This volume constitutes the proceedings of the Fourth International Workshop on Algorithms and Data Structures, WADS '95, held in Kingston, Canada in August 1995. The book presents 40 full refereed papers selected from a total of 121 submissions together with invited papers by Preparata and Bilardi, Sharir, Toussaint, and Vitanyi and Li. The book addresses various aspects of algorithms, data structures, computational geometry, scheduling, computational graph theory, and searching.
This volume constitutes the proceedings of the Fourth International Workshop on Algorithms and Data Structures, WADS '95, held in Kingston, Canada in ...
This book constitutes the refereed proceedings of the Third Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD '99, held in Beijing, China, in April 1999. The 29 revised full papers presented together with 37 short papers were carefully selected from a total of 158 submissions. The book is divided into sections on emerging KDD technology; association rules; feature selection and generation; mining in semi-unstructured data; interestingness, surprisingness, and exceptions; rough sets, fuzzy logic, and neural networks; induction, classification, and clustering;...
This book constitutes the refereed proceedings of the Third Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD '99, held in Beijing...
This book provides the foundations of understanding the physical nature of iron and its alloys. Basics and recent developments concerning its constitution and magnetism are presented as well as its thermal properties.
This book provides the foundations of understanding the physical nature of iron and its alloys. Basics and recent developments concerning its const...
The complexity of systems studied in distributed artificial intelligence (DAI), such as multi-agent systems, often makes it extremely difficult or even impossible to correctly and completely specify their behavioral repertoires and dynamics. There is broad agreement that such systems should be equipped with the ability to learn in order to improve their future performance autonomously. The interdisciplinary cooperation of researchers from DAI and machine learning (ML) has established a new and very active area of research and development enjoying steadily increasing attention from both...
The complexity of systems studied in distributed artificial intelligence (DAI), such as multi-agent systems, often makes it extremely difficult or eve...
This book presents the verified design of a code generator translating a prototypic real-time programming language to an actual microprocessor, the Inmos Transputer. Unlike most other work on compiler verification, and with particular emphasis on modularity, it systematically covers correctness of translation down to actual machine code, a necessity in the area of safety-critical systems. The formal framework provided as well as the novel proof-engineering ideas incorporated in the verified code generator are also of relevance for software design in general.
This book presents the verified design of a code generator translating a prototypic real-time programming language to an actual microprocessor, the In...
This monograph presents the author's studies in music recognition aimed at developing a computer system for automatic notation of performed music. The performance of such a system is supposed to be similar to that of speech recognition systems: acoustical data at the input and music scoreprinting at the output. The approach to pattern recognition employed is thatof artificial perception, based on self-organizing input data in order to segregate patterns before their identification by artificial intelligencemethods. The special merit of the approach is that it finds optimal representations of...
This monograph presents the author's studies in music recognition aimed at developing a computer system for automatic notation of performed music. The...
This volume constitutes the refereed proceedings of the Fourth International Conference on Conceptual Structures, ICCS '96, held in Sydney, Australia, in August 1996. The book presents five full papers by the invited speakers together with 15 revised full papers selected for presentation at the conference from a respectable number of submissions. The issues addressed are natural language processing, information retrieval, graph operations, conceptual graph and Peirce theory, knowledge acquisition, theorem proving and CG programming, and order-based organisation and encoding.
This volume constitutes the refereed proceedings of the Fourth International Conference on Conceptual Structures, ICCS '96, held in Sydney, Australia,...
This volume constitutes the refereed proceedings of the 15th International Conference on Conceptual Modeling, ER '96, held in Cottbus, Germany, in October 1996. The volume presents three invited contributions together with 29 revised full papers selected from 110 submissions. The papers cover all current aspects of the entity-relationship approach and conceptual modeling; they are organized in sections on advanced schema design, processes, query languages, representation, integration, principles of database design, transformation, enhanced modelling, capturing design information, and...
This volume constitutes the refereed proceedings of the 15th International Conference on Conceptual Modeling, ER '96, held in Cottbus, Germany, in Oct...
This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996. The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection,...
This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, A...
This book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the context of the special program on computer security, cryptology, and coding theory at the Isaac Newton Institute. The 17 revised full papers and one abstract included in the book were carefully selected. Among the topics addressed are several types of public key cryptosystems, digital cash, electronic commerce, digital signatures, and visual cryptography. Besides original theoretical results, the collection of papers show a strong...
This book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the contex...