Reprinted from Cybernetics and Systems Analysis; 30(4) [1994]