet Litt and   
                Stephen M. Watt   Reasoning about the Elementary Functions
                                  of Complex Analysis  . . . . . . . . . . 115
            Martine Ceberio and   
           Laurent Granvilliers   Solving Nonlinear Systems by Constraint
                                  Inversion and Interval Arithmetic  . . . 127
              Carlos Castro and   
                   Eric Monfroy   Basic Operators for Solving Constraints
                                  via Collaboration of Solvers . . . . . . 142
Eugenio Roanes-Macías and   
          Eugenio Roanes-Lozano   Automatic Determination of Geometric
                                  Loci. $3$D-Extension of Simson-Steiner
                                  Theorem  . . . . . . . . . . . . . . . . 157
          Robert M. Corless and   
         Mark W. Giesbrecht and   
         Ilias S. Kotsireas and   
                Stephen M. Watt   Numerical Implicitization of Parametric
                                  Hypersurfaces with Linear Algebra  . . . 174
               Jochen Pfalzgraf   A Note on Modeling Connectionist Network
                                  Structures: Geometric and Categorical
                                  Aspects  . . . . . . . . . . . . . . . . 184
            Andres Iglesias and   
            Akemi Gálvez   A New Artificial Intelligence Paradigm
                                  for Computer-Aided Geometric Design  . . 200
                Andres Iglesias   How Symbolic Computation Can Benefit
                                  Computer-Aided Geometric Design  . . . . 214
             Zahir Maazouzi and   
      Nirina Andrianarivelo and   
            Wadoud Bousdira and   
                 Jacques Chabin   CDR: a Rewriting Based Tool to Design
                                  FPLA Circuits  . . . . . . . . . . . . . 219
                    Julio Rubio   Locally Effective Objects and Artificial
                                  Intelligence . . . . . . . . . . . . . . 223
                Marco A. Arranz   Negotiation Algorithms for Multi-agent
                                  Interactions . . . . . . . . . . . . . . 227
         Thierry Boy de la Tour   Some Techniques of Isomorph-Free Search  240
                      Anonymous   Author Index . . . . . . . . . . . . . . 253


Lecture Notes in Computer Science
Volume 1936, 2001

             Paul Robertson and   
             Robert Laddaga and   
                   Howie Shrobe   Introduction: The First International
                                  Workshop on Self-Adaptive Software . . . 1
                 Robert Laddaga   Active Software  . . . . . . . . . . . . 11
          Leon J. Osterweil and   
                 Lori A. Clarke   Continuous Self-Evaluation for the
                                  Self-Improvement of Software . . . . . . 27
              Howard Shrobe and   
                      Jon Doyle   Active Trust Management for Autonomous
                                  Adaptive Survivable Systems  . . . . . . 40
             Du\vsko Pavlovi\'c   Towards Semantics of Self-Adaptive
                                  Software . . . . . . . . . . . . . . . . 50
                   Alex C. Meng   On Evaluating Self-Adaptive Software . . 65
        Mieczyslaw M. Kokar and   
           Kevin M. Passino and   
          Kenneth Baclawski and   
               Jeffrey E. Smith   Mapping an Application to a Control
                                  Architecture: Specification of the
                                  Problem  . . . . . . . . . . . . . . . . 75
                Gyula Simon and   
Tamás Kovácsházy and   
     Gábor Péceli   Transient Management in Reconfigurable
                                  Systems  . . . . . . . . . . . . . . . . 90
               Akos Ledeczi and   
                Arpad Bakay and   
                  Miklos Maroti   Model-Integrated Embedded Systems  . . . 99
              Prasanta Bose and   
               Mark G. Matthews   Coordination of View Maintenance Policy
                                  Adaptation Decisions: a
                                  Negotiation-Based Reasoning Approach . . 116
           Israel Ben-Shaul and   
                Hovav Gazit and   
               Ophir Holder and   
                    Boris Lavva   Dynamic Self Adaptation in Distributed
                                  Systems  . . . . . . . . . . . . . . . . 134
              David J. Musliner   Imposing Real-Time Constraints on
                                  Self-Adaptive Controller Synthesis . . . 143
           Deepak Karuppiah and   
             Patrick Deegan and   
             Elizeth Araujo and   
                Yunlei Yang and   
               Gary Holness and   
                Zhigang Zhu and   
             Barbara Lerner and   
             Roderic Grupen and   
                 Edward Riseman   Software Mode Changes for Continuous
                                  Motion Tracking  . . . . . . . . . . . . 161
             Kevin R. Dixon and   
           Theodore Q. Pham and   
              Pradeep K. Khosla   Port-Based Adaptable Agent Architecture  181
                 Paul Robertson   An Architecture for Self-Adaptation and
                                  Its Application to Aerial Image
                                  Understanding  . . . . . . . . . . . . . 199
                   Steven Reece   Self-Adaptive Multi-sensor Systems . . . 224
             Robert Laddaga and   
             Paul Robertson and   
                   Howie Shrobe   Results of the First International
                                  Workshop on Self Adaptive Software . . . 242
                      Anonymous   Author Index . . . . . . . . . . . . . . 249


Lecture Notes in Computer Science
Volume 1944, 2001

               Malcolm Atkinson   Persistence and Java -- A Balancing Act  1
                Suad Alagic and   
                   Tuong Nguyen   Parametric Polymorphism and Orthogonal
                                  Persistence  . . . . . . . . . . . . . . 32
            Philippe Collet and   
                  Greta Vignola   Towards a Consistent Viewpoint on
                                  Consistency for Persistent Applications  47
             Misha Dmitriev and   
                 Craig Hamilton   Towards Scalable and Recoverable Object
                                  Evolution for the PJama Persistent
                                  Platform . . . . . . . . . . . . . . . . 61
             Jerome Darmont and   
       Christophe Fromantin and   
    Stephane Régnier and   
               Le Gruenwald and   
               Michel Schneider   Dynamic Clustering in Object-Oriented
                                  Databases: An Advocacy for Simplicity    71
                    Zhen He and   
             Alonso Marquez and   
              Stephen Blackburn   Opportunistic Prioritised Clustering
                                  Framework (OPCF) . . . . . . . . . . . . 86
               Awais Rashid and   
               Peter Sawyer and   
             Elke Pulvermueller   A Flexible Approach for Instance
                                  Adaptation During Class Versioning . . . 101
          Kajal T. Claypool and   
      Chandrakant Natarajan and   
          Elke A. Rundensteiner   Optimizing Performance of Schema
                                  Evolution Sequences  . . . . . . . . . . 114
          Mohamed G. Elfeky and   
              Amani A. Saad and   
               Souheir A. Fouad   ODMQL: Object Data Mining Query Language 128
      Alberto Abelló and   
          José Samos and   
                 F\`elix Saltor   Benefits of an Object-Oriented
                                  Multidimensional Data Model  . . . . . . 141
               Christine Collet   The NODS Project: Networked Open
                                  Database Services  . . . . . . . . . . . 153
               Marlon Dumas and   
             Chaouki Daassi and   
     Marie-Christine Fauvet and   
                 Laurence Nigay   Pointwise Temporal Object Database
                                  Browsing . . . . . . . . . . . . . . . . 170
Miguel A. Sicilia Urbán and   
Elena García Barriocanal and   
          Juan M. Dodero Beardo   Towards a Unified Query-by-Example
                                  (UQBE): UML as a Basis for a Generic
                                  Graphical Query Language . . . . . . . . 185
          Klaus R. Dittrich and   
          Giovanna Guerrini and   
             Isabella Merlo and   
                Marta Oliva and   
      M. Elena Rodríguez   Concluding Remarks . . . . . . . . . . . 197
                      Anonymous   Author Index . . . . . . . . . . . . . . 199


Lecture Notes in Computer Science
Volume 1946, 2001

          Timothy N. Wright and   
      T. C. Nicholas Graham and   
                     Tore Urnes   Specifying Temporal Behaviour in
                                  Software Architectures for Groupware
                                  Systems  . . . . . . . . . . . . . . . . 1
                  Chris Johnson   Questioning the Foundations of Utility
                                  for Quality of Service in Interface
                                  Development  . . . . . . . . . . . . . . 19
                 F. Vernier and   
                       L. Nigay   A Framework for the Combination and
                                  Characterization of Output Modalities    35
                Maria Kutar and   
              Carol Britton and   
            Chrystopher Nehaniv   Specifying Multiple Time Granularities
                                  in Interactive Systems . . . . . . . . . 51
           James S. Willans and   
            Michael D. Harrison   Verifying the Behaviour of Virtual
                                  Environment World Objects  . . . . . . . 65
             Joanna Lumsden and   
                    Philip Gray   SUIT --- Context Sensitive Evaluation of
                                  User Interface Development Tools . . . . 79
              David Navarre and   
          Philippe Palanque and   
        Rémi Bastide and   
                     Ousmane Sy   Structuring Interactive Systems
                                  Specifications for Executability and
                                  Prototypability  . . . . . . . . . . . . 97
              Murray Crease and   
                Philip Gray and   
               Stephen Brewster   A Toolkit of Mechanism and Context
                                  Independent Widgets  . . . . . . . . . . 121
            Fabio Patern\`o and   
                 Carmen Santoro   Integrating Model Checking and HCI Tools
                                  to Help Designers Verify User Interface
                                  Properties . . . . . . . . . . . . . . . 135
                   Anke Dittmar   More Precise Descriptions of Temporal
                                  Relations within Task Models . . . . . . 151
               Karsten Loer and   
               Michael Harrison   Formal Interactive Systems Analysis and
                                  Usability Inspection Methods: Two
                                  Incompatible Worlds? . . . . . . . . . . 169
          Nuno Jardim Nunes and   
João Falcão e Cunha   Wisdom --- A UML Based Architecture for
                                  Interactive Systems  . . . . . . . . . . 191
        Paulo Pinheiro da Silva   User Interface Declarative Models and
                                  Development Environments: a Survey . . . 207
           Quentin Limbourg and   
          Jean Vanderdonckt and   
               Nathalie Souchon   The Task-Dialog and Task-Presentation
                                  Mapping Problem: Some Preliminary
                                  Results  . . . . . . . . . . . . . . . . 227
                      Anonymous   Subject Index  . . . . . . . . . . . . . 247
                      Anonymous   Author Index . . . . . . . . . . . . . . 251


Lecture Notes in Computer Science
Volume 1947, 2001

         Jari Järvinen and   
               Juha Haataja and   
 Jari Hämäläinen   Industrial Applications: Challenges in
                                  Modeling and Computing . . . . . . . . . 1
                 Carl Kesselman   Data Grids for Next Generation Problems
                                  in Science and Engineering . . . . . . . 17
                 Erik Hagersten   High-Performance Computers: Yesterday,
                                  Today, and Tomorrow  . . . . . . . . . . 18
                Timothy Mattson   The Evolution of OpenMP  . . . . . . . . 19
         Michael Philippsen and   
         Ronald F. Boisvert and   
          Valdimir S. Getov and   
                Roldan Pozo and   
        José Moreira and   
              Dennis Gannon and   
                Geoffrey C. Fox   JavaGrande --- High Performance
                                  Computing with Java  . . . . . . . . . . 20
                   Geir Evensen   Ocean and Climate Prediction on Parallel
                                  Super Computers  . . . . . . . . . . . . 37
         Bjarne S. Andersen and   
             Fred Gustavson and   
       Alexander Karaivanov and   
             Minka Marinova and   
         Jerzy Wa\'sniewski and   
                 Plamen Yalamov   LAWRA: Linear Algebra with Recursive
                                  Algorithms . . . . . . . . . . . . . . . 38--51
                     Bill Gropp   Solving CFD Problems with Open Source
                                  Parallel Libraries . . . . . . . . . . . 52
               Erik Elmroth and   
                 Fred Gustavson   High-Performance Library Software for QR
                                  Factorization  . . . . . . . . . . . . . 53
               Isak Jonsson and   
         Bo Kågström   Parallel Triangular Sylvester-Type
                                  Matrix Equation Solvers for SMP Systems
                                  Using Recursive Blocking . . . . . . . . 64
         Raimondas \vCiegis and   
    Vadimas Starikovi\vcius and   
             Jerzy Wa\'sniewski   On the Efficiency of Scheduling
                                  Algorithms for Parallel Gaussian
                                  Elimination with Communication Delays    74
             Fred Gustavson and   
                   Isak Jonsson   High Performance Cholesky Factorization
                                  via Blocking and Recursion That Uses
                                  Minimal Storage  . . . . . . . . . . . . 82
       Björn Adlerborn and   
           Krister Dackland and   
         Bo Kågström   Parallel Two-Stage Reduction of a
                                  Regular Matrix Pair to
                                  Hessenberg-Triangular Form . . . . . . . 92
             Fred Gustavson and   
       Alexander Karaivanov and   
             Minka Marinova and   
         Jerzy Wa\'sniewski and   
                 Plamen Yalamov   A Fast Minimal Storage Symmetric
                                  Indefinite Solver  . . . . . . . . . . . 103
               David Goudin and   
                     Jean Roman   A Scalable Parallel Assembly for
                                  Irregular Meshes Based on a Block
                                  Distribution for a Parallel Block Direct
                                  Solver . . . . . . . . . . . . . . . . . 113
         Patrick R. Amestoy and   
               Iain S. Duff and   
      Jean-Yves L'Excellent and   
                   Jacko Koster   MUMPS: a General Purpose Distributed
                                  Memory Sparse Solver . . . . . . . . . . 121
                Masha Sosonkina   Runtime Adaptation of an Iterative
                                  Linear System Solution to Distributed
                                  Environments . . . . . . . . . . . . . . 131
               Jarmo Rantakokko   A Local Refinement Algorithm for Data
                                  Partitioning . . . . . . . . . . . . . . 140
              T. L. Freeman and   
              D. J. Hancock and   
                 J. M. Bull and   
                     R. W. Ford   Feedback Guided Scheduling of Nested
                                  Loops  . . . . . . . . . . . . . . . . . 149
           Johan Steensland and   
      Stefan Söderberg and   
           Michael Thuné   A Comparison of Partitioning Schemes for
                                  Blockwise Parallel SAMR Algorithms . . . 160
              Jörn Behrens   Parallelizing an Adaptive Dynamical Grid
                                  Generator in a Climatological Trace Gas
                                  Transport Application  . . . . . . . . . 170
       Michael Thuné and   
          Stefan Söderberg   Optimal Parameter Values for a Parallel
                                  Structured Adaptive Mesh Refinement
                                  Algorithm  . . . . . . . . . . . . . . . 177
        Noureddine Bouhmala and   
                       Xing Cai   Partition of Unstructured Finite Element
                                  Meshes by a Multilevel Approach  . . . . 187
         Tor Sòrevik and   
            Jan Frode Myklebust   GRISK: An Internet Based Search for
                                  $K$-Optimal Lattice Rules  . . . . . . . 196
 Krisztián Monostori and   
           Arkady Zaslavsky and   
                  Heinz Schmidt   Parallel and Distributed Document
                                  Overlap Detection on the Web . . . . . . 206
                     U. Der and   
             K. Steinhöfel   A Parallel Implementation of a Job Shop
                                  Scheduling Heuristic . . . . . . . . . . 215
               Rocco Aversa and   
       Beniamino Di Martino and   
                Nicola Mazzocca   Restructuring Irregular Computations for
                                  Distributed Systems Using Mobile Agents  223
               Harald Kosch and   
              Renata S\lota and   
Lászlo Böszörményi and   
             Jacek Kitowski and   
              Janusz Otfinowski   An Information System for Long-Distance
                                  Cooperation in Medicine  . . . . . . . . 233
               Marian Bubak and   
              Pawe\l P\laszczak   Hydra --- Decentralized and Adaptative
                                  Approach to Distributed Computing  . . . 242--249
          Roman Wyrzykowski and   
                Tomasz Olas and   
               Norbert Sczygiol   Object-Oriented Approach to Finite
                                  Element Modeling on Clusters . . . . . . 250
                 Beidi S. Hamma   An Object Oriented Framework for
                                  Parallel Multiple Optimizations  . . . . 258
            R. B. Yehezkael and   
                 Y. Wiseman and   
           H. G. Mendelbaum and   
                   I. L. Gordin   Experiments in Separating Computational
                                  Algorithm from Program Distribution and
                                  Communication  . . . . . . . . . . . . . 268
              Holger Brunst and   
          Wolfgang E. Nagel and   
                  Stephan Seidl   Performance Tuning on Parallel Systems:
                                  All Problems Solved? . . . . . . . . . . 279
               Marian Bubak and   
        W\lodzimierz Funika and   
               Bartosz Bali and   
          Roland Wismüller   Performance Measurement Support for MPI
                                  Applications with PATOP  . . . . . . . . 288
                 Sung-Up Jo and   
               Chang-Sung Jeong   A Parallel Volume Visualization Using
                                  Extended Space Leaping Method  . . . . . 296
       Christian H. Bischof and   
      H. Martin Bücker and   
         Jörg Henrichs and   
                     Bruno Lang   Hands-On Training for Undergraduates in
                                  High-Performance Computing Using Java    306
              Daisuke Takahashi   A Parallel $3$-D FFT Algorithm on
                                  Clusters of Vector SMPs  . . . . . . . . 316
             Lars Paul Huse and   
              Håkon Bugge   High-End Computing on SHV Workstations
                                  Connected with High Performance Network  324
                   C. Adler and   
                  J. Berger and   
                  D. Flierl and   
                H. Helstrup and   
                J. S. Lange and   
                    J. Lien and   
            V. Lindenstruth and   
            D. Röhrich and   
              D. Schmischke and   
                  M. Schulz and   
                  B. Skaali and   
             H. K. Sollveit and   
               T. Steinbeck and   
                   R. Stock and   
                  C. Struck and   
                K. Ullaland and   
           A. Vestbò and   
                    A. Wiebalck   From the Big Bang to Massive Data Flow:
                                  Parallel Computing in High Energy
                                  Physics Experiments  . . . . . . . . . . 333
                    M. Amor and   
           F. Argüello and   
            J. López and   
                   O. Plata and   
                   E. L. Zapata   A Data Parallel Formulation of the
                                  Barnes--Hut Method for $N$-Body
                                  Simulations  . . . . . . . . . . . . . . 342
                  Peter Messmer   Par-T: a Parallel Relativistic Fully
                                  $3$D Electromagnetic Particle-in-Cell
                                  Code . . . . . . . . . . . . . . . . . . 350
                 T. Matthey and   
                   J. P. Hansen   Evaluation of MPI's One-Sided
                                  Communication Mechanism for Short-Range
                                  Molecular Dynamics on the Origin2000 . . 356
          João Silva and   
                   Paulo Guedes   Ship Hull Hydrodynamic Analysis Using
                                  Distributed Shared Memory  . . . . . . . 366
  Petter E. Bjòrstad and   
               Jacko Koster and   
           Piotr Krzy\.zanowski   Domain Decomposition Solvers for Large
                                  Scale Industrial Finite Element Problems 373
           Rossella Cancelliere   A High Parallel Procedure to Initialize
                                  the Output Weights of a Radial Basis
                                  Function or BP Neural Network  . . . . . 384
     Felicja Okulicka-Dluzewska   High-Performance Computing in
                                  Geomechanics by a Parallel Finite
                                  Element Approach . . . . . . . . . . . . 391
                      Anonymous   Author Index . . . . . . . . . . . . . . 399


Lecture Notes in Computer Science
Volume 1951, 2001

           Frank van der Linden   Introduction . . . . . . . . . . . . . . 1
            Jan Gerben Wijnstra   Component Frameworks for a Medical
                                  Imaging Product Family . . . . . . . . . 4
                 Robert L. Nord   Meeting the Product Line Goals for an
                                  Embedded Real-Time System  . . . . . . . 19
          Hans Peter Jepsen and   
               Flemming Nielsen   A Two-Part Architectural Model as Basis
                                  for Frequency Converter Product Families 30
               Dewayne E. Perry   A Product Line Architecture for a
                                  Network Product  . . . . . . . . . . . . 39
              Julio Mellado and   
              Manuel Sierra and   
                 Ana Romera and   
          Juan C. Dueñas   Railway-Control Product Families: The
                                  Alcatel TAS Platform Experience  . . . . 53
        Günter Böckle   Discussion Report ``Business'' Session   63
               Klaus Schmid and   
                 Michael Schank   PuLSE--BEAT -- A Decision Support Tool
                                  for Scoping Product Lines  . . . . . . . 65
          Sergio Bandinelli and   
       Goiuri Sagardui Mendieta   Domain Potential Analysis: Calling the
                                  Attention on Business Issues of
                                  Product-Lines  . . . . . . . . . . . . . 76
             Douglas Stuart and   
                Wonhee Sull and   
                     T. W. Cook   Dependency Navigation in Product Lines
                                  Using XML  . . . . . . . . . . . . . . . 82
               Juha Kuusela and   
                      Jan Bosch   Summary of Product Family Concepts
                                  Session  . . . . . . . . . . . . . . . . 94
            Alexander Egyed and   
               Nikunj Mehta and   
        Nenad Medvidovíc   Software Connectors and Refinement in
                                  Family Architectures . . . . . . . . . . 96
         Alessandro Maccari and   
           Antti-Pekka Tuovinen   System Family Architectures: Current
                                  Challenges at Nokia  . . . . . . . . . . 107
                  Paul Clements   Product Family Methods . . . . . . . . . 116
                      Jan Bosch   Organizing for Software Product Lines    117
       Tuomo Vehkomäki and   
    Kari Känsälä   A Comparison of Software Product Family
                                  Process Frameworks . . . . . . . . . . . 135
           Mikael Svahnberg and   
                      Jan Bosch   Issues Concerning Variability in
                                  Software Product Lines . . . . . . . . . 146
       Rodrigo Cerón and   
      Juan C. Dueñas and   
           Juan A. de la Puente   A First Assessment of Development
                                  Processes with Respect to Product Lines
                                  and Component Based Development  . . . . 158
                  Jan Bosch and   
                  Alexander Ran   Evolution of Software Product Families   168
                 David M. Weiss   Product Family Techniques Session  . . . 184
               Rob van Ommering   Beyond Product Families: Building a
                                  Product Population?  . . . . . . . . . . 187
             Pierre America and   
              Jan van Wijgerden   Requirements Modeling for Families of
                                  Complex Systems  . . . . . . . . . . . . 199
              Joachim Bayer and   
               Oliver Flege and   
                 Cristina Gacek   Creating Product Line Architectures  . . 210
            Alan Stephenson and   
              Darren Buttle and   
                  John McDermid   Extending Commonality Analysis for
                                  Embedded Control System Families . . . . 217
                  Tom Dolan and   
             Ruud Weterings and   
                 J. C. Wortmann   Stakeholder-Centric Assessment of
                                  Product Family Architecture  . . . . . . 225
       Frank van der Linden and   
                    Henk Obbink   ESAPS --- Engineering Software
                                  Architectures, Processes and Platforms
                                  for System Families  . . . . . . . . . . 244
                  Paul Clements   Product-Line Engineering . . . . . . . . 253
                      Anonymous   Author Index . . . . . . . . . . . . . . 255


Lecture Notes in Computer Science
Volume 1958, 2001

     Simone Fischer-Hübner   1. Introduction  . . . . . . . . . . . . 1
     Simone Fischer-Hübner   2. Privacy in the Global Information
                                  Society  . . . . . . . . . . . . . . . . 5
     Simone Fischer-Hübner   3. IT-Security . . . . . . . . . . . . . 35
     Simone Fischer-Hübner   4. Privacy-Enhancing Technologies  . . . 107
     Simone Fischer-Hübner   5. A Task-Based Privacy Model  . . . . . 167
     Simone Fischer-Hübner   6. Specification and Implementation of
                                  the Privacy Policy Following the
                                  Generalised Framework for Access
                                  Control-Approach . . . . . . . . . . . . 201
     Simone Fischer-Hübner   7. Concluding Remarks  . . . . . . . . . 259
     Simone Fischer-Hübner   Appendix A: Formal Mathematical Privacy
                                  Model  . . . . . . . . . . . . . . . . . 261
     Simone Fischer-Hübner   Appendix B: Implementation of a Hospital
                                  Scenario as a Demonstration Example  . . 325
                      Anonymous   References . . . . . . . . . . . . . . . 331


Lecture Notes in Computer Science
Volume 1959, 2001

          Ans A. G. Steuten and   
                Frank Dehne and   
           Reind P. van de Riet   WordNet++: a Lexicon Supporting the
                                  Color-X Method . . . . . . . . . . . . . 1
         Antonio L. Furtado and   
          Angelo E. M. Ciarlini   Generating Narratives from Plots Using
                                  Schema Information . . . . . . . . . . . 17
             Sylviane R. Schwer   Temporal Granularity Enlightened by
                                  Knowledge  . . . . . . . . . . . . . . . 30
            Martin Romacker and   
                       Udo Hahn   Coping with Different Types of Ambiguity
                                  Using a Uniform Context Handling
                                  Mechanism  . . . . . . . . . . . . . . . 42
      Andrés Montoyo and   
                 Manuel Palomar   WSD Algorithm Applied to a NLP System    54
                Odile Piton and   
                   Denis Maurel   ``Beijing Frowns and Washington Pays
                                  Close Attention'' Computer Processing of
                                  Relations between Geographical Proper
                                  Names in Foreign Affairs . . . . . . . . 66--78
                 Veda C. Storey   Understanding and Representing
                                  Relationship Semantics in Database
                                  Design . . . . . . . . . . . . . . . . . 79
             Harald Ullrich and   
              Sandeep Purao and   
                 Veda C. Storey   An Ontology for Classifying the
                                  Semantics of Relationships in Database
                                  Design . . . . . . . . . . . . . . . . . 91
             Igor Bolshakov and   
              Alexander Gelbukh   A Very Large Database of Collocations
                                  and Semantic Links . . . . . . . . . . . 103
               Farid Cerbah and   
    Jérôme Euzenat   Using Terminology Extraction to Improve
                                  Traceability from Formal Models to
                                  Textual Requirements . . . . . . . . . . 115
           Terje Brasethvik and   
                 Jon Atle Gulla   Natural Language Analysis for Semantic
                                  Document Modeling  . . . . . . . . . . . 127
               Alfs T. Berztiss   Domain Analysis and Queries in Context   141
              Leila Kosseim and   
 Stéphane Beauregard and   
                    Guy Lapalme   Using Information Extraction and Natural
                                  Language Generation to Answer E-Mail . . 152
             Eloi L. Favero and   
                  Jacques Robin   Using OLAP and Data Mining for Content
                                  Planning in Natural Language Generation  164
           Asanee Kawtrakul and   
            Frederic Andres and   
                  Kinji Ono and   
           Chaiwat Ketsuwan and   
              Nattakan Pengphon   Toward an Enhancement of Textual
                                  Database Retrieval Using NLP Techniques  176
      Abdelhamid Bouchachia and   
       Roland T. Mittermeir and   
               Heinz Pozewaunig   Document Identification by Shallow
                                  Semantic Analysis  . . . . . . . . . . . 190
Ramón Aragüés Peleato and   
Jean-Cédric Chappelier and   
                  Martin Rajman   Automated Information Extraction out of
                                  Classified Advertisements  . . . . . . . 203
         Roger H. L. Chiang and   
                 Cecil Chua and   
                 Veda C. Storey   A Smart Web Query Engine for Semantic
                                  Retrieval of Web Data and Its
                                  Application to E-Trading . . . . . . . . 215
               Ilvio Bruder and   
 Antje Düsterhöft and   
              Markus Becker and   
        Jochen Bedersdorfer and   
            Günter Neumann   GETESS: Constructing a Linguistic Search
                                  Index for an Internet Search Engine  . . 227
           Amalia Todirascu and   
 François de Beuvron and   
            Dan Gâlea and   
              Bernard Keith and   
      François Rousselot   Using Semantics for Efficient
                                  Information Retrieval  . . . . . . . . . 239
        Günther Fliedl and   
              Christian Kop and   
          Willi Mayerthaler and   
           Heinrich C. Mayr and   
              Christian Winkler   Guidelines for NL-Based Requirements
                                  Specifications in NIBA . . . . . . . . . 251
                Heather Fulford   Developing Document Analysis and Data
                                  Extraction Tools for Entity Modelling    265
     Paloma Martínez and   
      Ana García-Serrano   On the Automatization of Database
                                  Conceptual Modelling through Linguistic
                                  Engineering  . . . . . . . . . . . . . . 276
                Paul Rayson and   
                 Luke Emmet and   
              Roger Garside and   
                    Pete Sawyer   The REVERE Project: Experiments with the
                                  Application of Probabilistic NLP to
                                  Systems Engineering  . . . . . . . . . . 288
                 Helmut Horacek   Presenting Mathematical Concepts as an
                                  Example for Inference-Rich Domains . . . 301
        Klaus-Dieter Schewe and   
              Bernhard Thalheim   Modeling Interaction and Media Objects   313
            Maria Bergholtz and   
               Paul Johannesson   Validating Conceptual Models ---
                                  Utilising Analysis Patterns as an
                                  Instrument for Explanation Generation    325
                    Petia Wohed   Conceptual Patterns --- A Consolidation
                                  of Coad's and Wohed's Approaches . . . . 340
           Catherine Berrut and   
            Agn\`es Front-Conte   Patterns Retrieval System: a First
                                  Attempt  . . . . . . . . . . . . . . . . 352
          Alexander Maedche and   
                  Steffen Staab   Ontology Learning from Text  . . . . . . 364
               Afzal Ballim and   
Jean-Cédric Chappelier and   
              Martin Rajman and   
              Vincenzo Pallotta   ISIS: Interaction through Speech with
                                  Information Systems  . . . . . . . . . . 365
            Mohamed Khalifa and   
                      Rinky Lam   Effects of Hypertext Navigational
                                  Structure on Knowledge Acquisition . . . 366
               Afzal Ballim and   
                  Hatem Ghorbel   MEDIEVAL: a Navigation Tool Through
                                  Medieval Documents . . . . . . . . . . . 367
     Pablo Sanchez Torralba and   
      Ana García-Serrano   MESIA: a Web Site Assistant for Document
                                  Filtering  . . . . . . . . . . . . . . . 368
Jérôme Carr\`ere and   
Frédéric Cuppens and   
                  Claire Saurel   LE x IS: a Query Language to Scan
                                  Information Flow . . . . . . . . . . . . 369
    Véronique Plihon and   
                     Fei Wu and   
               Georges Gardarin   A Financial Data Mining Trading System   370
                      Anonymous   Author Index . . . . . . . . . . . . . . 371


Lecture Notes in Computer Science
Volume 1962, 2001

                  Moni Naor and   
                   Benny Pinkas   Efficient Trace and Revoke Schemes . . . 1
                   Francis Zane   Efficient Watermark Detection and
                                  Collusion Security . . . . . . . . . . . 21
               Pamela Samuelson   Towards More Sensible Anti-circumvention
                                  Regulations  . . . . . . . . . . . . . . 33
           Birgit Pfitzmann and   
             Ahmad-Reza Sadeghi   Self-Escrowed Cash against User
                                  Blackmailing . . . . . . . . . . . . . . 42
               Tomas Sander and   
              Amnon Ta-Shma and   
                      Moti Yung   Blind, Auditable Membership Proofs . . . 53
          Giovanni Di Crescenzo   Private Selective Payment Protocols  . . 72
        Pierre-Alain Fouque and   
          Guillaume Poupard and   
                  Jacques Stern   Sharing Decryption in the Context of
                                  Voting or Lotteries  . . . . . . . . . . 90
            Leon A. Pintsov and   
              Scott A. Vanstone   Postal Revenue Collection in the Digital
                                  Age  . . . . . . . . . . . . . . . . . . 105
             David Naccache and   
                  Jacques Stern   Signing on a Postcard  . . . . . . . . . 121
                      Moti Yung   Payment Systems: The Next Generation . . 136
            Els Van Herreweghen   Non-repudiation in SET: Open Issues  . . 140
Jean-Sébastien Coron and   
                Paul Kocher and   
                 David Naccache   Statistics and Secret Leakage  . . . . . 157
           Vitaly Shmatikov and   
               John C. Mitchell   Analysis of Abuse-Free Contract Signing  174
           David M'Ra\"\ihi and   
             David Naccache and   
               Michael Tunstall   Asymmetric Currency Rounding . . . . . . 192
                Barak D. Jolish   The Encryption Debate in Plaintext:
                                  National Security and Encryption in the
                                  United States and Israel . . . . . . . . 202
Apol\textperiodcenteredl\`onia Martínez Nadal and   
Josep Lluís Ferrer Gomila   Critical Comments on the European
                                  Directive on a Common Framework for
                                  Electronic Signatures and Certification
                                  Service Providers  . . . . . . . . . . . 225
           Patrick McDaniel and   
                    Aviel Rubin   A Response to ``Can We Eliminate
                                  Certificate Revocation Lists?''  . . . . 245
              David Pointcheval   Self-Scrambling Anonymizers  . . . . . . 259
      Stuart G. Stubblebine and   
               Paul F. Syverson   Authentic Attributes with Fine-Grained
                                  Anonymity Protection . . . . . . . . . . 276
                    Ben Handley   Resource-Efficient Anonymous Group
                                  Identification . . . . . . . . . . . . . 295
              Jaap-Henk Hoepman   Secret Key Authentication with
                                  Software-Only Verification . . . . . . . 313
                Barbara Fox and   
                Brian LaMacchia   Panel: Public Key Infrastructure: PKIX,
                                  Signed XML or Something Else?  . . . . . 327
                      Ian Grigg   Financial Cryptography in $7$ Layers . . 332
             Mark S. Miller and   
           Chip Morningstar and   
                    Bill Frantz   Capability-Based Financial Instruments   349
                      Anonymous   Author Index . . . . . . . . . . . . . . 379


Lecture Notes in Computer Science
Volume 1964, 2001

             Walter Cazzola and   
              Shigeru Chiba and   
                  Thomas Ledoux   Reflection and Meta-level Architectures:
                                  State of the Art and Future Trends . . . 1
       Alexander Romanovsky and   
            Christophe Dony and   
Jòrgen Lindskov Knudsen and   
                 Anand Tripathi   Exception Handling in Object Oriented
                                  Systems  . . . . . . . . . . . . . . . . 16
      Francisco Ballesteros and   
             Frank Schubert and   
             Ashish Singhai and   
    Dario Alvarez Gutierrez and   
                 Reinhard Meyer   Object-Orientation and Operating Systems 32
        Sophia Drossopoulou and   
            Susan Eisenbach and   
                Bart Jacobs and   
            Gary T. Leavens and   
          Peter Müller and   
          Arnd Poetzsch-Heffter   Formal Techniques for Java Programs  . . 41
                  Jan Bosch and   
          Clemens Szyperski and   
                  Wolfgang Weck   Component-Oriented Programming . . . . . 55
            Isabel Michiels and   
 Alejandro Fernández and   
  Jürgen Börstler and   
                  Maximo Prieto   Tools and Environments for Understanding
                                  Object-Oriented Concepts . . . . . . . . 65
             Anthony Lauder and   
               Marlon Dumas and   
               Akos Frohner and   
                     Ian Oliver   PhDOOS 2000: The 10th Ph.D. Workshop on
                                  Object-Oriented Systems  . . . . . . . . 78
     Fernando Brito e Abreu and   
                Geert Poels and   
         Houari A. Sahraoui and   
                     Horst Zuse   Quantitative Approaches in
                                  Object-Oriented Software Engineering . . 93
            Joseph W. Yoder and   
                    Reza Razavi   Metadata and Adaptive Object-Models  . . 104
          Jean-Michel Bruel and   
               Johan Lilius and   
                Ana Moreira and   
               Robert B. France   Defining Precise Semantics for UML . . . 113
           Marianne Huchard and   
               Robert Godin and   
                  Amedeo Napoli   Objects and Classification . . . . . . . 123
             Isabelle Borne and   
         Galal Hassan Galal and   
                  Huw Evans and   
            Luis Filipe Andrade   Object-Oriented Architectural Evolution  138
    François Terrier and   
             Nikos S. Voros and   
                 Udo Brockmeyer   Specification, Implementation, and
                                  Validation of Object-Oriented Embedded
                                  Systems  . . . . . . . . . . . . . . . . 150
           Christian Becker and   
                    John Zincky   Quality of Service in Distributed Object
                                  Systems  . . . . . . . . . . . . . . . . 178
            Barbara Catania and   
              Elena Ferrari and   
                  Alon Levy and   
           Alberto O. Meldelzon   XML and Object Technology  . . . . . . . 191
                  Peri Tarr and   
               Maja D'Hondt and   
          Lodewijk Bergmans and   
         Cristina Videira Lopes   Workshop on Aspects and Dimensions of
                                  Concern: Requirements on, and Challenge
                                  Problems for, Advanced Separation of
                                  Concerns . . . . . . . . . . . . . . . . 203
        Ciarán Bryce and   
         Chrislain Razafimahefa   Mobile Object Systems  . . . . . . . . . 241
         Antonio Vallecillo and   
      Juan Hernández and   
           José M. Troya   New Issues in Object Interoperability    256
                Refik Molva and   
         Françoise Baude   Mobile Code, Internet Security, and
                                  E-Commerce . . . . . . . . . . . . . . . 270
                      Anonymous   Poster Session . . . . . . . . . . . . . 282
                      Anonymous   Author Index . . . . . . . . . . . . . . 309


Lecture Notes in Computer Science
Volume 1965, 2001

           Darrel Hankerson and   
Julio López Hernandez and   
                 Alfred Menezes   Software Implementation of Elliptic
                                  Curve Cryptography over Binary Fields    1
              Souichi Okada and   
                Naoya Torii and   
               Kouichi Itoh and   
              Masahiko Takenaka   Implementation of Elliptic Curve
                                  Cryptographic Coprocessor over GF (2 m )
                                  on an FPGA . . . . . . . . . . . . . . . 25
            Gerardo Orlando and   
                  Christof Paar   A High-Performance Reconfigurable
                                  Elliptic Curve Processor for GF (2 m )   41
             Jae Wook Chung and   
              Sang Gyoo Sim and   
                  Pil Joong Lee   Fast Implementation of Elliptic Curve
                                  Defined over GF$ (p^m) $ on CalmRISC
                                  with MAC2424 Coprocessor . . . . . . . . 57--70
                     Adi Shamir   Protecting Smart Cards from Passive
                                  Power Analysis with Detached Power
                                  Supplies . . . . . . . . . . . . . . . . 71
              Rita Mayer-Sommer   Smartly Analyzing the Simplicity and the
                                  Power of Simple Power Analysis on
                                  Smartcards . . . . . . . . . . . . . . . 78
                 M. Anwar Hasan   Power Analysis Attacks and Algorithmic
                                  Approaches to their Countermeasures for
                                  Koblitz Curve Cryptosystems  . . . . . . 93
               Werner Schindler   A Timing Attack against RSA with the
                                  Chinese Remainder Theorem  . . . . . . . 109
           Andreas Dandalis and   
         Viktor K. Prasanna and   
               Jose D. P. Rolim   A Comparative Study of Performance of
                                  AES Final Candidates Using FPGAs . . . . 125
              Cameron Patterson   A Dynamic FPGA Implementation of the
                                  Serpent Block Cipher . . . . . . . . . . 141--155
           Steve Trimberger and   
               Raymond Pang and   
                     Amit Singh   A 12 Gbps DES Encryptor/Decryptor Core
                                  in an FPGA . . . . . . . . . . . . . . . 156
            Herbert Leitold and   
       Wolfgang Mayerwieser and   
                  Udo Payer and   
       Karl Christian Posch and   
             Reinhard Posch and   
         Johannes Wolkerstorfer   A 155 Mbps Triple-DES Network Encryptor  164
              James Goodman and   
           Anantha Chandrakasan   An Energy Efficient Reconfigurable
                                  Public-Key Cryptography Processor
                                  Architecture . . . . . . . . . . . . . . 175
   Johann Großschädl   High-Speed RSA Hardware Based on
                                  Barret's Modular Reduction Method  . . . 191
                Colin D. Walter   Data Integrity in Hardware for Modular
                                  Arithmetic . . . . . . . . . . . . . . . 204
              Takehiko Kato and   
                 Satoru Ito and   
                  Jun Anzai and   
              Natsume Matsuzaki   A Design for Modular Exponentiation
                                  Coprocessor in Mobile Telecommunication
                                  Terminals  . . . . . . . . . . . . . . . 216
             David Naccache and   
               Michael Tunstall   How to Explain Side-Channel Leakage to
                                  Your Kids  . . . . . . . . . . . . . . . 229
Jean-Sébastien Coron and   
                   Louis Goubin   On Boolean and Arithmetic Masking
                                  against Differential Power Analysis  . . 231
            Thomas S. Messerges   Using Second-Order Power Analysis to
                                  Attack DPA Resistant Software  . . . . . 238
         Christophe Clavier and   
Jean-Sébastien Coron and   
                   Nora Dabbous   Differential Power Analysis in the
                                  Presence of Hardware Countermeasures . . 252
                     Huapeng Wu   Montgomery Multiplier and Squarer in GF$
                                  (2^m) $  . . . . . . . . . . . . . . . . 264--276
                Erkay Savas and   
         Alexandre F. Tenca and   
     Çetin K. Koç   A Scalable and Unified Multiplier
                                  Architecture for Finite Fields GF ( p )
                                  and GF (2 m )  . . . . . . . . . . . . . 277
           Gaël Hachez and   
        Jean-Jacques Quisquater   Montgomery Exponentiation with no Final
                                  Subtractions: Improved Results . . . . . 293
              Steve H. Weingart   Physical Security Devices for Computer
                                  Subsystems: a Survey of Attacks and
                                  Defenses . . . . . . . . . . . . . . . . 302
              Thomas Pornin and   
                  Jacques Stern   Software-Hardware Trade-Offs:
                                  Application to A5/1 Cryptanalysis  . . . 318
          Jeffrey Hoffstein and   
            Joseph H. Silverman   MiniPASS: Authentication and Digital
                                  Signatures in a Constrained Environment  328
                  Marc Joye and   
            Pascal Paillier and   
                 Serge Vaudenay   Efficient Generation of Prime Numbers    340
                      Anonymous   Author Index . . . . . . . . . . . . . . 355


Lecture Notes in Computer Science
Volume 1972, 2001

        Cristiano Castelfranchi   Engineering Social Order . . . . . . . . 1
        H. Van Dyke Parunak and   
             Sven Brueckner and   
                John Sauter and   
             Robert S. Matthews   Distinguishing Environmental and Agent
                                  Dynamics: a Case Study in Abstraction
                                  and Alternate Modeling Technologies  . . 19
              Gianluca Moro and   
                   Mirko Viroli   On Observing and Constraining Active
                                  Systems  . . . . . . . . . . . . . . . . 34
              Giacomo Cabri and   
           Letizia Leonardi and   
              Franco Zambonelli   Context-Dependency in Internet-Agent
                                  Coordination . . . . . . . . . . . . . . 51
             Christoph Koch and   
                    Paolo Petta   Coordination Issues in Multi-agent Event
                                  Data Processing  . . . . . . . . . . . . 64
               Robert Tolksdorf   Models of Coordination . . . . . . . . . 78
     Pierre-Michel Ricordel and   
                  Yves Demazeau   From Analysis to Deployment: a
                                  Multi-agent Platform Survey  . . . . . . 93
          Federico Bergenti and   
                 Agostino Poggi   Exploiting UML in the Design of
                                  Multi-agent Systems  . . . . . . . . . . 106
            Vincent Hilaire and   
               Abder Koukam and   
                Pablo Gruer and   
        Jean-Pierre Müller   Formal Specification and Prototyping of
                                  Multi-agent Systems  . . . . . . . . . . 114
              Mercedes Amor and   
        Mónica Pinto and   
              Lidia Fuentes and   
 José María Troya   Combining Software Components and Mobile
                                  Agents . . . . . . . . . . . . . . . . . 128
                      Anonymous   Author Index . . . . . . . . . . . . . . 143


Lecture Notes in Computer Science
Volume 1973, 2001

                  Leonid Libkin   Expressive Power of SQL  . . . . . . . . 1
             Jörg Flum and   
               Markus Frick and   
                   Martin Grohe   Query Evaluation via Tree-Decompositions 22
             Marcelo Arenas and   
          Leopoldo Bertossi and   
                   Jan Chomicki   Scalar Aggregation in FD-Inconsistent
                                  Databases  . . . . . . . . . . . . . . . 39
         Vitaliy L. Khizder and   
                David Toman and   
                  Grant Weddell   On Decidability and Complexity of
                                  Description Logics with Uniqueness
                                  Constraints  . . . . . . . . . . . . . . 54
               James Bailey and   
        Szabolcs Mikulás   Expressiveness Issues and Decision
                                  Problems for Active Database Event
                                  Queries  . . . . . . . . . . . . . . . . 68
                Seppo Sippu and   
        Eljas Soisalon-Soininen   A Theory of Transactions on Recoverable
                                  Search Trees . . . . . . . . . . . . . . 83
                    Chen Li and   
                Mayank Bawa and   
              Jeffrey D. Ullman   Minimizing View Sets without Losing
                                  Query-Answering Power  . . . . . . . . . 99
                      Bo Xu and   
               Ouri Wolfson and   
                Sam Chamberlain   Cost Based Data Dissemination in
                                  Broadcast Networks . . . . . . . . . . . 114
                Frank Dehne and   
                 Todd Eavis and   
          Susanne Hambrusch and   
             Andrew Rau-Chaplin   Parallelizing the Data Cube  . . . . . . 129
            Rakesh K. Sinha and   
             Randeep Bhatia and   
                 Chung-Min Chen   Asymptotically Optimal Declustering
                                  Schemes for Range Queries  . . . . . . . 144
            Mirek Riedewald and   
          Divyakant Agrawal and   
                  Amr El Abbadi   Flexible Data Cubes for Online
                                  Aggregation  . . . . . . . . . . . . . . 159
               Jeff Edmonds and   
                 Jarek Gryz and   
             Dongming Liang and   
         Renée J. Miller   Mining for Empty Rectangles in Large
                                  Data Sets  . . . . . . . . . . . . . . . 174
          Noël Novelli and   
               Rosine Cicchetti   FUN: An Efficient Algorithm for Mining
                                  Functional and Embedded Dependencies . . 189
               Toon Calders and   
                  Jan Paredaens   Axiomatization of Frequent Sets  . . . . 204
                    Chen Li and   
                   Edward Chang   On Answering Queries in the Presence of
                                  Limited Access Patterns  . . . . . . . . 219
                  William Hesse   The Dynamic Complexity of Transitive
                                  Closure Is in DynTC$^0$  . . . . . . . . 234--247
               Stephan Kreutzer   Query Languages for Constraint
                                  Databases: First-Order Logic,
                                  Fixed-Points, and Convex Hulls . . . . . 248
             Mary Fernandez and   
              Jerome Simeon and   
                  Philip Wadler   A Semi-monad for Semi-structured Data    263
          Gösta Grahne and   
                     Alex Thomo   Algebraic Rewritings for Optimizing
                                  Regular Path Queries . . . . . . . . . . 301
              Peter Buneman and   
             Sanjeev Khanna and   
                 Wang-Chiew Tan   Why and Where: a Characterization of
                                  Data Provenance  . . . . . . . . . . . . 316
           Gabriel M. Kuper and   
Jérôme Siméon   Subsumption for XML Types  . . . . . . . 331
               Holger Meuss and   
            Klaus U. Schulz and   
            François Bry   Towards Aggregated Answers for
                                  Semistructured Data  . . . . . . . . . . 346
               Chung Keung Poon   Orthogonal Range Queries in OLAP . . . . 361
          Carlos A. Hurtado and   
           Alberto O. Mendelzon   Reasoning about Summarizability in
                                  Heterogeneous Multidimensional Schemas   375
       Francesco Buccafurri and   
            Filippo Furfaro and   
               Domenico Sacc\`a   Estimating Range Queries Using Aggregate
                                  Data with Integrity Constraints: a
                                  Probabilistic Approach . . . . . . . . . 390
         Anthony K. H. Tung and   
                 Jiawei Han and   
           V. S. Lakshmanan and   
                  Raymond T. Ng   Constraint-Based Clustering in Large
                                  Databases  . . . . . . . . . . . . . . . 405
          Charu C. Aggarwal and   
        Alexander Hinneburg and   
                 Daniel A. Keim   On the Surprising Behavior of Distance
                                  Metrics in High Dimensional Space  . . . 420
           Stefan Berchtold and   
        Christian Böhm and   
                Daniel Keim and   
              Florian Krebs and   
             Hans-Peter Kriegel   On Optimizing Nearest Neighbor Queries
                                  in High-Dimensional Data Spaces  . . . . 435
                      Anonymous   Author Index . . . . . . . . . . . . . . 451


Lecture Notes in Computer Science
Volume 1978, 2001

              Alex Biryukov and   
                 Adi Shamir and   
                   David Wagner   Real Time Cryptanalysis of A5/1 on a PC  1
           Scott R. Fluhrer and   
                David A. McGrew   Statistical Analysis of the Alleged RC4
                                  Keystream Generator  . . . . . . . . . . 19
              Muxiang Zhang and   
        Christopher Carroll and   
                     Agnes Chan   The Software-Oriented Stream Cipher SSC2 31
                   Paul Crowley   Mercy: a Fast Large Block Cipher for
                                  Disk Sector Encryption . . . . . . . . . 49
              Henri Gilbert and   
           Helena Handschuh and   
               Antoine Joux and   
                 Serge Vaudenay   A Statistical Attack on RC6  . . . . . . 64
                John Kelsey and   
            Tadayoshi Kohno and   
                 Bruce Schneier   Amplified Boomerang Attacks Against
                                  Reduced-Round MARS and Serpent . . . . . 75
            Lars R. Knudsen and   
                    Willi Meier   Correlations in RC6 with a Reduced
                                  Number of Rounds . . . . . . . . . . . . 94
              A. M. Youssef and   
                        G. Gong   On the Interpolation Attacks on Block
                                  Ciphers  . . . . . . . . . . . . . . . . 109
              Marine Minier and   
                  Henri Gilbert   Stochastic Cryptanalysis of Crypton  . . 121
                Joan Daemen and   
            Michael Peeters and   
              Gilles Van Assche   Bitslice Ciphers and Power Analysis
                                  Attacks  . . . . . . . . . . . . . . . . 134
            Thomas S. Messerges   Securing the AES Finalists Against Power
                                  Analysis Attacks . . . . . . . . . . . . 150
              Anne Canteaut and   
                    Eric Filiol   Ciphertext Only Reconstruction of Stream
                                  Ciphers Based on Combination Generators  165
      Vladimor V. Chepyzhov and   
           Thomas Johansson and   
                     Ben Smeets   A Simple Algorithm for Fast Correlation
                                  Attacks on Stream Ciphers  . . . . . . . 181
      Miodrag J. Mihaljevic and   
       Marc P. C. Fossorier and   
                    Hideki Imai   A Low-Complexity and High-Performance
                                  Algorithm for the Fast Correlation
                                  Attack . . . . . . . . . . . . . . . . . 196
             Niels Ferguson and   
                John Kelsey and   
               Stefan Lucks and   
             Bruce Schneier and   
                  Mike Stay and   
               David Wagner and   
                   Doug Whiting   Improved Cryptanalysis of Rijndael . . . 213
                Tetsu Iwata and   
                 Kaoru Kurosawa   On the Pseudorandomness of the AES
                                  Finalists --- RC6 and Serpent  . . . . . 231
        Jorge Nakahara, Jr. and   
               Bart Preneel and   
                Joos Vandewalle   Linear Cryptanalysis of Reduced-Round
                                  Versions of the SAFER Block Cipher
                                  Family . . . . . . . . . . . . . . . . . 244
            Lars R. Knudsen and   
           John Erik Mathiassen   A Chosen-Plaintext Linear Attack on DES  262
               Seokhie Hong and   
                Sangjin Lee and   
                 Jongin Lim and   
               Jaechul Sung and   
            Donghyeon Cheon and   
                       Inho Cho   Provable Security against Differential
                                  and Linear Cryptanalysis for the SPN
                                  Structure  . . . . . . . . . . . . . . . 273
              Jonathan Katz and   
                      Moti Yung   Unforgeable Encryption and Chosen
                                  Ciphertext Secure Modes of Operation . . 284
                 L. Burnett and   
                  G. Carter and   
                  E. Dawson and   
                      W. Millan   Efficient Methods for Generating
                                  MARS-Like S-Boxes  . . . . . . . . . . . 300
                      Anonymous   Author Index . . . . . . . . . . . . . . 315


Lecture Notes in Computer Science
Volume 1980, 2001

 C. J. ``Keith'' van Rijsbergen   Getting into Information Retrieval . . . 1
                   Norbert Fuhr   Models in Information Retrieval  . . . . 21
               Carol Peters and   
         Páraic Sheridan   Multilingual Information Access  . . . . 51
              Stephen Robertson   Evaluation in Information Retrieval  . . 81
                Alan F. Smeaton   Indexing, Browsing, and Searching of
                                  Digital Video and Digital Audio
                                  Information  . . . . . . . . . . . . . . 93
                 John P. Eakins   Retrieval of Still Images by Content . . 111
Ingeborg Torvik Sòlvberg   Digital Libraries and Information
                                  Retrieval  . . . . . . . . . . . . . . . 139
                Peter Ingwersen   Users in Context . . . . . . . . . . . . 157
             Fabio Crestani and   
                  Mounia Lalmas   Logic and Uncertainty in Information
                                  Retrieval  . . . . . . . . . . . . . . . 179
            Gloria Bordogna and   
                 Gabriella Pasi   Modeling Vagueness in Information
                                  Retrieval  . . . . . . . . . . . . . . . 207
          Maristella Agosti and   
                Massimo Melucci   Information Retrieval on the Web . . . . 242
               Yves Chiaramella   Information Retrieval and Structured
                                  Documents  . . . . . . . . . . . . . . . 286
                      Anonymous   Author Index . . . . . . . . . . . . . . 311


Lecture Notes in Computer Science
Volume 1981, 2001

                      Anonymous   Introduction . . . . . . . . . . . . . . 1
                 Ian Foster and   
                 Carl Kesselman   Computational Grids (Invited Talk) . . . 3
              Tomas Forkert and   
         Hans-Peter Kersken and   
          Andreas Schreiber and   
           Martin Strietzel and   
                     Klaus Wolf   The Distributed Engineering Framework
                                  TENT . . . . . . . . . . . . . . . . . . 38
           Thomas Rischbeck and   
                    Paul Watson   A Parallel VRML97 Server Based on Active
                                  Objects  . . . . . . . . . . . . . . . . 47
             Reginald L. Walker   Dynamic Load Balancing Model:
                                  Preliminary Results for Parallel
                                  Pseudo-search Engine Indexers/Crawler
                                  Mechanisms Using MPI and Genetic
                                  Programming  . . . . . . . . . . . . . . 61
           Francesc Solsona and   
       Francesc Giné and   
       Fermín Molina and   
  Porfidio Hernández and   
                   Emilio Luque   Implementing and Analysing an Effective
                                  Explicit Coscheduling Algorithm on a NOW 75
    Javier Fernández and   
 Félix García and   
         Jesús Carretero   Enhancing Parallel Multimedia Servers
                                  through New Hierarchical Disk Scheduling
                                  Algorithms . . . . . . . . . . . . . . . 89
             Hyun-Gyoo Yook and   
                Myong-Soon Park   Suboptimal Communication Schedule for
                                  GEN\_BLOCK Redistribution (Best Student
                                  Paper Award: Honourable Mention) . . . . 100--113
João Luís Sobral and   
Alberto José Proença   A SCOOPP Evaluation on Packing Parallel
                                  Objects in Run-Time  . . . . . . . . . . 114
Arturo González-Escribano and   
     Arjan J. C. van Gemund and   
Valentín Cardeñoso-Payo and   
 Judith Alonso-López and   
David Martín-García and   
          Alberto Pedrosa-Calvo   Measuring the Performance Impact of
                                  SP-Restricted Programming in
                                  Shared-Memory Machines . . . . . . . . . 128
            Patrick H. Corr and   
             Peter Milligan and   
                Vaughan Purnell   A Neural Network Based Tool for
                                  Semi-automatic Code Transformation . . . 142
              Oliver Sinnen and   
                   Leonel Sousa   A Platform Independent Parallelising
                                  Tool Based on Graph Theoretic Models . . 154
    Renato J. O. Figueiredo and   
        Jeffrey P. Bradford and   
       José A. B. Fortes   Improving the Performance of
                                  Heterogeneous DSMs via Multithreading    168
            Silvia Del Pino and   
         Luis Piñuel and   
           Rafael A. Moreno and   
               Francisco Tirado   Value Prediction as a Cost-Effective
                                  Solution to Improve Embedded Processors
                                  Performance  . . . . . . . . . . . . . . 181
                      Anonymous   Introduction . . . . . . . . . . . . . . 197
              Dietrich Stauffer   Cellular Automata: Applications (Invited
                                  Talk)  . . . . . . . . . . . . . . . . . 199
                 Domenico Talia   The Role of Parallel Cellular
                                  Programming in Computational Science . . 207
                   Sourav Kundu   Optimization with Parallel Computing . . 221
           Jorge M. Pacheco and   
José Luís Martins   Parallelization of a Density Functional
                                  Program for Monte-Carlo Simulation of
                                  Large Molecules  . . . . . . . . . . . . 230
        Carmen L. T. Borges and   
        Djalma M. Falcão   Power System Reliability by Sequential
                                  Monte Carlo Simulation on Multicomputer
                                  Platforms  . . . . . . . . . . . . . . . 242
                     David Nunn   A Novel Algorithm for the Numerical
                                  Simulation of Collision-Free
                                  Plasma-Vlasov Hybrid Simulation  . . . . 254
   Jesús Vigo-Aguiar and   
          Luis M. Quintales and   
             Srinivasan Natesan   An Efficient Parallel Algorithm for the
                                  Numerical Solution of Schrödinger
                                  Equation . . . . . . . . . . . . . . . . 262
                      Anonymous   Introduction . . . . . . . . . . . . . . 271
              Chao-Yang Gau and   
              Mark A. Stadtherr   Parallel Branch-and-Bound for Chemical
                                  Engineering Applications: Load Balancing
                                  and Scheduling Issues (Invited Talk) . . 273
               Jordi Castro and   
              Antonio Frangioni   A Parallel Implementation of an
                                  Interior-Point Algorithm for
                                  Multicommodity Network Flows . . . . . . 301
               Pedro Alonso and   
José M. Badía and   
               Antonio M. Vidal   A Parallel Algorithm for Solving the
                                  Toeplitz Least Squares Problem . . . . . 316
                Andreas Schramm   An Index Domain for Adaptive Multi-grid
                                  Methods  . . . . . . . . . . . . . . . . 330
             Margarita Amor and   
    Francisco Argüello and   
          Juan López and   
               Emilio L. Zapata   Parallelization of a Recursive
                                  Decoupling Method for Solving
                                  Tridiagonal Linear Systems on
                                  Distributed Memory Computer  . . . . . . 344
       Jesús Peinado and   
               Antonio M. Vidal   A New Parallel Approach to the Toeplitz
                                  Inverse Eigenproblem Using Newton-like
                                  Methods  . . . . . . . . . . . . . . . . 355
Maria Antónia Forjaz and   
                      Rui Ralha   An Efficient Parallel Algorithm for the
                                  Symmetric Tridiagonal Eigenvalue Problem 369
                Josep Arnal and   
    Violeta Migallón and   
     José Penadés   Non-stationary Parallel Newton Iterative
                                  Methods for Nonlinear Problems . . . . . 380
           Maribel Castillo and   
Enrique S. Quintana-Ortí and   
Gregorio Quintana-Ortí and   
       Vicente Hernández   Parallel Pole Assignment of Single-Input
                                  Systems  . . . . . . . . . . . . . . . . 395
     Gloria Martínez and   
     Germán Fabregat and   
       Vicente Hernández   Solving the Generalized Sylvester
                                  Equation with a Systolic Library . . . . 403
                      Anonymous   Introduction . . . . . . . . . . . . . . 417
             Michael J. B. Duff   Thirty Years of Parallel Image
                                  Processing (Invited Talk)  . . . . . . . 419
              Jorge Barbosa and   
        João Tavares and   
             Armando J. Padilha   Parallel Image Processing System on a
                                  Cluster of Personal Computers (Best
                                  Student Paper Award: First Prize)  . . . 439--452
               Leonel Sousa and   
                  Oliver Sinnen   Synchronous Non-local Image Processing
                                  on Orthogonal Multiprocessor Systems . . 453
 Augusto Cesar Heluy Dantas and   
José Manoel de Seixas and   
Felipe Maia Galvão França   Parallel Implementation of a Track
                                  Recognition System Using Hough Transform 467
                      Anonymous   Introduction . . . . . . . . . . . . . . 481
              D. R. J. Owen and   
                 Y. T. Feng and   
                 Jianguo Yu and   
                  Djordje Peric   Finite/Discrete Element Analysis of
                                  Multi-fracture and Multi-contact
                                  Phenomena (Invited Talk) . . . . . . . . 483
       Marcos A. D. Martins and   
    José L. D. Alves and   
       Alvaro L. G. A. Coutinho   Parallel Edge-Based Finite Element
                                  Techniques for Nonlinear Solid Mechanics 506
           Emmanuel Cagniot and   
             Thomas Brandes and   
          Jean-Luc Dekeyser and   
             Francis Piriou and   
              Pierre Boulet and   
 Stéphance Clénet   High Level Parallelization of a $3$D
                                  Electromagnetic Simulation Code with
                                  Irregular Communication Patterns . . . . 519
              Sergio Romero and   
             Luis F. Romero and   
               Emilio L. Zapata   Parallel Algorithm for Fast Cloth
                                  Simulation . . . . . . . . . . . . . . . 529
              Elsa F. Gomes and   
    Lígia M. Ribeiro and   
      Pedro F. R. Regueiras and   
   José J. C. Cruz-Pinto   A Parallel Algorithm for the Simulation
                                  of the Dynamic Behaviour of
                                  Liquid-Liquid Agitated Columns . . . . . 536
               Ugo Piomelli and   
             Alberto Scotti and   
                  Elias Balaras   Large-Eddy Simulations of Turbulent
                                  Flows, from Desktop to Supercomputer
                                  (Invited Talk) . . . . . . . . . . . . . 551
                      Anonymous   Author Index . . . . . . . . . . . . . . 579


Lecture Notes in Computer Science
Volume 1982, 2001

                  Karsten Weihe   On the Differences between ``Practical''
                                  and ``Applied''  . . . . . . . . . . . . 1
             Susanne Albers and   
           Bianca Schröder   An Experimental Study of Online
                                  Scheduling Algorithms  . . . . . . . . . 11
              Kurt Mehlhorn and   
             Guido Schäfer   Implementation of $ O(n m \log n) $
                                  Weighted Matchings in General Graphs.
                                  The Power of Data Structures . . . . . . 23
            Stefan Edelkamp and   
              Patrick Stiegeler   Pushing the Limits in Sequential Sorting 39
                  Lars Arge and   
                 Jeff Chase and   
          Jeffrey S. Vitter and   
           Rajiv Wickremesinghe   Efficient Sorting Using Registers and
                                  Caches . . . . . . . . . . . . . . . . . 51
              Werner Backes and   
                 Susanne Wetzel   Lattice Basis Reduction with Dynamic
                                  Approximation  . . . . . . . . . . . . . 63
                Javed Aslam and   
              Alain Leblanc and   
                 Clifford Stein   Clustering Data without Prior Knowledge  74
           Annegret Liebers and   
                  Karsten Weihe   Recognizing Bundles in Time Table Graphs
                                  --- A Structural Approach  . . . . . . . 87
         I. Chatzigiannakis and   
             S. Nikoletseas and   
                    P. Spirakis   Analysis and Experimental Evaluation of
                                  an Innovative and Efficient Routing
                                  Protocol for Ad-hoc Mobile Networks  . . 99
Isabelle Guérin Lassous and   
                   Jens Gustedt   Portable List Ranking: An Experimental
                                  Study  . . . . . . . . . . . . . . . . . 111
                Kazuo Iwama and   
              Daisuke Kawai and   
           Shuichi Miyazaki and   
                Yasuo Okabe and   
                    Jun Umemoto   Parallelizing Local Search for CNF
                                  Satisfiability Using Vectorization and
                                  PVM  . . . . . . . . . . . . . . . . . . 123
              Peter Sanders and   
               Rudolf Fleischer   Asymptotic Complexity from Experiments?
                                  A Case Study for Randomized Algorithms   135
           Camil Demetrescu and   
             Irene Finocchi and   
                Giuseppe Liotta   Visualizing Algorithms over the Web with
                                  the Publication-Driven Approach  . . . . 147
             Jesper Bojesen and   
               Jyrki Katajainen   Interchanging Two Segments of an Array
                                  in a Hierarchical Memory System  . . . . 159
               Iddo Hanniel and   
                   Dan Halperin   Two-Dimensional Arrangements in CGAL and
                                  Adaptive Point Location for Parametric
                                  Curves . . . . . . . . . . . . . . . . . 171
             Jan Vahrenhold and   
              Klaus H. Hinrichs   Planar Point Location for Large Data
                                  Sets: To Seek or Not to Seek . . . . . . 183
            Thomas Erlebach and   
                   Klaus Jansen   Implementation of Approximation
                                  Algorithms for Weighted and Unweighted
                                  Edge-Disjoint Paths in Bidirected Trees  195
                 Guido Proietti   Dynamic Maintenance Versus Swapping: An
                                  Experimental Study on Shortest Paths
                                  Trees  . . . . . . . . . . . . . . . . . 207
           Camil Demetrescu and   
           Daniele Frigioni and   
Alberto Marchetti-Spaccamela and   
                  Umberto Nanni   Maintaining Shortest Paths in Digraphs
                                  with Arbitrary Arc Weights: An
                                  Experimental Study . . . . . . . . . . . 218
       Massimiliano Caramia and   
            Paolo Dell'Olmo and   
           Giuseppe F. Italiano   New Algorithms for Examination
                                  Timetabling  . . . . . . . . . . . . . . 230
                      Anonymous   Author Index . . . . . . . . . . . . . . 243


Lecture Notes in Computer Science
Volume 1985, 2001

             Lucia Lo Bello and   
               Orazio Mirabella   Randomization-Based Approaches for
                                  Dynamic Priority Scheduling of Aperiodic
                                  Messages on a CAN Network  . . . . . . . 1
             Reinhard Budde and   
             Axel Poigné   Complex Reactive Control with Simple
                                  Synchronous Models . . . . . . . . . . . 19
           Byeong-Soo Jeong and   
                  Daeho Kim and   
                  Sungyoung Lee   Optimistic Secure Real-Time Concurrency
                                  Control Using Multiple Data Version  . . 33
             Marcelo Cintra and   
                   Guido Araujo   Array Reference Allocation Using
                                  SSA-Form and Live Range Growth . . . . . 48
            Daniel Kästner   PROPAN: a Retargetable System for
                                  Postpass Optimisations and Analyses  . . 63
          Deepankar Bairagi and   
              Santosh Pande and   
              Dharma P. Agrawal   A Framework for Enhancing Code Quality
                                  in Limited Register Set Embedded
                                  Processors . . . . . . . . . . . . . . . 81
             S. Chakraverty and   
                C. P. Ravikumar   A Stochastic Framework for Co-synthesis
                                  of Real-Time Systems . . . . . . . . . . 96
               Gwangil Jeon and   
              Tae-Hyung Kim and   
              Seongsoo Hong and   
                      Sunil Kim   A Fault Tolerance Extension to the
                                  Embedded CORBA for the CAN Bus Systems   114
              Tobias Amnell and   
            Alexandre David and   
                        Wang Yi   A Real-Time Animator for Hybrid Systems  134
          Bruce R. Childers and   
                    Tarun Nakra   Reordering Memory Bus Transactions for
                                  Reduced Power Consumption  . . . . . . . 146
                 Gi-Ho Park and   
               Kil-Whan Lee and   
               Jae-Hyuk Lee and   
               Tack-Don Han and   
                   Shin-Dug Kim   A Power Efficient Cache Structure for
                                  Embedded Processors Based on the Dual
                                  Cache Structure  . . . . . . . . . . . . 162
               Matteo Corti and   
              Roberto Brega and   
                   Thomas Gross   Approximation of Worst-Case Execution
                                  Time for Preemptive Multitasking Systems 178
              Kwangyong Lee and   
               Chaedeok Lim and   
                 Kisok Kong and   
                  Heung-Nam Kim   A Design and Implementation of a Remote
                                  Debugging Environment for Embedded
                                  Internet Software  . . . . . . . . . . . 199
              Johan Runeson and   
     Sven-Olof Nyström and   
                Jan Sjödin   Optimizing Code Size through Procedural
                                  Abstraction  . . . . . . . . . . . . . . 204
         Robert van Engelen and   
              David Whalley and   
                       Xin Yuan   Automatic Validation of Code-Improving
                                  Transformations  . . . . . . . . . . . . 206
                M. Kandemir and   
           N. Vijaykrishnan and   
                M. J. Irwin and   
                      H. S. Kim   Towards Energy-Aware Iteration Space
                                  Tiling . . . . . . . . . . . . . . . . . 211
              Sungyoung Lee and   
             Hyon Woo Seung and   
                 Tae Woong Jeon   An Integrated Push/Pull Buffer
                                  Management Method in Multimedia
                                  Communication Environments . . . . . . . 216
                      Anonymous   Author Index . . . . . . . . . . . . . . 221


Lecture Notes in Computer Science
Volume 1986, 2001

         Michael Wooldridge and   
                  Paul E. Dunne   Optimistic and Disjunctive Agent Design
                                  Problems . . . . . . . . . . . . . . . . 1
              A. F. Dragoni and   
                P. Giorgini and   
                    L. Serafini   Updating Mental States from
                                  Communication  . . . . . . . . . . . . . 15
         Stephen Zimmerbaum and   
                 Richard Scherl   Sensing Actions, Time, and Concurrency
                                  in the Situation Calculus  . . . . . . . 31
           Scott A. DeLoach and   
                      Mark Wood   Developing Multiagent Systems with
                                  agentTool  . . . . . . . . . . . . . . . 46
              Patrick Riley and   
                Peter Stone and   
                 Manuela Veloso   Layered Disclosure: Revealing Agents'
                                  Internals  . . . . . . . . . . . . . . . 61
              Joanna Bryson and   
              Lynn Andrea Stein   Architectures and Idioms: Making
                                  Progress in Agent Design . . . . . . . . 73
          Fabio Bellifemine and   
             Agostino Poggi and   
               Giovanni Rimassa   Developing Multi-agent Systems with JADE 89
            Murray Shanahan and   
                 Mark Witkowski   High-Level Robot Control through Logic   104
       Oswaldo Terán and   
              Bruce Edmonds and   
                   Steve Wallis   Determining the Envelope of Emergent
                                  Agent Behaviour via Architectural
                                  Transformation . . . . . . . . . . . . . 122
          Timothy J. Norman and   
                     Chris Reed   Delegation and Responsibility  . . . . . 136
               Frank Dignum and   
    Barbara Dunin-K\ceplicz and   
               Rineke Verbrugge   Agent Theory for Team Formation by
                                  Dialogue . . . . . . . . . . . . . . . . 150
              Marian Nodine and   
       Damith Chandrasekara and   
                      Amy Unruh   Task Coordination Paradigms for
                                  Information Agents . . . . . . . . . . . 167
               Michael Luck and   
                 Mark d'Inverno   Plan Analysis for Autonomous
                                  Sociological Agents  . . . . . . . . . . 182
              Carles Sierra and   
Ramon López de M\`antaras and   
          Dídac Busquets   Multiagent Bidding Mechanisms for Robot
                                  Qualitative Navigation . . . . . . . . . 198
         Bradley J. Clement and   
               Edmund H. Durfee   Performance of Coordinating Concurrent
                                  Hierarchical Planning Agents Using
                                  Summary Information  . . . . . . . . . . 213
           Koen V. Hindriks and   
           Frank S. de Boer and   
         Wiebe van der Hoek and   
           John-Jules Ch. Meyer   Agent Programming with Declarative Goals 228
             Steven Shapiro and   
         Yves Lespérance   Modeling Multiagent Systems with CASL
                                  --- A Feature Interaction Resolution
                                  Application  . . . . . . . . . . . . . . 244
         Rogier M. van Eijk and   
           Frank S. de Boer and   
         Wiebe van der Hoek and   
           John-Jules Ch. Meyer   Generalised Object-Oriented Concepts for
                                  Inter-agent Communication  . . . . . . . 260
              Simone Marini and   
          Maurizio Martelli and   
           Viviana Mascardi and   
                  Floriano Zini   Specification of Heterogeneous Agent
                                  Architectures  . . . . . . . . . . . . . 275
               Luis Antunes and   
          João Faria and   
                  Helder Coelho   Improving Choice Mechanisms within the
                                  BVG Architecture . . . . . . . . . . . . 290
                    Sven Koenig   Planning-Task Transformations for Soft
                                  Deadlines  . . . . . . . . . . . . . . . 305
             Gerhard Weiß   An Architectural Framework for
                                  Integrated Multiagent Planning,
                                  Reacting, and Learning . . . . . . . . . 320
              Joanna Bryson and   
               Keith Decker and   
           Scott A. DeLoach and   
              Michael Huhns and   
             Michael Wooldridge   Panel Summary: Agent Development Tools   331
        Cristiano Castelfranchi   Again on Agents' Autonomy: a Homage to
                                  Alan Turing  . . . . . . . . . . . . . . 339
          K. Suzanne Barber and   
               Cheryl E. Martin   Autonomy as Decision-Making Control  . . 343
                   Rino Falcone   Autonomy: Theory, Dimensions, and
                                  Regulation . . . . . . . . . . . . . . . 346
                  Henry Hexmoor   Situated Autonomy  . . . . . . . . . . . 349
               Michael Luck and   
                 Mark d'Inverno   Autonomy: a Nice Idea in Theory  . . . . 351
               Milind Tambe and   
             David Pynadath and   
                    Paul Scerri   Adjustable Autonomy: a Response  . . . . 354
                      Anonymous   Author Index . . . . . . . . . . . . . . 357


Lecture Notes in Computer Science
Volume 1987, 2001

            Philippe Bonnet and   
            Johannes Gehrke and   
               Praveen Seshadri   Towards Sensor Database Systems  . . . . 3
        Christos Efstratiou and   
             Keith Cheverst and   
               Nigel Davies and   
                  Adrian Friday   An Architecture for the Effective
                                  Support of Adaptive Context-Aware
                                  Applications . . . . . . . . . . . . . . 15
              Shiow-yang Wu and   
             H. S. Cinatit Chao   Event Engine for Adaptive Mobile
                                  Computing  . . . . . . . . . . . . . . . 27
               Mqhele Nzama and   
               Alexander Ng and   
               Arkady Zaslavsky   Adaptive Delivery of Multimedia Data in
                                  Heterogeneous and Mobile Environments    41
              Kinuko Yasuda and   
               Takuya Asada and   
                 Tatsuya Hagino   Effects and Performance of Content
                                  Negotiation Based on CC/PP . . . . . . . 53
               S. Tagashira and   
                  K. Saisho and   
                      A. Fukuda   Design and Implementation of an
                                  Information Announcement Toolkit for
                                  Mobile Computers . . . . . . . . . . . . 65
        Peter Triantafillou and   
             R. Harpantidou and   
                   M. Paterakis   High Performance Data Broadcasting: a
                                  Comprehensive Systems' Perspective . . . 79
           Jeong-Hyon Hwang and   
                 SungHo Cho and   
                Chong-Sun Hwang   Optimized Scheduling on Broadcast Disks  91
                SungSuk Kim and   
            Chong-Sun Hwang and   
               HeonChang Yu and   
                   SangKeun Lee   Optimistic Scheduling Algorithm for
                                  Mobile Transactions Based on Reordering  105
              Hyunchul Kang and   
                    Sangmin Lim   Bandwidth-Conserving Cache Validation
                                  Schemes in a Mobile Database System  . . 121
           Rashmi Srinivasa and   
                    Sang H. Son   Quasi-consistency and Caching with
                                  Broadcast Disks  . . . . . . . . . . . . 133
                 Uwe Kubach and   
                 Kurt Rothermel   A Map-Based Hoarding Mechanism for
                                  Location-Dependent Information . . . . . 145
               Zhexuan Song and   
              Nick Roussopoulos   Hashing Moving Objects . . . . . . . . . 161
               Hae Don Chon and   
          Divyakant Agrawal and   
                  Amr El Abbadi   Storage and Retrieval of Moving Objects  173
               Xiaoyan Hong and   
              Taek Jin Kwon and   
                Mario Gerla and   
            Daniel Lihui Gu and   
                    Guangyu Pei   A Mobility Framework for Ad Hoc Wireless
                                  Networks . . . . . . . . . . . . . . . . 185
                 Amit Sinha and   
        Anantha P. Chandrakasan   Operating System and Algorithmic
                                  Techniques for Energy Scalable Wireless
                                  Sensor Networks  . . . . . . . . . . . . 199
           Alvin T. S. Chan and   
                     Dan He and   
             Siu Nam Chuang and   
                   Jiannong Cao   Towards a Programmable Mobile IP . . . . 210
          Marjan Bozinovski and   
            Liljana Gavrilovska   Adaptive Call Admission Control in
                                  Wireless Multimedia Network  . . . . . . 222
                  Tao Zhang and   
                       Wai Chen   Soft Mobile Ad-Hoc Networking  . . . . . 233
      Lalitha Suryanarayana and   
                    Johan Hjelm   CC/PP for Content Negotiation and
                                  Contextualization  . . . . . . . . . . . 239
                Haitao Tang and   
            Mari Korkea-aho and   
         Jose Costa-Requena and   
                    Jussi Ruutu   Serving Spatial Location Information
                                  over the Internet  . . . . . . . . . . . 246
                 Jari Korva and   
                Johan Plomp and   
Petri Määttä and   
                    Maija Metso   On-Line Service Adaptation for Mobile
                                  and Fixed Terminal Devices . . . . . . . 252
             Vincent Magret and   
              Vinod Kumar Choyi   Multicast Micro-mobility Management  . . 260
              San-Yih Hwang and   
             Jeng-Kuen Chiu and   
                 Wan-Shiou Yang   Personal Workflow Management in Support
                                  of Pervasive Computing . . . . . . . . . 271
             Carlos Sanchez and   
                   Le Gruenwald   An Agent Based Architecture Using XML
                                  for Mobile Federated Database Systems    273
               Soroush Sedaghat   Designing Electronic Forms in Web
                                  Applications: Integration of Form
                                  Components . . . . . . . . . . . . . . . 275
              IlYoung Chung and   
                Chong-Sun Hwang   Increasing Concurrency of Transactions
                                  Using Delayed Certification in Mobile
                                  DBMSs  . . . . . . . . . . . . . . . . . 277
          Stanley M. T. Yau and   
              Hong Va Leong and   
                     Antonio Si   Multi-resolution Web Document Browsing
                                  in a Distributed Agent Environment . . . 279
                SungHun Nam and   
                Chong-Sun Hwang   Dynamic Remote Update Adapting Wireless
                                  Network Connection States  . . . . . . . 282
                 Kenya Sato and   
            Soichi Hasegawa and   
         Shigeaki Tagashira and   
               Keizo Saisho and   
                   Akira Fukuda   Performance Modeling of Layered-Data
                                  Delivery for Mobile Users through
                                  Broadcast/On-Demand Hybrid Communication 284
               Le Gruenwald and   
               Shankar M. Banik   Energy-Efficient Transaction Management
                                  for Real-Time Mobile Databases in Ad-hoc
                                  Network Environments . . . . . . . . . . 287
                      Anonymous   Author Index . . . . . . . . . . . . . . 289


Lecture Notes in Computer Science
Volume 1989, 2001

           Julie Schlembach and   
                Anders Skoe and   
                  Ping Yuan and   
                Edward Knightly   Design and Implementation of Scalable
                                  Admission Control  . . . . . . . . . . . 1
          Giulia Bernardini and   
           Stefano Giordano and   
          Gregorio Procissi and   
              Sandra Tartarelli   Analysis and Performance Evaluation of a
                                  Connection Admission Control Scheme
                                  Based on the Many Sources Asymptotic . . 17
             Raffaele Bolla and   
              Franco Davoli and   
             Mario Marchese and   
                 Marco Perrando   Call Admission Control and Routing of
                                  QoS-Aware and Best-Effort Flows in an
                                  IP-over-ATM Networking Environment . . . 33
             Marco Listanti and   
             Fabio Ricciato and   
                Stefano Salsano   An Upper Bound to the Loss Probability
                                  in the Multiplexing of Jittered Flows    51
          Srinivas Vutukury and   
     Jose J. Garcia-Luna-Aceves   SMART: a Scalable Multipath Architecture
                                  for Intra-domain QoS Provisioning  . . . 67
              Franco Davoli and   
           Daniele Luscardo and   
          Piergiulio Maryni and   
                  Angelo Pietra   Definition and Experimental Evaluation
                                  of an Architecture for Joint Quality of
                                  Service Control in Multimedia Networks   81
             Andrea Borella and   
       Giovanni Cancellieri and   
               Elena Pagani and   
               Gian Paolo Rossi   Quality-of-Service Guarantees for
                                  Multicast Traffic in Heterogeneous
                                  Multi-service Networks . . . . . . . . . 97
                Mario Gerla and   
            Claudio Casetti and   
        Scott Seongwook Lee and   
                 Gianluca Reali   Resource Allocation and Admission
                                  Control Styles in QoS DiffServ Networks  113
               Elena Pagani and   
           Gian Paolo Rossi and   
               Dario Maggiorini   A Multicast Transport Service with
                                  Bandwidth Guarantees for Diff-Serv
                                  Networks . . . . . . . . . . . . . . . . 129
            Claudio Casetti and   
                    Michela Meo   Modeling the Stationary Behavior of TCP
                                  Reno Connections . . . . . . . . . . . . 141
         Francesco Cocimano and   
             Alfio Lombardo and   
              Giovanni Schembra   A Markov Model for the Design of
                                  Feedback Techniques to Match Traffic
                                  Specification Parameters in MPEG Video
                                  Sources  . . . . . . . . . . . . . . . . 157
        Francesco Beritelli and   
           Salvatore Casale and   
             Mario Francese and   
               Giuseppe Ruggeri   Intrastandard Hybrid Speech Coding for
                                  Adaptive IP Telephony  . . . . . . . . . 173
              Marco De Luca and   
               Paolo Senesi and   
                Francesca Cuomo   Implementation of a Test-Bed for
                                  Telephony over IP: Architectural,
                                  Theoretical, and Performance Issues  . . 189
            Andrea Francini and   
           Fabio M. Chiussi and   
           Robert T. Clancy and   
           Kevin D. Drucker and   
              Nasser E. Idirene   Enhanced Weighted Round Robin Schedulers
                                  for Bandwidth Guarantees in Packet
                                  Networks . . . . . . . . . . . . . . . . 205
        Marco Ajmone Marsan and   
              Andrea Bianco and   
             Paolo Giaccone and   
            Emilio Leonardi and   
                     Fabio Neri   Router Architectures Exploiting
                                  Input-Queued Cell-Based Switching
                                  Fabrics  . . . . . . . . . . . . . . . . 223
                Maurizio Casoni   Packet Discard Schemes for
                                  Differentiated Services Networks with
                                  ATM Switching Systems  . . . . . . . . . 239
              Nicola Ciulli and   
               Stefano Giordano   Analysis and Simulation of $ W F^2 Q + $
                                  Based Schedulers: Comparisons and
                                  Compliance with Theoretical Bounds . . . 255--271
      Lars-Åke Larzon and   
           Mikael Degermark and   
                   Stephen Pink   Requirements on the TCP/IP Protocol
                                  Stack for Real-Time Communication in
                                  Wireless Environments  . . . . . . . . . 273
               Koohyun Park and   
              Yong-Sik Shin and   
                  Hyun-Chan Lee   Multicast Routing by Multiple Tree
                                  Routes . . . . . . . . . . . . . . . . . 285
           Andrea Fumagalli and   
                    Marco Tacca   Optimal Design of Optical Ring Networks
                                  with Differentiated Reliability (DiR)    299
           Franco Callegati and   
            Giorgio Corazza and   
                Carla Raffaelli   An Optical Packet Switch for IP Traffic
                                  with QoS Provisioning  . . . . . . . . . 315
 Elionildo da Silva Menezes and   
    Djamel Fawzi Hadj Sadok and   
                  Judith Kelner   A Policy Management Framework Using
                                  Traffic Engineering in DiffServ Networks 331
           George Xylomenos and   
              George C. Polyzos   Quality of Service Issues in
                                  Multi-service Wireless Internet Links    347
         Giannis Priggouris and   
   Stathes Hadjiefthymiades and   
                Lazaros Merakos   Enhancing the General Packet Radio
                                  Service with IP QoS Support  . . . . . . 365
           Mohamed Moustafa and   
              Ibrahim Habib and   
             Mahmoud Naghshineh   Genetic Algorithm for Mobiles
                                  Equilibrium Applied to Video Traffic . . 381
           Giuseppe Bianchi and   
         Flaminio Borgonovo and   
             Antonio Capone and   
               Luigi Fratta and   
                Chiara Petrioli   PCP: An End-to-End Measurement-Based
                                  Call Admission Control for Real-Time
                                  Services over IP Networks  . . . . . . . 391
             Gennaro Boggia and   
             Pietro Camarda and   
             Maurizio Tortorici   Admission Control for Distribution of
                                  Smoothed Video Using Patching Algorithms 407
           Giuseppe Bianchi and   
         Nicola Blefari-Melazzi   A Migration Path for the Internet: From
                                  Best-Effort to a QoS Capable
                                  Infrastructure by Means of Localized
                                  Admission Control  . . . . . . . . . . . 423
                      Anonymous   Author Index . . . . . . . . . . . . . . 439


Lecture Notes in Computer Science
Volume 1990, 2001

             C. R. Ramakrishnan   A Model Checker for Value-Passing
                                  Mu-Calculus Using Logic Programming  . . 1
               Michael Leuschel   Design and Implementation of the
                                  High-Level Specification Language
                                  CSP(LP) in Prolog  . . . . . . . . . . . 14
                Antony Courtney   Frappé: Functional Reactive Programming
                                  in Java  . . . . . . . . . . . . . . . . 29
              Antonio Brogi and   
                Gianluca Caruso   From Subject Directories to Subject
                                  Meta-directories via Declarative
                                  Programming  . . . . . . . . . . . . . . 45
             Matteo Baldoni and   
          Cristina Baroglio and   
       Alessandro Chiarotto and   
                  Viviana Patti   Programming Goal-Driven Web Sites Using
                                  an Agent Logic Language  . . . . . . . . 60
                  Michael Hanus   High-Level Server Side Web Scripting in
                                  Curry  . . . . . . . . . . . . . . . . . 76
                Anima Gupta and   
                     Paul Tarau   Logic Programming Techniques for Dynamic
                                  VRML Web Content Generation  . . . . . . 93
            Giampaolo Bella and   
             Stefano Bistarelli   Soft Constraints for Security Protocol
                                  Analysis: Confidentiality  . . . . . . . 108
                   Steve Barker   Secure Deductive Databases . . . . . . . 123
                Horatiu Cirstea   Specifying Authentication Protocols
                                  Using Rewriting and Strategies . . . . . 138
           Juan R. Iglesias and   
                Gopal Gupta and   
            Enrico Pontelli and   
                Desh Ranjan and   
                 Brook Milligan   Interoperability between Bioinformatics
                                  Tools: a Logic Programming Approach  . . 153
            Monica Nogueira and   
        Marcello Balduccini and   
            Michael Gelfond and   
             Richard Watson and   
                  Matthew Barry   An A-Prolog Decision Support System for
                                  the Space Shuttle  . . . . . . . . . . . 169
               Enrico Denti and   
             Andrea Omicini and   
               Alessandro Ricci   tu Prolog: a Light-Weight Prolog for
                                  Internet Applications and
                                  Infrastructures  . . . . . . . . . . . . 184
              Ricardo Lopes and   
  Vítor Santos Costa and   
                 Fernando Silva   A Novel Implementation of the Extended
                                  Andorra Model  . . . . . . . . . . . . . 199
                 Hendrik Decker   Soundcheck for SQL . . . . . . . . . . . 214
              Pierre Flener and   
               Brahim Hnich and   
                Zeynep Kiziltan   Compiling High-Level Type Constructors
                                  in Constraint Programming  . . . . . . . 229
      Supratik Mukhopadhyay and   
               Andreas Podelski   Constraint Database Models
                                  Characterizing Timed Bisimilarity  . . . 245
      Alessandra Raffaet\`a and   
            Thom Frühwirth   Spatio-temporal Annotated Constraint
                                  Logic Programming  . . . . . . . . . . . 259
              Pierre Flener and   
               Brahim Hnich and   
                Zeynep Kiziltan   A Meta-heuristic for Subset Problems . . 274
            Enrico Pontelli and   
                 Omar El-Khatib   Construction and Optimization of a
                                  Parallel Engine for Answer Set
                                  Programming  . . . . . . . . . . . . . . 288
              John Peterson and   
                 Paul Hudak and   
              Alastair Reid and   
                     Greg Hager   FVision: a Declarative Language for
                                  Visual Tracking  . . . . . . . . . . . . 304
               Satyam Tyagi and   
                     Paul Tarau   A Most Specific Method Finding Algorithm
                                  for Reflection Based Dynamic
                                  Prolog-to-Java Interfaces  . . . . . . . 322
                     Owen Kaser   State Generation in the PARMC Model
                                  Checker  . . . . . . . . . . . . . . . . 337
                      Anonymous   Author Index . . . . . . . . . . . . . . 353


Lecture Notes in Computer Science
Volume 1991, 2001

              Carles Sierra and   
                   Frank Dignum   Agent-Mediated Electronic Commerce:
                                  Scientific and Technological Roadmap . . 1
        Alessio R. Lomuscio and   
         Michael Wooldridge and   
           Nicholas R. Jennings   A Classification Scheme for Negotiation
                                  in Electronic Commerce . . . . . . . . . 19
                Jean-Luc Koning   Designing and Testing Negotiation
                                  Protocols for Electronic Commerce
                                  Applications . . . . . . . . . . . . . . 34
       Shamimabi Paurobally and   
                 Jim Cunningham   Specifying the Processes and States of
                                  Negotiation  . . . . . . . . . . . . . . 61
    Eugénio Oliveira and   
                Ana Paula Rocha   Agents Advanced Features for Negotiation
                                  in Electronic Commerce and Virtual
                                  Organisations Formation Process  . . . . 78
                   Frank Dignum   Agents, Markets, Institutions, and
                                  Protocols  . . . . . . . . . . . . . . . 98
 Maria João Viamonte and   
                   Carlos Ramos   A Model for an Electronic Market Place   115
                Marc Esteva and   
Juan-Antonio Rodríguez-Aguilar and   
              Carles Sierra and   
                Pere Garcia and   
                 Josep L. Arcos   On the Formal Specification of
                                  Electronic Institutions  . . . . . . . . 126
             Michael Vetter and   
                  Stefan Pitsch   Towards a Flexible Trading Process over
                                  the Internet . . . . . . . . . . . . . . 148
              Mehdi Dastani and   
                Nico Jacobs and   
        Catholijn M. Jonker and   
                      Jan Treur   Modelling User Preferences and Mediating
                                  Agents in Electronic Commerce  . . . . . 163
          Liliana Ardissono and   
                   Anna Goy and   
           Giovanna Petrone and   
              Marino Segnan and   
               Luca Console and   
             Leonardo Lesmo and   
               Carla Simone and   
                 Pietro Torasso   Agent Technologies for the Development
                                  of Adaptive Web Stores . . . . . . . . . 194
               Marc Torrens and   
                   Boi Faltings   Constraint Satisfaction for Modelling
                                  Scalable Electronic Catalogs . . . . . . 214
                Volker Roth and   
                    Vania Conan   Encrypting Java Archives and Its
                                  Application to Mobile Agent Security . . 229
                      Anonymous   Author Index . . . . . . . . . . . . . . 241


Lecture Notes in Computer Science
Volume 1992, 2001

             Siguna Müller   On the Security of a Williams Based
                                  Public Key Encryption Scheme . . . . . . 1
            Kazukuni Kobara and   
                    Hideki Imai   Semantically Secure McEliece Public-Key
                                  Cryptosystems --- Conversions for
                                  McEliece PKC . . . . . . . . . . . . . . 19--35
             Kaoru Kurosawa and   
               Wakaha Ogata and   
           Toshihiko Matsuo and   
              Shuichi Makishima   IND--CCA Public Key Schemes Equivalent
                                  to Factoring n = pq  . . . . . . . . . . 36
                  Yuliang Zheng   Identification, Signature and
                                  Signcryption Using High Order Residues
                                  Modulo an RSA Composite  . . . . . . . . 48
           Arjen K. Lenstra and   
            Igor E. Shparlinski   On the Security of Lenstra's Variant of
                                  DSA without Long Inversions  . . . . . . 64
           Arjen K. Lenstra and   
                Eric R. Verheul   Fast Irreducibility and Subgroup
                                  Membership Testing in XTR  . . . . . . . 73
                Takeshi Koshiba   A New Aspect for Security Notions:
                                  Secure Randomness in Public-Key
                                  Encryption Schemes . . . . . . . . . . . 87
           Tatsuaki Okamoto and   
              David Pointcheval   The Gap-Problems: a New Class of
                                  Problems for the Security of
                                  Cryptographic Schemes  . . . . . . . . . 104
         Ivan Damgård and   
                     Mads Jurik   A Generalisation, a Simplification and
                                  Some Applications of Paillier's
                                  Probabilistic Public-Key System  . . . . 119
         Dennis Kügler and   
                    Holger Vogt   Marking: a Privacy Protecting Approach
                                  Against Blackmailing . . . . . . . . . . 137
                   Feng Bao and   
             Robert H. Deng and   
           Willi Geiselmann and   
              Claus Schnorr and   
          Rainer Steinwandt and   
                     Hongjun Wu   Cryptanalysis of Two Sparse Polynomial
                                  Based Public Key Cryptosystems . . . . . 153
      Éliane Jaulmes and   
                   Antoine Joux   Cryptanalysis of PKP: a New Approach . . 165
                 Hongjun Wu and   
                   Feng Bao and   
                 Robert H. Deng   Cryptanalysis of a Digital Signature
                                  Scheme on ID-Based Key-Sharing
                                  Infrastructures  . . . . . . . . . . . . 173
              Rainer Steinwandt   Loopholes in Two Public Key
                                  Cryptosystems Using the Modular Group    180
           Emmanuel Bresson and   
                  Jacques Stern   Efficient Revocation in Group Signatures 190
             Wen-Guey Tzeng and   
                  Zhi-Jia Tzeng   A Public-Key Traitor Tracing Scheme with
                                  Revocation Using Dynamic Shares  . . . . 207
            Hirotaka Komaki and   
              Yuji Watanabe and   
           Goichiro Hanaoka and   
                    Hideki Imai   Efficient Asymmetric Self-Enforcement
                                  Scheme with Public Traceability  . . . . 225
               Yair Frankel and   
        Philip D. MacKenzie and   
                      Moti Yung   Adaptive Security for the
                                  Additive-Sharing Based Proactive RSA . . 240
             Wen-Guey Tzeng and   
                  Zhi-Jia Tzeng   Robust Forward-Secure Signature Schemes
                                  with Proactive Security  . . . . . . . . 264
                Yvo Desmedt and   
             Mike Burmester and   
               Jennifer Seberry   Equitability in Retroactive Data
                                  Confiscation versus Proactive Key Escrow 277
                 Adam Young and   
                      Moti Yung   A PVSS as Hard as Discrete Log and
                                  Shareholder Separability . . . . . . . . 287
        Pierre-Alain Fouque and   
                  Jacques Stern   One Round Threshold Discrete-Log Key
                                  Generation without Private Channels  . . 300
               Masayuki Abe and   
               Fumitaka Hoshino   Remarks on Mix-Network Based on
                                  Permutation Networks . . . . . . . . . . 317
              Chong Hee Kim and   
                  Pil Joong Lee   New Key Recovery in WAKE Protocol  . . . 325
           Willi Geiselmann and   
                 Harald Lukhaub   Redundant Representation of Finite
                                  Fields . . . . . . . . . . . . . . . . . 339
                  Marc Joye and   
               Christophe Tymen   Compact Encoding of Non-adjacent Forms
                                  with Applications to Elliptic Curve
                                  Cryptography . . . . . . . . . . . . . . 353
             Jorge Guajardo and   
         Rainer Blümel and   
                Uwe Krieger and   
                  Christof Paar   Efficient Implementation of Elliptic
                                  Curve Cryptosystems on the TI MSP430x33x
                                  Family of Microcontrollers . . . . . . . 365
           Markus Jakobsson and   
                 Susanne Wetzel   Secure Server-Aided Signature Generation 383
                Arne Ansper and   
                Ahto Buldas and   
                Meelis Roos and   
                  Jan Willemson   Efficient Long-Term Validation of
                                  Digital Signatures . . . . . . . . . . . 402
       Nikos K. Moshopoulos and   
                K. Z. Pekmestzi   A Novel Systolic Architecture for an
                                  Efficient RSA Implementation . . . . . . 416
                      Anonymous   Author Index . . . . . . . . . . . . . . 423


Lecture Notes in Computer Science
Volume 1993, 2001

                Kaisa Miettinen   Some Methods for Nonlinear
                                  Multi-objective Optimization . . . . . . 1
        Carlos A. Coello Coello   A Short Tutorial on Evolutionary
                                  Multiobjective Optimization  . . . . . . 21
                Ralph E. Steuer   An Overview in Graphs of Multiple
                                  Objective Programming  . . . . . . . . . 41
                   I. C. Parmee   Poor-Definition, Uncertainty, and Human
                                  Factors --- Satisfying Multiple
                                  Objectives in Real-World Decision-Making
                                  Environments . . . . . . . . . . . . . . 52
              Kalyanmoy Deb and   
                    Tushar Goel   Controlled Elitist Non-dominated Sorting
                                  Genetic Algorithms for Better
                                  Convergence  . . . . . . . . . . . . . . 67
            Tadahiko Murata and   
            Hisao Ishibuchi and   
                     Mitsuo Gen   Specification of Genetic Search
                                  Directions in Cellular Multi-objective
                                  Genetic Algorithms . . . . . . . . . . . 82
                 Yaochu Jin and   
              Tatsuya Okabe and   
              Bernhard Sendhoff   Adapting Weighted Aggregation for
                                  Multiobjective Evolution Strategies  . . 96
                  K. C. Tan and   
                  T. H. Lee and   
                     E. F. Khor   Incrementing Multi-objective
                                  Evolutionary Algorithms: Performance
                                  Studies and Comparisons  . . . . . . . . 111
    Carlos A. Coello Coello and   
        Gregorio Toscano Pulido   A Micro-Genetic Algorithm for
                                  Multiobjective Optimization  . . . . . . 126
            Andrzej Osyczka and   
              Stanislaw Krenich   Evolutionary Algorithms for
                                  Multicriteria Optimization with
                                  Selecting a Representative Subset of
                                  Pareto Optimal Solutions . . . . . . . . 141
           Nicole Drechsler and   
             Rolf Drechsler and   
                   Bernd Becker   Multi-objective Optimisation Based on
                                  Relation Favour  . . . . . . . . . . . . 154
          Natasa Milickovic and   
            Michael Lahanas and   
               Dimos Baltas and   
             Nikolaos Zamboglou   Comparison of Evolutionary and
                                  Deterministic Multiobjective Algorithms
                                  for Dose Optimization in Brachytherapy   167
             Marco Laumanns and   
             Eckart Zitzler and   
                  Lothar Thiele   On the Effects of Archiving, Elitism,
                                  and Density Based Selection in
                                  Evolutionary Multi-objective
                                  Optimization . . . . . . . . . . . . . . 181
                   Thomas Hanne   Global Multiobjective Optimization with
                                  Evolutionary Algorithms: Selection
                                  Mechanisms and Mutation Control  . . . . 197
 Viviane Grunert da Fonseca and   
          Carlos M. Fonseca and   
                Andreia O. Hall   Inferential Performance Assessment of
                                  Stochastic Optimisers and the Attainment
                                  Function . . . . . . . . . . . . . . . . 213
          Jesse B. Zydallis and   
    David A. Van Veldhuizen and   
                 Gary B. Lamont   A Statistical Comparison of
                                  Multiobjective Evolutionary Algorithms
                                  Including the MOMGA--II  . . . . . . . . 226
        Andrzej Jaszkiewicz and   
               Maciej Hapke and   
                 Pawe\l Kominek   Performance of Multiple Objective
                                  Evolutionary Algorithms on a
                                  Distribution System Design Problem ---
                                  Computational Experiment . . . . . . . . 241
            Jonathan Wright and   
              Heather Loosemore   An Infeasibility Objective for Use in
                                  Constrained Pareto Optimization  . . . . 256
          Joshua D. Knowles and   
          Richard A. Watson and   
                 David W. Corne   Reducing Local Optima in
                                  Single-Objective Problems by
                                  Multi-objectivization  . . . . . . . . . 269
              Kalyanmoy Deb and   
               Amrit Pratap and   
                   T. Meyarivan   Constrained Test Problems for
                                  Multi-objective Evolutionary
                                  Optimization . . . . . . . . . . . . . . 284
         S. Ranji Ranjithan and   
           S. Kishan Chetan and   
             Harish K. Dakshina   Constraint Method-Based Evolutionary
                                  Algorithm (CMEA) for Multiobjective
                                  Optimization . . . . . . . . . . . . . . 299
              Jürgen Teich   Pareto-Front Exploration with Uncertain
                                  Objectives . . . . . . . . . . . . . . . 314
                 Evan J. Hughes   Evolutionary Multi-objective Ranking
                                  with Uncertainty and Noise . . . . . . . 329
                 E. F. Khor and   
                  K. C. Tan and   
                      T. H. Lee   Tabu-Based Exploratory Evolutionary
                                  Algorithm for Effective Multi-objective
                                  Optimization . . . . . . . . . . . . . . 344
              Steffen Iredi and   
              Daniel Merkle and   
              Martin Middendorf   Bi-Criterion Optimization with Multi
                                  Colony Ant Algorithms  . . . . . . . . . 359
              Jerzy Balicki and   
               Zygmunt Kitowski   Multicriteria Evolutionary Algorithm
                                  with Tabu Search for Task Assignment . . 373
              Kalyanmoy Deb and   
                    Tushar Goel   A Hybrid Multi-objective Evolutionary
                                  Approach to Engineering Shape Design . . 385
              Habib Youssef and   
              Sadiq M. Sait and   
                 Salman A. Khan   Fuzzy Evolutionary Hybrid Metaheuristic
                                  for Network Topology Design  . . . . . . 400
           El-Ghazali Talbi and   
              Malek Rahoual and   
        Mohamed Hakim Mabed and   
              Clarisse Dhaenens   A Hybrid Evolutionary Approach for
                                  Multicriteria Optimization Problems:
                                  Application to the Flow Shop . . . . . . 416
          Xavier Gandibleux and   
            Hiroyuki Morita and   
                    Naoki Katoh   The Supported Solutions Used as a
                                  Genetic Information in a Population
                                  Heuristic  . . . . . . . . . . . . . . . 429
                C. Brizuela and   
               N. Sannomiya and   
                        Y. Zhao   Multi-objective Flow-Shop: Preliminary
                                  Results  . . . . . . . . . . . . . . . . 443
                Tapan P. Bagchi   Pareto-Optimal Solutions for
                                  Multi-objective Production Scheduling
                                  Problems . . . . . . . . . . . . . . . . 458
         W. Matthew Carlyle and   
                  Bosun Kim and   
             John W. Fowler and   
                    Esma S. Gel   Comparison of Multiple Objective Genetic
                                  Algorithms for Parallel Machine
                                  Scheduling Problems  . . . . . . . . . . 472
           Walid El Moudani and   
Carlos Alberto Nunes Cosenza and   
            Marc de Coligny and   
       Félix Mora-Camino   A Bi-Criterion Approach for the Airlines
                                  Crew Rostering Problem . . . . . . . . . 486
   Hernán E. Aguirre and   
             Kiyoshi Tanaka and   
            Tatsuo Sugimura and   
                Shinjiro Oshita   Halftone Image Generation with Improved
                                  Multiobjective Genetic Algorithm . . . . 501
          Ivo F. Sbalzarini and   
        Sibylle Müller and   
            Petros Koumoutsakos   Microchannel Optimization Using
                                  Multiobjective Evolution Strategies  . . 516
           Andrei Petrovski and   
                    John McCall   Multi-objective Optimisation of Cancer
                                  Chemotherapy Using Evolutionary
                                  Algorithms . . . . . . . . . . . . . . . 531
                  Mark Thompson   Application of Multi Objective
                                  Evolutionary Algorithms to Analogue
                                  Filter Tuning  . . . . . . . . . . . . . 546
                P. Di Barba and   
                  M. Farina and   
                      A. Savini   Multiobjective Design Optimization of
                                  Real-Life Devices in Electrical
                                  Engineering: a Cost-Effective
                                  Evolutionary Approach  . . . . . . . . . 560
            Michael Lahanas and   
          Natasa Milickovic and   
               Dimos Baltas and   
             Nikolaos Zamboglou   Application of Multiobjective
                                  Evolutionary Algorithms for Dose
                                  Optimization Problems in Brachytherapy   574
            Hisao Ishibuchi and   
         Tomoharu Nakashima and   
                Tadahiko Murata   Multiobjective Optimization in
                                  Linguistic Rule Extraction from
                                  Numerical Data . . . . . . . . . . . . . 588
             Neil H. Eklund and   
              Mark J. Embrechts   Determining the Color-Efficiency Pareto
                                  Optimal Surface for Filtered Light
                                  Sources  . . . . . . . . . . . . . . . . 603
             Nando Laumanns and   
             Marco Laumanns and   
                   Dirk Neunzig   Multi-objective Design Space Exploration
                                  of Road Trains with Evolutionary
                                  Algorithms . . . . . . . . . . . . . . . 612
            Johan Andersson and   
                    Petter Krus   Multiobjective Optimization of Mixed
                                  Variable Design Problems . . . . . . . . 624
             Daisuke Sasaki and   
           Masashi Morikawa and   
           Shigeru Obayashi and   
             Kazuhiro Nakahashi   Aerodynamic Shape Optimization of
                                  Supersonic Wings by Adaptive Range
                                  Multiobjective Genetic Algorithms  . . . 639
    Fernando Jiménez and   
Antonio F. Gómez-Skarmeta and   
                Hans Roubos and   
               Robert Babu\vska   Accurate, Transparent, and Compact Fuzzy
                                  Models for Function Approximation and
                                  Dynamic Modeling through Multi-objective
                                  Evolutionary Optimization  . . . . . . . 653
             Anna L. Blumel and   
             Evan J. Hughes and   
                 Brian A. White   Multi-objective Evolutionary Design of
                                  Fuzzy Autopilot Controller . . . . . . . 668
              Mark Erickson and   
                 Alex Mayer and   
                   Jeffrey Horn   The Niched Pareto Genetic Algorithm $2$
                                  Applied to the Design of Groundwater
                                  Remediation Systems  . . . . . . . . . . 681--695
Ester Bernadó i Mansilla and   
        Josep M. Garrell i Guiu   MOLeCS: Using Multiobjective
                                  Evolutionary Algorithms for Learning . . 696
                      Anonymous   Author Index . . . . . . . . . . . . . . 711


Lecture Notes in Computer Science
Volume 1994, 2001

               Jürgen Lind   1. Introduction  . . . . . . . . . . . . 1
               Jürgen Lind   2. Agents, Multiagent Systems and
                                  Software Engineering . . . . . . . . . . 9
               Jürgen Lind   3. Basic Concepts in Software
                                  Engineering  . . . . . . . . . . . . . . 35
               Jürgen Lind   4. The Conceptual Framework of MASSIVE   97
               Jürgen Lind   5. MASSIVE Views . . . . . . . . . . . . 121
               Jürgen Lind   6. Further Case Studies  . . . . . . . . 205
               Jürgen Lind   7. Conclusion  . . . . . . . . . . . . . 243
               Jürgen Lind   A. Toolkits for Agent-Based Applications 247
               Jürgen Lind   B. Basic Problem Solving Capabilities of
                                  TCS Agents . . . . . . . . . . . . . . . 255
               Jürgen Lind   C. Protoz Specification of the
                                  Contract-Net Protocol  . . . . . . . . . 261
                      Anonymous   Bibliography . . . . . . . . . . . . . . 265
                      Anonymous   Glossary . . . . . . . . . . . . . . . . 281
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 283


Lecture Notes in Computer Science
Volume 1995, 2001

                 James Cole and   
               John Derrick and   
            Zoran Milosevic and   
                  Kerry Raymond   Author Obliged to Submit Paper before 4
                                  July: Policies in an Enterprise
                                  Specification  . . . . . . . . . . . . . 1--17
         Nicodemos Damianou and   
             Naranker Dulay and   
                  Emil Lupu and   
                  Morris Sloman   The Ponder Policy Specification Language 18
                     Zhi Fu and   
                S. Felix Wu and   
                   He Huang and   
                   Kung Loh and   
               Fengmin Gong and   
               Ilia Baldine and   
                       Chong Xu   IPSec/VPN Security Policy: Correctness,
                                  Conflict Detection, and Resolution . . . 39
               Jan Chomicki and   
                     Jorge Lobo   Monitors for History-Based Policies  . . 57
                Roberto Viviani   A Type/Domain Security Policy for
                                  Internet Transmission, Sharing, and
                                  Archiving of Medical and Biological Data 73
           Michael Hitchens and   
             Vijay Varadharajan   Tower: a Language for Role Based Access
                                  Control  . . . . . . . . . . . . . . . . 88
                 Jean Bacon and   
              Michael Lloyd and   
                      Ken Moody   Translating Role-Based Access Control
                                  Policy within Context  . . . . . . . . . 107
             Ingo Lück and   
     Christian Schäfer and   
                    Heiko Krumm   Model-Based Tool-Assistance for
                                  Packet-Filter Design . . . . . . . . . . 120
               Dinesh Verma and   
               Mandis Beigi and   
               Raymond Jennings   Policy Based SLA Management in
                                  Enterprise Networks  . . . . . . . . . . 137
               Mark Bearden and   
                Sachin Garg and   
                   Woei-jyh Lee   Integrating Goal Specification in
                                  Policy-Based Management  . . . . . . . . 153
                  Yasusi Kanada   Taxonomy and Description of Policy
                                  Combination Methods  . . . . . . . . . . 171
             Hanan Lutfiyya and   
             Gary Molenkamp and   
          Michael Katchabaw and   
                  Michael Bauer   Issues in Managing Soft QoS Requirements
                                  in Distributed Systems Using a
                                  Policy-Based Framework . . . . . . . . . 185
            Ian W. Marshall and   
                     Paul Mckee   A Policy Based Management Architecture
                                  for Large Scale Active Communication
                                  Systems  . . . . . . . . . . . . . . . . 202
            Antonio Corradi and   
             Naranker Dulay and   
          Rebecca Montanari and   
              Cesare Stefanelli   Policy-Driven Management of Agent
                                  Systems  . . . . . . . . . . . . . . . . 214
              Paris Flegkas and   
          Panos Trimintzios and   
              George Pavlou and   
         Ilias Adrikopoulos and   
           Carlos F. Calvacanti   On Policy-Based Extensible Hierarchical
                                  Network Management in QoS-Enabled IP
                                  Networks . . . . . . . . . . . . . . . . 230
              Raouf Boutaba and   
              Andreas Polyrakis   Towards Extensible Policy Enforcement
                                  Points . . . . . . . . . . . . . . . . . 247
                      Anonymous   Author Index . . . . . . . . . . . . . . 263


Lecture Notes in Computer Science
Volume 1996, 2001

               Eric B. Baum and   
                Igor Durdanovic   An Artificial Economy of Post Production
                                  Systems  . . . . . . . . . . . . . . . . 3
                     Larry Bull   Simple Markov Models of the Genetic
                                  Algorithm in Classifier Systems:
                                  Accuracy-Based Fitness . . . . . . . . . 21
                     Larry Bull   Simple Markov Models of the Genetic
                                  Algorithm in Classifier Systems:
                                  Multi-step Tasks . . . . . . . . . . . . 29
             Martin V. Butz and   
          David E. Goldberg and   
             Wolfgang Stolzmann   Probability-Enhanced Predictions in the
                                  Anticipatory Classifier System . . . . . 37
       Pierre Gérard and   
                 Olivier Sigaud   YACS: Combining Dynamic Programming with
                                  Generalization in Classifier Systems . . 52
                Jacob Hurst and   
                     Larry Bull   A Self-Adaptive Classifier System  . . . 70
                 Tim Kovacs and   
                 Manfred Kerber   What Makes a Problem Hard for XCS? . . . 80
                 John H. Holmes   Applying a Learning Classifier System to
                                  Mining Explanatory and Predictive Models
                                  from a Large Clinical Database . . . . . 103
          Sonia Schulenburg and   
                     Peter Ross   Strength and Money: An LCS Approach to
                                  Increasing Returns . . . . . . . . . . . 114
             Olivier Sigaud and   
           Pierre Gérard   Using Classifier Systems as Adaptive
                                  Expert Systems for Control . . . . . . . 138
              Stewart W. Wilson   Mining Oblique Data with XCS . . . . . . 158
     Tiago Sepúlveda and   
         Mário Rui Gomes   A Study on the Evolution of Learning
                                  Classifier Systems . . . . . . . . . . . 177
             Keiki Takadama and   
               Takao Terano and   
            Katsunori Shimohara   Learning Classifier Systems Meet
                                  Multiagent Environments  . . . . . . . . 192
                 Tim Kovacs and   
                Pier Luca Lanzi   A Bigger Learning Classifier Systems
                                  Bibliography . . . . . . . . . . . . . . 213
             Martin V. Butz and   
              Stewart W. Wilson   An Algorithmic Description of XCS  . . . 253
                      Anonymous   Author Index . . . . . . . . . . . . . . 273


Lecture Notes in Computer Science
Volume 1997, 2001

             Don Chamberlin and   
             Jonathan Robie and   
               Daniela Florescu   Quilt: An XML Query Language for
                                  Heterogeneous Data Sources . . . . . . . 1
                 Nuno Maria and   
          Mário J. Silva   Theme-Based Retrieval of Web News  . . . 26
                Jeonghee Yi and   
            Neel Sundaresan and   
                    Anita Huang   Using Metadata to Enhance Web
                                  Information Gathering  . . . . . . . . . 38
   Jayavel Shanmugasundaram and   
              Kristin Tufte and   
               David DeWitt and   
                David Maier and   
            Jeffrey F. Naughton   Architecting a Network Query Engine for
                                  Producing Partial Results  . . . . . . . 58
                Luping Quan and   
                    Li Chen and   
          Elke A. Rundensteiner   Argos: Efficient Refresh in an XQL-Based
                                  Web Caching System . . . . . . . . . . . 78
                  Qiong Luo and   
        Jeffrey F. Naughton and   
    Rajasekar Krishnamurthy and   
                    Pei Cao and   
                      Yunrui Li   Active Query Caching for Database Web
                                  Servers  . . . . . . . . . . . . . . . . 92
              Anja Theobald and   
                 Gerhard Weikum   Adding Relevance to XML  . . . . . . . . 105
            Thorsten Fiebig and   
                Guido Moerkotte   Evaluating Queries on Structure with
                                  eXtended Access Support Relations  . . . 125
           Albrecht Schmidt and   
             Martin Kersten and   
           Menzo Windhouwer and   
                   Florian Waas   Efficient Relational Storage and
                                  Retrieval of XML Documents . . . . . . . 137
              Meike Klettke and   
                   Holger Meyer   XML and Object-Relational Database
                                  Systems --- Enhancing Structural
                                  Mappings Based on Statistics . . . . . . 151
                Arnaud Sahuguet   Everything You Ever Wanted to Know About
                                  DTDs, But Were Afraid to Ask (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 171--183
              Shu-Yao Chien and   
        Vassilis J. Tsotras and   
                  Carlo Zaniolo   Version Management of XML Documents  . . 184
                Aldo Bongio and   
               Stefano Ceri and   
           Piero Fraternali and   
                 Andrea Maurino   Modeling Data Entry and Operations in
                                  WebML  . . . . . . . . . . . . . . . . . 201
          Gösta Grahne and   
                     Alex Thomo   An Optimization Technique for Answering
                                  Regular Path Queries . . . . . . . . . . 215
               Haruo Hosoya and   
             Benjamin C. Pierce   XDuce: a Typed XML Processing Language
                                  (Preliminary Report) . . . . . . . . . . 226--244
    Panagiotis G. Ipeirotis and   
               Luis Gravano and   
                  Mehran Sahami   Automatic Classification of Text
                                  Databases through Query Probing  . . . . 245
               D. W. Embley and   
                          L. Xu   Locating and Reconfiguring Records in
                                  Unstructured Multiple-Record Web
                                  Documents  . . . . . . . . . . . . . . . 256
                      Anonymous   Author Index . . . . . . . . . . . . . . 275


Lecture Notes in Computer Science
Volume 1998, 2001

 Mårten Björkman and   
               Jan-Olof Eklundh   Visual Cues for a Fixating Active Agent  1
             Bodo Rosenhahn and   
        Norbert Krüger and   
               Torge Rabsch and   
                  Gerald Sommer   Tracking with a Novel Pose Estimation
                                  Algorithm  . . . . . . . . . . . . . . . 9
                 Jason Luck and   
                  Dan Small and   
              Charles Q. Little   Real-Time Tracking of Articulated Human
                                  Models Using a $3$D
                                  Shape-from-Silhouette Method . . . . . . 19
             Sebastian Weik and   
                  C.-E. Liedtke   Hierarchical $3$D Pose Estimation for
                                  Articulated Human Body Models from a
                                  Sequence of Volume Data  . . . . . . . . 27
             Stefan Enderle and   
             Heiko Folkerts and   
              Marcus Ritter and   
      Stefan Sablatnög and   
       Gerhard Kraetzschmar and   
              Günther Palm   Vision-Based Robot Localization Using
                                  Sporadic Features  . . . . . . . . . . . 35
               Nikki Austin and   
                   Yen Chen and   
            Reinhard Klette and   
            Robert Marshall and   
            Yuan-sheng Tsai and   
                  Yongbao Zhang   A Comparison of Feature Measurements for
                                  Kinetic Studies on Human Bodies  . . . . 43
       Benjamin Hohnhaeuser and   
                 Guenter Hommel   Object Identification and Pose
                                  Estimation for Automatic Manipulation    52
                 Slimane Larabi   Toward Self-calibration of a Stereo Rig
                                  from Noisy Stereoscopic Images . . . . . 60
          Philippe Leclercq and   
             Thomas Bräunl   A Color Segmentation Algorithm for
                                  Real-Time Object Localization on Small
                                  Embedded Systems . . . . . . . . . . . . 69
            Karsten Scheibe and   
          Hartmut Korsitzky and   
                Ralf Reulke and   
             Martin Scheele and   
                Michael Solbrig   EYESCAN --- A High Resolution Digital
                                  Panoramic Camera . . . . . . . . . . . . 77
               Tiangong Wei and   
                Reinhard Klette   A Wavelet-Based Algorithm for Height
                                  from Gradients . . . . . . . . . . . . . 84
            Alexander Wuerz and   
           Stefan K. Gehrig and   
              Fridtjof J. Stein   Enhanced Stereo Vision Using Free-Form
                                  Surface Mirrors  . . . . . . . . . . . . 91
                   Jacky Baltes   RoboCup-99: a Student's Perspective  . . 99
                   Jacky Baltes   HORUS: Object Orientation and Id without
                                  Additional Markers . . . . . . . . . . . 107
             Pascual Campoy and   
            Pedro J. Garcia and   
         Antonio Barrientos and   
            Jaime del Cerro and   
      Iñaqui Aguirre and   
          Andrés Roa and   
              Rafael Garcia and   
    José M. Muñoz   An Stereoscopic Vision System Guiding an
                                  Autonomous Helicopter for Overhead Power
                                  Cable Inspection . . . . . . . . . . . . 115
             Wee-Soon Ching and   
                  Edward Ho and   
            Christopher Ong and   
                     Hs Tay and   
                    Sai-Mui Lim   $3$D Stereo Vision-Based Nursing Robot
                                  for Elderly Health Care  . . . . . . . . 125
         Ernst Dieter Dickmanns   Efficient Computation of Intensity
                                  Profiles for Real-Time Vision  . . . . . 131
              Atsushi Imiya and   
                Keisuke Iwawaki   Subpixel Flow Detection by the Hough
                                  Transform  . . . . . . . . . . . . . . . 140
               Ruijiang Luo and   
                        Yan Guo   Tracking of Moving Heads in Cluttered
                                  Scenes from Stereo Vision  . . . . . . . 148
                Josef Pauli and   
               Arne Schmidt and   
                  Gerald Sommer   Servoing Mechanisms for Peg-In-Hole
                                  Assembly Operations  . . . . . . . . . . 157
           David C. K. Yuen and   
             Bruce A. MacDonald   Robot Localization Using Omnidirectional
                                  Color Images . . . . . . . . . . . . . . 167
                Alan McIvor and   
                    Qi Zang and   
                Reinhard Klette   The Background Subtraction Problem for
                                  Video Surveillance Systems . . . . . . . 176
            Radim \vSára   Stable Monotonic Matching for
                                  Stereoscopic Vision  . . . . . . . . . . 184
          Kazuhiko Kawamoto and   
                  Atsushi Imiya   Random Sampling and Voting Method for
                                  Three-Dimensional Reconstruction . . . . 193
              Georgy Gimel'farb   Binocular Stereo by Maximizing the
                                  Likelihood Ratio Relative to a Random
                                  Terrain  . . . . . . . . . . . . . . . . 201
                  Fay Huang and   
              Shou Kang Wei and   
                Reinhard Klette   Stereo Reconstruction from Polycentric
                                  Panoramas  . . . . . . . . . . . . . . . 209
        Norbert Krüger and   
            Daniel Wendorff and   
                  Gerald Sommer   Two Modules of a Vision-Based Robotic
                                  System: Attention and Accumulation of
                                  Object Representations . . . . . . . . . 219
                Josef Pauli and   
                  Gerald Sommer   Compatibilities for the
                                  Perception-Action Cycle  . . . . . . . . 227
                      Hongbo Li   Trifocal Tensors with Grassmann-Cayley
                                  Algebra  . . . . . . . . . . . . . . . . 237
                   Jacky Baltes   Camera Calibration Using Rectangular
                                  Textures . . . . . . . . . . . . . . . . 245
                Mohammed Yeasin   Optical Flow in Log-mapped Image Plane   252
          Takamasa Koshizen and   
                Hiroshi Tsujino   Hypothetically Modeled Perceptual
                                  Sensory Modality of Human Visual
                                  Selective Attention Scheme by PFC-Based
                                  Network  . . . . . . . . . . . . . . . . 261
           Anko Börner and   
                    Ralf Reulke   Results of Test Flights with the
                                  Airborne Digital Sensor ADS40  . . . . . 270
                    Moshe Porat   Localized Video Compression for Machine
                                  Vision . . . . . . . . . . . . . . . . . 278
                      Anonymous   Author Index . . . . . . . . . . . . . . 285


Lecture Notes in Computer Science
Volume 1999, 2001

                 Walter Schwarz   Application Integration with CORBA and
                                  XML  . . . . . . . . . . . . . . . . . . 1
          Stanley M. Sutton Jr.   Middleware Selection . . . . . . . . . . 2
           Michael Goedicke and   
                       Uwe Zdun   A Key Technology Evaluation Case Study:
                                  Applying a New Middleware Architecture
                                  on the Enterprise Scale  . . . . . . . . 8
Jörn Guy Süß and   
                  Michael Mewes   An Architecture Proposal for Enterprise
                                  Message Brokers  . . . . . . . . . . . . 27
             Stoney Jackson and   
                   Prem Devanbu   Resource Management  . . . . . . . . . . 43
      Hector A. Duran-Limon and   
                Gordon S. Blair   The Importance of Resource Management in
                                  Engineering Distributed Objects  . . . . 44
                Felix Bübl   Towards Designing Distributed Systems
                                  with ConDIL  . . . . . . . . . . . . . . 61
              Wolfgang Emmerich   Architectural Reasoning  . . . . . . . . 81
           Miguel de Miguel and   
           Thomas Lambolais and   
            Sophie Piekarec and   
Stéphane Betgé-Brezetz and   
Jérôme Péquery   Automatic Generation of Simulation
                                  Models for the Evaluation of Performance
                                  and Reliability of Architectures
                                  Specified in UML . . . . . . . . . . . . 83
           Francesco Tisato and   
             Andrea Savigni and   
             Walter Cazzola and   
                   Andrea Sosio   Architectural Reflection: Realising
                                  Software Architectures via Reflective
                                  Activities . . . . . . . . . . . . . . . 102
                     Nima Kaveh   Using Model Checking to Detect Deadlocks
                                  in Distributed Object Systems  . . . . . 116
            Alessandro Orso and   
          Mary Jean Harrold and   
                David Rosenblum   Component Metadata for Software
                                  Engineering Tasks  . . . . . . . . . . . 129
                   Jessica Chen   On Using Static Analysis in Distributed
                                  System Testing . . . . . . . . . . . . . 145
           Alfonso Fuggetta and   
         Rushikesh K. Joshi and   
      António Rito Silva   Distributed Communication  . . . . . . . 163
  António Rito Silva and   
       Francisco Assis Rosa and   
    Teresa Gonçalves and   
                 Miguel Antunes   Distributed Proxy: a Design Pattern for
                                  the Incremental Development of
                                  Distributed Applications . . . . . . . . 165
             Rushikesh K. Joshi   Modeling with Filter Objects in
                                  Distributed Systems  . . . . . . . . . . 182
           Christoph Liebig and   
                     Stefan Tai   Advanced Transactions: Concepts and $
                                  X^{2TS} $ Prototype  . . . . . . . . . . 188
           Christoph Liebig and   
                Marco Malva and   
              Alejandro Buchman   Integrating Notifications and
                                  Transactions: Concepts and $ X^{2TS} $
                                  Prototype  . . . . . . . . . . . . . . . 194
                Marek Prochazka   Advanced Transactions in Enterprise Java
                                  Beans  . . . . . . . . . . . . . . . . . 215
               Michael Goedicke   Service Integration  . . . . . . . . . . 231
        Kostas Kontogiannis and   
                Richard Gregory   Customizable Service Integration in
                                  Web-Enabled Environments . . . . . . . . 235
                   Ying Zou and   
            Kostas Kontogiannis   Migrating and Specifying Services for
                                  Web Integration  . . . . . . . . . . . . 253
                      Anonymous   Author Index . . . . . . . . . . . . . . 271


Lecture Notes in Computer Science
Volume 2000, 2001

                 Gerhard Weikum   The Web in 2010: Challenges and
                                  Opportunities for Database Research  . . 1
            Michael J. Franklin   Challenges in Ubiquitous Data Management 24
         Andrew T. Campbell and   
        Michael E. Kounavis and   
                John B. Vicente   Programmable Networks  . . . . . . . . . 34
              Andreas Pfitzmann   Multilateral Security: Enabling
                                  Technologies and Their Evaluation  . . . 50
                    Ueli Maurer   Cryptography $ 2000 \pm 10 $ . . . . . . 63--85
          Fred B. Schneider and   
             Greg Morrisett and   
                  Robert Harper   A Language-Based Approach to Security    86
                 Jochen Ludewig   Software Engineering in the Years 2000
                                  Minus and Plus Ten . . . . . . . . . . . 102
                 Cliff B. Jones   Thinking Tools for the Future of
                                  Computing Science  . . . . . . . . . . . 112
Famantanantsoa Randimbivololona   Orientations in Verification Engineering
                                  of Avionics Software . . . . . . . . . . 131
                 Patrick Cousot   Abstract Interpretation Based Formal
                                  Methods and Future Challenges  . . . . . 138
             K. Rustan M. Leino   Extended Static Checking: a Ten-Year
                                  Perspective  . . . . . . . . . . . . . . 157
              Edmund Clarke and   
              Orna Grumberg and   
                 Somesh Jha and   
                    Yuan Lu and   
                   Helmut Veith   Progress on the State Explosion Problem
                                  in Model Checking  . . . . . . . . . . . 176
                Susan L. Graham   From Research Software to Open Source    195
               Gurindar S. Sohi   Microprocessors -- 10 Years Back, 10
                                  Years Ahead  . . . . . . . . . . . . . . 209
            Paul Vitányi   The Quantum Computing Challenge  . . . . 219
                Lawrence Snyder   Parallel Computation: $ M M \pm X $  . . 234
                Juris Hartmanis   Computational Complexity and
                                  Mathematical Proofs  . . . . . . . . . . 251
                Wolfgang Thomas   Logic for Computer Science: The
                                  Engineering Challenge  . . . . . . . . . 257
                  Kurt Mehlhorn   From Algorithm to Program to Software
                                  Library  . . . . . . . . . . . . . . . . 268
              Wolfgang Wahlster   Pervasive Speech and Language Technology 274
                   Rolf Pfeifer   Embodied Artificial Intelligence: 10
                                  Years Back, 10 Years Forward . . . . . . 294
                 Hans Hagen and   
                Achim Ebert and   
    Rolf Hendrik van Lengen and   
              Gerik Scheuermann   Scientific Visualization --- Methods and
                                  Applications . . . . . . . . . . . . . . 311
           Jan-Olof Eklundh and   
          Henrik I. Christensen   Computer Vision: Past and Future . . . . 328
                Thomas Lengauer   Computational Biology at the Beginning
                                  of the Post-genomic Era  . . . . . . . . 341
                 A. Peter Young   Computer Science in Physics  . . . . . . 356
                      Anonymous   Author Index . . . . . . . . . . . . . . 369


Lecture Notes in Computer Science
Volume 2001, 2001

                       C. Lakos   Object Oriented Modeling with Object
                                  Petri Nets . . . . . . . . . . . . . . . 1
                 T. Holvoet and   
                   P. Verbaeten   Using Petri Nets for Specifying Active
                                  Objects and Generative Communication . . 38
              O. Biberstein and   
                   D. Buchs and   
                      N. Guelfi   Object-Oriented Nets with Algebraic
                                  Specifications: The CO-OPN/2 Formalism   73
               E. Battiston and   
                A. Chizzoni and   
                   F. De Cindio   CLOWN as a Testbed for Concurrent
                                  Object-Oriented Concepts . . . . . . . . 131
                        R. Valk   Concurrency in Communicating Object
                                  Petri Nets . . . . . . . . . . . . . . . 164
                      X. He and   
                        Y. Ding   Object Orientation in Hierarchical
                                  Predicate Transition Nets  . . . . . . . 196
              C. Sibertin-Blanc   CoOperative Objects: Principles, Use and
                                  Implementation . . . . . . . . . . . . . 216
                      J. Lilius   OB(PN) 2: An Object Based Petri Net
                                  Programming Notation . . . . . . . . . . 247
                  L. Baresi and   
                     M. Pezz\`e   On Formalizing UML with High-Level Petri
                                  Nets . . . . . . . . . . . . . . . . . . 276
                 R. Bastide and   
                    P. Palanque   Modeling a Groupware Editing Tool with
                                  Cooperative Objects  . . . . . . . . . . 305
              M. A. Alberti and   
                     P. Evi and   
                      D. Marini   Modeling Constrained Geometric Objects
                                  with OBJSA Nets  . . . . . . . . . . . . 319
             D. S. Guerrero and   
     J. C. A. de Figueiredo and   
                   A. Perkusich   An Object-Based Modular CPN Approach:
                                  Its Application to the Specification of
                                  a Cooperative Editing Environment  . . . 338
       J. A. Bañares and   
         P. R. Muro-Medrano and   
           J. L. Villarroel and   
                 F. J. Zarazaga   KRON: Knowledge Engineering Approach
                                  Based on the Integration of CPNs with
                                  Objects  . . . . . . . . . . . . . . . . 355
             F. Köster and   
              S. Schöf and   
            M. Sonnenschein and   
                     R. Wieting   Modeling of a Library with THORNs  . . . 375
                  T. Basten and   
         W. M. P. van der Aalst   Inheritance of Dynamic Behavior:
                                  Development of a Groupware Editor  . . . 391
                   C. Maier and   
                       D. Moldt   Object Coloured Petri Nets -- A Formal
                                  Technique for Object Oriented Modeling   406
                 M. Gaspari and   
                   G. Zavattaro   An Actor Algebra for Specifying
                                  Distributed Systems: The Hurried
                                  Philosophers Case Study  . . . . . . . . 428
                     S. Schacht   Formal Reasoning about Actor Programs
                                  Using Temporal Logic . . . . . . . . . . 445
                    F. Puntigam   Flexible Types for a Concurrent Model    461
                F. Vernadat and   
                P. Azéma   High Level Transition Systems for
                                  Communicating Agents . . . . . . . . . . 473
                   L. Nigro and   
                        F. Pupo   Schedulability Analysis of Real Time
                                  Actor Systems Using Coloured Petri Nets  493
                      A. Diagne   Control Properties in Object-Oriented
                                  Specifications . . . . . . . . . . . . . 514
                 R. Bastide and   
                   C. Lakos and   
                    P. Palanque   A Cooperative Petri Net Editor . . . . . 534
              C. Sibertin-Blanc   The Hurried Philosophers . . . . . . . . 536
                      Anonymous   Author Index . . . . . . . . . . . . . . 539


Lecture Notes in Computer Science
Volume 2002, 2001

                An Introduction   1 Constraints and Constraint Solving: An
                                  Introduction . . . . . . . . . . . . . . 1
               Hubert Comon and   
                Claude Kirchner   2 Constraint Solving on Terms  . . . . . 47
               Franz Baader and   
                Klaus U. Schulz   3 Combining Constraint Solving . . . . . 104
           Harald Ganzinger and   
             Robert Nieuwenhuis   4 Constraints and Theorem Proving  . . . 159
Mario Rodríguez-Artalejo   5 Functional and Constraint Logic
                                  Programming  . . . . . . . . . . . . . . 202
                 Helmut Simonis   6 Building Industrial Applications with
                                  Constraint Programming . . . . . . . . . 271


Lecture Notes in Computer Science
Volume 2003, 2001

           Gustavo de Paula and   
            Francisco Ramos and   
                  Geber Ramalho   Bilateral Negotiation for Agent-Mediated
                                  Electronic Commerce  . . . . . . . . . . 1
           Mihai Barbuceanu and   
                     Wai-Kau Lo   Multi-attribute Utility Theoretic
                                  Negotiation for Electronic Commerce  . . 15
          Ryszard Kowalczyk and   
                        Van Bui   On Constraint-Based Reasoning in
                                  e-Negotiation Agents . . . . . . . . . . 31
          Alexander Artikis and   
               Frank Guerin and   
                    Jeremy Pitt   Integrating Interaction Protocols and
                                  Internet Protocols for Agent-Mediated
                                  E-Commerce . . . . . . . . . . . . . . . 47
         Michael Wooldridge and   
                  Simon Parsons   Issues in the Design of Negotiation
                                  Protocols for Logic-Based Agent
                                  Communication Languages  . . . . . . . . 70
            Matteo Pradella and   
               Marco Colombetti   A Formal Description of a Practical
                                  Agent for E-Commerce . . . . . . . . . . 84
     Henrique Lopes Cardoso and   
        Eugénio Oliveira   A Platform for Electronic Commerce with
                                  Adaptive Agents  . . . . . . . . . . . . 96
          Michael Schroeder and   
               Julie McCann and   
                  Daniel Haynes   Trading without Explicit Ontologies  . . 108
           Maksim Tsvetovat and   
               Katia Sycara and   
                  Yian Chen and   
                     James Ying   Customer Coalitions in Electronic
                                  Markets  . . . . . . . . . . . . . . . . 121
               Chris Preist and   
          Claudio Bartolini and   
                  Ivan Phillips   Algorithm Design for Agents which
                                  Participate in Multiple Simultaneous
                                  Auctions . . . . . . . . . . . . . . . . 139
        Javier Béjar and   
           Ulises Cortés   Agent Strategies on DPB Auction
                                  Tournaments  . . . . . . . . . . . . . . 155
        Javier Béjar and   
Juan A. Rodríguez-Aguilar   To Bid or Not To Bid Agent Strategies in
                                  Electronic Auction Games: Agent
                                  Strategies in Electronic Auction Games   173
                      Anonymous   Author Index . . . . . . . . . . . . . . 193


Lecture Notes in Computer Science
Volume 2004, 2001

                 Sylvain Kahane   What Is a Natural Language and How to
                                  Describe It? Meaning-Text Approaches in
                                  Contrast with Generative Approaches  . . 1
                 Sylvain Kahane   A Fully Lexicalized Grammar for French
                                  Based on Meaning-Text Theory . . . . . . 18--31
                     Leo Ferres   Modeling the Level of Involvement of
                                  Verbal Arguments . . . . . . . . . . . . 32
              Masaki Murata and   
          Kiyotaka Uchimoto and   
                    Qing Ma and   
                Hitoshi Isahara   Magical Number Seven Plus or Minus Two:
                                  Syntactic Structure Recognition in
                                  Japanese and English Sentences . . . . . 43
                 Roland Hausser   Spatio-temporal Indexing in Database
                                  Semantics  . . . . . . . . . . . . . . . 53
            Roussanka Loukanova   Russellian and Strawsonian Definite
                                  Descriptions in Situation Semantics  . . 69
              Igor A. Bolshakov   Treatment of Personal Pronouns Based on
                                  Their Parameterization . . . . . . . . . 80
                 Slim Ben Hazez   Modeling Textual Context in Linguistic
                                  Pattern Matching . . . . . . . . . . . . 93
            Valentyna Arkhelyuk   Statistical Methods in Studying the
                                  Semantics of Size Adjectives . . . . . . 96
            Tamotsu Shirado and   
                Hitoshi Isahara   Numerical Model of the Strategy for
                                  Choosing Polite Expressions  . . . . . . 98
                  Ruslan Mitkov   Outstanding Issues in Anaphora
                                  Resolution . . . . . . . . . . . . . . . 110
             Manuel Palomar and   
     Maximiliano Saiz-Noeda and   
        Rafael Muñoz and   
      Armando Suárez and   
Patricio Martínez-Barco and   
          Andrés Montoyo   PHORA: a NLP System for Spanish  . . . . 126
                   Sandra Roger   Belief Revision on Anaphora Resolution   140
              Masaki Murata and   
          Kiyotaka Uchimoto and   
                    Qing Ma and   
                Hitoshi Isahara   A Machine-Learning Approach to
                                  Estimating the Referential Properties of
                                  Japanese Noun Phrases  . . . . . . . . . 142
              Tamara Matulevich   The Referring Expressions in the Other's
                                  Comment  . . . . . . . . . . . . . . . . 155
                   Ted Pedersen   Lexical Semantic Ambiguity Resolution
                                  with Bigram-Based Decision Trees . . . . 157
              Leslie Barret and   
           Anthony R. Davis and   
                 Bonnie J. Dorr   Interpretation of Compound Nominals
                                  Using WordNet  . . . . . . . . . . . . . 169
      Andrés Montoyo and   
                 Manuel Palomar   Specification Marks for Word Sense
                                  Disambiguation: New Development  . . . . 182
Sofía N. Galicia-Haro and   
          Alexander Gelbukh and   
              Igor A. Bolshakov   Three Mechanisms of Parser Driving for
                                  Structure Disambiguation . . . . . . . . 192
                   Michael Carl   Recent Research in the Field of
                                  Example-Based Machine Translation  . . . 195
                JianDe Wang and   
             ZhaoXiong Chen and   
                    HeYan Huang   Intelligent Case Based Machine
                                  Translation System . . . . . . . . . . . 197
                  Kenji Imamura   A Hierarchical Phrase Alignment from
                                  English and Japanese Bilingual Text  . . 206
                   Rong Jin and   
         Alexander G. Hauptmann   Title Generation Using a Training Corpus 208
Ma. del Socorro Bernardos Galindo and   
        Guadalupe Aguado de Cea   A New Approach in Building a Corpus for
                                  Natural Language Generation Systems  . . 216
               Ichiro Kobayashi   A Study on Text Generation from
                                  Non-verbal Information on $2$D Charts    226
           José Coch and   
                Karine Chevreau   Interactive Multilingual Generation  . . 239
               Charles Callaway   A Computational Feature Analysis for
                                  Multilingual Character-to-Character
                                  Dialogue . . . . . . . . . . . . . . . . 251
          Diana Zaiu Inkpen and   
                   Graeme Hirst   Experiments on Extracting Knowledge from
                                  a Machine-Readable Dictionary of Synonym
                                  Differences  . . . . . . . . . . . . . . 265
            Elena I. Bolshakova   Recognition of Author's Scientific and
                                  Technical Terms  . . . . . . . . . . . . 281
        Nicoletta Calzolari and   
          Ornella Corazzari and   
               Antonio Zampolli   Lexical-Semantic Tagging of an Italian
                                  Corpus . . . . . . . . . . . . . . . . . 291
              Masaki Murata and   
              Kyoko Kanzaki and   
          Kiyotaka Uchimoto and   
                    Qing Ma and   
                Hitoshi Isahara   Meaning Sort --- Three Examples:
                                  Dictionary Construction, Tagged Corpus
                                  Construction, and Information
                                  Presentation System  . . . . . . . . . . 305
           Mitsuo Shimohata and   
                Eiichiro Sumita   Converting Morphological Information
                                  Using Lexicalized and General Conversion 319
          Alexander Gelbukh and   
                Grigori Sidorov   Zipf and Heaps Laws' Coefficients Depend
                                  on Language  . . . . . . . . . . . . . . 332
       Jesús Vilares and   
              David Cabrero and   
               Miguel A. Alonso   Applying Productive Derivational
                                  Morphology to Term Indexing of Spanish
                                  Texts  . . . . . . . . . . . . . . . . . 336
        Björn Gambäck   Unification-Based Lexicon and Morphology
                                  with Speculative Feature Signalling  . . 349
               Kazuaki Ando and   
                Tae-hun Lee and   
          Masami Shishibori and   
                   Jun-ichi Aoe   A Method of Pre-computing Connectivity
                                  Relations for Japanese/Korean POS
                                  Tagging  . . . . . . . . . . . . . . . . 363
                       Fuji Ren   A Hybrid Approach of Text Segmentation
                                  Based on Sensitive Word Concept for NLP  375
                Jawad Berri and   
               Hamza Zidoum and   
                    Yacine Atif   Web-Based Arabic Morphological Analyzer  389
    Francisco-Mario Barcala and   
     Oscar Sacristán and   
             Jorge Graña   Stochastic Parsing and Parallelism . . . 401
José Fortes Gálvez and   
       Jacques Farré and   
Miguel Ángel Pérez Aguiar   Practical Nondeterministic DR($k$ )
                                  Parsing on Graph-Structured Stack  . . . 411
             Jean-Philippe Vert   Text Categorization Using Adaptive
                                  Context Trees  . . . . . . . . . . . . . 423
              Ali Hadjarian and   
                 Jerzy Bala and   
                Peter Pachowicz   Text Categorization through
                                  Multistrategy Learning and Visualization 437
               Sabrina Tiun and   
             Rosni Abdullah and   
                 Tang Enya Kong   Automatic Topic Identification Using
                                  Ontology Hierarchy . . . . . . . . . . . 444
            Pavel Makagonov and   
          Konstantin Sboychakov   Software for Creating Domain-Oriented
                                  Dictionaries and Document Clustering in
                                  Full-Text Databases  . . . . . . . . . . 454
         Mikhail Alexandrov and   
          Alexander Gelbukh and   
                 George Lozovoi   Chi-Square Classifier for Document
                                  Categorization . . . . . . . . . . . . . 457
          Anne-Marie Currie and   
              Jocelyn Cohan and   
                  Larisa Zlatic   Information Retrieval of Electronic
                                  Medical Records  . . . . . . . . . . . . 460
               Anette Hulth and   
             Jussi Karlgren and   
               Anna Jonsson and   
        Henrik Boström and   
                     Lars Asker   Automatic Keyword Extraction Using
                                  Domain Knowledge . . . . . . . . . . . . 472
             Manuel Vilares and   
       Francisco J. Ribadas and   
              Victor M. Darriba   Approximate VLDC Pattern Matching in
                                  Shared-Forest  . . . . . . . . . . . . . 483
                   Guido Drexel   Knowledge Engineering for Intelligent
                                  Information Retrieval  . . . . . . . . . 495
          Karine Lespinasse and   
                Bruno Bachimont   Is Peritext a Key for Audiovisual
                                  Documents? The Use of Texts Describing
                                  Television Programs to Assist Indexing   505
                 David Escorial   An Information Space Using Topic
                                  Identification for Retrieved Documents   507
              Dina Wonsever and   
                 Jean-Luc Minel   Contextual Rules for Text Analysis . . . 509
Manuel Montes-y-Gómez and   
Aurelio López-López and   
              Alexander Gelbukh   Finding Correlative Associations among
                                  News Topics  . . . . . . . . . . . . . . 524
                      Anonymous   Author Index . . . . . . . . . . . . . . 527


Lecture Notes in Computer Science
Volume 2005, 2001

                Wojciech Ziarko   Rough Sets: Trends, Challenges, and
                                  Prospects  . . . . . . . . . . . . . . . 1
                  Setsuo Ohsuga   To What Extent Can Computers Aid Human
                                  Activity? Toward Second Phase
                                  Information Technology . . . . . . . . . 8
               Zdzis\law Pawlak   Rough Sets and Decision Algorithms . . . 30
                    L. A. Zadeh   Toward a Perception-Based Theory of
                                  Probabilistic Reasoning  . . . . . . . . 46
               H. S. Nguyen and   
                 A. Skowron and   
                     M. Szczuka   Situation Identification by Unmanned
                                  Aerial Vehicle . . . . . . . . . . . . . 49
             Lech Polkowski and   
                Andrzej Skowron   Rough-Neuro Computing  . . . . . . . . . 57
            Andrzej Skowron and   
         Jaroslaw Stepaniuk and   
                James F. Peters   Approximation of Information Granule
                                  Sets . . . . . . . . . . . . . . . . . . 65
            Yukari Yamauchi and   
                Masao Mukaidono   Probabilistic Inference and Bayesian
                                  Theorem on Rough Sets  . . . . . . . . . 73
                  Y. Y. Yao and   
                    J. P. Zhang   Interpreting Fuzzy Membership Functions
                                  in the Theory of Rough Sets  . . . . . . 82
          James J. Alpigini and   
                James F. Peters   Dynamic System Visualization with Rough
                                  Performance Maps . . . . . . . . . . . . 90
             Peter Apostoli and   
                    Akira Kanda   Approximation Spaces of Type-Free Sets   98
               Jan G. Bazan and   
                 Marcin Szczuka   RSES and RSESlib --- A Collection of
                                  Tools for Rough Set Computations . . . . 106
                 Malcolm Beynon   An Investigation of $ \beta $-Reduct
                                  Selection within the Variable Precision
                                  Rough Sets Model . . . . . . . . . . . . 114--122
           Maciej Borkowski and   
                 Dominik Slezak   Application of Discernibility Tables to
                                  Calculation of Approximate Frequency
                                  Based Reducts  . . . . . . . . . . . . . 123
            Moussa Boussouf and   
               Mohamed Quafafou   Scalable Feature Selection Using Rough
                                  Set Theory . . . . . . . . . . . . . . . 131
                  Igor Chikalov   On Algorithm for Constructing of
                                  Decision Trees with Minimal Number of
                                  Nodes  . . . . . . . . . . . . . . . . . 139
        Alexios Chouchoulas and   
                     Qiang Shen   Rough Set-Based Dimensionality Reduction
                                  for Multivariate Adaptive Regression
                                  Splines  . . . . . . . . . . . . . . . . 144
                 Grzegorz Drwal   Rough and Fuzzy-Rough Classification
                                  Methods Implemented in RClass System . . 152
                   S. Greco and   
               B. Matarazzo and   
                   R. Slowinski   Rough Set Approach to Decisions under
                                  Risk . . . . . . . . . . . . . . . . . . 160
                   S. Greco and   
               B. Matarazzo and   
               R. Slowinski and   
                 J. Stefanowski   Variable Consistency Model of
                                  Dominance-Based Rough Sets Approach  . . 170
             Jouni Järinen   Approximations and Rough Sets Based on
                                  Tolerances . . . . . . . . . . . . . . . 182
           Herman Midelfart and   
                 Jan Komorowski   A Rough Set Approach to Inductive Logic
                                  Programming  . . . . . . . . . . . . . . 190
                Mikhail Moshkov   Classification of Infinite Information
                                  Systems  . . . . . . . . . . . . . . . . 199
                 Zbigniew Suraj   Some Remarks on Extensions and
                                  Restrictions of Information Systems  . . 204
          Jerzy Stefanowski and   
              Alexis Tsouki\`as   Valued Tolerance and Decision Rules  . . 212
               Karl Erich Wolff   A Conceptual View of Knowledge Bases in
                                  Rough Set Theory . . . . . . . . . . . . 220
            Adriano Breunig and   
      Haroldo R. de Azevedo and   
      Edilberto P. Teixeira and   
               Elmo B. de Faria   Computer Vision Using Fuzzy Logic for
                                  Robot Manipulator  . . . . . . . . . . . 229
            Kankana Chakrabarty   On Fuzzy Lattice . . . . . . . . . . . . 238
                 Hugang Han and   
                 Chun-Yi Su and   
                 Shuta Murakami   Fuzzy-Logic-Based Adaptive Control for a
                                  Class of Nonlinear Discrete-Time System  243
                Rolly Intan and   
                Masao Mukaidono   Conditional Probability Relations in
                                  Fuzzy Relational Database  . . . . . . . 251
         Masahiro Inuiguchi and   
                 Tetsuzo Tanino   A New Class of Necessity Measures and
                                  Fuzzy Rough Sets Based on Certainty
                                  Qualifications . . . . . . . . . . . . . 261
               Jamil Saquer and   
             Jitender S. Deogun   A Fuzzy Approach for Approximating
                                  Formal Concepts  . . . . . . . . . . . . 269
                  Helmut Thiele   On Axiomatic Characterizations of Fuzzy
                                  Approximation Operators  . . . . . . . . 277
M. C. Fernández-Baizán and   
      C. Pérez-Llera and   
     J. Feito-García and   
                     A. Almeida   LEM3 Algorithm Generalization Based on
                                  Stochastic Approximation Space . . . . . 286
María C. Fernández-Baizán and   
  Ernestina Menasalvas Ruiz and   
José M. Peña Sánchez and   
Juan Francisco Martínez Sarrías and   
          Socorro Millán   Using the Apriori Algorithm to Improve
                                  Rough Sets Results . . . . . . . . . . . 291
      Juan F. Gálvez and   
              Fernando Diaz and   
       Pilar Carrión and   
                   Angel Garcia   An Application for Knowledge Discovery
                                  Based on a Revision of VPRS Model  . . . 296
            Salvatore Greco and   
        Benedetto Matarazzo and   
            Roman Slowinski and   
              Jerzy Stefanowski   An Algorithm for Induction of Decision
                                  Rules Consistent with the Dominance
                                  Principle  . . . . . . . . . . . . . . . 304
                 J. W. Guan and   
                      D. A. Bel   Data Mining for Monitoring Loose Parts
                                  in Nuclear Power Plants  . . . . . . . . 314
               Jianchao Han and   
                 Xiaohua Hu and   
                   Nick Cercone   Supervised Learning: a Generalized Rough
                                  Set Approach . . . . . . . . . . . . . . 322
              Julia Johnson and   
                Mengchi Liu and   
                      Hong Chen   Unification of Knowledge Discovery and
                                  Data Mining Using Rough Sets Approach in
                                  a Real-World Application . . . . . . . . 330
            Aileen H. Liang and   
            Wojciech Ziarko and   
                  Brien Maguire   The Application of a Distance Learning
                                  Algorithm in Web-Based Course Delivery   338
 Tsau Young (``T. Y.'') Lin and   
                        Hui Cao   Searching Decision Rules in Very Large
                                  Databases Using Rough Set Theory . . . . 346
                Nguyen Hung Son   On Efficient Construction of Decision
                                  Trees from Large Databases . . . . . . . 354
                Shusaku Tsumoto   An Approach to Statistical Extension of
                                  Rough Set Rule Induction . . . . . . . . 362
                Guoyin Wang and   
                       Feng Liu   The Inconsistency in Rough Set Based
                                  Rule Generation  . . . . . . . . . . . . 370
    Jerzy W. Grzymala-Busse and   
                        Ming Hu   A Comparison of Several Approaches to
                                  Missing Attribute Values in Data Mining  378
                 Hoang Kiem and   
                        Do Phuc   Discovering Motiv Based Association
                                  Rules in a Set of DNA Sequences  . . . . 386
           Marzena Kryszkiewicz   Inducing Theory for the Rule Set . . . . 391
       Jean-Charles Lamirel and   
             Jacques Ducloy and   
                  Hager Kammoun   Some Basics of a Self Organizing Map
                                  (SOM) Extended Model for Information
                                  Discovery in a Digital Library Context   399
           Michinori Nakata and   
              Tetsuya Murai and   
                Germano Resconi   Handling Data with Plural Sources in
                                  Databases  . . . . . . . . . . . . . . . 404
         David Ramamonjisoa and   
            Einoshin Suzuki and   
                    Issam Hamid   Research Topics Discovery from WWW by
                                  Keywords Association Rules . . . . . . . 412
                    Piotr Synak   Temporal Templates and Analysis of Time
                                  Related Data . . . . . . . . . . . . . . 420
                Arkadiusz Wojna   Constraint Based Incremental Learning of
                                  Classification Rules . . . . . . . . . . 428
                 Ning Zhong and   
                Juzhen Dong and   
               Chunnian Liu and   
                  Setsuo Ohsuga   A Hybrid Model for Rule Discovery in
                                  Data . . . . . . . . . . . . . . . . . . 436
             Thomas Bittner and   
                  John G. Stell   Rough Sets in Approximate Spatial
                                  Reasoning  . . . . . . . . . . . . . . . 445
                    Tao Lin and   
                   Yichao Huang   A Study of Conditional Independence
                                  Change in Learning Probabilistic Network 454
                       Qing Liu   $ \lambda $-Level Rough Equality
                                  Relation and the Inference of Rough
                                  Paramodulation . . . . . . . . . . . . . 462
           Kazumi Nakamatsu and   
            Jair Minoro Abe and   
                Atsuyuki Suzuki   Annotated Semantics for Defeasible
                                  Deontic Reasoning  . . . . . . . . . . . 470
                 Lech Polkowski   Spatial Reasoning via Rough Sets . . . . 479
                P. Sapiecha and   
                H. Selvaraj and   
                      M. Pleban   Decomposition of Boolean Relations and
                                  Functions in Logic Synthesis and Data
                                  Analysis . . . . . . . . . . . . . . . . 487
                Shusaku Tsumoto   Diagnostic Reasoning from the Viewpoint
                                  of Rough Sets  . . . . . . . . . . . . . 495
                 Jan Wierzbicki   Rough Set Approach to CBR  . . . . . . . 503
              S. K. M. Wong and   
                     C. J. Butz   Rough Sets for Uncertainty Reasoning . . 511
             Basabi Chakraborty   Feature Subset Selection by Neuro-rough
                                  Hybridization  . . . . . . . . . . . . . 519
              Seok-Woo Jang and   
               Kyu-Jung Kim and   
                  Hyung-J. Choi   Accurate Estimation of Motion Vectors
                                  Using Active Block Matching  . . . . . . 527
                  Mark Last and   
             Abraham Kandel and   
                Oded Maimon and   
                Eugene Eberbach   Anytime Algorithm for Feature Selection  532
             Byung Tae Chun and   
               Younglae Bae and   
                    Tai-Yun Kim   Reconstruction in an Original Video
                                  Sequence of the Lost Region Occupied by
                                  Caption Areas  . . . . . . . . . . . . . 540
          Andrzej Czyzewski and   
              Bozena Kostek and   
                 Piotr Odya and   
             Slawomir Zielinski   Determining Influence of Visual Cues on
                                  the Perception of Surround Sound Using
                                  Soft Computing . . . . . . . . . . . . . 545
             Dominik Slezak and   
        Jakub Wróblewski   Application of Normalized Decision
                                  Measures to the New Case Classification  553
                  R. Swiniarski   An Application of Rough Sets and Haar
                                  Wavelets to Face Recognition . . . . . . 561
             Zbigniew M. Wojcik   Detecting Spots for NASA Space Programs
                                  Using Rough Sets . . . . . . . . . . . . 569
             Zbigniew M. Wojcik   Solving the Localization-Detection
                                  Trade-Off In Shadow Recognition Problem
                                  Using Rough Sets . . . . . . . . . . . . 577
                Gasser Auda and   
                  Mohamed Kamel   A Modular Neural Network for Vague
                                  Classification . . . . . . . . . . . . . 584
                      L. Araujo   Evolutionary Parsing for a Probabilistic
                                  Context Free Grammar . . . . . . . . . . 590
             Chaochang Chiu and   
                Jih-Tay Hsu and   
                  Chih-Yung Lin   The Application of Genetic Programming
                                  in Milk Yield Prediction for Dairy Cows  598
          Rafal Krolikowski and   
          Andrzej Czyzewski and   
                  Bozena Kostek   Localization of Sound Sources by Means
                                  of Recurrent Neural Networks . . . . . . 603
               J. F. Peters and   
                 A. Skowron and   
                     L. Han and   
                     S. Ramanna   Towards Rough Neural Computing Based on
                                  Rough Membership Functions: Theory and
                                  Application  . . . . . . . . . . . . . . 611
                     Lihan Tian   The Nature of Crossover Operator in
                                  Genetic Algorithms . . . . . . . . . . . 619
                   Pan Yong and   
                Hongbao Shi and   
                         Li Lei   The Behavior of the Complex Integral
                                  Neural Network . . . . . . . . . . . . . 624
            Ryszard Janicki and   
                        Yan Liu   On Trace Assertion Method of Module
                                  Interface Specification with Concurrency 632
              Kamran Karimi and   
           Julia A. Johnson and   
             Howard J. Hamilton   A Proposal for Including Behavior in the
                                  Process of Object Similarity Assessment
                                  with Examples from Artificial Life . . . 642
            Philippe Levecq and   
                 Nadine Meskens   How Can Help an Inductive Approach in
                                  the Resolution of a Problematic $ \alpha
                                  $ Problem? . . . . . . . . . . . . . . . 647
                   Trong Wu and   
               Shu-chiung Huang   A Timed Petri Net Interpreter: An
                                  Alternative Method for Simulation  . . . 652
              Chengqi Zhang and   
                 Zili Zhang and   
                   Ong Swee San   An Agent-Based Soft Computing Society    661
                      Anonymous   Author Index . . . . . . . . . . . . . . 669


Lecture Notes in Computer Science
Volume 2006, 2001

                 Dirk Beyer and   
            Claus Lewerentz and   
                    Frank Simon   Impact of Inheritance on Metrics for
                                  Size, Coupling, and Cohesion in
                                  Object-Oriented Systems  . . . . . . . . 1
               Peter Rosner and   
                 Tracy Hall and   
                   Tobias Mayer   Measuring Object-Orientedness: The
                                  Invocation Profile . . . . . . . . . . . 18
              Siar Sarferaz and   
                 Wolfgang Hesse   CEOS -- A Cost Estimation Method for
                                  Evolutionary, Object-Oriented Software
                                  Development  . . . . . . . . . . . . . . 29
                   Li Xinke and   
               Liu Zongtian and   
                   Pan Biao and   
                    Xing Dahong   A Measurement Tool for Object Oriented
                                  Software and Measurement Experiments
                                  with It  . . . . . . . . . . . . . . . . 44
                Erik Foltin and   
          Andreas Schmietendorf   Estimating the Cost of Carrying out
                                  Tasks Relating to Performance
                                  Engineering  . . . . . . . . . . . . . . 55
                 Tracy Hall and   
              Nathan Baddoo and   
                   David Wilson   Measurement in Software Process
                                  Improvement Programmes: An Empirical
                                  Study  . . . . . . . . . . . . . . . . . 73
             Christof Ebert and   
   Casimiro Hernandez Parro and   
             Roland Suttels and   
               Harald Kolarczyk   Improving Validation Activities in a
                                  Global Software Development  . . . . . . 83
        Manoranjan Satpathy and   
            Rachel Harrison and   
                Colin Snook and   
                 Michael Butler   A Generic Model for Assessing Process
                                  Quality  . . . . . . . . . . . . . . . . 94
      Andreas Schmietendorf and   
            André Scholz   Maturity Evaluation of the Performance
                                  Engineering Process  . . . . . . . . . . 111
                Alain Abran and   
                  S. Oligny and   
              Charles R. Symons   COSMIC FFP and the World-Wide Field
                                  Trials Strategy  . . . . . . . . . . . . 125
                 Harry M. Sneed   Extraction of Function-Points from
                                  Source-Code  . . . . . . . . . . . . . . 135
                  Luca Santillo   Early & Quick COSMIC--FFP Analysis using
                                  Analytic Hierarchy Process . . . . . . . 147
                  Sue Black and   
                  Francis Clark   Measuring the Ripple Effect of Pascal
                                  Programs . . . . . . . . . . . . . . . . 161
                    Maya Daneva   An Assessment of the Effects of
                                  Requirements Reuse Measurements on the
                                  ERP Requirements Engineering Process . . 172
            Reiner R. Dumke and   
                Cornelius Wille   A New Metric-Based Approach for the
                                  Evaluation of Customer Satisfaction in
                                  the IT Area  . . . . . . . . . . . . . . 183
               Dirk Schmelz and   
           Margitta Schmelz and   
                  Julia Schmelz   Utility Metrics for Economic Agents  . . 196
             Luigi Buglione and   
                    Alain Abran   QFD: a Different Way to Measure Software
                                  Quality  . . . . . . . . . . . . . . . . 205
                Dirk Hamann and   
               Andrew Beitz and   
         Markus Müller and   
              Rini van Solingen   Using FAME Assessments to Define
                                  Measurement Goals  . . . . . . . . . . . 220
               Francis Dion and   
           Thanh Khiet Tran and   
                    Alain Abran   Mapping Processes Between Parallel,
                                  Hierarchical, and Orthogonal System
                                  Representations  . . . . . . . . . . . . 233
                      Anonymous   Author Index . . . . . . . . . . . . . . 245


Lecture Notes in Computer Science
Volume 2007, 2001

               Kathleen Hornsby   Workshop Report --- International
                                  Workshop on Temporal, Spatial, and
                                  Spatio-temporal Data Mining --- TSDM
                                  2000 . . . . . . . . . . . . . . . . . . 1
                 Yingjiu Li and   
               X. Sean Wang and   
                 Sushil Jajodia   Discovering Temporal Patterns in
                                  Multiple Granularities . . . . . . . . . 5
              Ray J. Hickey and   
              Michaela M. Black   Refined Time Stamps for Concept Drift
                                  Detection During Mining for
                                  Classification Rules . . . . . . . . . . 20
                  Bin Zhang and   
                Meichun Hsu and   
                    Umesh Dayal   $ {K} $-Harmonic Means --- A Spatial
                                  Clustering Algorithm with Boosting . . . 31
           Richard J. Povinelli   Identifying Temporal Patterns for
                                  Characterization and Prediction of
                                  Financial Time Series Events . . . . . . 46
                Ruixin Yang and   
              Kwang-Su Yang and   
              Menas Kafatos and   
                   X. Sean Wang   Value Range Queries on Earth Science
                                  Data via Histogram Clustering  . . . . . 62
   Vladimir Estivill-Castro and   
               Michael E. Houle   Fast Randomized Algorithms for Robust
                                  Estimation of Location . . . . . . . . . 77
                 Thomas Bittner   Rough Sets in Spatio-temporal Data
                                  Mining . . . . . . . . . . . . . . . . . 89
            Karine Zeitouni and   
                Laurent Yeh and   
             Marie-Aude Aufaure   Join Indices as a Tool for Spatial Data
                                  Mining . . . . . . . . . . . . . . . . . 105
         Howard J. Hamilton and   
                Dee Jay Randall   Data Mining with Calendar Attributes . . 117
   Vladimir Estivill-Castro and   
                     Ickjai Lee   AUTOCLUST+: Automatic Clustering of
                                  Point-Data Sets in the Presence of
                                  Obstacles  . . . . . . . . . . . . . . . 133
            John F. Roddick and   
           Kathleen Hornsby and   
              Myra Spiliopoulou   An Updated Bibliography of Temporal,
                                  Spatial, and Spatio-temporal Data Mining
                                  Research . . . . . . . . . . . . . . . . 147
                      Anonymous   Author Index . . . . . . . . . . . . . . 165


Lecture Notes in Computer Science
Volume 2008, 2001

                 Flavius Gruian   System-Level Design Methods for
                                  Low-Energy Architectures Containing
                                  Variable Voltage Processors  . . . . . . 1
                Zhenyu Tang and   
               Norman Chang and   
                   Shen Lin and   
                  Weize Xie and   
               Sam Nakagawa and   
                         Lei He   Ramp Up/Down Functional Unit to Reduce
                                  Step Power . . . . . . . . . . . . . . . 13
       Alper Buyuktosunoglu and   
           Stanley Schuster and   
               David Brooks and   
                Pradip Bose and   
                 Peter Cook and   
                 David Albonesi   An Adaptive Issue Queue for Reduced
                                  Power at High Performance  . . . . . . . 25
                 P. Marchal and   
                    C. Wong and   
                 A. Prayati and   
               N. Cossement and   
                F. Catthoor and   
              R. Lauwereins and   
                 D. Verkest and   
                      H. De Man   Dynamic Memory Oriented Transformations
                                  in the MPEG4 IM1-Player on a Low Power
                                  Platform . . . . . . . . . . . . . . . . 40
              Jeongseon Euh and   
                 Wayne Burleson   Exploiting Content Variation and
                                  Perception in Power-Aware $3$D Graphics
                                  Rendering  . . . . . . . . . . . . . . . 51
            Chung-Hsing Hsu and   
              Ulrich Kremer and   
                  Michael Hsiao   Compiler-Directed Dynamic Frequency and
                                  Voltage Scheduling . . . . . . . . . . . 65
           Stefanos Kaxiras and   
                 Zhigang Hu and   
            Girija Narlikar and   
                   Rae McLellan   Cache-Line Decay: a Mechanism to Reduce
                                  Cache Leakage Power  . . . . . . . . . . 82
               Roberto Maro and   
                     Yu Bai and   
                  R. Iris Bahar   Dynamically Reconfiguring Processor
                                  Resources to Reduce Power Consumption in
                                  High-Performance Processors  . . . . . . 97
         Ashutosh Dhodapkar and   
               Chee How Lim and   
                 George Cai and   
               W. Robert Daasch   TEM$^2$P$^2$EST: a Thermal Enabled
                                  Multi-model Power/Performance ESTimator  112--125
               David Brooks and   
         Margaret Martonosi and   
         John-David Wellman and   
                    Pradip Bose   Power-Performance Modeling and Tradeoff
                                  Analysis for a High End Microprocessor   126
              Soraya Ghiasi and   
                  Dirk Grunwald   A Comparison of Two Architectural Power
                                  Models . . . . . . . . . . . . . . . . . 137
                      Anonymous   Author Index . . . . . . . . . . . . . . 153


Lecture Notes in Computer Science
Volume 2009, 2001

          Andreas Pfitzmann and   
            Marit Köhntopp   Anonymity, Unobservability, and
                                  Pseudonymity --- A Proposal for
                                  Terminology  . . . . . . . . . . . . . . 1
   Jean-François Raymond   Traffic Analysis: Protocols, Attacks,
                                  Design Issues, and Open Problems . . . . 10
            Oliver Berthold and   
          Andreas Pfitzmann and   
                 Ronny Standtke   The Disadvantages of Free MIX Routes and
                                  how to Overcome Them . . . . . . . . . . 30
                 Ian Clarke and   
             Oskar Sandberg and   
              Brandon Wiley and   
               Theodore W. Hong   Freenet: a Distributed Anonymous
                                  Information Storage and Retrieval System 46
           Roger Dingledine and   
        Michael J. Freedman and   
                   David Molnar   The Free Haven Project: Distributed
                                  Anonymous Storage Service  . . . . . . . 67
              Paul Syverson and   
                Gene Tsudik and   
               Michael Reed and   
                  Carl Landwehr   Towards an Analysis of Onion Routing
                                  Security . . . . . . . . . . . . . . . . 96
            Oliver Berthold and   
           Hannes Federrath and   
            Stefan Köpsell   Web MIXes: a System for Anonymous and
                                  Unobservable Internet Access . . . . . . 115
                John J. Borking   Privacy Incorporated Software Agent
                                  (PISA): Proposal for Building a Privacy
                                  Guardian for the Electronic Age  . . . . 130
            Oliver Berthold and   
            Marit Köhntopp   Identity Management Based on P3P . . . . 141
             Joachim Biskup and   
                  Ulrich Flegel   On Pseudonymization of Audit Data for
                                  Intrusion Detection  . . . . . . . . . . 161
          Giovanni Iachello and   
                 Kai Rannenberg   Protection Profiles for Remailer Mixes   181
                      Anonymous   Author Index . . . . . . . . . . . . . . 231


Lecture Notes in Computer Science
Volume 2010, 2001

               Julien Cassaigne   Recurrence in Infinite Words (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 1
                   Martin Grohe   Generalized Model-Checking Problems for
                                  First-Order Logic  . . . . . . . . . . . 12
                   Dexter Kozen   Myhill-Nerode Relations on Automatic
                                  Systems and the Completeness of Kleene
                                  Algebra  . . . . . . . . . . . . . . . . 27
                 Luca Aceto and   
                Wan Fokkink and   
Anna Ingólfsdóttir   $2$-Nested Simulation Is Not Finitely
                                  Equationally Axiomatizable . . . . . . . 39
                  Shin Aida and   
             Rainer Schuler and   
            Tatsuie Tsukiji and   
                 Osamu Watanabe   On the Difference between
                                  Polynomial-Time Many-One and Truth-Table
                                  Reducibilities on Distributional
                                  Problems . . . . . . . . . . . . . . . . 51
                 Helmut Alt and   
           Christian Knauer and   
                    Carola Wenk   Matching Polygonal Curves with Respect
                                  to the Fréchet Distance . . . . . . . . . 63
            Andris Ambainis and   
          Arnolds \cKikusts and   
                M\=aris Valdats   On the Class of Languages Recognizable
                                  by $1$-Way Quantum Finite Automata . . . 75--86
             Martin Beaudry and   
    François Lemieux and   
           Denis Thérien   Star-Free Open Languages and Aperiodic
                                  Loops  . . . . . . . . . . . . . . . . . 87
             Markus Bläser   A $ (5 / 2)n^2 $-Lower Bound for the
                                  Multiplicative Complexity of $ n \times
                                  n $-Matrix Multiplication  . . . . . . . 99--109
           Amit Chakrabarti and   
               Subhash Khot and   
                     Yaoyun Shi   Evasiveness of Subgraph Containment and
                                  Related Properties . . . . . . . . . . . 110
      Andrea E. F. Clementi and   
             Pilu Crescenzi and   
                Paolo Penna and   
             Gianluca Rossi and   
                    Paola Vocca   On the Complexity of Computing Minimum
                                  Energy Consumption Broadcast Subgraphs   121
                   Zhe Dang and   
       Pierluigi San Pietro and   
            Richard A. Kemmerer   On Presburger Liveness of Discrete Timed
                                  Automata . . . . . . . . . . . . . . . . 132
      François Denis and   
      Aurélien Lemay and   
                 Alain Terlutte   Residual Finite State Automata . . . . . 144
            Anders Dessmark and   
                   Andrzej Pelc   Deterministic Radio Broadcasting at Low
                                  Cost . . . . . . . . . . . . . . . . . . 158
             Volker Diekert and   
   Claudio Gutiérrez and   
              Christian Hagenah   The Existential Theory of Equations with
                                  Rational Constraints in Free Groups is
                                  PSPACE-Complete  . . . . . . . . . . . . 170
             Benjamin Doerr and   
                Anand Srivastav   Recursive Randomized Coloring Beats Fair
                                  Dice Random Colorings  . . . . . . . . . 183
              Rod G. Downey and   
       Denis R. Hirschfeldt and   
              André Nies   Randomness, Computability, and Density   195
              Pavol Duri\vs and   
             Juraj Hromkovi and   
               Stasys Jukna and   
           Martin Sauerhoff and   
                Georg Schnitger   On Multipartition Communication
                                  Complexity (Extended Abstract) . . . . . 206
       Robert Elsässer and   
   Rastislav Královi and   
                Burkhard Monien   Scalable Sparse Topologies with Small
                                  Spectrum . . . . . . . . . . . . . . . . 218
                   Leah Epstein   Optimal Preemptive Scheduling on Uniform
                                  Processors with Non-decreasing Speed
                                  Ratios . . . . . . . . . . . . . . . . . 230
      Cristina G. Fernandes and   
                  Till Nierhoff   The UPS Problem  . . . . . . . . . . . . 238
            Paola Flocchini and   
          Giuseppe Prencipe and   
             Nicola Santoro and   
                 Peter Widmayer   Gathering of Asynchronous Oblivious
                                  Robots with Limited Visibility . . . . . 247
       Anahí Gajardo and   
                 Eric Goles and   
          Andrés Moreira   Generalized Langton's Ant: Dynamical
                                  Behavior and Complexity  . . . . . . . . 259
             Clemente Galdi and   
        Christos Kaklamanis and   
         Manuela Montangero and   
                  Pino Persiano   Optimal and Approximate Station
                                  Placement in Networks (With Applications
                                  to Multicasting and Space Efficient
                                  Traversals)  . . . . . . . . . . . . . . 271
           Ricard Gavald\`a and   
           Denis Thérien   Learning Expressions over Monoids
                                  (Extended Abstract)  . . . . . . . . . . 283
             Andreas Goerdt and   
            Michael Krivelevich   Efficient Recognition of Random
                                  Unsatisfiable $k$-SAT Instances by
                                  Spectral Methods . . . . . . . . . . . . 294
      Massimiliano Goldwurm and   
            Beatrice Palano and   
                Massimo Santini   On the Circuit Complexity of Random
                                  Generation Problems for Regular and
                                  Context-Free Languages . . . . . . . . . 305
             Torben Hagerup and   
                 Torsten Tholey   Efficient Minimal Perfect Hashing in
                                  Nearly Minimal Space . . . . . . . . . . 317
            Prahladh Harsha and   
                    Madhu Sudan   Small PCPs with Low Query Complexity . . 327
             Andreas Jakoby and   
          Maciej Liskiewicz and   
          Rüdiger Reischuk   Space Efficient Algorithms for
                                  Series-Parallel Graphs . . . . . . . . . 339
                David Janin and   
             Jerzy Marcinkowski   A Toolkit for First Order Extensions of
                                  Monadic Games  . . . . . . . . . . . . . 353
               Klaus Jansen and   
            Marek Karpinski and   
             Andrzej Lingas and   
                    Eike Seidel   Polynomial Time Approximation Schemes
                                  for MAX--BISECTION on Planar and
                                  Geometric Graphs . . . . . . . . . . . . 365
           Matthias Jantzen and   
               Alexy Kurganskyy   Refining the Hierarchy of Blind
                                  Multicounter Languages . . . . . . . . . 376
      Juhani Karhumäki and   
              Leonid P. Lisovik   A Simple Undecidable Problem: The
                                  Inclusion Problem for Finite
                                  Substitutions on $ a b^*c $  . . . . . . 388
                Jarkko Kari and   
               Cristopher Moore   New Results on Alternating and
                                  Non-deterministic Two-Dimensional
                                  Finite-State Automata  . . . . . . . . . 396
       Lefteris M. Kirousis and   
            Phokion G. Kolaitis   The Complexity of Minimal Satisfiability
                                  Problems . . . . . . . . . . . . . . . . 407
            Matthias Krause and   
                   Stefan Lucks   On the Minimal Hardware Complexity of
                                  Pseudorandom Function Generators
                                  (Extended Abstract)  . . . . . . . . . . 419
               Piotr Krysta and   
               V. S. Anil Kumar   Approximation Algorithms for Minimum
                                  Size $2$-Connectivity Problems . . . . . 431
                 Dietrich Kuske   A Model Theoretic Proof of Büchi-Type
                                  Theorems and First-Order Logic for
                                  $N$-Free Pomsets . . . . . . . . . . . . 443
          Clemens Lautemann and   
             Nicole Schweikardt   An Ehrenfeucht-Fra\"\issé Approach to
                                  Collapse Results for First-Order Queries
                                  over Embedded Databases  . . . . . . . . 455
                  Giacomo Lenzi   A New Logical Characterization of Büchi
                                  Automata . . . . . . . . . . . . . . . . 467
                 Liang Zhao and   
          Hiroshi Nagamochi and   
              Toshihide Ibaraki   A Primal-Dual Approximation Algorithm
                                  for the Survivable Network Design
                                  Problem in Hypergraph  . . . . . . . . . 478
         Markus Müller-Olm   The Complexity of Copy Constant
                                  Detection in Parallel Programs . . . . . 490
            Giri Narasimhan and   
                   Michiel Smid   Approximation Algorithms for the
                                  Bottleneck Stretch Factor Problem  . . . 502
                 Dirk Pattinson   Semantical Principles in the Modal Logic
                                  of Coalgebras  . . . . . . . . . . . . . 514
                Klaus Reinhardt   The $ \# a = \# b $ Pictures Are
                                  Recognizable . . . . . . . . . . . . . . 527--538
            Victor L. Selivanov   A Logical Approach to Decidability of
                                  Hierarchies of Regular Star-Free
                                  Languages  . . . . . . . . . . . . . . . 539
           Howard Straubing and   
           Denis Thérien   Regular Languages Defined by Generalized
                                  First-Order Formulas with a Bounded
                                  Number of Bound Variables  . . . . . . . 551
                Philipp Woelfel   New Bounds on the OBDD-Size of Integer
                                  Multiplication via Universal Hashing . . 563
                      Anonymous   Author Index . . . . . . . . . . . . . . 575


Lecture Notes in Computer Science
Volume 2011, 2001

        Ricardo Peña and   
                   Clara Segura   Non-determinism Analysis in a
                                  Parallel-Functional Language . . . . . . 1
              John Sargeant and   
              Chris Kirkham and   
                     Ian Watson   Exploiting Implicit Parallelism in
                                  Functional Programs with SLAM  . . . . . 19
                Thomas Arts and   
                    Thomas Noll   Verifying Generic Erlang Client-Server
                                  Implementations  . . . . . . . . . . . . 37
              R. F. Pointon and   
              P. W. Trinder and   
                     H-W. Loidl   The Design and Implementation of Glasgow
                                  Distributed Haskell  . . . . . . . . . . 53
              Ulrike Klusik and   
                Rita Loogen and   
             Steffen Priebe and   
                 Fernando Rubio   Implementation Skeletons in Eden:
                                  Low-Effort Parallel Programming  . . . . 71
              Michael Hanus and   
                 Frank Huch and   
               Philipp Niederau   ObjectCurry: An Object-Oriented
                                  Extension of the Declarative
                                  Multi-Paradigm Language Curry  . . . . . 89
                 Frank Huch and   
              Ulrich Norbisrath   Distributed Programming in Haskell with
                                  Ports  . . . . . . . . . . . . . . . . . 107
                  Kevin Hammond   The Dynamic Properties of Hume: a
                                  Functionally-Based Concurrent Language
                                  with Bounded Time and Space Behaviour    122
     Jörgen Gustavsson and   
             Josef Svenningsson   A Usage Analysis with Bounded Usage
                                  Polymorphism and Subtyping . . . . . . . 140
 Thorsten H.-G. Zörner and   
             Pieter Koopman and   
          Marko van Eekelen and   
               Rinus Plasmeijer   Polygonizing Implicit Surfaces in a
                                  Purely Functional Way  . . . . . . . . . 158
                Olaf Chitil and   
             Colin Runciman and   
                Malcolm Wallace   Freja, Hat and Hood --- A Comparative
                                  Evaluation of Three Systems for Tracing
                                  and Debugging Lazy Functional Programs   176
               Peter Achten and   
             Simon Peyton Jones   Porting the Clean Object I/O Library to
                                  Haskell  . . . . . . . . . . . . . . . . 194
          Raimund Schroeder and   
                   Werner Kluge   Organizing Speculative Computations in
                                  Functional Systems . . . . . . . . . . . 214
                 Clemens Grelck   Improving Cache Effectiveness through
                                  Array Data Layout Manipulation in SAC    231
                 John O'Donnell   The Collective Semantics in Functional
                                  SPMD Programming . . . . . . . . . . . . 249
                      Anonymous   Author Index . . . . . . . . . . . . . . 267


Lecture Notes in Computer Science
Volume 2012, 2001

              Muxiang Zhang and   
        Christopher Carroll and   
                     Agnes Chan   Analysis of IS-95 CDMA Voice Privacy . . 1
            David A. McGrew and   
               Scott R. Fluhrer   Attacks on Additive Encryption of
                                  Redundant Plaintext and Implications on
                                  Internet Security  . . . . . . . . . . . 14
                  A. M. Youssef   Cryptanalysis of the ``Augmented Family
                                  of Cryptographic Parity Circuits''
                                  Proposed at ISW'97 . . . . . . . . . . . 29
              Kazumaro Aoki and   
           Tetsuya Ichikawa and   
             Masayuki Kanda and   
             Mitsuru Matsui and   
               Shiho Moriai and   
             Junko Nakajima and   
                  Toshio Tokita   Camellia: a $ 128 $-Bit Block Cipher
                                  Suitable for Multiple Platforms ---
                                  Design and Analysis  . . . . . . . . . . 39
           Louis Granboulan and   
            Phong Q. Nguyen and   
            Fabrice Noilhan and   
                 Serge Vaudenay   DFCv2  . . . . . . . . . . . . . . . . . 57
               Kenji Ohkuma and   
          Hirofumi Muratani and   
              Fumihiko Sano and   
              Shinichi Kawamura   The Block Cipher Hierocrypt  . . . . . . 72
       Valér \vCanda and   
             Tran van Trung and   
          Spyros Magliveras and   
    Tamás Horváth   Symmetric Block Ciphers Based on Group
                                  Bases  . . . . . . . . . . . . . . . . . 89--105
     Christian Günther and   
                Tanja Lange and   
                  Andreas Stein   Speeding up the Arithmetic on Koblitz
                                  Curves of Genus Two  . . . . . . . . . . 106
                     Huapeng Wu   On Complexity of Polynomial Basis
                                  Squaring in $ \mathbb {F}_{2^m} $  . . . 118
               Carlo Blundo and   
          Annalisa De Bonis and   
            Barbara Masucci and   
             Douglas R. Stinson   Dynamic Multi-threshold Metering Schemes 130
        Francesco Bergadano and   
           Davide Cavagnino and   
                   Bruno Crispo   Chained Stream Authentication  . . . . . 144
             Carlisle Adams and   
              Robert Zuccherato   A Global PMI for Electronic Content
                                  Distribution . . . . . . . . . . . . . . 158
                  John O. Pliam   A Polynomial-Time Universal Security
                                  Amplifier in the Class of Block Ciphers  169
                 Serge Vaudenay   Decorrelation over Infinite Domains: The
                                  Encrypted CBC--MAC Case  . . . . . . . . 189
            Nan Kyoung Park and   
              Joon Ho Hwang and   
                  Pil Joong Lee   HAS-V: a New Hash Function with Variable
                                  Output Length  . . . . . . . . . . . . . 202
                    G. Gong and   
                  A. M. Youssef   On Welch-Gong Transformation Sequence
                                  Generators . . . . . . . . . . . . . . . 217
                Jovan Dj. Golic   Modes of Operation of Stream Ciphers . . 233
        Leonie Ruth Simpson and   
                  E. Dawson and   
            Jovan Dj. Golic and   
              William L. Millan   LILI Keystream Generator . . . . . . . . 248
              Yuliang Zheng and   
                  Xian-Mo Zhang   Improved Upper Bound on the Nonlinearity
                                  of High Order Correlation Immune
                                  Functions  . . . . . . . . . . . . . . . 262
       Detlef Hühnlein and   
   Michael J. Jacobson, Jr. and   
                   Damian Weber   Towards Practical Non-interactive Public
                                  Key Cryptosystems Using Non-maximal
                                  Imaginary Quadratic Orders . . . . . . . 275
       Detlef Hühnlein and   
                  Sachar Paulus   On the Implementation of Cryptosystems
                                  Based on Real Quadratic Number Fields    288
             Kaoru Kurosawa and   
                Tetsu Iwata and   
               Viet Duong Quang   Root Finding Interpolation Attack  . . . 303
                Haruki Seki and   
               Toshinobu Kaneko   Differential Cryptanalysis of Reduced
                                  Rounds of GOST . . . . . . . . . . . . . 315
                 Masayuki Kanda   Practical Security Evaluation against
                                  Differential and Linear Cryptanalyses
                                  for Feistel Ciphers with SPN Round
                                  Function . . . . . . . . . . . . . . . . 324
                      Anonymous   Author Index . . . . . . . . . . . . . . 339


Lecture Notes in Computer Science
Volume 2013, 2001

                   H. Bunke and   
             S. Günter and   
                       X. Jiang   Towards Bridging the Gap between
                                  Statistical and Structural Pattern
                                  Recognition: Two New Concepts in Graph
                                  Matching . . . . . . . . . . . . . . . . 1
              Toshio Fukuda and   
              Yasuhisa Hasegawa   Learning and Adaptation in Robotics  . . 12
        Tomás Pajdla and   
    Václav Hlavác   Image-Based Self-Localization by Means
                                  of Zero Phase Representation in
                                  Panoramic Images . . . . . . . . . . . . 24
               Gautam Garai and   
                B. B. Chaudhuri   A Cascaded Genetic Algorithm for
                                  Efficient Optimization and Pattern
                                  Matching . . . . . . . . . . . . . . . . 32
            Antanas Verikas and   
              Adas Gelzinis and   
          Kerstin Malmqvist and   
             Marija Bacauskiene   Using Unlabelled Data to Train a
                                  Multilayer Perceptron  . . . . . . . . . 40
                M. De Santo and   
             G. Percannella and   
                 C. Sansone and   
                       M. Vento   A Neural Multi-expert Classification
                                  System for MPEG Audio Segmentation . . . 50
                    A. A. Ezhov   Pattern Recognition with Quantum Neural
                                  Networks . . . . . . . . . . . . . . . . 60
               Sameer Singh and   
             Jonathan Fieldsend   Pattern Matching and Neural Networks
                                  Based Hybrid Forecasting System  . . . . 72
  Jean-Christophe Terrillon and   
          Mahdad N. Shirazi and   
          Daniel McReynolds and   
              Mohamed Sadek and   
              Yunlong Sheng and   
           Shigeru Akamatsu and   
              Kazuhiko Yamamoto   Invariant Face Detection in Color Images
                                  Using Orthogonal Fourier-Mellin Moments
                                  and Support Vector Machines  . . . . . . 83
               Chew Lim Tan and   
                  Ruini Cao and   
                  Qian Wang and   
                     Peiyi Shen   Character Extraction from Interfering
                                  Background --- Analysis of Double-Sided
                                  Handwritten Archival Documents . . . . . 93
     Alceu de S. Britto Jr. and   
            Robert Sabourin and   
          Flavio Bortolozzi and   
                  Ching Y. Suen   An Enhanced HMM Topology in an LBA
                                  Framework for the Recognition of
                                  Handwritten Numeral Strings  . . . . . . 105--114
                     Adnan Amin   Segmentation of Printed Arabic Text  . . 115
      Alessandro L. Koerich and   
            Robert Sabourin and   
                  Ching Y. Suen   A Time-Length Constrained Level Building
                                  Algorithm for Large Vocabulary
                                  Handwritten Word Recognition . . . . . . 127
              Markus Junker and   
                 Andreas Dengel   Preventing Overfitting in Learning Text
                                  Patterns for Document Categorization . . 137
     Michelangelo Diligenti and   
             Paolo Frasconi and   
                     Marco Gori   Image Document Categorization Using
                                  Hidden Tree Markov Models and Structured
                                  Representations  . . . . . . . . . . . . 147
              Victor Kulesh and   
             Kevin Schaffer and   
               Ishwar Sethi and   
                  Mark Schwartz   Handwriting Quality Evaluation . . . . . 157
                  Ming Dong and   
                   Ravi Kothari   Texture Based Look-Ahead for
                                  Decision-Tree Induction  . . . . . . . . 166
             Nayer M. Wanas and   
               Mohamed S. Kamel   Feature Based Decision Fusion  . . . . . 176
   Teófilo E. Campos and   
             Isabelle Bloch and   
           Roberto M. Cesar Jr.   Feature Selection Based on Fuzzy
                                  Distances between Clusters: First
                                  Results on Simulated Data  . . . . . . . 186
               D. Partridge and   
                    W. Wang and   
                       P. Jones   Efficient and Effective Feature
                                  Selection in the Presence of Feature
                                  Interaction and Noise  . . . . . . . . . 196
                 G. Sagerer and   
               C. Bauckhage and   
                   E. Braun and   
               G. Heidemann and   
                 F. Kummert and   
                  H. Ritter and   
               D. Schlüter   Integrating Recognition Paradigms in a
                                  Multiple-Path Architecture . . . . . . . 202
             Gopal Racherla and   
      Sridhar Radhakrishnan and   
                 B. John Oommen   A New Geometric Tool for Pattern
                                  Recognition --- An Algorithm for Real
                                  Time Insertion of Layered Segment Trees  212
                Yingquan Wu and   
       Krasimir G. Ianakiev and   
               Venu Govindaraju   Improvements in $K$-Nearest Neighbor
                                  Classification . . . . . . . . . . . . . 222
                 Petr Somol and   
                Pavel Pudil and   
               Jirí Grim   Branch & Bound Algorithm with Partial
                                  Prediction for Use with Recursive and
                                  Non-recursive Criterion Forms  . . . . . 230
              Josef Kittler and   
              Kieron Messer and   
               Mohammed Sadeghi   Model Validation for Model Selection . . 240
             Andreas Turina and   
           Tinne Tuytelaars and   
                 Theo Moons and   
                   Luc Van Gool   Grouping via the Matching of Repeated
                                  Patterns . . . . . . . . . . . . . . . . 250
             Thomas Kämpke   Complex Fittings . . . . . . . . . . . . 260
               Matti Aksela and   
            Jorma Laaksonen and   
                  Erkki Oja and   
                    Jari Kangas   Application of Adaptive Committee
                                  Classifiers in On-Line Character
                                  Recognition  . . . . . . . . . . . . . . 270
          Walter F. Bischof and   
                   Terry Caelli   Learning Complex Action Patterns with
                                  CRG$_{ST}$ . . . . . . . . . . . . . . . 280
        A. Salguero Beltran and   
                  M. Petrou and   
                 G. Barrett and   
                     B. Dickson   Identification of Electrical Activity of
                                  the Brain Associated with Changes in
                                  Behavioural Performance  . . . . . . . . 290
     Flávio Szenberg and   
 Paulo Cezar Pinto Carvalho and   
                Marcelo Gattass   Automatic Camera Calibration for Image
                                  Sequences of a Football Match  . . . . . 301
    Rogério S. Feris and   
        Roberto M. Cesar Junior   Locating and Tracking Facial Landmarks
                                  Using Gabor Wavelet Networks . . . . . . 311
               Terry Caelli and   
                  Andrew McCabe   Complex Images and Complex Filters: a
                                  Unified Model for Encoding and Matching
                                  Shape and Colour . . . . . . . . . . . . 321
                 Jasjit S. Suri   White Matter/Gray Matter Boundary
                                  Segmentation Using Geometric Snakes: a
                                  Fuzzy Deformable Model . . . . . . . . . 331
             B. M. Carvalho and   
          E. Garduño and   
                   G. T. Herman   Multiseeded Fuzzy Segmentation on the
                                  Face Centered Cubic Grid . . . . . . . . 339
               A. Del Bimbo and   
                    P. Pala and   
                  L. Tanganelli   $3$D Wavelet Based Video Retrieval . . . 349
                Jan Flusser and   
          Barbara Zitová   Combined Invariants to Convolution and
                                  Rotation and Their Application to Image
                                  Registration . . . . . . . . . . . . . . 359
                R. Cappelli and   
                    D. Maio and   
                     D. Maltoni   Modelling Plastic Distortion in
                                  Fingerprint Images . . . . . . . . . . . 369
               Daniela Stan and   
                Ishwar K. Sethi   Image Retrieval Using a Hierarchy of
                                  Clusters . . . . . . . . . . . . . . . . 377
             Thomas Lehmann and   
           Jörg Bredno and   
                  Klaus Spitzer   Texture-Adaptive Active Contour Models   387
                 Timo Ojala and   
     Matti Pietikäinen and   
    Topi Mäenpää   A Generalized Local Binary Pattern
                                  Operator for Multiresolution Gray Scale
                                  and Rotation Invariant Texture
                                  Classification . . . . . . . . . . . . . 397
             Eraldo Ribeiro and   
               Edwin R. Hancock   Analysis of Curved Textured Surfaces
                                  Using Local Spectral Distortion  . . . . 407
                   S. Singh and   
                      M. Sharma   Texture Analysis Experiments with
                                  Meastex and Vistex Benchmarks  . . . . . 417
              Josef Kittler and   
                Pavel Pudil and   
                     Petr Somol   Advances in Statistical Feature
                                  Selection  . . . . . . . . . . . . . . . 425
               Nicolae Duta and   
                   Anil K. Jain   Learning-Based Detection, Segmentation,
                                  and Matching of Objects  . . . . . . . . 435
            Nalini K. Ratha and   
              Andrew Senior and   
                  Ruud M. Bolle   Automated Biometrics . . . . . . . . . . 445
                      Anonymous   Author Index . . . . . . . . . . . . . . 475


Lecture Notes in Computer Science
Volume 2014, 2001

              Christof Monz and   
               Maarten de Rijke   Deductions with Meaning  . . . . . . . . 1
                 Marcelo Finger   Computational Solutions for Structural
                                  Constraints  . . . . . . . . . . . . . . 11
                 Nissim Francez   Hypothetical Reasoning and Basic
                                  Non-constituent Coordination in
                                  Type-Logical Grammar . . . . . . . . . . 31
              Stephen J. Hegner   Computational and Structural Aspects of
                                  Openly Specified Type Hierarchies  . . . 48
             Gerhard Jäger   Anaphora and Quantification in
                                  Categorial Grammar . . . . . . . . . . . 70
           Aravind K. Joshi and   
                Seth Kulick and   
              Natasha Kurtonina   An LTAG Perspective on Categorial
                                  Inference  . . . . . . . . . . . . . . . 90
           Alexander Koller and   
            Joachim Niehren and   
                   Ralf Treinen   Dominance Constraints: Algorithms and
                                  Complexity . . . . . . . . . . . . . . . 106
                  Marcus Kracht   Strict Compositionality and Literal
                                  Movement Grammars  . . . . . . . . . . . 126
                  Alain Lecomte   Categorial Minimalism  . . . . . . . . . 143
            Wilfried Meyer-Viol   Sequential Construction of Logical Forms 159
                 Jens Michaelis   Derivational Minimalism Is Mildly
                                  Context-Sensitive  . . . . . . . . . . . 179
            Joachim Niehren and   
               Alexander Koller   Dominance Constraints in Context
                                  Unification  . . . . . . . . . . . . . . 199
                 Norihiro Ogata   A Revision System of Circular Objects
                                  and Its Applications to Dynamic
                                  Semantics of Dialogues . . . . . . . . . 219
              Sylvain Pogodalla   Lexicalized Proof-Nets and TAGs  . . . . 230
               Hans-Joerg Tiede   Lambek Calculus Proofs and Tree Automata 251
              Christian Wartena   Grammars with Composite Storages . . . . 266
                      Anonymous   Author Index . . . . . . . . . . . . . . 287


Lecture Notes in Computer Science
Volume 2015, 2001

               Ju-Sung Kang and   
             Seongtaek Chee and   
                  Choonsik Park   A Note on the Higher Order Differential
                                  Attack of Block Ciphers with Two-Block
                                  Structures . . . . . . . . . . . . . . . 1
              Hidema Tanaka and   
             Chikashi Ishii and   
               Toshinobu Kaneko   On the Strength of KASUMI without FL
                                  Functions against Higher Order
                                  Differential Attack  . . . . . . . . . . 14
              Steve Babbage and   
                 Laurent Frisch   On MISTY1 Higher Order Differential
                                  Cryptanalysis  . . . . . . . . . . . . . 22
           Dong Hyeon Cheon and   
              Seok Hie Hong and   
               Sang Jin Lee and   
               Sung Jae Lee and   
            Kyung Hwan Park and   
                  Seon Hee Yoon   Difference Distribution Attack on DONUT
                                  and Improved DONUT . . . . . . . . . . . 37
              Yuliang Zheng and   
                  Xian-Mo Zhang   New Results on Correlation Immunity  . . 49
             Jung Hee Cheon and   
                 Seongtaek Chee   Elliptic Curves and Resilient Functions  64
                Ted Krovetz and   
                Phillip Rogaway   Fast Universal Hashing with Small Keys
                                  and No Preprocessing: The PolyR
                                  Construction . . . . . . . . . . . . . . 73
              Atsuko Miyaji and   
         Masaki Nakabayashi and   
                  Shunzo Takano   Characterization of Elliptic Curve
                                  Traces under FR-Reduction  . . . . . . . 90
         Olivier Markowitch and   
                   Steve Kremer   A Multi-party Optimistic Non-repudiation
                                  Protocol . . . . . . . . . . . . . . . . 109
            Byoungcheon Lee and   
                    Kwangjo Kim   Secure Matchmaking Protocol  . . . . . . 123
                Takeru Miyazaki   An Improved Scheme of the
                                  Gennaro-Krawczyk-Rabin Undeniable
                                  Signature System Based on RSA  . . . . . 135
             Hyun-Jeong Kim and   
                Jong In Lim and   
                  Dong Hoon Lee   Efficient and Secure Member Deletion in
                                  Group Signature Schemes  . . . . . . . . 150
                   Feng Bao and   
             Robert H. Deng and   
                   Peirong Feng   An Efficient and Practical Scheme for
                                  Privacy Protection in the E-Commerce of
                                  Digital Goods  . . . . . . . . . . . . . 162
                      Yi Mu and   
             Vijay Varadharajan   An Internet Anonymous Auction Scheme . . 171
            Koutarou Suzuki and   
            Kunio Kobayashi and   
                  Hikaru Morita   Efficient Sealed-Bid Auction Using Hash
                                  Chain  . . . . . . . . . . . . . . . . . 183
              DongGook Park and   
                 Colin Boyd and   
                      Ed Dawson   Micropayments for Wireless
                                  Communications . . . . . . . . . . . . . 192
           William D. Banks and   
              Daniel Lieman and   
        Igor E. Shparlinski and   
                  Van Thuong To   Cryptographic Applications of Sparse
                                  Polynomials over Finite Rings  . . . . . 206
              Chanjoo Chung and   
              Seungbok Choi and   
             Youngchul Choi and   
                     Dongho Won   Efficient Anonymous Fingerprinting of
                                  Electronic Information with Improved
                                  Automatic Identification of
                                  Redistributors . . . . . . . . . . . . . 221
                 Adam Young and   
                      Moti Yung   Hash to the Rescue: Space Minimization
                                  for PKI Directories  . . . . . . . . . . 235
              Jae Seung Lee and   
             Sang Choon Kim and   
                 Seung Won Sohn   A Design of the Security Evaluation
                                  System for Decision Support in the
                                  Enterprise Network Security Management   246
                      Anonymous   Author Index . . . . . . . . . . . . . . 261


Lecture Notes in Computer Science
Volume 2016, 2001

                      Anonymous   Web Engineering: Introduction and
                                  Perspectives --- Overview  . . . . . . . 1
              San Murugesan and   
           Yogesh Deshpande and   
               Steve Hansen and   
                  Athula Ginige   Web Engineering: a New Discipline for
                                  Development of Web-Based Systems . . . . 3
           Yogesh Deshpande and   
              San Murugesan and   
                   Steve Hansen   Web Engineering: Beyond CS, IS and SE
                                  Evolutionary and Non-engineering
                                  Perspectives . . . . . . . . . . . . . . 14
                  Athula Ginige   Web Engineering in Action  . . . . . . . 24
                      Anonymous   Web-Based Systems Development: Process
                                  and Methodology --- Overview . . . . . . 33
           Yogesh Deshpande and   
                  Athula Ginige   Corporate Web Development: From Process
                                  Infancy to Maturity --- A Case Study . . 36
              Kenneth S. Norton   Applying Cross-Functional Evolutionary
                                  Methodologies to Web Development . . . . 48
              Martin Gaedke and   
              Guntram Gräf   Development and Evolution of
                                  Web-Applications Using the
                                  WebComposition Process Model . . . . . . 58
         Savitha Srinivasan and   
            Dulce Ponceleon and   
                 Arnon Amir and   
            Brian Blanchard and   
              Dragutin Petkovic   Engineering the Web for Multimedia . . . 77
         Paloma Díaz and   
               Ignacio Aedo and   
                 Fivos Panetsos   Modelling Security Policies in
                                  Hypermedia and Web-Based Applications    90
               Christophe Gnaho   Web-Based Information Systems
                                  Development --- A User Centered
                                  Engineering Approach . . . . . . . . . . 105
                Wil Janssen and   
                  Maarten Steen   Rapid Service Development: An Integral
                                  Approach to e-Business Engineering . . . 119
                      Anonymous   Managing Information on the Web ---
                                  Overview . . . . . . . . . . . . . . . . 133
              Clemens Kerer and   
                    Engin Kirda   Layout, Content and Logic Separation in
                                  Web Engineering  . . . . . . . . . . . . 135
        Francisco J. Monaco and   
            Adilson Gonzaga and   
          Leonardo B. Guerreiro   Restraining Content Explosion vs.
                                  Constraining Content Growth  . . . . . . 148
                    Arno Scharl   A Classification of Web Adaptivity:
                                  Tailoring Content and Navigational
                                  Systems of Advanced Web Applications . . 156
   Sotiris P. Christodoulou and   
           Paris A. Zafiris and   
      Theodore S. Papatheodorou   Web Engineering: The Developers' View
                                  and a Practitioner's Approach  . . . . . 170
                      Anonymous   Development Tools, Skills and Case
                                  Studies --- Overview . . . . . . . . . . 188
João M. B. Cavalcanti and   
                David Robertson   Synthesis of Web Sites from High Level
                                  Descriptions . . . . . . . . . . . . . . 190
          Stephen C. Arnold and   
                       Leo Mark   Meta-XML Specification . . . . . . . . . 204
        Siddhartha R. Dalal and   
                Ashish Jain and   
     Nachimuthu Karunanithi and   
             Gardner Patton and   
                   Manish Rathi   Engineering of Two Web-Enabled
                                  Commercial Software Services . . . . . . 213
               Steve Hansen and   
           Yogesh Deshpande and   
                  San Murugusan   A Skills Hierarchy for Web-Based Systems
                                  Development  . . . . . . . . . . . . . . 223
              Shu Wing Chan and   
                   Weigang Zhao   A Case Study of a Web-Based Timetabling
                                  System . . . . . . . . . . . . . . . . . 236
                      Anonymous   Performance, Testing and Web Metrics ---
                                  Overview . . . . . . . . . . . . . . . . 245
             Jim Challenger and   
               Arun Iyengar and   
               Paul Dantzig and   
                Daniel Dias and   
                Nathaniel Mills   Engineering Highly Accessed Web Sites
                                  for Performance  . . . . . . . . . . . . 247
                Luis Olsina and   
         Guillermo Lafuente and   
                  Gustavo Rossi   Specifying Quality Characteristics and
                                  Attributes for Websites  . . . . . . . . 266
                     David Lowe   A Framework for Defining Acceptance
                                  Criteria for Web Development Projects    279
              Emilia Mendes and   
             Steve Counsell and   
                    Nile Mosley   Measurement and Effort Prediction for
                                  Web Applications . . . . . . . . . . . . 295
Martín González Rodríguez and   
José Emilio Labra Gayo and   
      Juan Manuel Cueva Lovelle   Web Navigability Testing with Remote
                                  Agents . . . . . . . . . . . . . . . . . 311
                      Anonymous   Web Maintenance and Reuse --- Overview   324
    Rosa María Carro and   
            Estrella Pulido and   
         Pilar Rodríguez   Improving Web-Site Maintenance with
                                  TANGOW by Making Page Structure and
                                  Contents Independent . . . . . . . . . . 325
             Daniel Schwabe and   
              Gustavo Rossi and   
        Luiselena Esmeraldo and   
               Fernando Lyardet   Web Design Frameworks: An Approach to
                                  Improve Reuse in Web Applications  . . . 335
                      Anonymous   Web Engineering Resources  . . . . . . . 353
                      Anonymous   Author Index . . . . . . . . . . . . . . 357


Lecture Notes in Computer Science
Volume 2017, 2001

          Francisco Corbera and   
              Rafael Asenjo and   
                  Emilio Zapata   Accurate Shape Analysis for Recursive
                                  Data Structures  . . . . . . . . . . . . 1
             John O'Donnell and   
              Thomas Rauber and   
             Gudula Rünger   Cost Hierarchies for Abstract Parallel
                                  Machines . . . . . . . . . . . . . . . . 16
                Radu Rugina and   
                  Martin Rinard   Recursion Unrolling for Divide and
                                  Conquer Programs . . . . . . . . . . . . 34
             Matthew Arnold and   
               Michael Hind and   
               Barbara G. Ryder   An Empirical Study of Selective
                                  Optimization . . . . . . . . . . . . . . 49
              George Almasi and   
                 David A. Padua   MaJIC: a Matlab Just-In-time Compiler    68--81
       Lawrence Rauchwerger and   
             Nancy M. Amato and   
                Josep Torrellas   SmartApps: An Application Centric
                                  Approach to High Performance Computing   82
                David Wonnacott   Extending Scalar Optimizations for
                                  Arrays . . . . . . . . . . . . . . . . . 97
             Jeremy Johnson and   
          Robert W. Johnson and   
             David A. Padua and   
                  Jianxin Xiong   Searching for the Best FFT Formulas with
                                  the SPL Compiler . . . . . . . . . . . . 112
      Daniel J. Rosenkrantz and   
           Lenore R. Mullin and   
              Harry B. Hunt III   On Materializations of Array-Valued
                                  Temporaries  . . . . . . . . . . . . . . 127
            Mahmut Kandemir and   
    Narayanan Vijaykrishnan and   
            Mary Jane Irwin and   
                   Hyun Suk Kim   Experimental Evaluation of Energy
                                  Behavior of Iteration Space Tiling . . . 142
                 Sunil Atri and   
               J. Ramanujam and   
                Mahmut Kandemir   Improving Offset Assignment for Embedded
                                  Processors . . . . . . . . . . . . . . . 158
                Hwansoo Han and   
                 Chau-Wen Tseng   Improving Locality for Adaptive
                                  Irregular Scientific Codes . . . . . . . 173
          Hironori Kasahara and   
               Motoki Obata and   
              Kazuhisa Ishizaka   Automatic Coarse Grain Task Parallel
                                  Processing on SMP Using OpenMP . . . . . 189
                Vikram Adve and   
              Rizos Sakellariou   Compiler Synthesis of Task Graphs for
                                  Parallel Program Performance Prediction  208
            Samuel Z. Guyer and   
                     Calvin Lin   Optimizing the Use of High Performance
                                  Software Libraries . . . . . . . . . . . 227
                H. G. Dietz and   
                   T. I. Mattox   Compiler Techniques for Flat
                                  Neighborhood Networks  . . . . . . . . . 244
           Pramod G. Joisha and   
            Prithviraj Banerjee   Exploiting Ownership Sets in HPF . . . . 259
              Seon Wook Kim and   
                Insung Park and   
               Rudolf Eigenmann   A Performance Advisor Tool for
                                  Shared-Memory Parallel Programming . . . 274
             Jay Hoeflinger and   
                  Yunheung Paek   A Comparative Analysis of Dependence
                                  Testing Mechanisms . . . . . . . . . . . 289
               D. K. Arvind and   
                    T. A. Lewis   Safe Approximation of Data Dependencies
                                  in Pointer-Based Structures  . . . . . . 304
              Marc Gonzalez and   
                Jose Oliver and   
           Xavier Martorell and   
             Eduard Ayguade and   
              Jesus Labarta and   
                  Nacho Navarro   OpenMP Extensions for Thread Groups and
                                  Their Run-Time Support . . . . . . . . . 324
            Renato Ferreira and   
              Gagan Agrawal and   
                Ruoming Jin and   
                     Joel Saltz   Compiling Data Intensive Applications
                                  with Spatial Coordinates . . . . . . . . 339
              Will Denissen and   
                   Henk J. Sips   Efficient Dynamic Local Enumeration for
                                  HPF  . . . . . . . . . . . . . . . . . . 355
                Peter Faber and   
              Martin Griebl and   
             Christian Lengauer   Issues of the Automatic Generation of
                                  HPF Loop Programs  . . . . . . . . . . . 359
            Antony J. Field and   
           Thomas L. Hansen and   
               Paul H. J. Kelly   Run-Time Fusion of MPI Calls in a
                                  Parallel C++ Library . . . . . . . . . . 363
              Thomas Rauber and   
             Robert Reilein and   
             Gudula Rünger   Set Operations for Orthogonal Processor
                                  Groups . . . . . . . . . . . . . . . . . 367
       Srivatsan Narasimhan and   
                  Santosh Pande   Compiler Based Scheduling of Java Mobile
                                  Agents . . . . . . . . . . . . . . . . . 372
                Jian-Zhi Wu and   
                  Jenq Kuen Lee   A Bytecode Optimizer to Engineer
                                  Bytecodes for Performance  . . . . . . . 377
                      Anonymous   Author Index . . . . . . . . . . . . . . 383


Lecture Notes in Computer Science
Volume 2018, 2001

                   Paul Debevec   Pursuing Reality with Image-Based
                                  Modeling, Rendering, and Lighting  . . . 1
            David Nistér   Frame Decimation for Structure and
                                  Motion . . . . . . . . . . . . . . . . . 17
           Yasushi Kanazawa and   
               Kenichi Kanatani   Stabilizing Image Mosaicing by Model
                                  Selection  . . . . . . . . . . . . . . . 35
                     Jean Ponce   On Computing Metric Upgrades of
                                  Projective Reconstructions Under the
                                  Rectangular Pixel Assumption . . . . . . 52
             Zhengyou Zhang and   
                      Ying Shan   A Progressive Scheme for Stereo Matching 68
                Bill Triggs and   
        David Nistér and   
           Kenichi Kanatani and   
                 Jean Ponce and   
                 Zhengyou Zhang   Panel Session on Computations and
                                  Algorithms . . . . . . . . . . . . . . . 86
              Jinxiang Chai and   
             Sing Bing Kang and   
               Heung-Yeung Shum   Rendering with Non-uniform Approximate
                                  Concentric Mosaics . . . . . . . . . . . 94
        Gregory G. Slabaugh and   
          Thomas Malzbender and   
            W. Bruce Culbertson   Volumetric Warping for Voxel Coloring on
                                  an Infinite Domain . . . . . . . . . . . 109
             Alexey Zalesny and   
                   Luc Van Gool   A Compact Model for Viewpoint Dependent
                                  Texture Synthesis  . . . . . . . . . . . 124
              Kurt Cornelis and   
             Marc Pollefeys and   
          Maarten Vergauwen and   
                   Luc Van Gool   Augmented Reality Using Uncalibrated
                                  Video Sequences  . . . . . . . . . . . . 144
             Marc Pollefeys and   
             Sing Bing Kang and   
        Gregory G. Slabaugh and   
              Kurt Cornelis and   
                   Paul Debevec   Panel Session on Visual Scene
                                  Representation . . . . . . . . . . . . . 161
                   J. P. Mellor   Geometry and Texture from Thousands of
                                  Images . . . . . . . . . . . . . . . . . 170
              Camillo J. Taylor   VideoPlus: a Method for Capturing the
                                  Structure and Appearance of Immersive
                                  Environments . . . . . . . . . . . . . . 187
              Patrick Baker and   
               Robert Pless and   
    Cornelia Fermüller and   
              Yiannis Aloimonos   Eyes from Eyes . . . . . . . . . . . . . 204
          Andrew J. Davison and   
                  Nobuyuki Kita   Sequential Localisation and Map-Building
                                  in Computer Vision and Robotics  . . . . 218
               Tomas Pajdla and   
               J. P. Mellor and   
          Camillo J. Taylor and   
              Tomas Brodsky and   
                 Andrew Davison   Panel Session on Extended Environments   235
                      Anonymous   Author Index . . . . . . . . . . . . . . 243


Lecture Notes in Computer Science
Volume 2019, 2001

                Peter Stone and   
               Minoru Asada and   
Tucker Balchand Masahiro Fujita and   
       Gerhard Kraetzschmar and   
                Henrik Lund and   
                Paul Scerri and   
           Satoshi Tadokoro and   
                   Gordon Wyeth   Overview of RoboCup-2000 . . . . . . . . 1--29
     Luís Paulo Reis and   
                       Nuno Lau   FC Portugal Team Description: RoboCup
                                  2000 Simulation League Champion  . . . . 29
         Raffaello D'Andrea and   
Tamás Kalmár-Nagy and   
             Pritam Ganguly and   
                 Michael Babish   The Cornell Robocup Team . . . . . . . . 41
               Thilo Weigel and   
             Willi Auerbach and   
               Markus Dietl and   
       Burkhard Dümler and   
       Jens-Steffen Gutmann and   
               Kornel Marko and   
          Klaus Müller and   
             Bernhard Nebel and   
         Boris Szerbakowski and   
               Maximilian Thiel   CS Freiburg: Doing the Right Thing in a
                                  Group  . . . . . . . . . . . . . . . . . 52
            Bernhard Hengst and   
            Darren Ibbotson and   
               Son Bao Pham and   
             John Dalgliesh and   
               Mike Lawther and   
               Phil Preston and   
                  Claude Sammut   The UNSW RoboCup 2000 Sony Legged League
                                  Team . . . . . . . . . . . . . . . . . . 64
               Jacky Baltes and   
              Nicholas Hildreth   Adaptive Path Planner for Highly Dynamic
                                  Environments . . . . . . . . . . . . . . 76
       Claudio Castelpietra and   
                Luca Iocchi and   
              Daniele Nardi and   
           Maurizio Piaggio and   
          Alessandro Scalzo and   
              Antonio Sgorbissa   Communication and Coordination among
                                  Heterogeneous Mid-size Players: ART99    86
          Carlos F. Marques and   
                  Pedro U. Lima   A Localization Method for a Soccer Robot
                                  Using a Vision-Based Omni-Directional
                                  Sensor . . . . . . . . . . . . . . . . . 96
       Michael Wünstel and   
              Daniel Polani and   
             Thomas Uthmann and   
               Jürgen Perl   Behavior Classification with
                                  Self-Organizing Maps . . . . . . . . . . 108
                Marc Butler and   
         Mikhail Prokopenko and   
                  Thomas Howard   Flexible Synchronisation within RoboCup
                                  Environment: A Comparative Analysis  . . 119
            Shuichi Enokida and   
              Takeshi Ohasi and   
           Takaichi Yoshida and   
                 Toshiaki Ejima   Extended $Q$-learning: Reinforcement
                                  Learning Using Self-Organized State
                                  Space  . . . . . . . . . . . . . . . . . 129
                  Ian Frank and   
        Kumiko Tanaka-Ishii and   
           Hiroshi G. Okuno and   
              Junichi Akita and   
            Yukiko Nakagawa and   
                   K. Maeda and   
           Kazuhiro Nakadai and   
                 Hiroaki Kitano   And The Fans Are Going Wild! SIG Plus
                                  MIKE . . . . . . . . . . . . . . . . . . 139
              Pieter Jonker and   
              Jurjen Caarls and   
                 Wouter Bokhove   Fast and Accurate Robot Vision for
                                  Vision Based Motion  . . . . . . . . . . 149
           Yoshitaka Kuwata and   
                Atsushi Shinjoh   Design of RoboCup-Rescue Viewers ---
                                  Towards a Real World Emergency System    159
                   R. Hanek and   
                 T. Schmitt and   
                 M. Klupsch and   
                        S. Buck   From Multiple Images to a Consistent
                                  View . . . . . . . . . . . . . . . . . . 169
          Fabio M. Marchese and   
           Domenico G. Sorrenti   Omni-directional Vision with a
                                  Multi-part Mirror  . . . . . . . . . . . 179
          Noriaki Mitsunaga and   
                   Minoru Asada   Observation Strategy for Decision Making
                                  Based on Information Criterion . . . . . 189
                 Jan Murray and   
                Oliver Obst and   
            Frieder Stolzenburg   Towards a Logical Approach for Soccer
                                  Agents Engineering . . . . . . . . . . . 199
            Yukiko Nakagawa and   
           Hiroshi G. Okuno and   
                 Hiroaki Kitano   Bridging Gap between the Simulation and
                                  Robotics with a Global Vision System . . 209
                T. Nakamura and   
                  M. Oohara and   
                   A. Ebina and   
                    M. Imai and   
               T. Ogasawara and   
                    H. Ishiguro   Real-Time Estimating Spatial
                                  Configuration between Multiple Robots by
                                  Triangle and Enumeration Constraints . . 219
                    Itsuki Noda   Framework of Distributed Simulation
                                  System for Multi-agent Environment . . . 229--238
                 Mark Simon and   
                Sven Behnke and   
              Raúl Rojas   Robust Real Time Color Tracking  . . . . 239
                Peter Stone and   
          Richard S. Sutton and   
                 Satinder Singh   Reinforcement Learning for $3$ vs. $2$
                                  Keepaway . . . . . . . . . . . . . . . . 249
                Jan Wendler and   
      Steffen Brüggert and   
       Hans-Dieter Burkhard and   
                  Helmut Myritz   Fault-Tolerant Self-Localization by
                                  Case-Based Reasoning . . . . . . . . . . 259
          Fuminori Yamasaki and   
             Tatsuya Matsui and   
         Takahiro Miyashita and   
                 Hiroaki Kitano   PINO The Humanoid: a Basic Architecture  269
            Giovanni Adorni and   
            Stefano Cagnoni and   
           Monica Mordonini and   
               Maurizio Piaggio   Team/Goal-Keeper Coordination in the
                                  RoboCup Mid-Size League  . . . . . . . . 279
                    Gary Au and   
                 Simon Goss and   
               Clint Heinze and   
               Adrian R. Pearce   RescueModel: a Multi-Agent Simulation of
                                  Bushfire Disaster Management . . . . . . 285
             Stefan Enderle and   
              Marcus Ritter and   
                 Dieter Fox and   
      Stefan Sablatnög and   
       Gerhard Kraetzschmar and   
              Günther Palm   Vision-Based Localization in RoboCup
                                  Environments . . . . . . . . . . . . . . 291
              M. Ferraresso and   
                 C. Ferrari and   
                 E. Pagello and   
                 R. Polesel and   
                  R. Rosati and   
               A. Speranzon and   
                     W. Zanette   Collaborative Emergent Actions between
                                  Real Soccer Robots . . . . . . . . . . . 297
                  Ian Frank and   
        Kumiko Tanaka-Ishii and   
               Katsuto Arai and   
              Hitoshi Matsubara   The Statistics Proxy Server  . . . . . . 303
             Fredrik Heintz and   
            Johan Kummeneje and   
                    Paul Scerri   Using Simulated RoboCup in Undergraduate
                                  Education  . . . . . . . . . . . . . . . 309
              Harukazu Igarashi   Path Planning of a Mobile Robot as a
                                  Discrete Optimization Problem and
                                  Adjustment of Weight Parameters in the
                                  Objective Function by Reinforcement
                                  Learning . . . . . . . . . . . . . . . . 315
           Toshiyuki Kaneda and   
          Fumitoshi Matsuno and   
          Hironao Takahashi and   
             Takeshi Matsui and   
            Masayasu Atsumi and   
         Michinori Hatayama and   
               Kenji Tayama and   
             Ryousuke Chiba and   
              Kazunori Takeuchi   Simulator Complex for RoboCup Rescue
                                  Simulation Project --- As Test-Bed for
                                  Multi-Agent Organizational Behavior in
                                  Emergency Case of Large-Scale Disaster   321
             Frederic Maire and   
                    Doug Taylor   A Quadratic Programming Formulation of a
                                  Moving Ball Interception and Shooting
                                  Behaviour, and Its Application to Neural
                                  Network Control  . . . . . . . . . . . . 327
           David McAllester and   
                    Peter Stone   Keeping the Ball from CMUnited-99  . . . 333
            Robin R. Murphy and   
                Jenn Casper and   
                    Mark Micire   Potential Tasks and Research Issues for
                                  Mobile Robots in RoboCup Rescue  . . . . 339
          Yasunori Nagasaka and   
          Kazuhito Murakami and   
             Tadashi Naruse and   
         Tomoichi Takahashi and   
                     Yasuo Mori   Potential Field Approach to Short Term
                                  Action Planning in RoboCup F180 League   345
              Masayuki Ohta and   
         Tomoichi Takahashi and   
                 Hiroaki Kitano   RoboCup-Rescue Simulation: In Case of
                                  Fire Fighting Planning . . . . . . . . . 351
         Mikhail Prokopenko and   
                Marc Butler and   
                  Thomas Howard   On Emergence of Scalable Tactical and
                                  Strategic Behaviour  . . . . . . . . . . 357
              M. Riedmiller and   
                   A. Merke and   
                   D. Meier and   
                A. Hoffmann and   
                  A. Sinner and   
                   O. Thate and   
                     R. Ehrmann   Karlsruhe Brainstormers --- A
                                  Reinforcement Learning Approach to
                                  Robotic Soccer . . . . . . . . . . . . . 367
Josep Lluís de la Rosa and   
        Israel Muñoz and   
           Bianca Innocenti and   
            Albert Figueras and   
            Miquel Montaner and   
             Josep Antoni Ramon   Preliminary Studies of Dynamics of
                                  Physical Agents Ecosystems . . . . . . . 373
         Tomoichi Takahashi and   
              Ikuo Takeuchi and   
             Tetsuhiko Koto and   
           Satoshi Tadokoro and   
                    Itsuki Noda   RoboCup-Rescue Disaster Simulator
                                  Architecture . . . . . . . . . . . . . . 379
         Yasutake Takahashi and   
            Masanori Takeda and   
                   Minoru Asada   Improvement Continuous Valued
                                  $Q$-learning and Its Application to
                                  Vision Guided Behavior Acquisition . . . 385
                Ubbo Visser and   
     Christian Drücker and   
      Sebastian Hübner and   
               Esko Schmidt and   
              Hans-Georg Weland   Recognizing Formations in Opponent Teams 391
             Amin Abbaspour and   
            Mahmood Rahmani and   
       Bahman Radjabalipour and   
                   Eslam Nazemi   SBC++ Simulator Team . . . . . . . . . . 397
               Hidehisa Akiyama   A Team . . . . . . . . . . . . . . . . . 401
       Hans-Dieter Burkhard and   
                Joscha Bach and   
          Kay Schröter and   
                Jan Wendler and   
             Michael Gollin and   
             Thomas Meinert and   
                    Gerd Sander   AT Humboldt 2000 (Team Description)  . . 405
             Ciprian Candea and   
                  Marius Staicu   AIRG Sibiu . . . . . . . . . . . . . . . 409
      Anneli Dahlström and   
             Fredrik Heintz and   
           Martin Jacobsson and   
              Johan Thapper and   
              Martin Öberg   The NOAI Team Description  . . . . . . . 413
                    Klaus Dorer   Improved Agents of the magmaFreiburg2000
                                  Team . . . . . . . . . . . . . . . . . . 417--420
     Christian Drücker and   
      Sebastian Hübner and   
               Esko Schmidt and   
                Ubbo Visser and   
              Hans-Georg Weland   Virtual Werder . . . . . . . . . . . . . 421
              Tetsuya Esaki and   
             Taku Sakushima and   
            Shinji Futamase and   
               Nobuhiro Ito and   
         Tomoichi Takahashi and   
                   Wei Chen and   
                    Koichi Wada   Kakitsubata Team Description . . . . . . 425
              Carlo Ferrari and   
          Francesco Garelli and   
                 Enrico Pagello   PaSo-Team 2000 . . . . . . . . . . . . . 429
               Jafar Habibi and   
       Ehsan Chiniforooshan and   
           Majid Khabbazian and   
            Mahdi Mirzazade and   
         MohammadAli Safari and   
              HamidReza Younesi   Sharif-Arvand Simulation Team  . . . . . 433
               Jafar Habibi and   
             Ehsan Foroughi and   
             Mehran Motamed and   
             Pooya Karimian and   
               Hamed Hatami and   
                 Hossein Fardad   SharifII Soccer Simulation Team  . . . . 437
                      H. Hu and   
               K. Kostiadis and   
                  M. Hunter and   
                  N. Kalyviotis   Essex Wizards 2000 Team Description  . . 441
          Harukazu Igarashi and   
            Yusuke Yamauchi and   
                  Shuichi Iidoi   RoboCup-2000 Simulation League: Team
                                  KU-Yam2000 . . . . . . . . . . . . . . . 445
            Hiroyuki Iizuka and   
         Masatoshi Hiramoto and   
          Hidenori Kawamura and   
          Masahito Yamamoto and   
                   Azuma Ohuchi   Harmony Team . . . . . . . . . . . . . . 449
                 Tetsuhiko Koto   TakAI  . . . . . . . . . . . . . . . . . 453
        Alexander N. Kozhushkin   PSI Team . . . . . . . . . . . . . . . . 457
                  Takenori Kubo   Gnez: Adapting Knowledge to the
                                  Environment with GA  . . . . . . . . . . 461
           Takuya Morishita and   
           T. Kawarabayashi and   
                 J. Nishino and   
                 H. Shimora and   
                       H. Ogura   Zeng00: The Realization of Mixed
                                  Strategy in Simulation Soccer Game . . . 465
                 Jan Murray and   
                Oliver Obst and   
            Frieder Stolzenburg   RoboLog Koblenz 2000 . . . . . . . . . . 469
              Junji Nishino and   
           Takuya Morishita and   
                  Takenori Kubo   Open Zeng: An Open Style Distributed
                                  Semi-cooperative Team Development
                                  Project from Japan . . . . . . . . . . . 473
                  Masayuki Ohta   Gemini in RoboCup-2000 . . . . . . . . . 477
              Daniel Polani and   
               Thomas Martinetz   Team Description for Lucky Lübeck ---
                                  Evidence-Based World State Estimation    481
          Martin Riedmiller and   
                Artur Merke and   
                David Meier and   
           Andreas Hoffmann and   
                Alex Sinner and   
                   Ortwin Thate   Karlsruhe Brainstormers 2000 Team
                                  Description  . . . . . . . . . . . . . . 485
              Patrick Riley and   
                Peter Stone and   
           David McAllester and   
                 Manuela Veloso   ATT-CMUnited-2000: Third Place Finisher
                                  in the Robocup-2000 Simulator League . . 489
                Paul Scerri and   
                 Nancy Reed and   
               Tobias Wiren and   
      Mikael Lönneberg and   
                  Pelle Nilsson   Headless Chickens IV . . . . . . . . . . 493
            Birgit Schappel and   
                   Frank Schulz   Mainz Rolling Brains 2000  . . . . . . . 497
            Kousuke Shinoda and   
                Susumu Kunifuji   Team Description of Spatial-Timer  . . . 501
             L. Stankevitch and   
                    S. Akhapkin   Polytech100  . . . . . . . . . . . . . . 505
             Takashi Suzuki and   
          Sinnosuke Asahara and   
             Hideaki Kurita and   
                  Ikuo Takeuchi   Team YowAI-2000 Description  . . . . . . 509
             Naotaka Tanaka and   
                   Mio Yamamoto   11monkeysII  . . . . . . . . . . . . . . 513
                   Jacky Baltes   All Botz . . . . . . . . . . . . . . . . 515
                   Jacky Baltes   4 Stooges  . . . . . . . . . . . . . . . 519
         Thomas Bräunl and   
        Petter Reinholdtsen and   
                 Stephen Humble   CIIPS Glory Small Soccer Robots with
                                  Local Image Processing . . . . . . . . . 523
              Mark M. Chang and   
             Brett Browning and   
                Gordon F. Wyeth   ViperRoos 2000 . . . . . . . . . . . . . 527
              Jerome Douret and   
             Thierry Dorval and   
              Ryad Benosman and   
               Francis Bras and   
                Gael Surtet and   
               Thomas Petit and   
              Nadege Quedec and   
               Denis Philip and   
     Gilles Cordurié and   
              Mario Rebello and   
             Didier Abraham and   
             Nicolas Couder and   
                   Marco Marcon   RoboCup 2000 (F180) Team Description:
                                  UPMC--CFA team (France)  . . . . . . . . 531
                  Andrew Howard   MuCows . . . . . . . . . . . . . . . . . 535
             Nadir Ould Khessal   Role-Based Strategy in TPOTs RoboCup
                                  Team . . . . . . . . . . . . . . . . . . 539
               Ng Beng Kiat and   
              Quek Yee Ming and   
              Tay Boon Hock and   
              Yuen Suen Yee and   
                      Simon Koh   LuckyStar II --- Team Description Paper  543
          Raúl Rojas and   
                Sven Behnke and   
              Lars Knipping and   
         Bernhard Frötschl   FU-Fighters 2000 . . . . . . . . . . . . 547--550
Josep Lluís de la Rosa and   
           Bianca Innocenti and   
            Miquel Montaner and   
            Albert Figueras and   
        Israel Muñoz and   
                 Josep A. Ramon   RoGi Team Description  . . . . . . . . . 551
               Gordon Wyeth and   
                Ashley Tews and   
                 Brett Browning   UQ RoboRoos: Kicking on to 2000  . . . . 555
            Giovanni Adorni and   
            Andrea Bonarini and   
           Giorgio Clemente and   
              Daniele Nardi and   
             Enrico Pagello and   
               Maurizio Piaggio   ART'00 --- Azzurra Robot Team for the
                                  Year 2000  . . . . . . . . . . . . . . . 559
               James Brusey and   
                Mark Makies and   
                Lin Padgham and   
              Brad Woodvine and   
                   Karl Fantone   RMIT United  . . . . . . . . . . . . . . 563
             Sebastian Buck and   
               Robert Hanek and   
            Michael Klupsch and   
               Thorsten Schmitt   Agilo RoboCuppers: RoboCup Team
                                  Description  . . . . . . . . . . . . . . 567
               Kosei Demura and   
             Nobuhiro Tachi and   
              Noriharu Kubo and   
                     Kenji Miwa   WinKIT . . . . . . . . . . . . . . . . . 571
             Rosemary Emery and   
               Tucker Balch and   
                Rande Shern and   
             Kevin Sikorski and   
                 Ashley Stroupe   CMU Hammerheads Team Description . . . . 575
          Ansgar Bredenfeld and   
         Thomas Christaller and   
             Horst Guenther and   
                Jorg Hermes and   
          Giovanni Indiveri and   
             Herbert Jaeger and   
       Hans-Ulrich Kobialka and   
        Paul-Gerhard Ploger and   
              Peter Schoell and   
                Andrea Siegberg   GMD-Robots . . . . . . . . . . . . . . . 579
                  M. Jamzad and   
        A. Foroughnassiraei and   
            T. Hadji Aaghai and   
             V. S. Mirrokni and   
                R. Ghorbani and   
            A. Heydar Noori and   
                  M. Kazemi and   
                 H. Chitsaz and   
                F. Mobasser and   
     M. Ebraahimi Moghaddam and   
                 M. Gudarzi and   
              N. Ghaffarzadegan   A Goal Keeper for Middle Size Robocup    583
              Pieter Jonker and   
             Will van Geest and   
                    Frans Groen   The Dutch Team . . . . . . . . . . . . . 587
                T. Nakamura and   
                  H. Takeda and   
                  T. Terada and   
                  M. Oohara and   
                T. Yamamoto and   
                      M. Takeda   The RoboCup-NAIST  . . . . . . . . . . . 591
             Takeshi Ohashi and   
            Shuichi Enokida and   
          Junich Minatodani and   
          Kazuhiko Kawamoto and   
             Youji Shigeoka and   
           Takaichi Yoshida and   
                 Toshiaki Ejima   KIRC: Kyutech Intelligent Robot Club . . 595
                  N. Oswald and   
                   M. Becht and   
                T. Buchheim and   
                  P. Burger and   
                  G. Hetzel and   
              G. Kindermann and   
                 R. Lafrenz and   
                  M. Schanz and   
           M. Schulé and   
                        P. Levi   CoPS-Team Description  . . . . . . . . . 599
          Paolo de Pascalis and   
         Massimo Ferraresso and   
          Mattia Lorenzetti and   
          Alessandro Modolo and   
              Matteo Peluso and   
            Roberto Polesel and   
              Robert Rosati and   
           Nikita Scattolin and   
          Alberto Speranzon and   
                 Walter Zanette   Golem Team in Middle-Sized Robots League 603
         Yasutake Takahashi and   
                Eiji Uchibe and   
           Takahashi Tamura and   
            Masakazu Yanase and   
            Shoichi Ikenoue and   
               Shujiro Inui and   
                   Minoru Asada   Osaka University ``Trackies 2000'' . . . 607
                Huosheng Hu and   
                Dongbing Gu and   
                          Bo Li   Essex Rovers Team Description  . . . . . 611
              Vincent Hugel and   
             Patrick Bonnin and   
                Pierre Blazevic   French LRP Team's Description  . . . . . 615
               Yuichi Kobayashi   Team ARAIBO  . . . . . . . . . . . . . . 619
               Scott Lenser and   
                James Bruce and   
                 Manuela Veloso   CMPack '00 . . . . . . . . . . . . . . . 623
              Guillaume Marceau   The McGill's RedDogs Legged League
                                  System . . . . . . . . . . . . . . . . . 627
          Noriaki Mitsunaga and   
                Yukie Nagai and   
                   Minoru Asada   BabyTigers: Osaka Legged Robot Team  . . 631
                   D. Nardi and   
            C. Castelpietra and   
                A. Guidotti and   
                 M. Salerno and   
                    C. Sanitati   S.P.Q.R. . . . . . . . . . . . . . . . . 635--638
           Jim P. Ostrowski and   
             Ken A. McIsaac and   
                  Aveek Das and   
              Sachin Chitta and   
                  Julie Neiling   The University of Pennsylvania RoboCup
                                  Legged Soccer Team . . . . . . . . . . . 639
               A. Saffiotti and   
                   M. Boman and   
                 P. Buschka and   
               P. Davidsson and   
               S. Johansson and   
                       Z. Wasik   Team Sweden  . . . . . . . . . . . . . . 643
                 Robert Sim and   
                 Paul Russo and   
              Andrew Graham and   
               Andrew Blair and   
                Nick Barnes and   
                     Alan Blair   RoboMutts  . . . . . . . . . . . . . . . 647
            Matthias Werner and   
              Helmut Myritz and   
           Uwe Düffert and   
        Martin Lötzsch and   
           Hans-Dieter Burkhard   Humboldt Heroes  . . . . . . . . . . . . 651
                      Anonymous   Author Index . . . . . . . . . . . . . . 655


Lecture Notes in Computer Science
Volume 2020, 2001

           Detlef Hühnlein   Faster Generation of NICE-Schnorr-Type
                                  Signatures . . . . . . . . . . . . . . . 1
                Iris Anshel and   
             Michael Anshel and   
               Benji Fisher and   
                Dorian Goldfeld   New Key Agreement Protocols in Braid
                                  Group Cryptography . . . . . . . . . . . 13
              Hovav Shacham and   
                      Dan Boneh   Improving SSL Handshake Performance via
                                  Batching . . . . . . . . . . . . . . . . 28
         Genevi\`eve Arboit and   
               Jean-Marc Robert   From Fixed-Length Messages to
                                  Arbitrary-Length Messages Practical RSA
                                  Signature Padding Schemes  . . . . . . . 44
              Ron Steinfeld and   
                  Yuliang Zheng   An Advantage of Low-Exponent RSA with
                                  Modulus Primes Sharing Least Significant
                                  Bits . . . . . . . . . . . . . . . . . . 52
                    Paul Onions   On the Strength of Simply-Iterated
                                  Feistel Ciphers with Whitening Keys  . . 63
           Helena Handschuh and   
            Lars R. Knudsen and   
             Matthew J. Robshaw   Analysis of SHA-1 in Encryption Mode . . 70--83
                   Kris Gaj and   
                Pawel Chodowiec   Fast Implementation and Fair Comparison
                                  of the Final Candidates for Advanced
                                  Encryption Standard Using Field
                                  Programmable Gate Arrays . . . . . . . . 84
           Eyal Kushilevitz and   
                      Tal Rabin   Fair e-Lotteries and e-Casinos . . . . . 100
           Markus Jakobsson and   
          David Pointcheval and   
                     Adam Young   Secure Mobile Gambling . . . . . . . . . 110
         Daniel R. L. Brown and   
                 Don B. Johnson   Formal Security Proofs for a Signature
                                  Scheme with Partial Message Recovery . . 126
             Michel Abdalla and   
              Mihir Bellare and   
                Phillip Rogaway   The Oracle Diffie--Hellman Assumptions
                                  and an Analysis of DHIES . . . . . . . . 143
           Tatsuaki Okamoto and   
              David Pointcheval   REACT: Rapid Enhanced-Security
                                  Asymmetric Cryptosystem Transform  . . . 159
           Markus Jakobsson and   
                 Susanne Wetzel   Security Weaknesses in Bluetooth . . . . 176
            Colin D. Walter and   
                 Susan Thompson   Distinguishing Exponent Digits by
                                  Observing Modular Subtractions . . . . . 192
                  Marc Joye and   
    Jean-Jacques Quisquater and   
                      Moti Yung   On the Power of Misbehaving Adversaries
                                  and Security Analysis of the Original
                                  EPOC . . . . . . . . . . . . . . . . . . 208
       Alexander Tiountchik and   
                 Elena Trichina   Modular Exponentiation on Fine-Grained
                                  FPGA . . . . . . . . . . . . . . . . . . 223
             Elena Trichina and   
                Alex Tiountchik   Scalable Algorithm for Montgomery
                                  Multiplication and Its Implementation on
                                  the Coarse-Grain Reconfigurable Chip . . 235
              Michael Brown and   
           Darrel Hankerson and   
         Julio López and   
                 Alfred Menezes   Software Implementation of the NIST
                                  Elliptic Curves Over Prime Fields  . . . 250
            Nicolas T. Courtois   The Security of Hidden Field Equations
                                  (HFE)  . . . . . . . . . . . . . . . . . 266
            Jacques Patarin and   
           Nicolas Courtois and   
                   Louis Goubin   QUARTZ, $ 128 $-Bit Long Digital
                                  Signatures . . . . . . . . . . . . . . . 282
            Jacques Patarin and   
           Nicolas Courtois and   
                   Louis Goubin   FLASH, a Fast Multivariate Signature
                                  Algorithm  . . . . . . . . . . . . . . . 298
             Alfred Menezes and   
                     Minghua Qu   Analysis of the Weil Descent Attack of
                                  Gaudry, Hess and Smart . . . . . . . . . 308
            Jean-Pierre Seifert   Using Fewer Qubits in Shor's
                                  Factorization Algorithm Via Simultaneous
                                  Diophantine Approximation  . . . . . . . 319
              Amir Herzberg and   
                      Yosi Mass   Relying Party Credentials Framework  . . 328
                David P. Jablon   Password Authentication Using Multiple
                                  Servers  . . . . . . . . . . . . . . . . 344
               Philip MacKenzie   More Efficient Password-Authenticated
                                  Key Exchange . . . . . . . . . . . . . . 361
                   Yacov Yacobi   Improved Boneh-Shaw Content
                                  Fingerprinting . . . . . . . . . . . . . 378
              Yuji Watanabe and   
           Goichiro Hanaoka and   
                    Hideki Imai   Efficient Asymmetric Public-Key Traitor
                                  Tracing without Trusted Agents . . . . . 392
                      Ari Juels   Targeted Advertising \ldots And Privacy
                                  Too  . . . . . . . . . . . . . . . . . . 408
             Philippe Golle and   
                   Ilya Mironov   Uncheatable Distributed Computations . . 425
             Michel Abdalla and   
                 Sara Miner and   
           Chanathip Namprempre   Forward-Secure Threshold Signature
                                  Schemes  . . . . . . . . . . . . . . . . 441
                  Marc Fischlin   A Cost-Effective Pay-Per-Multiplication
                                  Comparison Method for Millionaires . . . 457
                      Anonymous   Author Index . . . . . . . . . . . . . . 473


Lecture Notes in Computer Science
Volume 2021, 2001

                 Daniel Jackson   Lightweight Formal Methods . . . . . . . 1
              F. Bellegarde and   
                  C. Darlot and   
                J. Julliand and   
                O. Kouchnarenko   Reformulation: a Way to Combine Dynamic
                                  Properties and B Refinement  . . . . . . 2
              Steffen Helke and   
                  Thomas Santen   Mechanized Analysis of Behavioral
                                  Conformance in the Eiffel Base Libraries 20
                Joseph Stoy and   
               Xiaowei Shen and   
                         Arvind   Proofs of Correctness of Cache-Coherence
                                  Protocols  . . . . . . . . . . . . . . . 43--71
             Marsha Chechik and   
          Steve Easterbrook and   
               Victor Petrovykh   Model-Checking over Multi-valued Logics  72
           Michael Leuschel and   
            Thierry Massart and   
                  Andrew Currie   How to Make FDR Spin LTL Model Checking
                                  of CSP by Refinement . . . . . . . . . . 99
            Fabrice Derepas and   
                Paul Gastin and   
        David Plainfossé   Avoiding State Explosion for Distributed
                                  Systems with Timestamps  . . . . . . . . 119
               Jan Jürjens   Secrecy-Preserving Refinement  . . . . . 135
                   Heiko Mantel   Information Flow Control and
                                  Applications --- Bridging a Gap  . . . . 153
             Vasu S. Alagar and   
                       Zheng Xi   A Rigorous Approach to Modeling and
                                  Analyzing E-Commerce Architectures . . . 173
  Nalini Venkatasubramanian and   
            Carolyn Talcott and   
                       Gul Agha   A Formal Model for Reasoning about
                                  Adaptive QoS-Enabled Middleware  . . . . 197
                  Jayadev Misra   A Programming Model for Wide-Area
                                  Computing  . . . . . . . . . . . . . . . 222
              Andres Flores and   
              Richard Moore and   
                   Luis Reynoso   A Formal Model of Object-Oriented Design
                                  and GoF Design Patterns  . . . . . . . . 223
        Sophie Dupuy-Chessa and   
              Lydie du Bousquet   Validation of UML Models Thanks to Z and
                                  Lustre . . . . . . . . . . . . . . . . . 242
                     Claus Pahl   Components, Contracts, and Connectors
                                  for the Unified Modelling Language UML   259
               Adnan Sherif and   
            Augusto Sampaio and   
       Sérgio Cavalcante   An Integrated Approach to Specification
                                  and Validation of Real-Time Systems  . . 278
             Stephen E. Paynter   Real-Time Logic Revisited  . . . . . . . 300
                     Dirk Beyer   Improvements in BDD-Based Reachability
                                  Analysis of Timed Automata . . . . . . . 318
                Leila Silva and   
            Augusto Sampaio and   
                  Geraint Jones   Serialising Parallel Processes in a
                                  Hardware/Software Partitioning Context   344
            Jonathan Burton and   
              Maciej Koutny and   
            Giuseppe Pappalardo   Verifying Implementation Relations . . . 364
               Muffy Calder and   
               Savi Maharaj and   
               Carron Shankland   An Adequate Logic for Full LOTOS . . . . 384
Mícheál Mac an Airchinnigh   Towards a Topos Theoretic Foundation for
                                  the Irish School of Constructive
                                  Mathematics $ (\hbox {\sf
                                  M}^{\scriptstyle \clubsuit }_{\hbox {\sf
                                  c}}) $ . . . . . . . . . . . . . . . . . 396--418
                    Shmuel Katz   Faithful Translations among Models and
                                  Specifications . . . . . . . . . . . . . 419
             Simon Peyton Jones   Composing Contracts: An Adventure in
                                  Financial Engineering  . . . . . . . . . 435
Manuel J. Fernández Iglesias and   
Francisco J. González-Castaño and   
José M. Pousada Carballo and   
Martín Llamas Nistal and   
          Alberto Romero Feijoo   From Complex Specifications to a Working
                                  Prototype. A Protocol Engineering Case
                                  Study  . . . . . . . . . . . . . . . . . 436
             Laurent Arditi and   
    Hédi Boufa\"\ied and   
      Arnaud Cavanié and   
          Vincent Stehlé   Coverage Directed Generation of
                                  System-Level Test Cases for the
                                  Validation of a DSP System . . . . . . . 449
                 O. Laurent and   
                  P. Michel and   
                       V. Wiels   Using Formal Verification Techniques to
                                  Reduce Simulation and Test Effort  . . . 465
           Pieter H. Hartel and   
          Michael J. Butler and   
             Eduard de Jong and   
                   Mark Longley   Transacted Memory for Smart Cards  . . . 478
            Cormac Flanagan and   
             K. Rustan M. Leino   Houdini, an Annotation Assistant for
                                  ESC/Java . . . . . . . . . . . . . . . . 500
        Dragan Bo\vsna\vcki and   
                Dennis Dams and   
             Leszek Holenderski   A Heuristic for Symmetry Reductions with
                                  Scalarsets . . . . . . . . . . . . . . . 518
            Michael Johnson and   
               Robert Rosebrugh   View Updatability Based on the Models of
                                  a Formal Specification . . . . . . . . . 534
               Ralf Lämmel   Grammar Adaptation . . . . . . . . . . . 550
          Bernhard K. Aichernig   Test-Case Calculation through
                                  Abstraction  . . . . . . . . . . . . . . 571
                   M. Doche and   
         I. Vernier-Mounier and   
                      F. Kordon   A Modular Approach to the Specification
                                  and Validation of an Electrical Flight
                                  Control System . . . . . . . . . . . . . 590
          Natasha Sharygina and   
                    Doron Peled   A Combined Testing and Verification
                                  Approach for Software Reliability  . . . 611
                      Anonymous   Author Index . . . . . . . . . . . . . . 629


Lecture Notes in Computer Science
Volume 2022, 2001

 Jòrgen Lindskov Knudsen   Fault Tolerance and Exception Handling
                                  in BETA  . . . . . . . . . . . . . . . . 1
                Christophe Dony   A Fully Object-Oriented Exception
                                  Handling System: Rationale and Smalltalk
                                  Implementation . . . . . . . . . . . . . 18
                 Kent M. Pitman   Condition Handling in the Lisp Language
                                  Family . . . . . . . . . . . . . . . . . 39
              Bjarne Stroustrup   Exception Safety: Concepts and
                                  Techniques . . . . . . . . . . . . . . . 60
         Yolande Ahronovitz and   
               Marianne Huchard   Exceptions in Object Modeling: Finding
                                  Exceptions from the Elements of the
                                  Static Object Model  . . . . . . . . . . 77
            Anna Mikhailova and   
           Alexander Romanovsky   Supporting Evolution of Interface
                                  Exceptions . . . . . . . . . . . . . . . 94
         Valérie Issarny   Concurrent Exception Handling  . . . . . 111
             Anand Tripathi and   
                  Robert Miller   Exception Handling in Agent-Oriented
                                  Systems  . . . . . . . . . . . . . . . . 128
       Alexander Romanovsky and   
              Jörg Kienzle   Action-Oriented Exception Handling in
                                  Cooperative and Competitive Concurrent
                                  Object-Oriented Systems  . . . . . . . . 147
Marta Patiño-Martínez and   
Ricardo Jiménez-Peris and   
          Sergio Arévalo   Exception Handling and Resolution for
                                  Transactional Object Groups  . . . . . . 165
             Charles Howell and   
                  Gary Vecellio   Experiences with Error Handling in
                                  Critical Systems . . . . . . . . . . . . 181
       Alessandro F. Garcia and   
    Cecília M. F. Rubira   An Architectural-Based Reflective
                                  Approach to Incorporating Exception
                                  Handling into Dependable Software  . . . 189
   Bjòrn Egil Hansen and   
                Henrik Fredholm   Adapting C++ Exception Handling to an
                                  Extended COM Exception Model . . . . . . 207
         Tatsurou Sekiguchi and   
          Takahiro Sakamoto and   
               Akinori Yonezawa   Portable Implementation of Continuation
                                  Operators in Imperative Languages by
                                  Exception Handling . . . . . . . . . . . 217
              Elisa Bertino and   
          Giovanna Guerrini and   
                 Isabella Merlo   Exception Handling in Object-Oriented
                                  Databases  . . . . . . . . . . . . . . . 234
               Fabio Casati and   
               Gianpaolo Cugola   Error Handling in Process Support
                                  Systems  . . . . . . . . . . . . . . . . 251
         Dickson K. W. Chiu and   
                    Qing Li and   
           Kamalakar Karlapalem   ADOME-WFMS: Towards Cooperative Handling
                                  of Workflow Exceptions . . . . . . . . . 271
                      Anonymous   Author Index . . . . . . . . . . . . . . 289


Lecture Notes in Computer Science
Volume 2024, 2001

               Gopalan Nadathur   The Metalanguage $ \lambda $ Prolog and
                                  Its Implementation . . . . . . . . . . . 1
               George C. Necula   A Scalable Architecture for
                                  Proof-Carrying Code  . . . . . . . . . . 21
                   Taisuke Sato   Parameterized Logic Programs where
                                  Computing Meets Learning . . . . . . . . 40
               Jeff Polakov and   
                   Kwangkeun Yi   Proving Syntactic Properties of
                                  Exceptions in an Ordered Logical
                                  Framework  . . . . . . . . . . . . . . . 61
              Olivier Danvy and   
               Lasse R. Nielsen   A Higher-Order Colon Translation . . . . 78
             Kwanghoon Choi and   
                Hyun-il Lim and   
                    Taisook Han   Compiling Lazy Functional Programs Based
                                  on the Spineless Tagless $G$-Machine for
                                  the Java Virtual Machine . . . . . . . . 92
               Javier Leach and   
                   Susana Nieva   A Higher-Order Logic Programming
                                  Language with Constraints  . . . . . . . 108
               Giorgio Delzanno   Specifying and Debugging Security
                                  Protocols via Hereditary Harrop Formulas
                                  and $ \lambda $ Prolog --- A Case-study  123
              Marco Bozzano and   
           Giorgio Delzanno and   
              Maurizio Martelli   An Effective Bottom-Up Semantics for
                                  First-Order Linear Logic Programs  . . . 138
Jesús M. Almendros-Jiménez and   
   Antonio Becerra-Terón   A Framework for Goal-Directed Bottom-Up
                                  Evaluation of Functional Logic Programs  153
           Rafael Caballero and   
Francisco J. López-Fraguas and   
Mario Rodríguez-Artalejo   Theoretical Foundations for the
                                  Declarative Debugging of Lazy Functional
                                  Logic Programs . . . . . . . . . . . . . 170
                   Wolfgang Lux   Adding Linear Constraints over Real
                                  Numbers to Curry . . . . . . . . . . . . 185
                Taro Suzuki and   
                Aart Middeldorp   A Complete Selection Function for Lazy
                                  Conditional Narrowing  . . . . . . . . . 201
Teresa Hortalá-González and   
               Eva Ullán   An Abstract Machine Based System for a
                                  Lazy Narrowing Calculus  . . . . . . . . 216
    C. Ferri-Ramírez and   
 J. Hernández-Orallo and   
  M. J. Ramírez-Quintana   Incremental Learning of Functional Logic
                                  Programs . . . . . . . . . . . . . . . . 233
                Martin Sulzmann   A General Type Inference Framework for
                                  Hindley/Milner Style Systems . . . . . . 248
                    Koji Kagawa   Monadic Encapsulation with Stack of
                                  Regions  . . . . . . . . . . . . . . . . 264
           Pierre Deransart and   
                Jan-Georg Smaus   Well-Typed Logic Programs Are not Wrong  280
              Vitaly Lagoon and   
               Peter J. Stuckey   A Framework for Analysis of Typed Logic
                                  Programs . . . . . . . . . . . . . . . . 296
             Gianluca Amato and   
                   Fausto Spoto   Abstract Compilation for Sharing
                                  Analysis . . . . . . . . . . . . . . . . 311
              Elvira Albert and   
              Michael Hanus and   
            Germán Vidal   A Practical Partial Evaluator for a
                                  Multi-Paradigm Declarative Language  . . 326
              Olivier Danvy and   
                  Morten Rhiger   A Simple Take on Typed Abstract Syntax
                                  in Haskell-like Languages  . . . . . . . 343
              Masahiko Sato and   
           Takafumi Sakurai and   
             Yukiyoshi Kameyama   A Simply Typed Context Calculus with
                                  First-Class Environments . . . . . . . . 359
        Fairouz Kamareddine and   
                  Twan Laan and   
                  Rob Nederpelt   Refining the Barendregt Cube Using
                                  Parameters . . . . . . . . . . . . . . . 375
                      Anonymous   Author Index . . . . . . . . . . . . . . 391


Lecture Notes in Computer Science
Volume 2025, 2001

           Rudolf Fleischer and   
                   Colin Hirsch   1. Graph Drawing and Its Applications    1
        René Weiskircher   2. Drawing Planar Graphs . . . . . . . . 23
 Matthias Müller-Hannemann   3. Drawing Trees, Series-Parallel
                                  Digraphs, and Lattices . . . . . . . . . 46
                  Ulrik Brandes   4. Drawing on Physical Analogies . . . . 71
             Oliver Bastert and   
          Christian Matuszewski   5. Layered Drawings of Digraphs  . . . . 87
         Markus Eiglsperger and   
    Sándor P. Fekete and   
                 Gunnar W. Klau   6. Orthogonal Graph Drawing  . . . . . . 121
                Britta Landgraf   7. $3$D Graph Drawing  . . . . . . . . . 172
           Ralf Brockenauer and   
               Sabine Cornelsen   8. Drawing Clusters and Hierarchies  . . 193
             Jürgen Branke   9. Dynamic Graph Drawing . . . . . . . . 228
                 Gabriele Neyer   10. Map Labeling with Application to
                                  Graph Drawing  . . . . . . . . . . . . . 247
                Thomas Willhalm   A. Software Packages . . . . . . . . . . 274
                      Anonymous   Bibliography . . . . . . . . . . . . . . 283
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 307


Lecture Notes in Computer Science
Volume 2026, 2001

          Siegfried Benkner and   
                 Thomas Brandes   High-Level Data Mapping for Clusters of
                                  SMPs . . . . . . . . . . . . . . . . . . 1
         Manuel Díaz and   
     Bartolomé Rubio and   
              Enrique Soler and   
           José M. Troya   Integrating Task and Data Parallelism by
                                  Means of Coordination Patterns . . . . . 16
              D. M. Pressel and   
                    J. Sahu and   
                   K. R. Heavey   Using Loop-Level Parallelism to
                                  Parallelize Vectorizable Programs  . . . 28
               Jens Gerlach and   
          Peter Gottschling and   
                        Uwe Der   A Generic C++ Framework for Parallel
                                  Mesh-Based Scientific Applications . . . 45
            Gabriel Antoniu and   
               Luc Bougé   DSM-PM2: a Portable Implementation
                                  Platform for Multithreaded DSM
                                  Consistency Protocols  . . . . . . . . . 55
     Rémi Coudarcher and   
       Jocelyn Sérot and   
     Jean-Pierre Dérutin   Implementation of a Skeleton-Based
                                  Parallel Programming Environment
                                  Supporting Arbitrary Nesting . . . . . . 71
              James C. Pang and   
         Gholamali C. Shoja and   
                Eric G. Manning   Supporting Soft Real-Time Tasks and QoS
                                  on the Java Platform . . . . . . . . . . 86
             Dorit Naishlos and   
              Joseph Nuzman and   
             Chau-Wen Tseng and   
                    Uzi Vishkin   Evaluating the XMT Parallel Programming
                                  Model  . . . . . . . . . . . . . . . . . 95
               Simon Huband and   
                 Chris McDonald   DEPICT: a Topology-Based Debugger for
                                  MPI Programs . . . . . . . . . . . . . . 109
            Jan B. Pedersen and   
                    Alan Wagner   Correcting Errors in Message Passing
                                  Systems  . . . . . . . . . . . . . . . . 122
                      Anonymous   Author Index . . . . . . . . . . . . . . 139


Lecture Notes in Computer Science
Volume 2027, 2001

            Ole Lehrmann Madsen   Virtual Classes and Their Implementation 1
           Vincenzo Martena and   
           Pierluigi San Pietro   Alias Analysis by Means of a Model
                                  Checker  . . . . . . . . . . . . . . . . 3
             Atanas Rountev and   
               Barbara G. Ryder   Points-to and Side-Effect Analyses for
                                  Programs Built with Precompiled
                                  Libraries  . . . . . . . . . . . . . . . 20
             Eduard Mehofer and   
                Bernhard Scholz   A Novel Probabilistic Data Flow
                                  Framework  . . . . . . . . . . . . . . . 37
                David Lacey and   
                   Oege de Moor   Imperative Program Transformation by
                                  Rewriting  . . . . . . . . . . . . . . . 52
          Björn Franke and   
                Michael O'Boyle   Compiler Transformation of Pointers to
                                  Explicit Array Accesses in DSP
                                  Applications . . . . . . . . . . . . . . 69
             Sibylle Schupp and   
             Douglas Gregor and   
               David Musser and   
                  Shin-Ming Liu   User-Extensible
                                  Simplification--Type-Based Optimizer
                                  Generators . . . . . . . . . . . . . . . 86
              Caroline Tice and   
                Susan L. Graham   A Practical, Robust Method for
                                  Generating Variable Range Tables . . . . 102
          Robert A. van Engelen   Efficient Symbolic Analysis for
                                  Optimizing Compilers . . . . . . . . . . 118
              Noam Rinetzky and   
                    Mooly Sagiv   Interprocedural Shape Analysis for
                                  Recursive Programs . . . . . . . . . . . 133
                Radu Rugina and   
                  Martin Rinard   Design-Driven Compilation  . . . . . . . 150
          Kalyan Muthukumar and   
                   Gautam Doshi   Software Pipelining of Nested Loops  . . 165
               Han-Saem Yun and   
                 Jihong Kim and   
                  Soo-Mook Moon   A First Step Towards Time Optimal
                                  Software Pipelining of Loops with
                                  Control Flows  . . . . . . . . . . . . . 182
                    David Gregg   Comparing Tail Duplication with
                                  Compensation Code in Single Path Global
                                  Instruction Scheduling . . . . . . . . . 200
           Sid Ahmed Ali Touati   Register Saturation in Superscalar and
                                  VLIW Codes . . . . . . . . . . . . . . . 213
                John Aycock and   
                 Nigel Horspool   Directly-Executable Earley Parsing . . . 229
       Jacques Farré and   
José Fortes Gálvez   A Bounded Graph-Connect Construction for
                                  LR-regular Parsers . . . . . . . . . . . 244
         Mahmut Taylan Kandemir   Array Unification: a Locality
                                  Optimization Technique . . . . . . . . . 259
           Guilherme Ottoni and   
                Sandro Rigo and   
               Guido Araujo and   
    Subramanian Rajagopalan and   
                   Sharad Malik   Optimal Live Range Merge for Address
                                  Register Allocation in Embedded Programs 274
         Artour Stoutchinin and   
  José Nelson Amaral and   
               Guang R. Gao and   
           James C. Dehnert and   
                Suneel Jain and   
                 Alban Douillet   Speculative Prefetching of Induction
                                  Pointers . . . . . . . . . . . . . . . . 289
               Fridtjof Siebert   Constant-Time Root Scanning for
                                  Deterministic Garbage Collection . . . . 304
            Scott Watterson and   
                  Saumya Debray   Goal-Directed Value Profiling  . . . . . 319
         Patrice Pominville and   
                  Feng Qian and   
     Raja Vallée-Rai and   
             Laurie Hendren and   
                Clark Verbrugge   A Framework for Optimizing Java Using
                                  Attributes . . . . . . . . . . . . . . . 334
            Isabelle Attali and   
             Carine Courbis and   
             Pascal Degenne and   
              Alexandre Fau and   
             Didier Parigot and   
                Claude Pasquier   SmartTools: a Generator of Interactive
                                  Environments Tools . . . . . . . . . . . 355
           Matthias T. Jung and   
                Uwe Kastens and   
        Christian Schindler and   
                Carsten Schmidt   Visual Patterns in the VLEli System  . . 361
     M. G. J. van den Brand and   
             A. van Deursen and   
                 J. Heering and   
              H. A. de Jong and   
                M. de Jonge and   
                 T. Kuipers and   
                   P. Klint and   
                  L. Moonen and   
              P. A. Olivier and   
               J. Scheerder and   
                J. J. Vinju and   
                  E. Visser and   
                      J. Visser   The \sc Asf $+$ SDF Meta-environment: a
                                  Component-Based Language Development
                                  Environment  . . . . . . . . . . . . . . 365--370
                      Anonymous   Author Index . . . . . . . . . . . . . . 371


Lecture Notes in Computer Science
Volume 2028, 2001

              Luca Cardelli and   
                 Giorgio Ghelli   A Query Language Based on the Ambient
                                  Logic  . . . . . . . . . . . . . . . . . 1
               John C. Mitchell   Probabilistic Polynomial-Time Process
                                  Calculus and Security Protocol Analysis  23
    François Pottier and   
           Christian Skalka and   
                    Scott Smith   A Systematic Approach to Static Access
                                  Control  . . . . . . . . . . . . . . . . 30
            Steve Zdancewic and   
                Andrew C. Myers   Secure Information Flow and CPS  . . . . 46
                 Peter Thiemann   Enforcing Safety Properties Using Type
                                  Specialization . . . . . . . . . . . . . 62
                    Peeter Laud   Semantics and Program Analysis of
                                  Computationally Secure Information Flow  77
              Stephanie Weirich   Encoding Intensional Type Analysis . . . 92
               Roland Backhouse   Fusion on Languages  . . . . . . . . . . 107
               Paul Graunke and   
      Shriram Krishnamurthi and   
       Steve Van Der Hoeven and   
             Matthias Felleisen   Programming the Web with High-Level
                                  Programming Languages  . . . . . . . . . 122
              Francesco Ranzato   On the Completeness of Model Checking    137
               Michael Huth and   
           Radha Jagadeesan and   
                  David Schmidt   Modal Transition Systems: a Foundation
                                  for Three-Valued Program Analysis  . . . 155
                Zhendong Su and   
                Alexander Aiken   Entailment with Conditional Equality
                                  Constraints  . . . . . . . . . . . . . . 170
     Markus Müller-Olm and   
            Oliver Rüthing   On the Complexity of Constant
                                  Propagation  . . . . . . . . . . . . . . 190
              Torben Amtoft and   
            Assaf J. Kfoury and   
   Santiago M. Pericas-Geertsen   What Are Polymorphically-Typed Ambients? 206
            Sylvain Conchon and   
        François Pottier   JOIN(X): Constraint-Based Type Inference
                                  for the Join-Calculus  . . . . . . . . . 221
                Pascal Cuoq and   
                    Marc Pouzet   Modular Causality in a Synchronous
                                  Stream Language  . . . . . . . . . . . . 237
           Flemming Nielson and   
                   Helmut Seidl   Control-Flow Analysis in Cubic Time  . . 252
           Gérard Boudol   The Recursive Record Semantics of
                                  Objects Revisited  . . . . . . . . . . . 269
                    Bart Jacobs   A Formalisation of Java's Exception
                                  Mechanism  . . . . . . . . . . . . . . . 284
              Gilles Barthe and   
            Guillaume Dufay and   
              Line Jakubiec and   
           Bernard Serpette and   
     Simão Melo de Sousa   A Formal Executable Semantics of the
                                  JavaCard Platform  . . . . . . . . . . . 302
              John Clements and   
              Matthew Flatt and   
             Matthias Felleisen   Modeling an Algebraic Stepper  . . . . . 320
                 Zhichen Xu and   
                Thomas Reps and   
               Barton P. Miller   Typestate Checking of Machine Code . . . 335
          Shin-ya Katsumata and   
                  Atsushi Ohori   Proof-Directed De-compilation of
                                  Low-Level Code . . . . . . . . . . . . . 352
                 David Monniaux   Backwards Abstract Interpretation of
                                  Probabilistic Programs . . . . . . . . . 367
         Raghavan Komondoor and   
                  Susan Horwitz   Tool Demonstration: Finding Duplicated
                                  Code Using Program Dependences . . . . . 383
               Marco Cadoli and   
                 Andrea Schaerf   Compiling Problem Specifications into
                                  SAT  . . . . . . . . . . . . . . . . . . 387
             Annalisa Bossi and   
              Sandro Etalle and   
               Sabina Rossi and   
                Jan-Georg Smaus   Semantics and Termination of
                                  Simply-Moded Logic Programs with Dynamic
                                  Scheduling . . . . . . . . . . . . . . . 402
               Samir Genaim and   
                 Michael Codish   The $ {\sf Def} $-inite Approach to
                                  Dependency Analysis  . . . . . . . . . . 417
                      Anonymous   Author Index . . . . . . . . . . . . . . 433


Lecture Notes in Computer Science
Volume 2029, 2001

                     Bran Selic   Physical Programming: Beyond Mere Logic  1
           Richard F. Paige and   
            Jonathan S. Ostroff   Metamodelling and Conformance Checking
                                  with PVS . . . . . . . . . . . . . . . . 2
                 Tony Clark and   
                 Andy Evans and   
                    Stuart Kent   The Metamodelling Language Calculus:
                                  Foundation Semantics for UML . . . . . . 17
                Ralf Pinger and   
             Hans-Dieter Ehrich   Compositional Checking of Communication
                                  among Observers  . . . . . . . . . . . . 32
                Joy N. Reed and   
               Jane E. Sinclair   Combining Independent Specifications . . 45
            Paola Inverardi and   
              Sebastian Uchitel   Proving Deadlock Freedom in
                                  Component-Based Programming  . . . . . . 60
                 Rik Eshuis and   
                  Roel Wieringa   A Real-Time Execution Semantics for UML
                                  Activity Diagrams  . . . . . . . . . . . 76
            Clemens Fischer and   
 Ernst-Rüdiger Olderog and   
                 Heike Wehrheim   A CSP View on UML--RT Structure Diagrams 91
               Reiko Heckel and   
                   Stefan Sauer   Strengthening UML Collaboration Diagrams
                                  by State Transformations . . . . . . . . 109
           Christine Choppy and   
              Pascal Poizat and   
              Jean-Claude Royer   Specification of Mixed Systems in
                                  KORRIGAN with the Support of a
                                  UML-Inspired Graphical Notation  . . . . 124
                Perdita Stevens   On Use Cases and Their Relationships in
                                  the Unified Modelling Language . . . . . 140
          Francis Bordeleau and   
          Jean-Pierre Corriveau   On the Importance of Inter-scenario
                                  Relationships in Hierarchical State
                                  Machine Design . . . . . . . . . . . . . 156
              Gianna Reggio and   
              Maura Cerioli and   
               Egidio Astesiano   Towards a Rigorous Semantics of UML
                                  Supporting Its Multiview Approach  . . . 171
               Jan Jürjens   Towards Development of Secure Systems
                                  Using UMLsec . . . . . . . . . . . . . . 187
               Ralf Lämmel   Grammar Testing  . . . . . . . . . . . . 201
             Alexey Loginov and   
              Suan Hsi Yong and   
              Susan Horwitz and   
                    Thomas Reps   Debugging via Run-Time Type Checking . . 217
               Oliver Niese and   
           Bernhard Steffen and   
           Tiziana Margaria and   
            Andreas Hagerer and   
                Georg Brune and   
                Hans-Dieter Ide   Library-Based Design and Consistency
                                  Checking of System-Level Industrial Test
                                  Cases  . . . . . . . . . . . . . . . . . 233
               Oliver Niese and   
           Markus Nagelmann and   
            Andreas Hagerer and   
Klaus Kolodziejczyk-Strunck and   
             Werner Goerigk and   
             Andrei Erochok and   
            Bernhard Hammelmann   Demonstration of an Automated Integrated
                                  Testing Environment for CTI Systems  . . 249
         Lutz Schröder and   
           Till Mossakowski and   
           Andrzej Tarlecki and   
                Bartek Klin and   
                  Piotr Hoffman   Semantics of Architectural
                                  Specifications in CASL . . . . . . . . . 253
           Till Mossakowski and   
             Serge Autexier and   
                  Dieter Hutter   Extending Development Graphs with Hiding 269
                Bart Jacobs and   
                      Erik Poll   A Logic for the Java Modeling Language
                                  JML  . . . . . . . . . . . . . . . . . . 284
              Bernhard Reus and   
             Martin Wirsing and   
                 Rolf Hennicker   A Hoare Calculus for Verifying Java
                                  Realizations of OCL-Constrained Design
                                  Models . . . . . . . . . . . . . . . . . 300
          Natasha Sharygina and   
            James C. Browne and   
              Robert P. Kurshan   A Formal Object-Oriented Analysis for
                                  Software Reliability: Design for
                                  Verification . . . . . . . . . . . . . . 318
  Peter Csaba Ölveczky and   
                Mark Keaton and   
       José Meseguer and   
            Carolyn Talcott and   
                   Steve Zabele   Specification and Analysis of the
                                  AER/NCA Active Network Protocol Suite in
                                  Real-Time Maude  . . . . . . . . . . . . 333
                      Anonymous   Author Index . . . . . . . . . . . . . . 349


Lecture Notes in Computer Science
Volume 2030, 2001

             Gordon Plotkin and   
                     John Power   Adequacy for Algebraic Effects . . . . . 1
        Martín Abadi and   
                 Bruno Blanchet   Secrecy Types for Asymmetric
                                  Communication  . . . . . . . . . . . . . 25
                 Luca Aceto and   
  Zoltán Ésik and   
Anna Ingólfsdóttir   Axiomatizing Tropical Semirings  . . . . 42
              Gilles Barthe and   
                   Olivier Pons   Type Isomorphisms and Proof Reuse in
                                  Dependent Type Theory  . . . . . . . . . 57
              Michel Bidoit and   
             Rolf Hennicker and   
                 Alexander Kurz   On the Duality between Observability and
                                  Reachability . . . . . . . . . . . . . . 72
           Miko\laj Boja\'nczyk   The Finite Graph Problem for Two-Way
                                  Alternating Automata . . . . . . . . . . 88--103
       Maria Grazia Buscemi and   
              Vladimiro Sassone   High-Level Petri Nets as Type Theories
                                  in the Join Calculus . . . . . . . . . . 104
                 Nadia Busi and   
           Roberto Gorrieri and   
            Gianluigi Zavattaro   Temporary Data in Shared Dataspace
                                  Coordination Languages . . . . . . . . . 121
         Cristiano Calcagno and   
               Peter W. O'Hearn   On Garbage and Program Logic . . . . . . 137
          Witold Charatonik and   
          Silvano Dal Zilio and   
           Andrew D. Gordon and   
      Supratik Mukhopadhyay and   
               Jean-Marc Talbot   The Complexity of Model Checking Mobile
                                  Ambients . . . . . . . . . . . . . . . . 152
            Horatiu Cirstea and   
            Claude Kirchner and   
                  Luigi Liquori   The Rho Cube . . . . . . . . . . . . . . 168
                    Mario Coppo   Type Inference with Recursive Type
                                  Equations  . . . . . . . . . . . . . . . 184
             Ir\`ene Durand and   
                Aart Middeldorp   On the Modularity of Deciding
                                  Call-by-Need . . . . . . . . . . . . . . 199
   Valérie Gouranton and   
         Pierre Réty and   
                   Helmut Seidl   Synchronized Tree Languages Revisited
                                  and New Applications . . . . . . . . . . 214
             Annegret Habel and   
                   Detlef Plump   Computational Completeness of
                                  Programming Languages Based on Graph
                                  Transformation . . . . . . . . . . . . . 230
          Masahito Hasegawa and   
             Yoshihiko Kakutani   Axioms for Recursion in Call-by-Value    246
              Thomas Jensen and   
                   Fausto Spoto   Class Analysis of Object-Oriented
                                  Programs through Abstract Interpretation 261
               Valerie King and   
             Orna Kupferman and   
                 Moshe Y. Vardi   On the Complexity of Parity Word
                                  Automata . . . . . . . . . . . . . . . . 276
                Manuel Koch and   
           Luigi V. Mancini and   
      Francesco Parisi-Presicce   Foundations for a Graph-Based Approach
                                  to the Specification of Access Control
                                  Policies . . . . . . . . . . . . . . . . 287
              Sava Krsti\'c and   
            John Launchbury and   
             Du\vsko Pavlovi\'c   Categories of Processes Enriched in
                                  Final Coalgebras . . . . . . . . . . . . 303
François Laroussinie and   
             Nicolas Markey and   
           Philippe Schnoebelen   Model Checking $ {\mathrm {CTL}}^+ $ and
                                  $ {\mathrm {FCTL}} $ is Hard . . . . . . 318
              Rémi Morin   On Regular Message Sequence Chart
                                  Languages and Relationships to
                                  Mazurkiewicz Trace Theory  . . . . . . . 332
                  Tobias Nipkow   Verified Bytecode Verifiers  . . . . . . 347
       Christine Röckl and   
          Daniel Hirschkoff and   
               Stefan Berghofer   Higher-Order Abstract Syntax with
                                  Induction in Isabelle/HOL: Formalizing
                                  the $ \pi $-Calculus and Mechanizing the
                                  Theory of Contexts . . . . . . . . . . . 364
                 Colin Stirling   Decidability of Weak Bisimilarity for a
                                  Subset of Basic Parallel Processes . . . 379
                    Simone Tini   An Axiomatic Semantics for the
                                  Synchronous Language Gentzen . . . . . . 394
         Dominique Ambroise and   
        Patrick Augé and   
            Kamel Bouchefra and   
                 Brigitte Rozoy   \sc Marrella and the Verification of an
                                  Embedded System  . . . . . . . . . . . . 409--412
                      Anonymous   Author Index . . . . . . . . . . . . . . 413


Lecture Notes in Computer Science
Volume 2031, 2001

                 Moshe Y. Vardi   Branching vs. Linear Time: Final
                                  Showdown . . . . . . . . . . . . . . . . 1
             Michael P. Fourman   Propositional Reasoning  . . . . . . . . 23
               Bernd Finkbeiner   Language Containment Checking with
                                  Nondeterministic BDDs  . . . . . . . . . 24
    Poul Frederick Williams and   
       Henrik Reif Andersen and   
                Henrik Hulgaard   Satisfiability Checking Using Boolean
                                  Expression Diagrams  . . . . . . . . . . 39
         Tuba Yavuz-Kahveci and   
               Murat Tuncer and   
                  Tevfik Bultan   A Library for Composite Symbolic
                                  Representations  . . . . . . . . . . . . 52
    Michael A. Colón and   
                 Henny B. Sipma   Synthesis of Linear Ranking Functions    67
                Amir Pnueli and   
              Sitvanit Ruah and   
                    Lenore Zuck   Automatic Deductive Verification with
                                  Invisible Invariants . . . . . . . . . . 82
                Y. Lakhnech and   
                S. Bensalem and   
                 S. Berezin and   
                        S. Owre   Incremental Verification by Abstraction  98
                  A. Tiwari and   
              H. Rueß and   
                H. Sa\"\idi and   
                     N. Shankar   A Technique for Invariant Generation . . 113
         Roberto Sebastiani and   
          Alessandro Tomasi and   
             Fausto Giunchiglia   Model Checking Syllabi and Student
                                  Carreers . . . . . . . . . . . . . . . . 128
                   Xiang Fu and   
              Tevfik Bultan and   
               Richard Hull and   
                     Jianwen Su   Verification of Vortex Workflows . . . . 143
                Thomas Ball and   
                Sagar Chaki and   
             Sriram K. Rajamani   Parameterized Verification of
                                  Multithreaded Software Libraries . . . . 158
              Gerd Behrmann and   
             Ansgar Fehnker and   
                Thomas Hune and   
                     Kim Larsen   Efficient Guiding Towards
                                  Cost-Optimality in UPPAAL  . . . . . . . 174
              of Timed Automata   Linear Parametric Model Checking of
                                  Timed Automata . . . . . . . . . . . . . 189
                  S. Andova and   
                J. C. M. Baeten   Abstraction in Probabilistic Process
                                  Algebra  . . . . . . . . . . . . . . . . 204
     Stochastic Process Algebra   First Passage Time Analysis of
                                  Stochastic Process Algebra Using Partial
                                  Orders . . . . . . . . . . . . . . . . . 220
               Alan Mycroft and   
                  Richard Sharp   Hardware/Software Co-Design Using
                                  Functional Languages . . . . . . . . . . 236
              Miroslav N. Velev   Automatic Abstraction of Memories in the
                                  Formal Verification of Superscalar
                                  Microprocessors  . . . . . . . . . . . . 252
                Thomas Ball and   
           Andreas Podelski and   
             Sriram K. Rajamani   Boolean and Cartesian Abstraction for
                                  Model Checking C Programs  . . . . . . . 268
        Corina S. Pasareanu and   
           Matthew B. Dwyer and   
                  Willem Visser   Finding Feasible Counter-examples when
                                  Model Checking Abstracted Java Programs  284
       Joachim van den Berg and   
                    Bart Jacobs   The LOOP Compiler for Java and JML . . . 299
         Alessandro Cimatti and   
               Marco Roveri and   
            Piergiorgio Bertoli   Searching Powerset Automata by Combining
                                  Explicit-State and Symbolic Model
                                  Checking . . . . . . . . . . . . . . . . 313
          Gianfranco Ciardo and   
        Gerald Lüttgen and   
               Radu Siminiceanu   Saturation: An Efficient Iteration
                                  Strategy for Symbolic State-Space
                                  Generation . . . . . . . . . . . . . . . 328
              Brian Nielsen and   
                      Arne Skou   Automated Test Generation from Timed
                                  Automata . . . . . . . . . . . . . . . . 343
               Sarfraz Khurshid   Testing an Intentional Naming Scheme
                                  Using Genetic Algorithms . . . . . . . . 358
              Filippo Ricca and   
                  Paolo Tonella   Building a Tool for the Analysis and
                                  Testing of Web Applications: Problems
                                  and Solutions  . . . . . . . . . . . . . 373
             Amie L. Souter and   
            Tiffany M. Wong and   
           Stacey A. Shindo and   
                Lori L. Pollock   TATOO: \em Testing and \em Analysis \em
                                  Tool for \em Object-\em Oriented
                                  Software . . . . . . . . . . . . . . . . 389--403
             Marsha Chechik and   
             Benet Devereux and   
              Steve Easterbrook   Implementing a Multi-valued Symbolic
                                  Model Checker  . . . . . . . . . . . . . 404
               Kathi Fisler and   
                Ranan Fraer and   
         GilaKamhi Y. Vardi and   
                   Zijiang Yang   Is There a Best Symbolic Cycle-Detection
                                  Algorithm? . . . . . . . . . . . . . . . 420
             Bounded Petri Nets   Combining Structural and Enumerative
                                  Techniques for the Validation of Bounded
                                  Petri Nets . . . . . . . . . . . . . . . 435
   Sòren Christensen and   
    Lars Michael Kristensen and   
                 Thomas Mailund   A Sweep-Line Method for State Space
                                  Exploration  . . . . . . . . . . . . . . 450
                  Nina Amla and   
           E. Allen Emerson and   
             Kedar Namjoshi and   
                Richard Trefler   Assume-Guarantee Based Compositional
                                  Reasoning for Synchronous Timing
                                  Diagrams . . . . . . . . . . . . . . . . 465
                     Li Tan and   
               Rance Cleaveland   Simulation Revisited . . . . . . . . . . 480
             Elsa L. Gunter and   
              Anca Muscholl and   
                 Doron A. Peled   Compositional Message Sequence Charts    496
               Jochen Klose and   
                 Hartmut Wittke   An Automata Based Interpretation of Live
                                  Sequence Charts  . . . . . . . . . . . . 512
              Hana Chockler and   
             Orna Kupferman and   
                 Moshe Y. Vardi   Coverage Metrics for Temporal Logic
                                  Model Checking . . . . . . . . . . . . . 528
            Benedikt Bollig and   
             Martin Leucker and   
                  Michael Weber   Parallel Model Checking for the
                                  Alternation Free $ \mu $-Calculus  . . . 543--558
             Paritosh K. Pandya   Model Checking CTL*[DC]  . . . . . . . . 559
     Michel Beaudouin-Lafon and   
            Wendy E. Mackay and   
                Mads Jensen and   
             Peter Andersen and   
               Paul Janecek and   
             Michael Lassen and   
                Kasper Lund and   
            Kjeld Mortensen and   
            Stephanie Munck and   
                Anne Ratzer and   
               Katrine Ravn and   
   Sòren Christensen and   
                    Kurt Jensen   CPN/Tools: a Tool for Editing and
                                  Simulating Coloured Petri Nets ETAPS
                                  Tool Demonstration Related to TACAS  . . 574--577
          Giuseppe Del Castillo   The ASM Workbench --- A Tool Environment
                                  for Computer-Aided Analysis and
                                  Validation of Abstract State Machine
                                  Models Tool Demonstration  . . . . . . . 578
                Thomas Noll and   
    Lars-åke Fredlund and   
                   Dilian Gurov   The Erlang Verification Tool . . . . . . 582
                      Anonymous   Author Index . . . . . . . . . . . . . . 587


Lecture Notes in Computer Science
Volume 2032, 2001

       Steven S. Beauchemin and   
                  Ruzena Bajcsy   Modelling and Removing Radial and
                                  Tangential Distortions in Spherical
                                  Lenses . . . . . . . . . . . . . . . . . 1
    Cornelia Fermüller and   
              Yiannis Aloimonos   Geometry of Eye Design: Biology and
                                  Technology . . . . . . . . . . . . . . . 22
                  Fay Huang and   
              Shou Kang Wei and   
                Reinhard Klette   Epipolar Geometry in Polycentric
                                  Panoramas  . . . . . . . . . . . . . . . 39
              Reinhard Koch and   
                Benno Heigl and   
                 Marc Pollefeys   Image-Based Rendering from Uncalibrated
                                  Lightfields with Scalable Geometry . . . 51
                    Ralf Reulke   Recent Progress in Digital
                                  Photogrammetric Stereo Cameras and Data
                                  Evaluation . . . . . . . . . . . . . . . 67
              Shou Kang Wei and   
                  Fay Huang and   
                Reinhard Klette   Classification and Characterization of
                                  Image Acquisition for $3$D Scene
                                  Visualization and Reconstruction
                                  Applications . . . . . . . . . . . . . . 81
           Michael Felsberg and   
                  Gerald Sommer   Structure Multivector for Local Analysis
                                  of Images  . . . . . . . . . . . . . . . 93
          Georgy Gimel'farb and   
                     Jian Zhong   Matching Multiple Views by the Least
                                  Square Correlation . . . . . . . . . . . 105
         Volker Krüger and   
                  Gerald Sommer   Gabor Wavelet Networks for Object
                                  Representation . . . . . . . . . . . . . 115
          Yoav Y. Schechner and   
              Nahum Kiryati and   
                  Joseph Shamir   Multi-valued Images and Their Separation 129
                   Roy Shor and   
                  Nahum Kiryati   Towards Segmentation from Multiple Cues:
                                  Symmetry and Color . . . . . . . . . . . 142
              Gerald Sommer and   
             Bodo Rosenhahn and   
                    Yiwen Zhang   Pose Estimation Using Geometric
                                  Constraints  . . . . . . . . . . . . . . 153
             John L. Barron and   
                    Hagen Spies   The Fusion of Image and Range Flow . . . 171
     Claus-Ebergard Liedtke and   
                   Stefan Growe   Knowledge-Based Concepts for the Fusion
                                  of Multisensor and Multitemporal Aerial
                                  Images . . . . . . . . . . . . . . . . . 190
                Josef Pauli and   
                  Gerald Sommer   Ellipsoidal Bias in Learning
                                  Appearance-Based Recognition Functions   201
           Sofia Tsekeridou and   
           Stelios Krinidis and   
                  Ioannis Pitas   Scene Change Detection Based on
                                  Audio-Visual Analysis and Interaction    214
            Kiyoharu Aizawa and   
               Akira Kubota and   
                  Kazuya Kodama   Implicit $3$D Approach to Image
                                  Generation: Object-Based Visual Effects
                                  by Linear Processing of Multiple
                                  Differently Focused Images . . . . . . . 226
               Kap Luk Chan and   
              Xuejian Xiong and   
                    Fan Liu and   
                  Ricky Purnomo   Content-Based Image Retrieval Using
                                  Regional Representation  . . . . . . . . 238
              Chia-Yen Chen and   
            Radim \vSára   Integration of Photometric Stereo and
                                  Shape from Occluding Contours by Fusing
                                  Orientation and Depth Data . . . . . . . 251
            Eun-Jung Holden and   
                    Robyn Owens   Visual Sign Language Recognition . . . . 270
                      Anonymous   Author Index . . . . . . . . . . . . . . 289


Lecture Notes in Computer Science
Volume 2033, 2001

                 Jiming Liu and   
                      Yiming Ye   Introduction to E-Commerce Agents:
                                  Marketplace Solutions, Security Issues,
                                  and Supply and Demand  . . . . . . . . . 1
              Gaurav Tewari and   
                    Pattie Maes   A Generalized Platform for the
                                  Specification, Valuation, and Brokering
                                  of Heterogeneous Resources in Electronic
                                  Markets  . . . . . . . . . . . . . . . . 7
           Giorgos Zacharia and   
         Theodoros Evgeniou and   
          Alexandros Moukas and   
           Petros Boufounos and   
                    Pattie Maes   Economics of Dynamic Pricing in a
                                  Reputation Brokered Agent Mediated
                                  Marketplace  . . . . . . . . . . . . . . 25
      Georgia Pinto Barbosa and   
              Fabio Q. B. Silva   An Electronic Marketplace Architecture
                                  Based on Technology of Intelligent
                                  Agents and Knowledge . . . . . . . . . . 39
             Isabel Gallego and   
                  Jaime Delgado   Modelling Broker Agents in Electronic
                                  Commerce of Multimedia Products and
                                  Services . . . . . . . . . . . . . . . . 61
             Kwang Mong Sim and   
                   Raymond Chan   A Brokering Protocol for Electronic
                                  Trading  . . . . . . . . . . . . . . . . 82
            Steven Gjerstad and   
                  John Dickhaut   Price Formation in Double Auctions . . . 106
                  P. W. Lei and   
              M. I. Heywood and   
                  C. R. Chatwin   Negotiating Agents in Manufacturing
                                  Decision Making Processes  . . . . . . . 135
                 Lars Rasmusson   Evaluating Resource Bundle Derivatives
                                  for Multi-agent Negotiation of Resource
                                  Allocation . . . . . . . . . . . . . . . 154
    Stéphane H. Maes and   
Ji\vrí Navrátil and   
           Upendra V. Chaudhari   Conversational Speech Biometrics . . . . 166
            Joris Claessens and   
               Bart Preneel and   
                Joos Vandewalle   Secure Communication for Secure
                                  Agent-Based Electronic Commerce
                                  Applications . . . . . . . . . . . . . . 180
                  Ding Peng and   
                    Shi Jun and   
              Sheng Huan Ye and   
                      Liming Lu   MA/LMA Architecture for Dealing with
                                  Malicious Agents in Agent-Mediated
                                  Electronic Markets . . . . . . . . . . . 191
         Artur Romão and   
           Miguel Mira da Silva   Secure Mobile Agent Digital Signatures
                                  with Proxy Certificates  . . . . . . . . 206
                     Xun Yi and   
           Chee Kheong Siew and   
                      Yuan Miao   Agent-Mediated Secure Electronic
                                  Transaction for Online Interdependent
                                  Purchases  . . . . . . . . . . . . . . . 221
                  T. O. Lee and   
                  Y. L. Yip and   
                C. M. Tsang and   
                       K. W. Ng   An Agent-Based Micropayment System for
                                  E-Commerce . . . . . . . . . . . . . . . 247
               Suresh Chari and   
             Parviz Kermani and   
                 Sean Smith and   
             Leandros Tassiulas   Security Issues in M-Commerce: a
                                  Usage-Based Taxonomy . . . . . . . . . . 264
              Seng Wai Loke and   
               Arkady Zaslavsky   Towards Distributed Workflow Enactment
                                  with Itineraries and Mobile Agent
                                  Management . . . . . . . . . . . . . . . 283
             Huaglory Tianfield   Enterprise Federation and Its
                                  Multi-agent Modelization . . . . . . . . 295
                 Xindong Wu and   
                 Daniel Ngu and   
              Sameer S. Pradhan   User-Centered Agents for Structured
                                  Information Location . . . . . . . . . . 323
               Marie Devlin and   
                    Terri Scott   Using a Speech Technology Agent as an
                                  Interface for E-Commerce . . . . . . . . 332
                      Anonymous   Author Index . . . . . . . . . . . . . . 347


Lecture Notes in Computer Science
Volume 2034, 2001

                 Manfred Morari   Control as an Embedded Technology  . . . 1
           Costas C. Pantelides   Optimisation of Hybrid Processes and
                                  Hybrid Controllers . . . . . . . . . . . 3
             Janos Sztipanovits   Embedded Software and Systems:
                                  Challenges and Approaches  . . . . . . . 4
Alberto Sangiovanni-Vincentelli and   
        Thomas A. Henzinger and   
             Bruce H. Krogh and   
                 Oded Maler and   
             Manfred Morari and   
       Costas C. Pantelides and   
           George J. Pappas and   
                Tunc Simsec and   
         Janos Sztipanovits and   
               Stavros Tripakis   Hybrid Systems Applications: An
                                  Oxymoron?  . . . . . . . . . . . . . . . 5--6
              A. Alessandri and   
                     P. Coletta   Design of Luenberger Observers for a
                                  Class of Hybrid Linear Systems . . . . . 7
                Rajeev Alur and   
                Calin Belta and   
         Franjo Ivan\vci\'c and   
                Vijay Kumar and   
                  Max Mintz and   
           George J. Pappas and   
               Harvey Rubin and   
                 Jonathan Schug   Hybrid Modeling and Simulation of
                                  Biomolecular Networks  . . . . . . . . . 19
                Rajeev Alur and   
                 Radu Grosu and   
                  Insup Lee and   
                  Oleg Sokolsky   Compositional Refinement for
                                  Hierarchical Hybrid Systems  . . . . . . 33
                Rajeev Alur and   
         Salvatore La Torre and   
               George J. Pappas   Optimal Paths in Weighted Timed Automata 49
              Hirokazu Anai and   
            Volker Weispfenning   Reach Set Computations Using Real
                                  Quantifier Elimination . . . . . . . . . 63
              Eugene Asarin and   
               Sorav Bansal and   
             Bernard Espiau and   
                  Thao Dang and   
                     Oded Maler   On Hybrid Control of Under-Actuated
                                  Mechanical Systems . . . . . . . . . . . 77
              Eugene Asarin and   
          Gerardo Schneider and   
                  Sergio Yovine   On the Decidability of the Reachability
                                  Problem for Planar Differential
                                  Inclusions . . . . . . . . . . . . . . . 89
         Hybrid Control Systems   The Substratum of Impulse and Hybrid
                                  Control Systems  . . . . . . . . . . . . 105
          Jean-Pierre Aubin and   
                  George Haddad   Path-Dependent Impulse and Hybrid
                                  Systems  . . . . . . . . . . . . . . . . 119
            Andrea Balluchi and   
         Philippe Sou\`eres and   
                 Antonio Bicchi   Hybrid Feedback Control for Path
                                  Tracking by a Bounded-Curvature Vehicle  133
              Gerd Behrmann and   
             Ansgar Fehnker and   
                Thomas Hune and   
                 Kim Larsen and   
            Paul Pettersson and   
                Judi Romijn and   
               Frits Vaandrager   Minimum-Cost Reachability for Priced
                                  Timed Automata . . . . . . . . . . . . . 147
         Francesco Borrelli and   
           Alberto Bemporad and   
              Michael Fodor and   
                   Davor Hrovat   A Hybrid Approach to Traction Control    162
           Mireille Broucke and   
Maria Domenica Di Benedetto and   
         Stefano Di Gennaro and   
Alberto Sangiovanni-Vincentelli   Optimal Control Using Bisimulations:
                                  Implementation . . . . . . . . . . . . . 175
Francesco Alessandro Cuzzola and   
                 Manfred Morari   A Generalized Approach for Analysis and
                                  Control of Discrete-Time Piecewise
                                  Affine and Hybrid Systems  . . . . . . . 189
           Joel M. Esposito and   
                Vijay Kumar and   
               George J. Pappas   Accurate Event Detection for Simulating
                                  Hybrid Systems . . . . . . . . . . . . . 204
  Giancarlo Ferrari-Trecate and   
              Marco Muselli and   
             Diego Liberati and   
                 Manfred Morari   A Clustering Technique for the
                                  Identification of Piecewise Affine
                                  Systems  . . . . . . . . . . . . . . . . 218
              Ronojoy Ghosh and   
               Claire J. Tomlin   Lateral Inhibition through Delta-Notch
                                  Signaling: a Piecewise Affine Hybrid
                                  Model  . . . . . . . . . . . . . . . . . 232
José M. E. González and   
     Antonio E. C. da Cunha and   
     José E. R. Cury and   
                 Bruce H. Krogh   Supervision of Event-Driven Hybrid
                                  Systems: Modeling and Synthesis  . . . . 247
     Luc C. G. J. M. Habets and   
            Jan H. van Schuppen   Control of Piecewise-Linear Hybrid
                                  Systems on Simplices and Rectangles  . . 261
        Thomas A. Henzinger and   
               Marius Minea and   
                 Vinayak Prabhu   Assume-Guarantee Reasoning for
                                  Hierarchical Hybrid Systems  . . . . . . 275
    João P. Hespanha and   
            Stephan Bohacek and   
             Katia Obraczka and   
                     Junsoo Lee   Hybrid Modeling of TCP Congestion
                                  Control  . . . . . . . . . . . . . . . . 291
                Jianghai Hu and   
             Maria Prandini and   
      Karl Henrik Johansson and   
                 Shankar Sastry   Hybrid Geodesics as Optimal Solutions to
                                  the Collision-Free Motion Planning
                                  Problem  . . . . . . . . . . . . . . . . 305
              Jens Kalkkuhl and   
          Tor Arne Johansen and   
         Jens Lüdemann and   
                  Andreas Queda   Nonlinear Adaptive Backstepping with
                                  Estimator Resetting Using Multiple
                                  Observers  . . . . . . . . . . . . . . . 319
                T. John Koo and   
           George J. Pappas and   
                 Shankar Sastry   Mode Switching Synthesis for
                                  Reachability Specifications  . . . . . . 333
      Xenofon D. Koutsoukos and   
             Panos J. Antsaklis   Characterization of Stabilizing
                                  Switching Sequences in Switched Linear
                                  Systems Using Piecewise Linear Lyapunov
                                  Functions  . . . . . . . . . . . . . . . 347
               P. Kowalczyk and   
                 M. di Bernardo   On a Novel Class of Bifurcations in
                                  Hybrid Dynamical Systems . . . . . . . . 361
         Ekaterina S. Lemch and   
             Shankar Sastry and   
                Peter E. Caines   Global Controllability of Hybrid Systems
                                  with Controlled and Autonomous
                                  Switchings . . . . . . . . . . . . . . . 375
                Vishal Bahl and   
           Andreas A. Linninger   Modeling of Continuous-Discrete
                                  Processes  . . . . . . . . . . . . . . . 387
                Nancy Lynch and   
             Roberto Segala and   
               Frits Vaandrager   Hybrid I/O Automata Revisited  . . . . . 403
               Ivar Ekeland and   
                    Roger Temam   Hamiltonian Mechanics 2  . . . . . . . . 418
                Thomas Moor and   
                  J. M. Davoren   Robust Controller Synthesis for Hybrid
                                  Systems Using Modal Logic  . . . . . . . 433
            Pieter J. Mosterman   Diagnosis of Physical Systems with
                                  Hybrid Models Using Parametrized
                                  Causality  . . . . . . . . . . . . . . . 447
                Meeko Oishi and   
           Claire J. Tomlin and   
                Vipin Gopal and   
                  Datta Godbole   Addressing Multiobjective Control:
                                  Safety and Performance through
                                  Constrained Optimization . . . . . . . . 459
       Jochen Schröder and   
                      Jan Lunze   Representation of Quantised Systems by
                                  the Frobenius--Perron Operator . . . . . 473
             Omid Shakernia and   
           George J. Pappas and   
                 Shankar Sastry   Semi-decidable Synthesis for Triangular
                                  Hybrid Systems . . . . . . . . . . . . . 487
              Paulo Tabuada and   
               George J. Pappas   Hybrid Abstractions that Preserve Timed
                                  Languages  . . . . . . . . . . . . . . . 501
                      Anonymous   Author Index . . . . . . . . . . . . . . 515


Lecture Notes in Computer Science
Volume 2035, 2001

Hosagrahar Visvesvaraya Jagadish   Incompleteness in Data Mining  . . . . . 1
                   Ronny Kohavi   Mining E-Commerce Data: The Good, the
                                  Bad, and the Ugly  . . . . . . . . . . . 2
                     Hongjun Lu   Seamless Integration of Data Mining with
                                  DBMS and Applications  . . . . . . . . . 3
             Chia-Hui Chang and   
              Shao-Chen Lui and   
                    Yen-Chin Wu   Applying Pattern Mining to Web
                                  Information Extraction . . . . . . . . . 4
           Vijay S. Iyengar and   
                     Tong Zhang   Empirical Study of Recommender Systems
                                  Using Linear Classifiers . . . . . . . . 16
          Raymond S. T. Lee and   
                James N. K. Liu   iJADE eMiner --- A Web-Based Mining
                                  Agent Based on Intelligent Java Agent
                                  Development Environment (iJADE) on
                                  Internet Shopping  . . . . . . . . . . . 28
              Yao-Tsung Lin and   
             Shian-Shyong Tseng   A Characterized Rating Recommend System  41
         Tetsuhiro Miyahara and   
          Takayoshi Shoudai and   
            Tomoyuki Uchida and   
          Kenichi Takahashi and   
                   Hiroaki Ueda   Discovery of Frequent Tree Structured
                                  Patterns in Semistructured Web Documents 47
         Eui-Hong (Sam) Han and   
             George Karypis and   
                    Vipin Kumar   Text Categorization Using Weight
                                  Adjusted $k$-Nearest Neighbor
                                  Classification . . . . . . . . . . . . . 53
                    Ah-Hwee Tan   Predictive Self-Organizing Networks for
                                  Text Categorization  . . . . . . . . . . 66
               Kwok-Yin Lai and   
                        Wai Lam   Meta-learning Models for Automatic
                                  Textual Document Categorization  . . . . 78
                Chi Yuen Ng and   
                 Joseph Lee and   
               Felix Cheung and   
                    Ben Kao and   
                   David Cheung   Efficient Algorithms for Concept Space
                                  Construction . . . . . . . . . . . . . . 90
       Kanagasabi Rajaraman and   
                    Ah-Hwee Tan   Topic Detection, Tracking, and Trend
                                  Analysis Using Self-Organizing Neural
                                  Networks . . . . . . . . . . . . . . . . 102
            Hsin-Chang Yang and   
                 Chung-Hong Lee   Automatic Hypertext Construction through
                                  a Text Mining Approach by
                                  Self-Organizing Maps . . . . . . . . . . 108
               Boon-Toh Low and   
                    Ki Chan and   
               Lei-Lei Choi and   
               Man-Yee Chin and   
                   Sin-Ling Lay   Semantic Expectation-Based Causation
                                  Knowledge Extraction: a Study on Hong
                                  Kong Stock Movement Analysis . . . . . . 114
             Ole M. Nielsen and   
             Peter Christen and   
             Markus Hegland and   
           Tatiana Semenova and   
                Timothy Hancock   A Toolbox Approach to Flexible and
                                  Efficient Data Mining  . . . . . . . . . 124
              Andrew Turpin and   
                 Eibe Frank and   
                  Mark Hall and   
              Ian H. Witten and   
               Chris A. Johnson   Determining Progression in Glaucoma
                                  Using Visual Fields  . . . . . . . . . . 136
         Russell J. Kennett and   
              Kevin B. Korb and   
               Ann E. Nicholson   Seabreeze Prediction Using Bayesian
                                  Networks . . . . . . . . . . . . . . . . 148
               Chun Hung Li and   
                  Pong Chi Yuen   Semi-supervised Learning in Medical
                                  Image Database . . . . . . . . . . . . . 154
              Feng-Hsu Wang and   
                 Shiou-Wen Hung   On Application of Rough Data Mining
                                  Methods to Automatic Construction of
                                  Student Models . . . . . . . . . . . . . 161
                   Keyun Hu and   
                 Yuefei Sui and   
                 Yuchang Lu and   
                    Ju Wang and   
                     Chunyi Shi   Concept Approximation in Concept Lattice 167
                      T. Y. Lin   Generating Concept Hierarchies/Networks:
                                  Mining Additional Semantics in
                                  Relational Data  . . . . . . . . . . . . 174
               Yanee Kachai and   
               Kitsana Waiyamai   Representing Large Concept Hierarchies
                                  Using Lattice Data Structure . . . . . . 186
            Rohan A. Baxter and   
         Graham J. Williams and   
                    Hongxing He   Feature Selection for Temporal Health
                                  Records  . . . . . . . . . . . . . . . . 198
                    Shlomo Geva   Boosting the Performance of Nearest
                                  Neighbour Methods with Feature Selection 210
        Alexandros Kalousis and   
                Melanie Hilario   Feature Selection for Meta-learning  . . 222
                Guozhu Dong and   
             Kaustubh Deshpande   Efficient Mining of Niches and Set
                                  Routines . . . . . . . . . . . . . . . . 234
        Robert J. Hilderman and   
             Howard J. Hamilton   Evaluation of Interestingness Measures
                                  for Ranking Discovered Knowledge . . . . 247
                 Ning Zhong and   
            Muneaki Ohshima and   
                  Setsuo Ohsuga   Peculiarity Oriented Mining and Its
                                  Application for Knowledge Discovery in
                                  Amino-Acid Data  . . . . . . . . . . . . 260
                 Zhenyu Liu and   
              Wesley W. Chu and   
                 Adam Huang and   
                 Chris Folk and   
                   Chih-Ming Ho   Mining Sequence Patterns from Wind
                                  Tunnel Experimental Data for Flight
                                  Control  . . . . . . . . . . . . . . . . 270
              Tadeusz Morzy and   
        Marek Wojciechowski and   
              Maciej Zakrzewicz   Scalable Hierarchical Clustering Method
                                  for Sequences of Categorical Values  . . 282
              Minghua Zhang and   
                    Ben Kao and   
                Chi-Lap Yip and   
                   David Cheung   FFS --- An IO-Efficient Algorithm for
                                  Mining Frequent Sequences  . . . . . . . 294
              Maciej Zakrzewicz   Sequential Index Structure for
                                  Content-Based Retrieval  . . . . . . . . 306
                Haixun Wang and   
              Chang-Shing Perng   The $ S^2 $-Tree: An Index Structure for
                                  Subsequence Matching of Spatial Objects  312--323
               Weiqiang Lin and   
            Mehmet A. Orgun and   
             Graham J. Williams   Temporal Data Mining Using Hidden
                                  Markov-Local Polynomial Models . . . . . 324
              Jeffrey Xu Yu and   
              Michael K. Ng and   
            Joshua Zhexue Huang   Patterns Discovery Based on Time-Series
                                  Decomposition  . . . . . . . . . . . . . 336
   Vladimir Estivill-Castro and   
                 Ickjai Lee and   
                 Alan T. Murray   Criteria on Proximity Graphs for
                                  Boundary Extraction and Spatial
                                  Clustering . . . . . . . . . . . . . . . 348
              Xiao-ming Jin and   
                 Yuchang Lu and   
                     Chunyi Shi   Micro Similarity Queries in Time Series
                                  Database . . . . . . . . . . . . . . . . 358
                 Jiuyong Li and   
                  Hong Shen and   
                   Rodney Topor   Mining Optimal Class Association Rule
                                  Set  . . . . . . . . . . . . . . . . . . 364
             Fan-Chen Tseng and   
                  Ching-Chi Hsu   Generating Frequent Patterns with the
                                  Frequent Pattern List  . . . . . . . . . 376
                    Ke Wang and   
                          Yu He   User-Defined Association Mining  . . . . 387
           Marzena Kryszkiewicz   Direct and Incremental Computing of
                                  Maximal Covering Rules . . . . . . . . . 400
                 Jiming Liu and   
                       Jian Yin   Towards Efficient Data Re-mining (DRM)   406
            Anna M. Manning and   
                  John A. Keane   Data Allocation Algorithm for Parallel
                                  Association Rule Discovery . . . . . . . 413
               Pedro de Almeida   Direct Domain Knowledge Inclusion in the
                                  PA3 Rule Induction Algorithm . . . . . . 421
            Chun-hung Cheng and   
                  Jian Tang and   
            Ada Wai-chee Fu and   
                     Irwin King   Hierarchical Classification of Documents
                                  with Error Control . . . . . . . . . . . 433
         Claudia Diamantini and   
                 Maurizio Panti   An Efficient Data Compression Approach
                                  to the Classification Task . . . . . . . 444
                  Jinyan Li and   
     Kotagiri Ramamohanarao and   
                    Guozhu Dong   Combining the Strength of Pattern
                                  Frequency and Distance for
                                  Classification . . . . . . . . . . . . . 455
          Trong Dung Nguyen and   
                  Tu Bao Ho and   
             Hiroshi Shimodaira   A Scalable Algorithm for Rule
                                  Post-pruning of Large Decision Trees . . 467
        Bernhard Pfahringer and   
            Geoffrey Holmes and   
                 Richard Kirkby   Optimizing the Induction of Alternating
                                  Decision Trees . . . . . . . . . . . . . 477
              Xiuzhen Zhang and   
                Guozhu Dong and   
         Kotagiri Ramamohanarao   Building Behaviour Knowledge Space to
                                  Make Classification Decision . . . . . . 488
            Manoranjan Dash and   
                       Huan Liu   Efficient Hierarchical Clustering
                                  Algorithms Using Partially Overlapping
                                  Partitions . . . . . . . . . . . . . . . 495
               Shoji Hirano and   
           Tomohiro Okuzaki and   
                Yutaka Hata and   
            Shusaku Tsumoto and   
                 Kouhei Tsumoto   A Rough Set-Based Clustering Method with
                                  Modification of Equivalence Relations    507
                   Juha Vesanto   Importance of Individual Variables in
                                  the $k$-Means Algorithm  . . . . . . . . 513
                Aoying Zhou and   
               Weining Qian and   
                Hailei Qian and   
                    Jin Wen and   
              Shuigeng Zhou and   
                         Ye Fan   A Hybrid Approach to Clustering in Very
                                  Large Databases  . . . . . . . . . . . . 519
              Wei-Chou Chen and   
         Shian-Shyong Tseng and   
              Lu-Ping Chang and   
                 Mon-Fong Jiang   A Similarity Indexing Method for the
                                  Data Warehousing --- Bit-Wise Indexing
                                  Method . . . . . . . . . . . . . . . . . 525
                 DaeEun Kim and   
                      Jaeho Lee   Rule Reduction over Numerical Attributes
                                  in Decision Tree Using Multilayer
                                  Perceptron . . . . . . . . . . . . . . . 538
                Takuya Wada and   
             Hiroshi Motoda and   
                 Takashi Washio   Knowledge Acquisition from Both Human
                                  Expert and Data  . . . . . . . . . . . . 550
       Renaud Bassée and   
                     Jef Wijsen   Neighborhood Dependencies for Prediction 562
              Fengzhan Tian and   
                 Yuchang Lu and   
                     Chunyi Shi   Learning Bayesian Networks with Hidden
                                  Variables Using the Combination of EM
                                  and Evolutionary Algorithms  . . . . . . 568
               Jianchao Han and   
                   Nick Cercone   Interactive Construction of Decision
                                  Trees  . . . . . . . . . . . . . . . . . 575
               Huajie Zhang and   
                Charles X. Ling   An Improved Learning Algorithm for
                                  Augmented Naive Bayes  . . . . . . . . . 581
              Liviu Vladutu and   
     Stergios Papadimitriou and   
          Severina Mavroudi and   
          Anastasios Bezerianos   Generalised RBF Networks Trained Using
                                  an IBL Algorithm for Mining Symbolic
                                  Data . . . . . . . . . . . . . . . . . . 587
                      Anonymous   Author Index . . . . . . . . . . . . . . 595


Lecture Notes in Computer Science
Volume 2036, 2001

             Stefan Wermter and   
                 Jim Austin and   
             David Willshaw and   
                    Mark Elshaw   Towards Novel Neuroscience-Inspired
                                  Computing  . . . . . . . . . . . . . . . 1
                 John G. Taylor   Images of the Mind: Brain Images and
                                  Neural Networks  . . . . . . . . . . . . 20
                Silke Dodel and   
        J. Michael Herrmann and   
                    Theo Geisel   Stimulus-Independent Data Analysis for
                                  fMRI . . . . . . . . . . . . . . . . . . 39
            Cornelius Weber and   
                Klaus Obermayer   Emergence of Modularity within One Sheet
                                  of Neurons: A Model Comparison . . . . . 53
            James A. Reggia and   
                Yuri Shkuro and   
              Natalia Shevtsova   Computational Investigation of
                                  Hemispheric Specialization and
                                  Interactions . . . . . . . . . . . . . . 68
                 John Hicks and   
               Padraic Monaghan   Explorations of the Interaction between
                                  Split Processing and Stimulus Types  . . 83
              Joanna Bryson and   
              Lynn Andrea Stein   Modularity and Specialized Learning:
                                  Mapping between Agent Architectures and
                                  Brain Organization . . . . . . . . . . . 98
                   Gustavo Deco   Biased Competition Mechanisms for Visual
                                  Attention in a Multimodular
                                  Neurodynamical System  . . . . . . . . . 114
            Thorsten Hansen and   
              Wolfgang Sepp and   
                  Heiko Neumann   Recurrent Long-Range Interactions in
                                  Early Vision . . . . . . . . . . . . . . 127
            Thorsten Hansen and   
                  Heiko Neumann   Neural Mechanisms for Representing
                                  Surface and Contour Features . . . . . . 139
           Gary G. R. Green and   
                 Will Woods and   
                   S. Manchanda   Representations of Neuronal Models Using
                                  Minimal and Bilinear Realisations  . . . 154
                Ronan G. Reilly   Collaborative Cell Assemblies: Building
                                  Blocks of Cortical Computation . . . . . 161
              Hauke Bartsch and   
             Martin Stetter and   
                Klaus Obermayer   On the Influence of Threshold
                                  Variability in a Mean-Field Model of the
                                  Visual Cortex  . . . . . . . . . . . . . 174
           Alistair G. Rust and   
                  Rod Adams and   
              Stella George and   
                  Hamid Bolouri   Towards Computational Neural Systems
                                  through Developmental Evolution  . . . . 188
   Péter Érdi and   
              Tamás Kiss   The Complexity of the Brain: Structural,
                                  Functional, and Dynamic Modules  . . . . 203
           Simon R. Schultz and   
         Huw D. R. Golledge and   
                Stefano Panzeri   Synchronisation, Binding, and the Role
                                  of Correlated Firing in Fast Information
                                  Transmission . . . . . . . . . . . . . . 212
                James Henderson   Segmenting State into Entities and Its
                                  Implication for Learning . . . . . . . . 227
             Roman Borisyuk and   
            Galina Borisyuk and   
               Yakov Kazanovich   Temporal Structure of Neural Activity
                                  and Modelling of Information Processing
                                  in the Brain . . . . . . . . . . . . . . 237
                  Guido Bugmann   Role of the Cerebellum in Time-Critical
                                  Goal-Oriented Behaviour: Anatomical
                                  Basis and Control Principle  . . . . . . 255
              David C. Sterratt   Locust Olfaction . . . . . . . . . . . . 270
              David M. Halliday   Temporal Coding in Neuronal Populations
                                  in the Presence of Axonal and Dendritic
                                  Conduction Time Delays . . . . . . . . . 285
     Péter András   The Role of Brain Chaos  . . . . . . . . 296
          Ramin Assadollahi and   
   Friedemann Pulvermüller   Neural Network Classification of Word
                                  Evoked Neuromagnetic Brain Activity  . . 311
            Stefano Panzeri and   
            Edmund T. Rolls and   
     Francesco P. Battaglia and   
                     Ruth Lavis   Simulation Studies of the Speed of
                                  Recurrent Processing . . . . . . . . . . 320
              Michael J. Denham   The Dynamics of Learning and Memory:
                                  Lessons from Neuroscience  . . . . . . . 333
               Lokendra Shastri   Biological Grounding of Recruitment
                                  Learning and Vicinal Algorithms in
                                  Long-Term Potentiation . . . . . . . . . 348
                 Gary F. Marcus   Plasticity and Nativism: Towards a
                                  Resolution of an Apparent Paradox  . . . 368
             Christian R. Huyck   Cell Assemblies as an Intermediate Level
                                  Model of Cognition . . . . . . . . . . . 383
                   Marcin Chady   Modelling Higher Cognitive Functions
                                  with Hebbian Cell Assemblies . . . . . . 398
          Andreas Knoblauch and   
              Günther Palm   Spiking Associative Memory and Scene
                                  Segmentation by Synchronization of
                                  Cortical Activity  . . . . . . . . . . . 407
               Rafal Bogacz and   
           Malcolm W. Brown and   
      Christophe Giraud-Carrier   A Familiarity Discrimination Algorithm
                                  Inspired by Computations of the
                                  Perirhinal Cortex  . . . . . . . . . . . 428
                  Hermann Moisl   Linguistic Computation with State Space
                                  Trajectories . . . . . . . . . . . . . . 442
                 Tim Pearce and   
             Paul Verschure and   
                 Joel White and   
                     John Kauer   Robust Stimulus Encoding in Olfactory
                                  Processing: Hyperacuity and Efficient
                                  Signal Transmission  . . . . . . . . . . 461
           Mikel L. Forcada and   
             Rafael C. Carrasco   Finite-State Computation in Analog
                                  Neural Networks: Steps towards
                                  Biologically Plausible Models? . . . . . 480
              Sue L. Denham and   
              Michael J. Denham   An Investigation into the Role of
                                  Cortical Synaptic Depression in Auditory
                                  Processing . . . . . . . . . . . . . . . 494
              John F. Kazer and   
           Amanda J. C. Sharkey   The Role of Memory, Anxiety, and Hebbian
                                  Learning in Hippocampal Function: Novel
                                  Explorations in Computational
                                  Neuroscience and Robotics  . . . . . . . 507
Andrés Pérez-Uribe   Using a Time-Delay Actor-Critic Neural
                                  Architecture with Dopamine-Like
                                  Reinforcement Signal for Learning in
                                  Autonomous Robots  . . . . . . . . . . . 522
             Daniel Kustrin and   
                     Jim Austin   Connectionist Propositional Logic  . . . 534
              Doina Caragea and   
            Adrian Silvescu and   
                 Vasant Honavar   Analysis and Synthesis of Agents That
                                  Learn from Distributed Dynamic Data
                                  Sources  . . . . . . . . . . . . . . . . 547
 Stephen José Hanson and   
            Michiro Negishi and   
               Catherine Hanson   Connectionist Neuroimaging . . . . . . . 560
                      Anonymous   Author Index . . . . . . . . . . . . . . 577


Lecture Notes in Computer Science
Volume 2037, 2001

               Thomas Gaube and   
                 Franz Rothlauf   The Link and Node Biased Encoding
                                  Revisited: Bias and Adjustment of
                                  Parameters . . . . . . . . . . . . . . . 1
                          Yu Li   An Effective Implementation of a Direct
                                  Spanning Tree Representation in GAs  . . 11
               Ivana Ljubic and   
          Günther R. Raidl   An Evolutionary Algorithm with
                                  Stochastic Hill-Climbing for the
                                  Edge-Biconnectivity Augmentation Problem 20
           Pierre Chardaire and   
           Geoff P. McKeown and   
                 Jameel A. Maki   Application of GRASP to the
                                  Multiconstraint Knapsack Problem . . . . 30
            Jens Levenhagen and   
          Andreas Bortfeldt and   
                Hermann Gehring   Path Tracing in Genetic Algorithms
                                  Applied to the Multiconstrained Knapsack
                                  Problem  . . . . . . . . . . . . . . . . 40
                  Jens Gottlieb   On the Feasibility Problem of
                                  Penalty-Based Evolutionary Algorithms
                                  for Knapsack Problems  . . . . . . . . . 50
            Roberto Cordone and   
             Francesco Maffioli   Coloured Ant System and Local Search to
                                  Design Local Telecommunication Networks  60
               Karl Doerner and   
           Richard F. Hartl and   
                   Marc Reimann   Cooperative Ant Colonies for Optimizing
                                  Resource Allocation in Transportation    70
          Vittorio Maniezzo and   
        Antonella Carbonaro and   
          Matteo Golfarelli and   
                  Stefano Rizzi   An ANTS Algorithm for Optimizing the
                                  Materialization of Fragmented Views in
                                  Data Warehouses: Preliminary Results . . 80
                    Ingo Meents   A Genetic Algorithm for the
                                  Group-Technology Problem . . . . . . . . 90
            Stefano Gregori and   
              Roberto Rossi and   
              Guido Torelli and   
             Valentino Liberali   Generation of Optimal Unit Distance
                                  Codes for Rotary Encoders through
                                  Simulated Evolution  . . . . . . . . . . 100
                 Jan Poland and   
        Kosmas Knödler and   
                   Andreas Zell   On the Efficient Construction of
                                  Rectangular Grids from Given Data Points 110
        Dimitris A. Fotakis and   
  Spiridon D. Likothanassis and   
         Stamatis K. Stefanakos   An Evolutionary Annealing Approach to
                                  Graph Coloring . . . . . . . . . . . . . 120
      Geraldo Ribeiro Filho and   
   Luiz Antonio Nogueira Lorena   A Constructive Evolutionary Approach to
                                  School Timetabling . . . . . . . . . . . 130
          Benjamin Weinberg and   
           Vincent Bachelet and   
               El-Ghazali Talbi   A Co-evolutionist Meta-heuristic for the
                                  Assignment of the Frequencies in
                                  Cellular Networks  . . . . . . . . . . . 140
               Der-Rong Din and   
             Shian-Shyong Tseng   A Simulated Annealing Algorithm for
                                  Extended Cell Assignment Problem in a
                                  Wireless ATM Network . . . . . . . . . . 150
        Pavel A. Borisovsky and   
               Anton V. Eremeev   On Performance Estimates for Two
                                  Evolutionary Algorithms  . . . . . . . . 161
           Rémi Lehn and   
                  Pascale Kuntz   A Contribution to the Study of the
                                  Fitness Landscape for a Graph Drawing
                                  Problem  . . . . . . . . . . . . . . . . 172
               Marcello Pelillo   Evolutionary Game Dynamics in
                                  Combinatorial Optimization: An Overview  182
           Ranieri Baraglia and   
José Ignacio Hidalgo and   
                Raffaele Perego   A Parallel Hybrid Heuristic for the TSP  193
            Edmund K. Burke and   
           Peter I. Cowling and   
                   Ralf Keuthen   Effective Local and Guided Variable
                                  Neighbourhood Search Methods for the
                                  Asymmetric Travelling Salesman Problem   203
            Michael Guntsch and   
              Martin Middendorf   Pheromone Modification Strategies for
                                  Ant Algorithms Applied to Dynamic TSP    213
            Susana Esquivel and   
             Claudia Gatica and   
            Raúl Gallard   Conventional and Multirecombinative
                                  Evolutionary Algorithms for the Parallel
                                  Task Scheduling Problem  . . . . . . . . 223
            Robert E. Smith and   
              Bruce A. Dike and   
            B. Ravichandran and   
             Adel El-Fallah and   
                 Raman K. Mehra   Two-Sided, Genetics-Based Learning to
                                  Discover Novel Fighter Combat Maneuvers  233
              Henry O. Nyongesa   Generation of Time-Delay Algorithms for
                                  Anti-Air Missiles Using Genetic
                                  Programming  . . . . . . . . . . . . . . 243
                  Enrico Piazza   Surface Movement Radar Image Correlation
                                  Using Genetic Algorithm  . . . . . . . . 248
             Tobias Grosche and   
               Armin Heinzl and   
                 Franz Rothlauf   A Conceptual Approach for Simultaneous
                                  Flight Schedule Construction with
                                  Genetic Algorithms . . . . . . . . . . . 257
                Lucia Ballerini   Genetic Snakes for Color Images
                                  Segmentation . . . . . . . . . . . . . . 268
      Alessandro Bevilacqua and   
           Renato Campanini and   
                Nico Lanconelli   A Distributed Genetic Algorithm for
                                  Parameters Optimization to Detect
                                  Microcalcifications in Digital
                                  Mammograms . . . . . . . . . . . . . . . 278
           Amine M. Boumaza and   
                   Jean Louchet   Dynamic Flies: Using Real-Time Parisian
                                  Evolution in Robotics  . . . . . . . . . 288
               Fulvio Corno and   
            Gianluca Cumani and   
        Matteo Sonza Reorda and   
             Giovanni Squillero   ARPIA: a High-Level Evolutionary Test
                                  Signal Generator . . . . . . . . . . . . 298
   Adelino R. Ferreira da Silva   A Pursuit Architecture for Signal
                                  Analysis . . . . . . . . . . . . . . . . 307
          Mario Köppen and   
           Bertram Nickolay and   
                Hendrik Treugut   Genetic Algorithm Based Heuristic
                                  Measure for Pattern Similarity in
                                  Kirlian Photographs  . . . . . . . . . . 317
Jacques Lévy Véhel and   
                 Evelyne Lutton   Evolutionary Signal Enhancement Based on
                                  Hölder Regularity Analysis  . . . . . . . 325
            Tommaso Minerva and   
                     Irene Poli   Building ARMA Models with Genetic
                                  Algorithms . . . . . . . . . . . . . . . 335
            Michael O'Neill and   
           Anthony Brabazon and   
                 Conor Ryan and   
                  J. J. Collins   Evolving Market Index Trading Rules
                                  Using Grammatical Evolution  . . . . . . 343
                 Gustavo Olague   Autonomous Photogrammetric Network
                                  Design Using Genetic Algorithms  . . . . 353
                 Vitorino Ramos   The Biological Concept of Neoteny in
                                  Evolutionary Color Image Segmentation
                                  --- Simple Experiments in Simple
                                  Non-memetic Genetic Algorithms . . . . . 364
        Alexander V. Spirov and   
          Dmitry L. Timakin and   
               John Reinitz and   
                   David Kosman   Using of Evolutionary Computations in
                                  Image Processing for Quantitative Atlas
                                  of Drosophila Genes Expression . . . . . 374
          Samuel Delepoulle and   
             Philippe Preux and   
        Jean-Claude Darcheville   Selection of Behavior in Social
                                  Situations . . . . . . . . . . . . . . . 384
                  Emma Hart and   
                     Peter Ross   Clustering Moving Data With a Modified
                                  Immune Algorithm . . . . . . . . . . . . 394
              Evelina Lamma and   
  Luís Moniz Pereira and   
               Fabrizio Riguzzi   Belief Revision by Lamarckian Evolution  404
                   Filippo Neri   A Study on the Effect of Cooperative
                                  Evolution on Concept Learning  . . . . . 414
       Francisco B. Pereira and   
                  Ernesto Costa   The Influence of Learning in the
                                  Evolution of Busy Beavers  . . . . . . . 421
           Marc Bufé and   
                Tim Fischer and   
             Holger Gubbels and   
       Claudius Häcker and   
            Oliver Hasprich and   
         Christian Scheibel and   
            Karsten Weicker and   
             Nicole Weicker and   
              Michael Wenig and   
            Christian Wolfangel   Automated Solution of a Highly
                                  Constrained School Timetabling Problem
                                  --- Preliminary Results  . . . . . . . . 431
        Matthijs den Besten and   
        Thomas Stützle and   
                   Marco Dorigo   Design of Iterated Local Search
                                  Algorithms . . . . . . . . . . . . . . . 441
        Calogero Di Stefano and   
        Andrea G. B. Tettamanzi   An Evolutionary Algorithm for Solving
                                  the School Time-Tabling Problem  . . . . 452
      Matthias Gröbner and   
                    Peter Wilke   Optimizing Employee Schedules by a
                                  Hybrid Genetic Algorithm . . . . . . . . 463
           Philippe Lacomme and   
            Christian Prins and   
   Wahiba Ramdane-Chérif   A Genetic Algorithm for the Capacitated
                                  Arc Routing Problem and Its Extensions   473
              Daniel Merkle and   
              Martin Middendorf   A New Approach to Solve Permutation
                                  Scheduling Problems with Ant Colony
                                  Optimization . . . . . . . . . . . . . . 484
              Neil Urquhart and   
               Ben Paechter and   
               Kenneth Chisholm   Street-Based Routing Using an
                                  Evolutionary Algorithm . . . . . . . . . 495
       C. Henrik Westerberg and   
                    John Levine   Investigation of Different Seeding
                                  Strategies in a Genetic Planner  . . . . 505
                      Anonymous   Author Index . . . . . . . . . . . . . . 515


Lecture Notes in Computer Science
Volume 2038, 2001

           Nicole Drechsler and   
            Frank Schmiedle and   
         Daniel Große and   
                 Rolf Drechsler   Heuristic Learning Based on Genetic
                                  Programming  . . . . . . . . . . . . . . 1
                     Marc Ebner   Evolving Color Constancy for an
                                  Artificial Retina  . . . . . . . . . . . 11
           Jeroen Eggermont and   
             Jano I. van Hemert   Adaptive Genetic Programming Applied to
                                  New and Existing Simple Regression
                                  Problems . . . . . . . . . . . . . . . . 23
          Massimiliano Erba and   
              Roberto Rossi and   
         Valentino Liberali and   
        Andrea G. B. Tettamanzi   An Evolutionary Approach to Automatic
                                  Generation of VHDL Code for Low-Power
                                  Digital Filters  . . . . . . . . . . . . 36
 Francisco Fernández and   
            Marco Tomassini and   
             Leonardo Vanneschi   Studying the Influence of Communication
                                  Topology and Migration on Distributed
                                  Genetic Programming  . . . . . . . . . . 51
           Gianluigi Folino and   
              Clara Pizzuti and   
          Giandomenico Spezzano   CAGE: a Tool for Parallel Genetic
                                  Programming Applications . . . . . . . . 64
            Maarten Keijzer and   
                 Conor Ryan and   
            Michael O'Neill and   
             Mike Cattolico and   
                 Vladan Babovic   Ripple Crossover in Genetic Programming  74
         William B. Langdon and   
              Bernard F. Buxton   Evolving Receiver Operating
                                  Characteristics for Data Fusion  . . . . 87
             Steve Margetts and   
               Antonia J. Jones   An Adaptive Mapping for Developmental
                                  Genetic Programming  . . . . . . . . . . 97
    Nicholas Freitag McPhee and   
                  Riccardo Poli   A Schema Theory Analysis of the
                                  Evolution of Size in Genetic Programming
                                  with Linear Representations  . . . . . . 108
              Riccardo Poli and   
        Nicholas Freitag McPhee   Exact Schema Theorems for GP with
                                  One-Point and Standard Crossover
                                  Operating on Linear Structures and Their
                                  Application to the Study of the
                                  Evolution of Size  . . . . . . . . . . . 126
                  Riccardo Poli   General Schema Theory for Genetic
                                  Programming with Subtree-Swapping
                                  Crossover  . . . . . . . . . . . . . . . 143
           Simon C. Roberts and   
              Daniel Howard and   
                   John R. Koza   Evolving Modules in Genetic Programming
                                  by Subtree Encapsulation . . . . . . . . 160
         Anargyros Sarafopoulos   Evolution of Affine Transformations and
                                  Iterated Function Systems Using
                                  Hierarchical Evolution Strategy  . . . . 176
           Edgar E. Vallejo and   
                 Fernando Ramos   Evolving Turing Machines for Biosequence
                                  Recognition and Analysis . . . . . . . . 192
                    Tina Yu and   
                  Julian Miller   Neutrality and the Evolvability of
                                  Boolean Function Landscape . . . . . . . 204
                        Tina Yu   Polymorphism and Genetic Programming . . 218
     Forrest H. Bennett III and   
                 Brad Dolin and   
             Eleanor G. Rieffel   Programmable Smart Membranes: Using
                                  Genetic Programming to Evolve Scalable
                                  Distributed Controllers for a Novel
                                  Self-Reconfigurable Modular Robotic
                                  Application  . . . . . . . . . . . . . . 234
                 Enzo Bolis and   
            Christian Zerbi and   
              Pierre Collet and   
               Jean Louchet and   
                 Evelyne Lutton   A GP Artificial Ant for Image
                                  Processing: Preliminary Experiments with
                                  EASEA  . . . . . . . . . . . . . . . . . 246
              Martijn C. J. Bot   Feature Extraction for the $k$-Nearest
                                  Neighbour Classifier with Genetic
                                  Programming  . . . . . . . . . . . . . . 256
          Eva Brucherseifer and   
              Peter Bechtel and   
             Stephan Freyer and   
                Peter Marenbach   An Indirect Block-Oriented
                                  Representation for Genetic Programming   268
           Jeroen Eggermont and   
               Tom Lenaerts and   
             Sanna Poyhonen and   
              Alexandre Termier   Raising the Dead: Extending Evolutionary
                                  Algorithms with a Case-Based Memory  . . 280
        Steven M. Gustafson and   
                 William H. Hsu   Layered Learning in Genetic Programming
                                  for a Cooperative Robot Soccer Problem   291
         Wolfgang Kantschik and   
               Wolfgang Banzhaf   Linear-Tree GP and Its Comparison with
                                  Other GP Structures  . . . . . . . . . . 302
         William B. Langdon and   
                   Peter Nordin   Evolving Hand-Eye Coordination for a
                                  Humanoid Robot with Machine Code Genetic
                                  Programming  . . . . . . . . . . . . . . 313
               Jens Niehaus and   
               Wolfgang Banzhaf   Adaption of Operator Probabilities in
                                  Genetic Programming  . . . . . . . . . . 325
            Michael O'Neill and   
                 Conor Ryan and   
            Maarten Keijzer and   
                 Mike Cattolico   Crossover in Grammatical Evolution: The
                                  Search Continues . . . . . . . . . . . . 337
              Bart Rylander and   
                Terry Soule and   
                   James Foster   Computational Complexity, Genetic
                                  Programming, and Implications  . . . . . 348
            Massimo Santini and   
              Andrea Tettamanzi   Genetic Programming for Financial Time
                                  Series Prediction  . . . . . . . . . . . 361
            Ankur Teredesai and   
                    J. Park and   
          Venugopal Govindaraju   Active Handwritten Character Recognition
                                  Using Genetic Programming  . . . . . . . 371
                      Anonymous   Author Index . . . . . . . . . . . . . . 381
                      Anonymous   Subject Index  . . . . . . . . . . . . . 383


Lecture Notes in Computer Science
Volume 2039, 2001

             Michael Schumacher   Chapter 1. Introduction  . . . . . . . . 1
             Michael Schumacher   Chapter 2. Multi-Agent Systems . . . . . 9
             Michael Schumacher   Chapter 3. Coordination Models and
                                  Languages  . . . . . . . . . . . . . . . 33
             Michael Schumacher   Chapter 4. The ECM Coordination Model    53
             Michael Schumacher   Chapter 5. The STL Coordination Language 61
             Michael Schumacher   Chapter 6. The STL++ Coordination
                                  Language . . . . . . . . . . . . . . . . 69
             Michael Schumacher   Chapter 7. The AGENT&CO Coordination
                                  Language . . . . . . . . . . . . . . . . 97
             Michael Schumacher   Chapter 8. Collective Robotics
                                  Simulation . . . . . . . . . . . . . . . 105
             Michael Schumacher   Chapter 9. Trading System Simulation . . 115
             Michael Schumacher   Chapter 10. Conclusions  . . . . . . . . 121
             Michael Schumacher   Appendix A. Core STL++ Interfaces  . . . 125
             Michael Schumacher   Appendix B. STL Code Example . . . . . . 133
             Michael Schumacher   Appendix C. LINDA, GAMMA and MANIFOLD
                                  Code Examples  . . . . . . . . . . . . . 135
             Michael Schumacher   Bibliography . . . . . . . . . . . . . . 137


Lecture Notes in Computer Science
Volume 2040, 2001

                   Oda Sans and   
                Gordon B. Agnew   An Efficient Multiple Merchants Payment
                                  Protocol for Secure Electronic
                                  Transactions Based on Purchase
                                  Consolidation  . . . . . . . . . . . . . 1
                      Yi Mu and   
          Khanh Quoc Nguyen and   
             Vijay Varadharajan   A Fair Electronic Cash Scheme  . . . . . 20
               Amitabha Das and   
                   Yao Gongxuan   A Secure Payment Protocol Using Mobile
                                  Agents in an Untrusted Host Environment  33
           Michael Shepherd and   
                Anil Dhonde and   
                Carolyn Watters   Building Trust for E-Commerce:
                                  Collaborating Label Bureaus  . . . . . . 42
                 Zi-Chen Li and   
              Jun-Mei Zhang and   
                    Jun Luo and   
               William Song and   
                      Yi-Qi Dai   Group-Oriented (t, n) Threshold Digital
                                  Signature Schemes with Traceable Signers 57
              Ying Jie Yang and   
                  Liang Zhu and   
                    Fan Yuan Ma   The Implementation of Security Algorithm
                                  of Mobile Agent on Roblet  . . . . . . . 70
                    Li Chen and   
         Elke Rundensteiner and   
                Afshan Ally and   
                  Rice Chen and   
                    Weidong Kou   Active Page Generation via Customizing
                                  XML for Data Beans in E-Commerce
                                  Applications . . . . . . . . . . . . . . 79
               Frankie Poon and   
            Kostas Kontogiannis   $i$-Cube: a Tool-Set for the Dynamic
                                  Extraction and Integration of Web Data
                                  Content  . . . . . . . . . . . . . . . . 98
               Jacob Slonim and   
          Theodore Chiasson and   
               Carrie Gates and   
             Michael McAllister   An Extensible, Human-Centric Framework
                                  That Promotes Universal Access to
                                  Electronic Commerce  . . . . . . . . . . 116
                Yao Hui Lei and   
                   Gang Mai and   
                 Esma A\"\imeur   CBR-Responder, an Automated Customer
                                  Service for E-Commerce . . . . . . . . . 127
         Gregor v. Bochmann and   
   Brigitte Kerhervé and   
             Hanan Lutfiyya and   
      Mohamed-Vall M. Salem and   
                      Haiwei Ye   Introducing QoS to Electronic Commerce
                                  Applications . . . . . . . . . . . . . . 138
           H. Keith Edwards and   
           Michael A. Bauer and   
             Hanan Lutfiyya and   
                Yumman Chan and   
            Michael Shields and   
                      Peter Woo   A Methodology and Implementation for
                                  Analytic Modeling in Electronic Commerce
                                  Applications . . . . . . . . . . . . . . 148
                 Deren Chen and   
                  Jen-Yao Chung   Internet Based Electronic Business
                                  Framework Applications and Business to
                                  Business Standards . . . . . . . . . . . 158
             Carsten Passch and   
               William Song and   
                Weidong Kou and   
                  Chung-Jen Tan   Online Auction Protocols: a Comparative
                                  Study  . . . . . . . . . . . . . . . . . 170
                      Anonymous   Author Index . . . . . . . . . . . . . . 187


Lecture Notes in Computer Science
Volume 2041, 2001

               D. Bolignano and   
       D. Le Métayer and   
                    C. Loiseaux   Formal Methods in Context: Security and
                                  Java Card  . . . . . . . . . . . . . . . 1
               Bernhard Beckert   A Dynamic Logic for the Formal
                                  Verification of Java Card Programs . . . 6
                  P. Bieber and   
                   J. Cazin and   
             A. El Marouani and   
                  P. Girard and   
                J.-L. Lanet and   
                   V. Wiels and   
                       G. Zanon   The PACAP Prototype: a Tool for
                                  Detecting Java Card Illegal Flow . . . . 25
         Rajeev Goré and   
                 Lan Duy Nguyen   CardKt: Automated Multi-modal Deduction
                                  on Java Cards for Multi-application
                                  Security . . . . . . . . . . . . . . . . 38
           Pieter H. Hartel and   
                 Eduard de Jong   A Programming and a Modelling
                                  Perspective on the Evaluation of Java
                                  Card Implementations . . . . . . . . . . 52
               Naomaru Itoi and   
            Tomoko Fukuzawa and   
                 Peter Honeyman   Secure Internet Smartcards . . . . . . . 73
                 Roger Kehr and   
               Michael Rohs and   
                    Harald Vogt   Issues in Smartcard Middleware . . . . . 90
             Marc Kekicheff and   
             Forough Kashef and   
                   David Brewer   Open Platform Security . . . . . . . . . 98
        Ksheerabdhi Krishna and   
             Michael Montgomery   A Simple(r) Interface Distribution
                                  Mechanism for Java Card  . . . . . . . . 114
              Hugues Martin and   
              Lydie du Bousquet   Automatic Test Generation for Java-Card
                                  Applets  . . . . . . . . . . . . . . . . 121
       Joachim van den Berg and   
                Bart Jacobs and   
                      Erik Poll   Formal Specification and Verification of
                                  JavaCard's Application Identifier Class  137
          Rüdiger Weis and   
            Bastiaan Bakker and   
                   Stefan Lucks   Security on Your Hand: Secure
                                  Filesystems with a ``Non-Cryptographic''
                                  JAVA-Ring  . . . . . . . . . . . . . . . 151
                      Anonymous   Author Index . . . . . . . . . . . . . . 163


Lecture Notes in Computer Science
Volume 2042, 2001

        Alessandro Avellone and   
              Mauro Ferrari and   
             Camillo Fiorentini   A Formal Framework for Synthesis and
                                  Verification of Logic Programs . . . . . 1
              Iman Poernomo and   
               John N. Crossley   Protocols between Programs and Proofs    18
              Robert Colvin and   
                  Ian Hayes and   
                  Paul Strooper   A Technique for Modular Logic Program
                                  Refinement . . . . . . . . . . . . . . . 38
              Silvija Seres and   
                 Michael Spivey   Higher-Order Transformation of Logic
                                  Programs . . . . . . . . . . . . . . . . 57
       Alexander Serebrenik and   
               Danny De Schreye   Non-transformational Termination
                                  Analysis of Logic Programs, Based on
                                  General Term-Orderings . . . . . . . . . 69
            Francisco Bueno and   
María García de la Banda and   
        Manuel Hermenegildo and   
               Kim Marriott and   
       Germán Puebla and   
               Peter J. Stuckey   A Model for Inter-module Analysis and
                                  Optimizing Compilation . . . . . . . . . 86
              Elvira Albert and   
               Sergio Antoy and   
            Germán Vidal   Measuring the Effectiveness of Partial
                                  Evaluation in Functional Logic Languages 103
           Fabio Fioravanti and   
         Alberto Pettorossi and   
              Maurizio Proietti   Automated Strategies for Specializing
                                  Constraint Logic Programs  . . . . . . . 125
       Alessandra Di Pierro and   
               Herbert Wiklicky   Measuring the Precision of Abstract
                                  Interpretations  . . . . . . . . . . . . 147
               Erwan Jahier and   
    Mireille Ducassé and   
                 Olivier Ridoux   Specifying Prolog Trace Models with a
                                  Continuation Semantics . . . . . . . . . 165
                      Anonymous   Author Index . . . . . . . . . . . . . . 183


Lecture Notes in Computer Science
Volume 2043, 2001

            Axel van Lamsweerde   Building Formal Requirements Models for
                                  Reliable Software  . . . . . . . . . . . 1
       Pascal Héraud and   
        Thierry Lelégard   Using Ada in Interactive Digital
                                  Television Systems . . . . . . . . . . . 21
            Marie-Claude Gaudel   Testing from Formal Specifications, a
                                  Generic Approach . . . . . . . . . . . . 35
                     Peter Amey   Logic versus Magic in Critical Systems   49
           Benjamin Brosgol and   
                  Brian Dobbing   Can Java\TM Meet Its Real-Time
                                  Deadlines? . . . . . . . . . . . . . . . 68
         Wolfgang Gellerich and   
         Erhard Plödereder   Parameter-Induced Aliasing in Ada  . . . 88
            Zhengqiang Chen and   
                  Baowen Xu and   
                    Hongji Yang   Slicing Tagged Objects in Ada  . . . . . 100
            Alexei Kuchumov and   
               Sergey Rybin and   
              Alfred Strohmeier   OASIS --- An ASIS Secondary Library for
                                  Analyzing Object-Oriented Ada Code . . . 113
             Laurent Pautet and   
              Thomas Quinot and   
                 Samuel Tardieu   Building Modern Distributed Systems  . . 123
   Luís Miguel Pinho and   
              Francisco Vasques   Reliable Communication in Distributed
                                  Computer-Controlled Systems  . . . . . . 136
   Francisco Guerra Santana and   
Javier Miranda González and   
José Miguel Santos Espino and   
José Carlos Rodríguez Calero   Building Robust Applications by Reusing
                                  Non-robust Legacy Software . . . . . . . 148
                 Joyce L. Tokar   New Developments in Ada 95 Run-Time
                                  Profile Definitions and Language
                                  Refinements  . . . . . . . . . . . . . . 160
              Alfons Crespo and   
         Patricia Balbastre and   
                 Silvia Terrasa   Complex Task Implementation in Ada . . . 167
             Guillem Bernat and   
                     Alan Burns   Implementing a Flexible Scheduler in Ada 179
           Alexandre Duret-Lutz   Expression Templates in Ada  . . . . . . 191
            Bo I. Sandén   A Design Pattern for State Machines and
                                  Concurrent Activities  . . . . . . . . . 203
                      Ehud Lamm   Component Libraries and Language
                                  Features . . . . . . . . . . . . . . . . 215
             Darren Foulger and   
                     Steve King   Using the SPARK Toolset for Showing the
                                  Absence of Run-Time Errors in
                                  Safety-Critical Software . . . . . . . . 229
                   Silke Kuball   Scenario-Based System Assessment . . . . 241
              Tsong Y. Chen and   
                     Man F. Lau   Test Suite Reduction and Fault Detecting
                                  Effectiveness: An Empirical Evaluation   253
                   John English   JEWL: a GUI Library for Educational Use  266
               Xavier Caron and   
          Jörg Kienzle and   
              Alfred Strohmeier   Object-Oriented Stable Storage Based on
                                  Mirroring  . . . . . . . . . . . . . . . 278
          Jörg Kienzle and   
Ricardo Jiménez-Peris and   
       Alexander Romanovsky and   
   Marta Patiño Martinez   Transaction Support for Ada  . . . . . . 290
          Mario Aldea Rivas and   
Michael González Harbour   MaRTE OS: An Ada Kernel for Real-Time
                                  Embedded Applications  . . . . . . . . . 305
              Juan Zamorano and   
        José F. Ruiz and   
      Juan Antonio de la Puente   Implementing Ada.Real\_Time.Clock and
                                  Absolute Delays in Real-Time Kernels . . 317
                     Alan Burns   Defining New Non-preemptive Dispatching
                                  and Locking Policies for Ada . . . . . . 328
          Frank Oppenheimer and   
             Dongming Zhang and   
                 Wolfgang Nebel   Modelling Communication Interfaces with
                                  COMIX  . . . . . . . . . . . . . . . . . 337
       Mário Amado Alves   Safe Web Forms and XML Processing with
                                  Ada  . . . . . . . . . . . . . . . . . . 349
                Bill Taylor and   
               Einar W. Karlsen   Mapping UML to Ada . . . . . . . . . . . 359
   Björn Källberg and   
              Rei Stråhle   Ship System 2000, a Stable Architecture
                                  under Continuous Evolution . . . . . . . 371
        Philippe Waroquiers and   
       Stef Van Vlierberghe and   
             Dirk Craeynest and   
              Andrew Hately and   
                  Erik Duvinage   Migrating Large Applications from Ada83
                                  to Ada95 . . . . . . . . . . . . . . . . 380
           Tullio Vardanega and   
      Rodrigo García and   
      Juan Antonio de la Puente   An Application Case for Ravenscar
                                  Technology: Porting OBOSS to GNAT/ORK    392
                      Anonymous   Author Index . . . . . . . . . . . . . . 405


Lecture Notes in Computer Science
Volume 2044, 2001

                  Olivier Danvy   Many Happy Returns . . . . . . . . . . . 1
                 Martin Hofmann   From Bounded Arithmetic to Memory
                                  Management: Use of Type Theory to
                                  Capture Complexity Classes and Space
                                  Behaviour  . . . . . . . . . . . . . . . 2
                    Dag Normann   Definability of Total Objects in PCF and
                                  Related Calculi  . . . . . . . . . . . . 4
                 Peter Selinger   Categorical Semantics of Control . . . . 6
            Thorsten Altenkirch   Representations of First Order Function
                                  Types as Terminal Coalgebras . . . . . . 8
        Thorsten Altenkirch and   
                Thierry Coquand   A Finitary Subsystem of the Polymorphic
                                  $ \lambda $-Calculus . . . . . . . . . . 22
              Martin Berger and   
                Kohei Honda and   
                 Nobuko Yoshida   Sequentiality and the $ \pi $-Calculus   29
              Luca Cardelli and   
               Andrew D. Gordon   Logical Properties of Name Restriction   46
             Juliusz Chroboczek   Subtyping Recursive Games  . . . . . . . 61
              Paolo Coppola and   
                 Simone Martini   Typing Lambda Terms in Elementary Logic
                                  with Linear Constraints  . . . . . . . . 76
                  Norman Danner   Ramified Recurrence with Dependent Types 91
          Pietro Di Gianantonio   Game Semantics for the Pure Lazy $
                                  \lambda $-calculus . . . . . . . . . . . 106
              Dan Dougherty and   
                Pierre Lescanne   Reductions, Intersection Types, and
                                  Explicit Substitutions . . . . . . . . . 121
                   Gilles Dowek   The Stratified Foundations as a Theory
                                  Modulo . . . . . . . . . . . . . . . . . 136
               Andrzej Filinski   Normalization by Evaluation for the
                                  Computational Lambda-Calculus  . . . . . 151
                 Herman Geuvers   Induction Is Not Derivable in Second
                                  Order Dependent Type Theory  . . . . . . 166
             Philippe de Groote   Strong Normalization of Classical
                                  Natural Deduction with Disjunction . . . 182
            Esfandiar Haghverdi   Partially Additive Categories and Fully
                                  Complete Models of Linear Logic  . . . . 197
                   C. Barry Jay   Distinguishing Data Structures and
                                  Functions: The Constructor Calculus and
                                  Functorial Types . . . . . . . . . . . . 217
                   Thierry Joly   The Finitely Generated Types of the $
                                  \lambda $-Calculus . . . . . . . . . . . 240
              Teodor Knapik and   
            Damian Niwinski and   
                Pawe\l Urzyczyn   Deciding Monadic Theories of
                                  Hyperalgebraic Trees . . . . . . . . . . 253
                    James Laird   A Deconstruction of Non-deterministic
                                  Classical Cut Elimination  . . . . . . . 268
                Olivier Laurent   A Token Machine for Full Geometry of
                                  Interaction  . . . . . . . . . . . . . . 283
                Hans Leiß   Second-Order Pre-Logical Relations and
                                  Representation Independence  . . . . . . 298
                 Ugo de'Liguoro   Characterizing Convergent Terms in
                                  Object Calculi via Intersection Types    315
                  Ralph Matthes   Parigot's Second Order $ \lambda \mu
                                  $-Calculus and Inductive Types . . . . . 329
               Alexandre Miquel   The Implicit Calculus of Constructions   344
        Andrzej S. Murawski and   
                 C.-H. Luke Ong   Evolving Games and Essential Nets for
                                  Affine Polymorphism  . . . . . . . . . . 360
               Vincent Padovani   Retracts in Simple Types . . . . . . . . 376
              Jorge Sousa Pinto   Parallel Implementation Models for the $
                                  \lambda $-Calculus Using the Geometry of
                                  Interaction  . . . . . . . . . . . . . . 385
                Aleksy Schubert   The Complexity of $ \beta $-Reduction in
                                  Low Orders . . . . . . . . . . . . . . . 400
                Christian Urban   Strong Normalisation for a Gentzen-like
                                  Cut-Elimination Procedure  . . . . . . . 415
                      Anonymous   Author Index . . . . . . . . . . . . . . 431


Lecture Notes in Computer Science
Volume 2045, 2001

       Frederik Vercauteren and   
               Bart Preneel and   
                Joos Vandewalle   A Memory Efficient Version of Satoh's
                                  Algorithm  . . . . . . . . . . . . . . . 1
           Mireille Fouquet and   
            Pierrick Gaudry and   
                  Robert Harley   Finding Secure Curves with the Satoh-FGH
                                  Algorithm and an Early-Abort Strategy    14
                 Nigel P. Smart   How Secure Are Elliptic Curves over
                                  Composite Extension Fields?  . . . . . . 30
      Giovanni Di Crescenzo and   
              Jonathan Katz and   
           Rafail Ostrovsky and   
                     Adam Smith   Efficient and Non-interactive
                                  Non-malleable Commitment . . . . . . . . 40
      Claude Crépeau and   
Frédéric Légaré and   
                  Louis Salvail   How to Convert the Flavor of a Quantum
                                  Bit Commitment . . . . . . . . . . . . . 60
              Jonathan Katz and   
               Steven Myers and   
               Rafail Ostrovsky   Cryptographic Counters and Applications
                                  to Electronic Voting . . . . . . . . . . 78
              Jan Camenisch and   
               Anna Lysyanskaya   An Efficient System for Non-transferable
                                  Anonymous Credentials with Optional
                                  Anonymity Revocation . . . . . . . . . . 93
                Bill Aiello and   
                Yuval Ishai and   
                  Omer Reingold   Priced Oblivious Transfer: How to Sell
                                  Digital Goods  . . . . . . . . . . . . . 119
                   Masayuki Abe   A Secure Three-Move Blind Signature
                                  Scheme for Polynomially Many Signatures  136
         Ivan Damgård and   
               Maciej Koprowski   Practical Threshold RSA Signatures
                                  without a Trusted Dealer . . . . . . . . 152
                   Ilya Mironov   Hash Functions: From Merkle-Damgård to
                                  Shoup  . . . . . . . . . . . . . . . . . 166
                   Craig Gentry   Key Recovery and Message Attacks on
                                  NTRU-Composite . . . . . . . . . . . . . 182
                Eric R. Verheul   Evidence that XTR Is More Secure than
                                  Supersingular Elliptic Curve
                                  Cryptosystems  . . . . . . . . . . . . . 195
          Jeffrey Hoffstein and   
                Jill Pipher and   
            Joseph H. Silverman   NSS: An NTRU Lattice-Based Signature
                                  Scheme . . . . . . . . . . . . . . . . . 211
             Dario Catalano and   
            Rosario Gennaro and   
           Nick Howgrave-Graham   The Bit Security of Paillier's
                                  Encryption Scheme and Its Applications   229
         Ahmad-Reza Sadeghi and   
                Michael Steiner   Assumptions Related to Discrete
                                  Logarithms: Why Subtleties Make a Real
                                  Difference . . . . . . . . . . . . . . . 244
                Ran Canetti and   
                Ivan Damgrd and   
         Stefan Dziembowski and   
                Yuval Ishai and   
                     Tal Malkin   On Adaptive vs. Non-adaptive Security of
                                  Multiparty Protocols . . . . . . . . . . 262
              Ronald Cramer and   
         Ivan Damgård and   
              Jesper B. Nielsen   Multiparty Computation from Threshold
                                  Homomorphic Encryption . . . . . . . . . 280
             Yevgeniy Dodis and   
                 Amit Sahai and   
                     Adam Smith   On Perfect and Adaptive Security in
                                  Exposure-Resilient Cryptography  . . . . 301
               Ulrich Kühn   Cryptanalysis of Reduced-Round MISTY . . 325
                  Eli Biham and   
              Orr Dunkelman and   
                  Nathan Keller   The Rectangle Attack --- Rectangling the
                                  Serpent  . . . . . . . . . . . . . . . . 340
                   Steven Myers   Efficient Amplification of the Security
                                  of Weak Pseudo-random Function
                                  Generators . . . . . . . . . . . . . . . 358
              Silvio Micali and   
                  Leonid Reyzin   Min-round Resettable Zero-Knowledge in
                                  the Public-Key Model . . . . . . . . . . 373
              Alex Biryukov and   
                     Adi Shamir   Structural Cryptanalysis of SASAS  . . . 394
             Amr M. Youssef and   
                     Guang Gong   Hyper-bent Functions . . . . . . . . . . 406
               Liam Keliher and   
                Henk Meijer and   
               Stafford Tavares   New Method for Upper Bounding the
                                  Maximum Average Linear Hull Probability
                                  for SPNs . . . . . . . . . . . . . . . . 420
                  Dan Boneh and   
               Glenn Durfee and   
                  Matt Franklin   Lower Bounds for Multicast Message
                                  Authentication . . . . . . . . . . . . . 437
                Ran Canetti and   
                  Hugo Krawczyk   Analysis of Key-Exchange Protocols and
                                  Their Use for Building Secure Channels   453
              Jonathan Katz and   
           Rafail Ostrovsky and   
                      Moti Yung   Efficient Password-Authenticated Key
                                  Exchange Using Human-Memorable Passwords 475
              Mihir Bellare and   
              Marc Fischlin and   
           Shafi Goldwasser and   
                  Silvio Micali   Identification Protocols Secure against
                                  Reset Attacks  . . . . . . . . . . . . . 495
                 Jee Hea An and   
                  Mihir Bellare   Does Encryption with Redundancy Provide
                                  Authenticity?  . . . . . . . . . . . . . 512
             Charanjit S. Jutla   Encryption Modes with Almost Free
                                  Message Integrity  . . . . . . . . . . . 529
                      Anonymous   Author Index . . . . . . . . . . . . . . 545


Lecture Notes in Computer Science
Volume 2046, 2001

                    Hans Daduna   1. Introduction  . . . . . . . . . . . . 1
                    Hans Daduna   2. State Dependent Bernoulli Servers . . 9
                    Hans Daduna   3. Closed Cycles of State Dependent
                                  Bernoulli Servers with Different
                                  Customer Types . . . . . . . . . . . . . 23
                    Hans Daduna   4. Open Tandems of State Dependent
                                  Bernoulli Servers with Different
                                  Customer Types . . . . . . . . . . . . . 53
                    Hans Daduna   5. Networks with Doubly Stochastic and
                                  Geometrical Servers  . . . . . . . . . . 73
                    Hans Daduna   6. General Networks with Batch Movements
                                  and Batch Services . . . . . . . . . . . 105
                    Hans Daduna   7. Appendix  . . . . . . . . . . . . . . 121
                      Anonymous   Bibliography . . . . . . . . . . . . . . 125
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 137


Lecture Notes in Computer Science
Volume 2047, 2001

               Reiner Dumke and   
                Reinhard Koeppe   Conception of a Web-Based SPE
                                  Development Infrastructure . . . . . . . 1
                 Rainer Gerlich   Performance and Robustness Engineering
                                  and the Role of Automated Software
                                  Development  . . . . . . . . . . . . . . 20
               Hassan Gomaa and   
       Daniel A. Menascé   Performance Engineering of
                                  Component-Based Distributed Software
                                  Systems  . . . . . . . . . . . . . . . . 40
              Lars Lundberg and   
      Daniel Häggander and   
           Wolfgang Diestelkamp   Conflicts and Trade-Offs between
                                  Software Performance and Maintainability 56
        Claus Rautenstrauch and   
            André Scholz   Performance Engineering on the Basis of
                                  Performance Service Levels . . . . . . . 68
      Andreas Schmietendorf and   
                Evgeni Dimitrov   Possibilities of Performance Modelling
                                  with UML . . . . . . . . . . . . . . . . 78
                Connie U. Smith   Origins of Software Performance
                                  Engineering: Highlights and Outstanding
                                  Problems . . . . . . . . . . . . . . . . 96
                    Chris Stary   Performance Parameters and Context of
                                  Use  . . . . . . . . . . . . . . . . . . 119
             Mariela Curiel and   
                Ramon Puigjaner   Using Load Dependent Servers to Reduce
                                  the Complexity of Large Client-Server
                                  Simulation Models  . . . . . . . . . . . 131
        Marios D. Dikaiakos and   
                 George Samaras   Performance Evaluation of Mobile Agents:
                                  Issues and Approaches  . . . . . . . . . 148
           Pekka Kähkipuro   UML-Based Performance Modeling Framework
                                  for Component-Based Distributed Systems  167
                 Lennard Kerber   Scenario-Based Performance Evaluation of
                                  SDL/MSC-Specified Systems  . . . . . . . 185
        Shikharesh Majumdar and   
        Johannes Lüthi and   
         Günter Haring and   
               Revathy Ramadoss   Characterization and Analysis of
                                  Software and Computer Systems with
                                  Uncertainties and Variabilities  . . . . 202
                  Tim R. Norton   The Simalytic Modeling Technique . . . . 222
                M. Woodside and   
                 V. Vetland and   
                M. Courtois and   
                     S. Bayarov   Resource Function Capture for
                                  Performance Aspects of Software
                                  Components and Sub-Systems . . . . . . . 239
                     T. Drwiega   Shared Memory Contention and Its Impact
                                  on Multi-processor Call Control
                                  Throughput . . . . . . . . . . . . . . . 257
                Neil J. Gunther   Performance and Scalability Models for a
                                  Hypergrowth e-Commerce Web Site  . . . . 267
              Frank Huebner and   
   Kathleen Meier-Hellstern and   
                    Paul Reeser   Performance Testing for IP Services and
                                  Systems  . . . . . . . . . . . . . . . . 283
                Carlos Juiz and   
            Ramon Puigjaner and   
                    Ken Jackson   Performance Modelling of Interaction
                                  Protocols in Soft Real-Time Design
                                  Architectures  . . . . . . . . . . . . . 300
      José Merseguer and   
              Javier Campos and   
                   Eduardo Mena   A Performance Engineering Case Study:
                                  Software Retrieval System  . . . . . . . 317
               Thomas Schneider   Performance Management of SAP\reg
                                  Solutions  . . . . . . . . . . . . . . . 333
                      Anonymous   Author Index . . . . . . . . . . . . . . 349


Lecture Notes in Computer Science
Volume 2048, 2001

                    Josef Pauli   1. Introduction  . . . . . . . . . . . . 1
                    Josef Pauli   2. Compatibilities for Object Boundary
                                  Detection  . . . . . . . . . . . . . . . 25
                    Josef Pauli   3. Manifolds for Object and Situation
                                  Recognition  . . . . . . . . . . . . . . 101
                    Josef Pauli   4. Learning-Based Achievement of RV
                                  Competences  . . . . . . . . . . . . . . 171
                    Josef Pauli   5. Summary and Discussion  . . . . . . . 255
                    Josef Pauli   Appendix 1: Ellipsoidal Interpolation    263
                    Josef Pauli   Appendix 2: Further Behavioral Modules   265
                      Anonymous   Symbols  . . . . . . . . . . . . . . . . 269
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 273
                      Anonymous   References . . . . . . . . . . . . . . . 277


Lecture Notes in Computer Science
Volume 2049, 2001

                 Yves Kodratoff   Comparing Machine Learning and Knowledge
                                  Discovery in DataBases: An Application
                                  to Knowledge Discovery in Texts  . . . . 1
       Ryszard S. Michalski and   
             Kenneth A. Kaufman   Learning Patterns in Noisy Data: The AQ
                                  Approach . . . . . . . . . . . . . . . . 22
                  Wayne Iba and   
                    Pat Langley   Unsupervised Learning of Probabilistic
                                  Concept Hierarchies  . . . . . . . . . . 39
               Bla\vz Zupan and   
                Ivan Bratko and   
              Marko Bohanec and   
                 Janez Dem\vsar   Function Decomposition in Machine
                                  Learning . . . . . . . . . . . . . . . . 71--101
               Wim Van Laer and   
                   Luc De Raedt   How to Upgrade Propositional Learners to
                                  First Order Logic: a Case Study  . . . . 102
Ramon López de Mántaras   Case-Based Reasoning . . . . . . . . . . 127
               Jonathan Shapiro   Genetic Algorithms in Machine Learning   146
        Sergios Theodoridis and   
       Konstantinos Koutroumbas   Pattern Recognition and Neural Networks  169
            Maarten van Someren   Model Class Selection and Construction:
                                  Beyond the Procrustean Approach to
                                  Machine Learning Applications  . . . . . 196
                 Lorenza Saitta   Integrated Architectures for Machine
                                  Learning . . . . . . . . . . . . . . . . 218
                    Pat Langley   The Computational Support of Scientific
                                  Discovery  . . . . . . . . . . . . . . . 230
         Theodoros Evgeniou and   
            Massimiliano Pontil   Support Vector Machines: Theory and
                                  Applications . . . . . . . . . . . . . . 249
                     Ivan Bruha   Pre- and Post-processing in Machine
                                  Learning and Data Mining . . . . . . . . 258
         Nikos D. Fakotakis and   
            Kyriakos N. Sgarbas   Machine Learning in Human Language
                                  Technology . . . . . . . . . . . . . . . 267
        Grigoris Karakoulas and   
              Giovanni Semeraro   Machine Learning for Intelligent
                                  Information Access . . . . . . . . . . . 274
     Themis Panayiotopoulos and   
               Nick Z. Zacharis   Machine Learning and Intelligent Agents  281
         Christos Papatheodorou   Machine Learning in User Modeling  . . . 286
             Hans C. Jessen and   
             Georgios Paliouras   Data Mining in Economics, Finance, and
                                  Marketing  . . . . . . . . . . . . . . . 295
         George D. Magoulas and   
               Andriana Prentza   Machine Learning in Medical Applications 300
         Nikolaos Hatziargyriou   Machine Learning Applications to Power
                                  Systems  . . . . . . . . . . . . . . . . 308
          Nikolaos Vassilas and   
          Elias Kalapanidas and   
           Nikolaos Avouris and   
             Stavros Perantonis   Intelligent Techniques for
                                  Spatio-Temporal Data Analysis in
                                  Environmental Applications . . . . . . . 318
                      Anonymous   Author Index . . . . . . . . . . . . . . 325


Lecture Notes in Computer Science
Volume 2050, 2001

        Jean-Yves Le Boudec and   
                 Patrick Thiran   Chapter 1: Network Calculus  . . . . . . 3
        Jean-Yves Le Boudec and   
                 Patrick Thiran   Chapter 2: Application of Network
                                  Calculus to the Internet . . . . . . . . 83
        Jean-Yves Le Boudec and   
                 Patrick Thiran   Chapter 3: Basic Min-plus and Max-plus
                                  Calculus . . . . . . . . . . . . . . . . 125
        Jean-Yves Le Boudec and   
                 Patrick Thiran   Chapter 4: Min-plus and Max-plus System
                                  Theory . . . . . . . . . . . . . . . . . 159
        Jean-Yves Le Boudec and   
                 Patrick Thiran   Chapter 5: Optimal Multimedia Smoothing  185
        Jean-Yves Le Boudec and   
                 Patrick Thiran   Chapter 6: FIFO Systems and Aggregate
                                  Scheduling . . . . . . . . . . . . . . . 207
        Jean-Yves Le Boudec and   
                 Patrick Thiran   Chapter 7: Adaptive and Packet Scale
                                  Rate Guarantees  . . . . . . . . . . . . 227
        Jean-Yves Le Boudec and   
                 Patrick Thiran   Chapter 8: Time Varying Shapers  . . . . 243
        Jean-Yves Le Boudec and   
                 Patrick Thiran   Chapter 9: Systems with Losses . . . . . 251
                      Anonymous   Bibliography . . . . . . . . . . . . . . 267
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 273
        Jean-Yves Le Boudec and   
                 Patrick Thiran   Introduction: What this Book is About    xiii--ix


Lecture Notes in Computer Science
Volume 2051, 2001

                Henk Barendregt   Computing and Proving  . . . . . . . . . 1
            Michael Rusinowitch   Rewriting for Deduction and Verification 2
                   Denis Bechet   Universal Interaction Systems with Only
                                  Two Agents . . . . . . . . . . . . . . . 3
      Alessandro Berarducci and   
              Corrado Böhm   General Recursion on Second Order Term
                                  Algebras . . . . . . . . . . . . . . . . 15
            Manuel Bodirsky and   
                 Katrin Erk and   
           Alexander Koller and   
                Joachim Niehren   Beta Reduction Constraints . . . . . . . 31
            Eduardo Bonelli and   
               Delia Kesner and   
          Alejandro Ríos   From Higher-Order to First-Order
                                  Rewriting  . . . . . . . . . . . . . . . 47
           Alexandre Boudet and   
              Evelyne Contejean   Combining Pattern $ {E} $-Unification
                                  Algorithms . . . . . . . . . . . . . . . 63
            Horatiu Cirstea and   
            Claude Kirchner and   
                  Luigi Liquori   Matching Power . . . . . . . . . . . . . 77
          Jürgen Giesl and   
                   Deepak Kapur   Dependency Pairs for Equational
                                  Rewriting  . . . . . . . . . . . . . . . 93
                Dieter Hofbauer   Termination Proofs by Context-Dependent
                                  Interpretations  . . . . . . . . . . . . 108
        Zurab Khasidashvili and   
             Mizuhito Ogawa and   
            Vincent van Oostrom   Uniform Normalisation beyond
                                  Orthogonality  . . . . . . . . . . . . . 122
         Konstantin Korovin and   
                Andrei Voronkov   Verifying Orientability of Rewrite Rules
                                  Using the Knuth--Bendix Order  . . . . . 137
       Armin Kühnemann and   
          Robert Glück and   
                Kazuhiko Kakehi   Relating Accumulative and
                                  Non-accumulative Functional Programs . . 154
                 Jordi Levy and   
                 Mateu Villaret   Context Unification and Traversal
                                  Equations  . . . . . . . . . . . . . . . 169
     Sébastien Limet and   
         Pierre Réty and   
                   Helmut Seidl   Weakly Regular Relations and
                                  Applications . . . . . . . . . . . . . . 185
                  Markus Lohrey   On the Parallel Complexity of Tree
                                  Automata . . . . . . . . . . . . . . . . 201
                 Salvador Lucas   Transfinite Rewriting Semantics for Term
                                  Rewriting Systems  . . . . . . . . . . . 216
          Christopher Lynch and   
               Barbara Morawska   Goal-Directed $ {E} $-Unification  . . . 231
          Michio Oyamaguchi and   
                Yoshikatsu Ohta   The Unification Problem for Confluent
                                  Right-Ground Term Rewriting Systems  . . 246
            Femke van Raamsdonk   On Termination of Higher-Order Rewriting 261
          Christophe Ringeissen   Matching with Free Function Symbols ---
                                  A Simple Extension of Matching?  . . . . 276
                   Georg Struth   Deriving Focused Calculi for Transitive
                                  Relations  . . . . . . . . . . . . . . . 291
    René Vestergaard and   
              James Brotherston   A Formalised First-Order Confluence
                                  Proof for the $ \lambda $-Calculus Using
                                  One-Sorted Variable Names  . . . . . . . 306
              Jens R. Woinowski   A Normal Form for Church--Rosser
                                  Language Systems . . . . . . . . . . . . 322
               Toshiyuki Yamada   Confluence and Termination of Simply
                                  Typed Term Rewriting Systems . . . . . . 338
              Jorge Sousa Pinto   Parallel Evaluation of Interaction Nets
                                  with MPINE . . . . . . . . . . . . . . . 353
                   Eelco Visser   Stratego: a Language for Program
                                  Transformation Based on Rewriting
                                  Strategies . . . . . . . . . . . . . . . 357
                      Anonymous   Author Index . . . . . . . . . . . . . . 363


Lecture Notes in Computer Science
Volume 2052, 2001

          Dipankar Dasgupta and   
              Fabio A. Gonzalez   An Intelligent Decision Support System
                                  for Intrusion Detection and Response . . 1
               Alexander Grusho   Mathematical Models of the Covert
                                  Channels . . . . . . . . . . . . . . . . 15
              Catherine Meadows   Open Issues in Formal Methods for
                                  Cryptographic Protocol Analysis  . . . . 21
                    Ravi Sandhu   Future Directions in Role-Based Access
                                  Control Models . . . . . . . . . . . . . 22
             Vijay Varadharajan   Secure Networked Computing . . . . . . . 27
               Jan Jürjens   Composability of Secrecy . . . . . . . . 28
     Vladimir I. Gorodetski and   
                O. Karsayev and   
                A. Khabalov and   
                 I. Kotenko and   
         Leonard J. Popyack and   
              Victor A. Skormin   Agent-Based Model of Computer Network
                                  Security System: A Case Study  . . . . . 39
                Michael Smirnov   Security Considerations and Models for
                                  Service Creation in Premium IP Networks  51
           Peter D. Zegzhda and   
              Dmitry P. Zegzhda   Secure Systems Design Technology . . . . 63
         Dimitris Gritzalis and   
      Konstantinos Moulinos and   
            Konstantinos Kostis   A Privacy-Enhancing e-Business Model
                                  Based on Infomediaries . . . . . . . . . 72
            Constance Heitmeyer   Applying Practical Formal Methods to the
                                  Specification and Analysis of Security
                                  Properties . . . . . . . . . . . . . . . 84
             Andrey Kostogryzov   Modeling Software Tools Complex for
                                  Evaluation of Information Systems
                                  Operation Quality (CEISOQ) . . . . . . . 90
           Konstantin Knorr and   
                 Harald Weidner   Analyzing Separation of Duties in Petri
                                  Net Workflows  . . . . . . . . . . . . . 102
         Alexander O. Tarakanov   Information Security with Formal Immune
                                  Networks . . . . . . . . . . . . . . . . 115
          Victor A. Skormin and   
      Jose G. Delgado-Frias and   
            Dennis L. McGee and   
         Joseph V. Giordano and   
         Leonard J. Popyack and   
     Vladimir I. Gorodetski and   
         Alexander O. Tarakanov   BASIS: a Biological Approach to System
                                  Information Security . . . . . . . . . . 127
         Alexandr Seleznyov and   
           Oleksiy Mazhelis and   
                 Seppo Puuronen   Learning Temporal Regularities of User
                                  Behavior for Anomaly Detection . . . . . 143
               Harjit Singh and   
             Steven Furnell and   
                 Benn Lines and   
                   Paul Dowland   Investigating and Evaluating Behavioural
                                  Profiling and Intrusion Detection Using
                                  Data Mining  . . . . . . . . . . . . . . 153
               Iliano Cervesato   Typed MSR: Syntax and Examples . . . . . 159
                   Steve Barker   TRBAC: a Temporal Authorization Model    178
             Tatyana Ryutov and   
                Clifford Neuman   The Set and Function Approach to
                                  Modeling Authorization in Distributed
                                  Systems  . . . . . . . . . . . . . . . . 189
          Dmitry P. Zegzhda and   
          Pavel G. Stepanov and   
               Alexey D. Otavin   Fenix Secure Operating System:
                                  Principles, Models and Architecture  . . 207
              Valeri Korjik and   
                 Kirill Morozov   Generalized Oblivious Transfer Protocols
                                  Based on Noisy Channels  . . . . . . . . 219
            Boris V. Izotov and   
     Alexander A. Moldovyan and   
              Nick A. Moldovyan   Controlled Operations as a Cryptographic
                                  Primitive  . . . . . . . . . . . . . . . 230
            Viktor Yakovlev and   
              Valery Korjik and   
                Alexander Sinuk   Key Distribution Protocol Based on Noisy
                                  Channel and Error Detecting Codes  . . . 242
           Ghassan Chaddoud and   
         Isabelle Chrisment and   
            André Schaff   Dynamic Group Key Management Protocol    251
     Vladimir I. Gorodetski and   
         Leonard J. Popyack and   
          Vladimir Samoilov and   
              Victor A. Skormin   SVD-Based Approach to Transparent
                                  Embedding Data into Digital Images . . . 263
              Nick D. Goots and   
     Alexander A. Moldovyan and   
              Nick A. Moldovyan   Fast Encryption Algorithm Spectr-H64 . . 275
            Antonio Durante and   
           Riccardo Focardi and   
               Roberto Gorrieri   CVS at Work: a Report on New Failures
                                  upon Some Cryptographic Protocols  . . . 287
        Selçuk Kavut and   
            Melek D. Yücel   On Some Cryptographic Properties of
                                  Rijndael . . . . . . . . . . . . . . . . 300
                      Anonymous   Author Index . . . . . . . . . . . . . . 313