The papers in this volume were selected for presentation at the Fourth Annual International Computing and Combinatorics Conference (COCOON'98), held on August 12-14, 1998, in Taipei.
This book constitutes the strictly refereed proceedings of the 14th International Conference on Automated Deduction, CADE-14, held in Townsville, North Queensland, Australia, in July 1997.
Experimental algorithmics, as its name indicates, combines algorithmic work and experimentation: algorithms are not just designed, but also implemented and tested on a variety of instances.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Theoretical Foundations of Computer Vision, held in Dagstuhl Castle, Germany in April 2002.
This book constitutes the refereed proceedings of the 12th International Conference on Compiler Construction, CC 2003, held in Warsaw, Poland, in April 2003.
Commemorating the 50th anniversary of the first time a mathematical theorem was proven by a computer system, Freek Wiedijk initiated the present book in 2004 by inviting formalizations of a proof of the irrationality of the square root of two from scientists using various theorem proving systems.
We were very pleased to once again extend to the delegates and, we are pleased to th say, our friends the warmest of welcomes to the 8 International Conference on Knowledge-Based Intelligent Information and Engineering Systems at Wellington - stitute of Technology in Wellington, New Zealand.
Johannes Buchmann is internationally recognized as one of the leading figures in areas of computational number theory, cryptography and information security.
The LNCS journal Transactions on Aspect-Oriented Software Development is devoted to all facets of aspect-oriented software development (AOSD) techniques in the context of all phases of the software life cycle, from requirements and design to implementation, maintenance and evolution.
In May 2002 a number of about 20 scientists from various disciplines were invited by the Berlin-Brandenburg Academy of Sciences and Humanities to participate in an interdisciplinary workshop on structures and structure generating processes.
The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation.
Following the highly successful International Conference on Computer Vision - stems held in Las Palmas, Spain (ICVS'99), this second International Workshop on Computer Vision Systems, ICVS 2001 was held as an associated workshop of the International Conference on Computer Vision in Vancouver, Canada.
This volume contains the papers presented at the 12th Annual Conference on Algorithmic Learning Theory (ALT 2001), which was held in Washington DC, USA, during November 25-28, 2001.
The 14th DEXA 2003 International Conference on Database and Expert - stems Applications was held during September 1-5, 2003 at the Czech Technical UniversityinPrague,CzechRepublic.
EUROCRYPT 2001, the 20th annual Eurocrypt conference, was sponsored by the IACR, the International Association for Cryptologic Research, see http://www.
This volume constitutes the proceedings of the second International Workshop on the Semantics, Applications, and Implementation of Program Generation (SAIG 2001)held on 6 September, 2001, in Florence, Italy.
Computer analysis of images and patterns is a scienti c eld of longstanding tradition, with roots in the early years of the computer era when electronic brains inspired scientists.
This volume contains 3 invited papers, 15 regular papers, and 22 poster papers that were selected for presentation at the Third International Conference on Discovery Science (DS 2000), which was held 4-6 December 2000 in Kyoto.