Abstract is missing.
- Randomized Parallel List Ranking for Distributed Memory MultiprocessorsFrank K. H. A. Dehne, Siang W. Song. 1-10
- Suffix Arrays for Multiple Strings: A Method for On-Line Multiple String SearchesFei Shi. 11-22
- Relations Among Parallel and Sequential Computation ModelsHeribert Vollmer. 23-32
- The Expressive Power of Possible-is-Certain Semantics (Extended Abstract)Sergio Greco, Domenico Saccà. 33-42
- Using Stochastic Methods to Guide Search in CLP: A Preliminary ReportJimmy Ho-Man Lee, Ho-Fung Leung, Peter J. Stuckey, V. W. L. Tam, Hon-Wing Won. 43-52
- Backtrackable State with Linear Affine Implication and Assumption GrammarsPaul Tarau, Verónica Dahl, Andrew Fall. 53-63
- Declarative Debugging in Constraint Logic ProgrammingAlexandre Tessier. 64-73
- An Improved Logging and Checkpointing Scheme for Recoverable Distributed Shared MemoryTaesoon Park, Sung Bok Cho, Heon Young Yeom. 74-83
- Distributed Concurrency Control in Real-time Cooperative Editing SystemsChengzheng Sun, Yun Yang, Yanchun Zhang, David Chen. 84-95
- Variable Timestamp-Based Distributed Deadlock Detection and ResolutionHui Wu, Wei-Ngan Chin. 96-105
- Lambda-Definable Term rewriting SystemsSugwoo Byun, Richard Kennaway, M. Ronan Sleep. 106-115
- Sets as Anti-ChainsCarl A. Gunter, Teow-Hin Ngair, Devika Subramanian. 116-128
- A Typed Lambda Calculus of Objects (Extended Abstract)Luigi Liquori, Giuseppe Castagna. 129-141
- Intensionality versus Extensionality and Primitive RecursionPierre Valarcher. 142-151
- On the Bounded Theories of Finite FreesSergei G. Vorobyov. 152-161
- Broadcasting in Star Graphs with Byzantine FailuresYukihiro Hamada, Aohan Mei, Feng Bao, Yoshihide Igarashi. 162-171
- Blind Threshold Signatures Based on Discrete LogarithmWen-Shenq Juang, Chin-Laung Lei. 172-181
- Computation of the k-Error Linear Complexity of Binary Sequences with Period 2:::n:::Takayasu Kaida, Satoshi Uehara, Kyoki Imamura. 182-191
- Symbolic Rights and Vouchers for Access Control in Distributed Object SystemsVincent Nicomette, Yves Deswarte. 192-203
- The Heuristics for the Constrained Multicast RoutingZong-Ben Xu, Bo-Ting Yang. 204-212
- On Design and Analysis of a New Block CipherXun Yi. 213-222
- CHESSBOARD: A Synergy of Object-Oriented Concurrent Programming and Program LayeringTzilla Elrad, Baoling Sheen, Novak V. Nastasic. 223-233
- A Calculational Approach to Flattening Nested Data Parallelism in Functional LanguagesGabriele Keller, Martin Simons. 234-243
- Concurrent Object-Oriented Programming in Tempo++Rafael Ramirez. 244-253
- A Universal Scripting Framework or Lambda: The Ultimate Little Language Olin Shivers. 254-265
- Design and Application of a Light-Weight Persistency MechanismMarkus Theißinger. 266-275
- Hierarchical Verification Using Verification DiagramsAnca Browne, Zohar Manna, Henny Sipma. 276-286
- A Dynamic Evolution for the Specifications of Distributed SystemsIssam A. Hamid, Ferhat Khendek. 287-298
- Formal Verification and Evaluation of Execution Time in the Envelope TheoryShigeru Igarashi, Masayuki Shio, Tetsuya Shirogane, Tetsuya Mizutani. 299-308
- Design of Controllers for Linear Hybrid SystemsRupak Majumdar, R. K. Shyamasundar. 309-320
- Checking Linear Duration Invariants by Linear ProgrammingXuandong Li, Dang Van Hung. 321-332
- Conjunctive Vector Representations for Set Valued Feature DescriptionsMichael Carl. 333-334
- Constructive Negation in Definite Constraint Logic ProgramsVijay Chandru, Suman Roy, Ramesh Subrahmanyam. 335-336
- Multilevel Master-Slave Parallel Programming ModelsHsin-Chu Chen, Alvin S. Lim, Nazir A. Warsi. 337-338
- Improving the X.509 Protocol for ATM NetworksShaw-Cheng Chuang. 339-340
- InterMUD Communications (IMC) Protocol with Extensions to VRMLise MultiUser Domains (MUDs)Chan Fang Khoon, James Seng, L.-S. Ooi, J.-K. Tan, Kevin Mok, Tin Wee Tan. 341-342
- ALPS-JI: An Annotated Logic Programming System with Hypothetical Implications (Abstract)Kazuaki Goshi, Jingde Cheng, Kazuo Ushijima. 343-344
- Constructing More Relevant ModelsLifeng He, Yuyan Chao, Yuka Shimajiri, Hirohisa Seki, Hidenori Itoh. 345-346
- Formal Analysis for Continous Systems Controlled by ProgramsShigeru Igarashi, Tetsuya Mizutani, Tetsuya Shirogane, Masayuki Shio. 347-348
- Implementation Tuning of a Dataflow Language on a Stock Parallel Machine with Visualization ToolsShigeru Kusakabe, Kentaro Inenaga, Kiyotoshi Nishimura, Makoto Amamiya. 349-350
- Overall System for Secure Wireless Mobile NetworksArthur Li, Omran A. Bukhres. 351-352
- Materialized View Adaption in Distributed DatabasesMukesh K. Mohania, Guozhu Dong. 353-354
- Coupling Object Orientation & Deduction - A Modelling PerspectiveE. Ravindran, S. C. Hui. 355-356
- An Integer Programming-Based Nurse Rostering SystemJohn Thornton, Abdul Sattar. 357-358
- Synthesizing Parallel Divide-and-Coquer Algorithms Using the List Interleave OperatorRazvan Voicu. 359-360
- Some Thoughts on Statecharts, 13 Years Later (Abstract)David Harel. 361
- End-to-End Behavior to the INternet: Measurements, Analysis, and ApplicationsJean-Chrysostome Bolot. 362-376
- The Oz Programming Language and System (Abstract)Gert Smolka. 377
- Cryptographic Postage IndiciaJ. D. Tygar, Bennet S. Yee, Nevin Heintze. 378-391